SlideShare a Scribd company logo
Security challenges
in a multi-cloud
environment
Eyal Estrin, Cloud Architect, CCSP, CCSK, @eyalestrin
Agenda
▪ What is Multi-Cloud?
▪ Reasons for Multi-Cloud
▪ Multi-Cloud Challenges
▪ Security Challenges in a Multi-Cloud Environment
About me
▪ Cloud Architect, with 20 years of experience in IT, information security and cloud
services from various industries (Hi-Tech, Pharma, Banking and Academia)
▪ Working with cloud services since 2015
▪ Cloud related certifications: CCSK, CCSP and AWS security specialty
▪ Owner of the blog Security & Cloud 24/7
What is Multi-Cloud?
“Managing resources across two different clouds or more,
regardless of location (i.e. multiples of public and/or private
cloud; a mix of on-premises and public cloud with
integrated platforms)”
Foresight Factory report (http://www.digitalbizmagazine.com/wp-content/uploads/2018/09/Informe-
Future-of-Multi-Cloud_F5.pdf)
Multi-Cloud Strategy
Reasons for Multi-Cloud
▪ Vendor Lock-In
• Split resources between cloud vendors
▪ Price
• Choose the most cost-efficient solution
▪ Reliability
• Shift workloads between cloud vendors
▪ Optimal Application Environment
• Use the best tool (echo-system) or service for the job
Reasons for Multi-Cloud (Continue)
▪ Continuous Public Cloud Innovation
• Benefit from infrastructure such as containers and Serverless for
innovation and providing value to organization in a short time-to-
market
▪ Regulatory Compliance
• Selecting services and providers from different data center
regions and availability zones
Multi-Cloud Challenges
▪ Challenge: Knowledge Gap
• Requirement to have knowledge working with several cloud providers
▪ Solution
• Training for IT, development and researchers about the use and
maintenance of various cloud services
• Self-study / online courses:
▪ A Cloud Guru
▪ Cloud Academy
▪ Linux Academy
Multi-Cloud Challenges (Continue)
▪ Challenge: Cost Management
• Requirement to control the budget and monthly cost over multiple
accounts in several cloud providers
▪ Solution
• Train dedicated employees (such as IT, DevOps, finance) about the use
of cloud services (such as reviewing the monthly bill, produce cost
reports, etc.)
• Deploy cost management tools such as:
▪ CloudHealth
▪ Cloudyn / Azure cost management
▪ APPTIO
Multi-Cloud Challenges (Continue)
▪ Challenge: Environment Deployment
• Requirement to have the ability to deploy computer environments
(compute, storage, network, application) in multiple clouds
▪ Solution
• Train your employees about automation, scripting and Infrastructure as
a Code
• Deploy and use cloud-agnostic automation tools such as:
▪ Terraform
▪ Ansible
▪ Chef / Puppet
Multi-Cloud Challenges (Continue)
▪ Challenge: Vendor Lock-in
• Requirement to have the ability to move workloads between multiple
cloud providers
▪ Solution
• Build new applications and base your infrastructure on containers,
micro-services architecture and API
• Deploy and use Kubernetes managed solutions:
▪ Google Kubernetes Engine (GKE)
▪ Amazon Elastic Container Service for Kubernetes (EKS)
▪ Azure Kubernetes Service (AKS)
▪ RedHat OpenShift
Attack Surface of a Multi-Cloud Environment
What are the top threats in the Cloud
Cloud Security Alliance – “Treacherous 12”
Reference: https://cloudsecurityalliance.org/working-groups/top-threats/#_downloads
• Data Breaches • Advanced Persistent Threats (APTs)
• Weak Identity, Credential and Access
Management
• Data Loss
• Insecure APIs • Insufficient Due Diligence
• System and Application Vulnerabilities • Abuse and Nefarious Use of Cloud
Services
• Account Hijacking • Denial of Service
• Malicious Insiders • Shared Technology Vulnerabilities
Data Breaches
▪ Challenge: Safeguard Organizational Data
• Requirement to have incident response and forensics capabilities, over multiple
