SlideShare a Scribd company logo
2021 SecurityPlus
SaaS Security Assessment
(From a practical point of view)
이 찬 우
How to use cloud securely?
In short,
Customer should consider security in SDLC.
4
What’s wrong with this pictures?
5
Some things don’t change over time.
Not Special.
Source Link : https://www.information-age.com/public-cloud-revenue-to-grow-6-3-in-2020-gartner-123490499/
The SaaS market is growing rapidly
Source Link : https://www.bmc.com/blogs/saas-growth-trends/
What are the biggest companies?
Source Link : https://snazlan.wordpress.com/2016/12/09/topic-0020-assessment-vs-evaluation/
10
Preparation → Assessment → F/up → Evaluation
11
“Can refer to various references for SaaS security assessment.”
Preparation
2021 SecurityPlus
SaaS Security Assessment
✓ KISA, Cloud Service Information Security Guide(SaaS)
✓ KISA, Cloud Vulnerability Analysis Guide
✓ SK Infosec, Cloud Security Guide
✓ CIS Benchmark for Cloud Services
✓ Vendor, Reference Architecture Guide for SaaS
Copyright 2021. Chanwoo Lee All rights reserved.
“Must develop our own framework.”
Source Link : https://www.bettercloud.com/monitor/saas-operations-management/
SaaS Management Reference Architecture
13
“Can derive your requirements through a security assessment.”
Assessment
2021 SecurityPlus
SaaS Security Assessment
✓ Service : Business and background
✓ Data : Legal and Privacy
✓ Architecture : Design and Configuration
✓ Application : Vendor and Product
✓ Authority : Accounts and Authentication
✓ Security Control : Data Leakage and Malware
✓ Monitoring : Log feeding and Integration
✓ Stakeholder : Role and Responsibility
Copyright 2021. Chanwoo Lee All rights reserved.
“Must analyze various use cases.”
Source Link : https://securityboulevard.com/2019/04/penetration-testing-for-saas-companies/
SaaS Security Reference Architecture
15
“Must implement the requirements you have derived.”
F/up
2021 SecurityPlus
SaaS Security Assessment
[Data]
✓ Personal Information protection
✓ SSL/TLS Encryption
✓ Data and password Encryption
✓ Data Retention
✓ Tenant Restriction
✓ Sharing and Download permission disable
✓ Upload File Scanning
✓ Validation of file extension
Copyright 2021. Chanwoo Lee All rights reserved.
16
“Must implement the requirements you have derived.”
F/up
2021 SecurityPlus
SaaS Security Assessment
[Access]
✓ SSO/SAML Integration
✓ IP Restriction
✓ Multi-Factor Authentication
✓ Guest Access Control
✓ Session Timeout
✓ Concurrent-session Control
✓ Minimizing Pre-defined roles and permissions
Copyright 2021. Chanwoo Lee All rights reserved.
17
“Must implement the requirements you have derived.”
F/up
2021 SecurityPlus
SaaS Security Assessment
[Etc]
✓ Log management
✓ SIEM integration
✓ Management of API Key, Plug-in, Third-Party Program
✓ Application Configuration Analysis
Copyright 2021. Chanwoo Lee All rights reserved.
“Must discuss with stakeholders in advance.”
Source Link : https://www.hubspot.com/pricing/
SaaS Pricing Model(Subscription)
Source Link : https://www.atlassian.com/ko/software/jira
Issue Tracking system(Ex. JIRA)
20
“Must get visibility and evaluate periodically.”
Evaluation
2021 SecurityPlus
SaaS Security Assessment
✓ Is the Assessment process operating as designed?
✓ What are the ways to improve the Assessment process?
✓ Has the security level of our company increased through
the Assessment process?
✓ Did you miss anything in the Assessment process?
✓ What are the problems you are facing while Assessment
process?
✓ What can you create after solving those problems?
Copyright 2021. Chanwoo Lee All rights reserved.
“Must evaluate on a paper and evidence basis.”
Source Link : https://docs.servicenow.com/
Dashboard(Ex. ServiceNow)
Source Link : https://congruentagile.com/2020/03/16/less-sprint/
Review and Retrospective
Clear
Detail
24
Wrap-up
Customer should
consider security
in SDLC.
Customer Need to
develop their own
framework.
Changing people through technology
Chanwoo Lee | Richard
Blog blog.naver.com/jg706
Facebook www.facebook.com/jg706
Slideshare www.slideshare.net/jg706
Linkedin www.linkedin.com/in/jg706
Youtube www.youtube.com/channel/UC5Hs9p5_euXJbaf5E7Hx7Ag
jg719411@nate.com | 010-4772-0130