cloud
▪ Solution
• Deploy central SaaS based SIEM/SOC solution
• Use built-in cloud services to monitor and respond to critical security incidents (from
thousand of alerts and logs), such as:
▪ Amazon Guard​Duty
▪ Azure Security Center or Azure Sentinel (currently in preview)
▪ Cloud Security Command Center
• Deploy automation for handling security incidents
▪ Example: AWS CloudFormation Guardrails
Weak Identity, Credential and Access Management
▪ Challenge: Manage multiple identities and handle weak
authentications over multiple cloud providers
• Default authentication methods:
▪ AWS: IAM Users
▪ Microsoft Azure: AD Azure, Microsoft Live (outlook.com)
▪ GCP: Google G Suite, Gmail
▪ Solution
• Use federation-based solution (SAML, Oauth)
▪ Example of vendors: Okta, OneLogin
• Use MFA (Multi-Factor authentication)
Insecure APIs
▪ Challenge: Protect applications deployed in the cloud and
accessible from the Internet, from application-layer API
related attacks (such as data breaches, DoS, etc.)
▪ Solution
• Embed application security controls inside the software
development lifecycle (SDLC)
▪ “Pushing Left, Like a Boss - By Tanya Janca”
• Deploy API protection solutions, such as:
▪ Salt Security
System and Application Vulnerabilities
▪ Challenge: Protect cloud environments (both system and applications)
from vulnerabilities over multiple clouds
▪ Solution
• Embed solutions for locating vulnerabilities in open source:
▪ WhiteSource
▪ Synopsys Black Duck
▪ Snyk
• Embed solutions for locating system vulnerabilities:
▪ Tenable Nessus
• Use automated patch management solutions:
▪ AWS Systems Manager
▪ Azure Update Management
Data Loss
▪ Challenge: Locate sensitive data over multiple cloud providers and
protect from data leakage
▪ Solution
• Use built-in cloud services:
▪ Azure Information Protection
▪ Amazon Macie
▪ Google Cloud Data Loss Prevention
• Deploy Cloud Access Security Broker (CASB) solution, such as:
▪ ForcePoint
▪ Bitglass
▪ McAfee MVISION Cloud
Insufficient Due Diligence
▪ Challenge: Requirement to evaluate the security maturity
level and financial resiliency of multiple cloud providers
▪ Solution
• Vendor questionnaire
• Review SOC1 and SOC2 Type 2 audit reports
• Review ISO 27001 (Security Management Controls)
• Review ISO 27017 (Cloud Specific Controls)
• Review ISO 27018 (Personal Data Protection)
Abuse and Nefarious Use of Cloud Services
▪ Challenge: Requirement to protect cloud environments
from malicious activities such as denial of service, denial
of wallet (DoW), resource consumption, etc.
▪ Solution
• Enforce authentication and authorization mechanisms
• Deploy cost/budget management solution
• Enable logging and configure alerts on anomalies
• Publish legal acceptance and use for both internal and external
customers and partners
Denial of Service
▪ Challenge: Requirement to keep multiple environment up and
running and highly available over multiple cloud providers
▪ Solution
• Use built-in DDoD protection services
▪ Azure DDoS Protection
▪ AWS Shield
▪ Google Cloud Armor
• Deploy managed SaaS DDoS protection
▪ CloudFlare
▪ Incapsula
Multiple Entry Points
▪ Challenge: Requirement to allow multiple entry points
(from various locations and devices) into multiple cloud
environments in multiple cloud providers
▪ Solution
• Deploy Zero trust access solution, such as:
▪ Luminate
▪ BeyondCorp
▪ Akamai Zero Trust Security
Summary
▪ The challenges for working in multi-cloud environments can be
mitigated using the following:
• Creating a multi-cloud strategy, align with the business goals
• Employee training
• Cost management processes
• Central authentication & authorization mechanisms
• Central auditing and logging mechanisms
• Automated everything!
• Embed security inside operational processes
Thank You

More Related Content

What's hot

How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWS
Lahav Savir
 
Cloud security
Cloud securityCloud security
Cloud security
François Boucher
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
Ashnikbiz
 
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
Amazon Web Services
 
Shared Responsibility In Action
Shared Responsibility In ActionShared Responsibility In Action
Shared Responsibility In Action
Mark Nunnikhoven
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
James Strong
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
DATA SECURITY SOLUTIONS
 
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C. AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
Amazon Web Services
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWS
Alert Logic
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
Trish McGinity, CCSK
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
John Varghese
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
AWS User Group Bengaluru
 
Shared Responsibility In Action
Shared Responsibility In ActionShared Responsibility In Action
Shared Responsibility In Action
Mark Nunnikhoven
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
Amazon Web Services LATAM
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
Olivier Schmitt
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 

What's hot (20)

How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWS
 
Cloud security
Cloud securityCloud security
Cloud security
 
Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2Securing Your CI Pipeline with HashiCorp Vault - P2
Securing Your CI Pipeline with HashiCorp Vault - P2
 
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
Advanced Security Compliance and Risk Management with Xacta 360: Customer Sho...
 
Shared Responsibility In Action
Shared Responsibility In ActionShared Responsibility In Action
Shared Responsibility In Action
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
How to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloudHow to maintain business equality secured in network and cloud
How to maintain business equality secured in network and cloud
 
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C. AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWS
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2Shawn Harris - CCSP SAH v2
Shawn Harris - CCSP SAH v2
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
 
Demystifying identity on AWS
Demystifying identity on AWSDemystifying identity on AWS
Demystifying identity on AWS
 
Shared Responsibility In Action
Shared Responsibility In ActionShared Responsibility In Action
Shared Responsibility In Action
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Public cloud and the state of security
Public cloud and the state of securityPublic cloud and the state of security
Public cloud and the state of security
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 

Similar to Security challenges in a multi cloud environment

Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)
GICTTraining
 
Cloud Testing : An Overview
Cloud Testing : An OverviewCloud Testing : An Overview
Cloud Testing : An Overview
QA InfoTech
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
RightScale
 
Introduction to ActOnMagic
Introduction to ActOnMagicIntroduction to ActOnMagic
Introduction to ActOnMagic
Madan Ganesh Velayudham
 
AWS Certified Cloud Practitioner Course S1-S6
AWS Certified Cloud Practitioner Course S1-S6AWS Certified Cloud Practitioner Course S1-S6
AWS Certified Cloud Practitioner Course S1-S6
Neal Davis
 
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
Nati Shalom
 
Cloud computing
Cloud computingCloud computing
Cloud computing
حيدر نافع nafaa
 
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudInterop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Susan Wu
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
Eagle Technologies
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
Amazon Web Services
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
Anne Starr
 
Migrating into a cloud
Migrating into a cloudMigrating into a cloud
Migrating into a cloud
ANUSUYA T K
 
Cloud Brokering and Provisioning: How Technicolor Does It
Cloud Brokering and Provisioning: How Technicolor Does It Cloud Brokering and Provisioning: How Technicolor Does It
Cloud Brokering and Provisioning: How Technicolor Does It
RightScale
 
MCM_Publicv1.01.pptx
MCM_Publicv1.01.pptxMCM_Publicv1.01.pptx
MCM_Publicv1.01.pptx
Kai Viljanen
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
Jorge Sebastiao
 
Which cloud(s) & why? Defining Clouds and Best Practices
Which cloud(s) & why? Defining Clouds and Best PracticesWhich cloud(s) & why? Defining Clouds and Best Practices
Which cloud(s) & why? Defining Clouds and Best Practices
Paul Weiss
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
Tom Laszewski
 
7.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v0820207.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v082020
Wim Matthyssen
 
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESSHOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
Madan Ganesh Velayudham
 

Similar to Security challenges in a multi cloud environment (20)

Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)Certified Cloud Computing Associate (CCCA)
Certified Cloud Computing Associate (CCCA)
 
Cloud Testing : An Overview
Cloud Testing : An OverviewCloud Testing : An Overview
Cloud Testing : An Overview
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Introduction to ActOnMagic
Introduction to ActOnMagicIntroduction to ActOnMagic
Introduction to ActOnMagic
 
AWS Certified Cloud Practitioner Course S1-S6
AWS Certified Cloud Practitioner Course S1-S6AWS Certified Cloud Practitioner Course S1-S6
AWS Certified Cloud Practitioner Course S1-S6
 