More Related Content

What's hot

MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE - ATT&CKcon
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
FireEye, Inc.
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
isc2dfw
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Edureka!
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
Marco Morana
 
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]Sébastien Rabaud
 
Profiling your Java Application
Profiling your Java ApplicationProfiling your Java Application
Profiling your Java Application
Victor Rentea
 
Secure software development presentation
Secure software development presentationSecure software development presentation
Secure software development presentation
Mahdi Dolati
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
MITRE - ATT&CKcon
 
PRA et PCA : plans de reprise et de continuité d'activité
 PRA et PCA : plans de reprise et de continuité d'activité PRA et PCA : plans de reprise et de continuité d'activité
PRA et PCA : plans de reprise et de continuité d'activité
Christophe Casalegno
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
Anton Chuvakin
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
AmineRached2
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Shawn Tuma
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
MITRE ATT&CK
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
David Sweigert
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
bdemchak
 
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorAutomating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
MITRE ATT&CK
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
Ahmad Haghighi
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
Prime Infoserv
 
COBIT®5 - Foundation
COBIT®5 - FoundationCOBIT®5 - Foundation

What's hot (20)

MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
 
The Internal Signs of Compromise
The Internal Signs of CompromiseThe Internal Signs of Compromise
The Internal Signs of Compromise
 
Cyber Security Emerging Threats
Cyber Security Emerging ThreatsCyber Security Emerging Threats
Cyber Security Emerging Threats
 
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
Cybersecurity Frameworks | NIST Cybersecurity Framework | Cybersecurity Certi...
 
Risk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware AttacksRisk Analysis Of Banking Malware Attacks
Risk Analysis Of Banking Malware Attacks
 
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
Politiques Sécurité de l'Information - [SCASSI] [Club 27001] [TLS] [2013]
 
Profiling your Java Application
Profiling your Java ApplicationProfiling your Java Application
Profiling your Java Application
 
Secure software development presentation
Secure software development presentationSecure software development presentation
Secure software development presentation
 
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and ResearchUsing MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
 
PRA et PCA : plans de reprise et de continuité d'activité
 PRA et PCA : plans de reprise et de continuité d'activité PRA et PCA : plans de reprise et de continuité d'activité
PRA et PCA : plans de reprise et de continuité d'activité
 
SOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton ChuvakinSOC Lessons from DevOps and SRE by Anton Chuvakin
SOC Lessons from DevOps and SRE by Anton Chuvakin
 
Swift-cyber-attacks.pptx
Swift-cyber-attacks.pptxSwift-cyber-attacks.pptx
Swift-cyber-attacks.pptx
 
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial InstitutionsCybersecurity: Cyber Risk Management for Banks & Financial Institutions
Cybersecurity: Cyber Risk Management for Banks & Financial Institutions
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
 
Understanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loopUnderstanding Cyber Kill Chain and OODA loop
Understanding Cyber Kill Chain and OODA loop
 
Security patterns and model driven architecture
Security patterns and model driven architectureSecurity patterns and model driven architecture
Security patterns and model driven architecture
 
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections CollectorAutomating the mundanity of technique IDs with ATT&CK Detections Collector
Automating the mundanity of technique IDs with ATT&CK Detections Collector
 
An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)An introduction to SOC (Security Operation Center)
An introduction to SOC (Security Operation Center)
 