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
Real World Application Orchestration Made Easy on VMware vCloud Air, vSphere ...
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-CloudInterop ITX: Moving applications: From Legacy to Cloud-to-Cloud
Interop ITX: Moving applications: From Legacy to Cloud-to-Cloud
 
Pros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed ServicesPros and Cons of Moving to Cloud and Managed Services
Pros and Cons of Moving to Cloud and Managed Services
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
 
Cloudhnologysstecociat
CloudhnologysstecociatCloudhnologysstecociat
Cloudhnologysstecociat
 
Migrating into a cloud
Migrating into a cloudMigrating into a cloud
Migrating into a cloud
 
Cloud Brokering and Provisioning: How Technicolor Does It
Cloud Brokering and Provisioning: How Technicolor Does It Cloud Brokering and Provisioning: How Technicolor Does It
Cloud Brokering and Provisioning: How Technicolor Does It
 
MCM_Publicv1.01.pptx
MCM_Publicv1.01.pptxMCM_Publicv1.01.pptx
MCM_Publicv1.01.pptx
 
Gitex journey to the cloud
Gitex journey to the cloudGitex journey to the cloud
Gitex journey to the cloud
 
Which cloud(s) & why? Defining Clouds and Best Practices
Which cloud(s) & why? Defining Clouds and Best PracticesWhich cloud(s) & why? Defining Clouds and Best Practices
Which cloud(s) & why? Defining Clouds and Best Practices
 
CSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps sessionCSC AWS re:Invent Enterprise DevOps session
CSC AWS re:Invent Enterprise DevOps session
 
7.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v0820207.habits.every.azure.admin.must.have.v082020
7.habits.every.azure.admin.must.have.v082020
 
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESSHOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
HOW CLOUD PLATFORMS ARE EVOLVING TO SUPPORT WEB-SCALE DIGITAL AND IT BUSINESS
 

Recently uploaded

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
Alex Pruden
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
ScyllaDB
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
panagenda
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
Safe Software
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Pitangent Analytics & Technology Solutions Pvt. Ltd
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
Fwdays
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
DianaGray10
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
Miro Wengner
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
operationspcvita
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Alpen-Adria-Universität
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
Edge AI and Vision Alliance
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
Ivo Velitchkov
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
AstuteBusiness
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
Antonios Katsarakis
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
Edge AI and Vision Alliance
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
zkStudyClub - LatticeFold: A Lattice-based Folding Scheme and its Application...
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-EfficiencyFreshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
Freshworks Rethinks NoSQL for Rapid Scaling & Cost-Efficiency
 
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAUHCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
HCL Notes und Domino Lizenzkostenreduzierung in der Welt von DLAU
 
Essentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation ParametersEssentials of Automations: Exploring Attributes & Automation Parameters
Essentials of Automations: Exploring Attributes & Automation Parameters
 
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
Crafting Excellence: A Comprehensive Guide to iOS Mobile App Development Serv...
 
"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota"Choosing proper type of scaling", Olena Syrota
"Choosing proper type of scaling", Olena Syrota
 
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectorsConnector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
Connector Corner: Seamlessly power UiPath Apps, GenAI with prebuilt connectors
 
JavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green MasterplanJavaLand 2024: Application Development Green Masterplan
JavaLand 2024: Application Development Green Masterplan
 
The Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptxThe Microsoft 365 Migration Tutorial For Beginner.pptx
The Microsoft 365 Migration Tutorial For Beginner.pptx
 
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing InstancesEnergy Efficient Video Encoding for Cloud and Edge Computing Instances
Energy Efficient Video Encoding for Cloud and Edge Computing Instances
 
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
“Temporal Event Neural Networks: A More Efficient Alternative to the Transfor...
 
Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024Northern Engraving | Nameplate Manufacturing Process - 2024
Northern Engraving | Nameplate Manufacturing Process - 2024
 
Apps Break Data
Apps Break DataApps Break Data
Apps Break Data
 
Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |Astute Business Solutions | Oracle Cloud Partner |
Astute Business Solutions | Oracle Cloud Partner |
 
Dandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity serverDandelion Hashtable: beyond billion requests per second on a commodity server
Dandelion Hashtable: beyond billion requests per second on a commodity server
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
“How Axelera AI Uses Digital Compute-in-memory to Deliver Fast and Energy-eff...
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

Security challenges in a multi cloud environment

  • 1. Security challenges in a multi-cloud environment Eyal Estrin, Cloud Architect, CCSP, CCSK, @eyalestrin
  • 2. Agenda ▪ What is Multi-Cloud? ▪ Reasons for Multi-Cloud ▪ Multi-Cloud Challenges ▪ Security Challenges in a Multi-Cloud Environment
  • 3. About me ▪ Cloud Architect, with 20 years of experience in IT, information security and cloud services from various industries (Hi-Tech, Pharma, Banking and Academia) ▪ Working with cloud services since 2015 ▪ Cloud related certifications: CCSK, CCSP and AWS security specialty ▪ Owner of the blog Security & Cloud 24/7
  • 4. What is Multi-Cloud? “Managing resources across two different clouds or more, regardless of location (i.e. multiples of public and/or private cloud; a mix of on-premises and public cloud with integrated platforms)” Foresight Factory report (http://www.digitalbizmagazine.com/wp-content/uploads/2018/09/Informe- Future-of-Multi-Cloud_F5.pdf)
  • 6. Reasons for Multi-Cloud ▪ Vendor Lock-In • Split resources between cloud vendors ▪ Price • Choose the most cost-efficient solution ▪ Reliability • Shift workloads between cloud vendors ▪ Optimal Application Environment • Use the best tool (echo-system) or service for the job
  • 7. Reasons for Multi-Cloud (Continue) ▪ Continuous Public Cloud Innovation • Benefit from infrastructure such as containers and Serverless for innovation and providing value to organization in a short time-to- market ▪ Regulatory Compliance • Selecting services and providers from different data center regions and availability zones
  • 8. Multi-Cloud Challenges ▪ Challenge: Knowledge Gap • Requirement to have knowledge working with several cloud providers ▪ Solution • Training for IT, development and researchers about the use and maintenance of various cloud services • Self-study / online courses: ▪ A Cloud Guru ▪ Cloud Academy ▪ Linux Academy
  • 9. Multi-Cloud Challenges (Continue) ▪ Challenge: Cost Management • Requirement to control the budget and monthly cost over multiple accounts in several cloud providers ▪ Solution • Train dedicated employees (such as IT, DevOps, finance) about the use of cloud services (such as reviewing the monthly bill, produce cost reports, etc.) • Deploy cost management tools such as: ▪ CloudHealth ▪ Cloudyn / Azure cost management ▪ APPTIO
  • 10. Multi-Cloud Challenges (Continue) ▪ Challenge: Environment Deployment • Requirement to have the ability to deploy computer environments (compute, storage, network, application) in multiple clouds ▪ Solution • Train your employees about automation, scripting and Infrastructure as a Code • Deploy and use cloud-agnostic automation tools such as: ▪ Terraform ▪ Ansible ▪ Chef / Puppet
  • 11. Multi-Cloud Challenges (Continue) ▪ Challenge: Vendor Lock-in • Requirement to have the ability to move workloads between multiple cloud providers ▪ Solution • Build new applications and base your infrastructure on containers, micro-services architecture and API • Deploy and use Kubernetes managed solutions: ▪ Google Kubernetes Engine (GKE) ▪ Amazon Elastic Container Service for Kubernetes (EKS) ▪ Azure Kubernetes Service (AKS) ▪ RedHat OpenShift
  • 12. Attack Surface of a Multi-Cloud Environment