FireEye Portfolio
FireEye PortfolioFireEye Portfolio
FireEye Portfolio
 
COBIT®5 - Foundation
COBIT®5 - FoundationCOBIT®5 - Foundation
COBIT®5 - Foundation
 

Similar to [이찬우 강사] Security plus saas security assessment_2021.04

July 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slidesJuly 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slides
SoCalLAAdmin
 
Cloud computing elisheba wiggins
Cloud computing elisheba wigginsCloud computing elisheba wiggins
Cloud computing elisheba wiggins
Elisheba Wiggins
 
Finance Technologies: Buy or Rent
Finance Technologies: Buy or RentFinance Technologies: Buy or Rent
Finance Technologies: Buy or Rent
ScottMadden, Inc.
 
Build a complete security operations and compliance program using a graph dat...
Build a complete security operations and compliance program using a graph dat...Build a complete security operations and compliance program using a graph dat...
Build a complete security operations and compliance program using a graph dat...
Erkang Zheng
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
Ken Huang
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
Trish McGinity, CCSK
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
CloudLock
 
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebookComparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
ProfitBricks
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
CloudPassage
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
Amazon Web Services
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
Ariel Evans
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
David Linthicum
 
Lightning Workshop London
Lightning Workshop LondonLightning Workshop London
Lightning Workshop London
Keir Bowden
 
(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting
Priyanka Aash
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
Synopsys Software Integrity Group
 
Best Practices for Your CMP RFP or RFI
Best Practices for Your CMP RFP or RFIBest Practices for Your CMP RFP or RFI
Best Practices for Your CMP RFP or RFI
RightScale
 
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Yew Weisin
 
Spring Cloud Stream: What's New in 2.x—and What's Next?
Spring Cloud Stream: What's New in 2.x—and What's Next?Spring Cloud Stream: What's New in 2.x—and What's Next?
Spring Cloud Stream: What's New in 2.x—and What's Next?
VMware Tanzu
 
Cloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC ConsultingCloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC Consulting
kylelai
 

Similar to [이찬우 강사] Security plus saas security assessment_2021.04 (20)

July 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slidesJuly 31, 2020 - CSA LA event slides
July 31, 2020 - CSA LA event slides
 
Cloud computing elisheba wiggins
Cloud computing elisheba wigginsCloud computing elisheba wiggins
Cloud computing elisheba wiggins
 
Finance Technologies: Buy or Rent
Finance Technologies: Buy or RentFinance Technologies: Buy or Rent
Finance Technologies: Buy or Rent
 
Build a complete security operations and compliance program using a graph dat...
Build a complete security operations and compliance program using a graph dat...Build a complete security operations and compliance program using a graph dat...
Build a complete security operations and compliance program using a graph dat...
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
Up 2011-ken huang
Up 2011-ken huangUp 2011-ken huang
Up 2011-ken huang
 
Cloud Seeding
Cloud SeedingCloud Seeding
Cloud Seeding
 
Codeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWSCodeless Security for the Apps You Buy & Build on AWS
Codeless Security for the Apps You Buy & Build on AWS
 
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebookComparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
Comparing cloud-computing-providers-11-factors-to-consider-profit bricks-ebook
 
Security that works with, not against, your SaaS business
Security that works with, not against, your SaaS businessSecurity that works with, not against, your SaaS business
Security that works with, not against, your SaaS business
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 
Secure development 2014
Secure development 2014Secure development 2014
Secure development 2014
 
Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013Geting cloud architecture right the first time linthicum interop fall 2013
Geting cloud architecture right the first time linthicum interop fall 2013
 
Lightning Workshop London
Lightning Workshop LondonLightning Workshop London
Lightning Workshop London
 
(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting(SACON) Anant Shrivastava - cloud pentesting
(SACON) Anant Shrivastava - cloud pentesting
 
Webinar–That is Not How This Works
Webinar–That is Not How This WorksWebinar–That is Not How This Works
Webinar–That is Not How This Works
 
Best Practices for Your CMP RFP or RFI
Best Practices for Your CMP RFP or RFIBest Practices for Your CMP RFP or RFI
Best Practices for Your CMP RFP or RFI
 
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
Migrating to Cloud? 5 motivations and 10 key security architecture considerat...
 