  • 13. What are the top threats in the Cloud Cloud Security Alliance – “Treacherous 12” Reference: https://cloudsecurityalliance.org/working-groups/top-threats/#_downloads • Data Breaches • Advanced Persistent Threats (APTs) • Weak Identity, Credential and Access Management • Data Loss • Insecure APIs • Insufficient Due Diligence • System and Application Vulnerabilities • Abuse and Nefarious Use of Cloud Services • Account Hijacking • Denial of Service • Malicious Insiders • Shared Technology Vulnerabilities
  • 14. Data Breaches ▪ Challenge: Safeguard Organizational Data • Requirement to have incident response and forensics capabilities, over multiple cloud ▪ Solution • Deploy central SaaS based SIEM/SOC solution • Use built-in cloud services to monitor and respond to critical security incidents (from thousand of alerts and logs), such as: ▪ Amazon Guard​Duty ▪ Azure Security Center or Azure Sentinel (currently in preview) ▪ Cloud Security Command Center • Deploy automation for handling security incidents ▪ Example: AWS CloudFormation Guardrails
  • 15. Weak Identity, Credential and Access Management ▪ Challenge: Manage multiple identities and handle weak authentications over multiple cloud providers • Default authentication methods: ▪ AWS: IAM Users ▪ Microsoft Azure: AD Azure, Microsoft Live (outlook.com) ▪ GCP: Google G Suite, Gmail ▪ Solution • Use federation-based solution (SAML, Oauth) ▪ Example of vendors: Okta, OneLogin • Use MFA (Multi-Factor authentication)
  • 16. Insecure APIs ▪ Challenge: Protect applications deployed in the cloud and accessible from the Internet, from application-layer API related attacks (such as data breaches, DoS, etc.) ▪ Solution • Embed application security controls inside the software development lifecycle (SDLC) ▪ “Pushing Left, Like a Boss - By Tanya Janca” • Deploy API protection solutions, such as: ▪ Salt Security
  • 17. System and Application Vulnerabilities ▪ Challenge: Protect cloud environments (both system and applications) from vulnerabilities over multiple clouds ▪ Solution • Embed solutions for locating vulnerabilities in open source: ▪ WhiteSource ▪ Synopsys Black Duck ▪ Snyk • Embed solutions for locating system vulnerabilities: ▪ Tenable Nessus • Use automated patch management solutions: ▪ AWS Systems Manager ▪ Azure Update Management
  • 18. Data Loss ▪ Challenge: Locate sensitive data over multiple cloud providers and protect from data leakage ▪ Solution • Use built-in cloud services: ▪ Azure Information Protection ▪ Amazon Macie ▪ Google Cloud Data Loss Prevention • Deploy Cloud Access Security Broker (CASB) solution, such as: ▪ ForcePoint ▪ Bitglass ▪ McAfee MVISION Cloud
  • 19. Insufficient Due Diligence ▪ Challenge: Requirement to evaluate the security maturity level and financial resiliency of multiple cloud providers ▪ Solution • Vendor questionnaire • Review SOC1 and SOC2 Type 2 audit reports • Review ISO 27001 (Security Management Controls) • Review ISO 27017 (Cloud Specific Controls) • Review ISO 27018 (Personal Data Protection)
  • 20. Abuse and Nefarious Use of Cloud Services ▪ Challenge: Requirement to protect cloud environments from malicious activities such as denial of service, denial of wallet (DoW), resource consumption, etc. ▪ Solution • Enforce authentication and authorization mechanisms • Deploy cost/budget management solution • Enable logging and configure alerts on anomalies • Publish legal acceptance and use for both internal and external customers and partners
  • 21. Denial of Service ▪ Challenge: Requirement to keep multiple environment up and running and highly available over multiple cloud providers ▪ Solution • Use built-in DDoD protection services ▪ Azure DDoS Protection ▪ AWS Shield ▪ Google Cloud Armor • Deploy managed SaaS DDoS protection ▪ CloudFlare ▪ Incapsula
  • 22. Multiple Entry Points ▪ Challenge: Requirement to allow multiple entry points (from various locations and devices) into multiple cloud environments in multiple cloud providers ▪ Solution • Deploy Zero trust access solution, such as: ▪ Luminate ▪ BeyondCorp ▪ Akamai Zero Trust Security
  • 23. Summary ▪ The challenges for working in multi-cloud environments can be mitigated using the following: • Creating a multi-cloud strategy, align with the business goals • Employee training • Cost management processes • Central authentication & authorization mechanisms • Central auditing and logging mechanisms • Automated everything! • Embed security inside operational processes