Spring Cloud Stream: What's New in 2.x—and What's Next?
Spring Cloud Stream: What's New in 2.x—and What's Next?Spring Cloud Stream: What's New in 2.x—and What's Next?
Spring Cloud Stream: What's New in 2.x—and What's Next?
 
Cloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC ConsultingCloud Computing and Security - by KLC Consulting
Cloud Computing and Security - by KLC Consulting
 

More from Lee Chanwoo

AI_introduction and requirements(2024.05.12).pdf
AI_introduction and requirements(2024.05.12).pdfAI_introduction and requirements(2024.05.12).pdf
AI_introduction and requirements(2024.05.12).pdf
Lee Chanwoo
 
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
Lee Chanwoo
 
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
Lee Chanwoo
 
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
Lee Chanwoo
 
[이찬우 강사] Persons with disabilities education(2020.02.05)
[이찬우 강사] Persons with disabilities education(2020.02.05)[이찬우 강사] Persons with disabilities education(2020.02.05)
[이찬우 강사] Persons with disabilities education(2020.02.05)
Lee Chanwoo
 
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
Lee Chanwoo
 
[이찬우 강사] Osstem implant information security education_final version(20181011)
[이찬우 강사] Osstem implant information security education_final version(20181011)[이찬우 강사] Osstem implant information security education_final version(20181011)
[이찬우 강사] Osstem implant information security education_final version(20181011)
Lee Chanwoo
 
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
Lee Chanwoo
 
[이찬우 강사] Korea it information security academy public seminar presentation_st...
[이찬우 강사] Korea it information security academy public seminar presentation_st...[이찬우 강사] Korea it information security academy public seminar presentation_st...
[이찬우 강사] Korea it information security academy public seminar presentation_st...
Lee Chanwoo
 
[이찬우 강사] Korea it information security academy dongyang mirae university job ...
[이찬우 강사] Korea it information security academy dongyang mirae university job ...[이찬우 강사] Korea it information security academy dongyang mirae university job ...
[이찬우 강사] Korea it information security academy dongyang mirae university job ...
Lee Chanwoo
 
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
Lee Chanwoo
 
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
Lee Chanwoo
 
[이찬우 강사] Ing life information security education 20180625 final version
[이찬우 강사] Ing life information security education 20180625 final version[이찬우 강사] Ing life information security education 20180625 final version
[이찬우 강사] Ing life information security education 20180625 final version
Lee Chanwoo
 
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
Lee Chanwoo
 
Cyber resilience 201705
Cyber resilience 201705Cyber resilience 201705
Cyber resilience 201705
Lee Chanwoo
 
사이버 보안 트렌드_이찬우_2018020309_최종발표버전
사이버 보안 트렌드_이찬우_2018020309_최종발표버전사이버 보안 트렌드_이찬우_2018020309_최종발표버전
사이버 보안 트렌드_이찬우_2018020309_최종발표버전
Lee Chanwoo
 
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_finalIsaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
Lee Chanwoo
 
2016 sua 발표스터디 이찬우
2016 sua 발표스터디 이찬우2016 sua 발표스터디 이찬우
2016 sua 발표스터디 이찬우
Lee Chanwoo
 
2016 레몬세미나 발표자료 이찬우 final
2016 레몬세미나 발표자료 이찬우 final2016 레몬세미나 발표자료 이찬우 final
2016 레몬세미나 발표자료 이찬우 final
Lee Chanwoo
 
2016 산업보안 공모전 일반부 장려상
2016 산업보안 공모전 일반부 장려상2016 산업보안 공모전 일반부 장려상
2016 산업보안 공모전 일반부 장려상
Lee Chanwoo
 

More from Lee Chanwoo (20)

AI_introduction and requirements(2024.05.12).pdf
AI_introduction and requirements(2024.05.12).pdfAI_introduction and requirements(2024.05.12).pdf
AI_introduction and requirements(2024.05.12).pdf
 
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
[이찬우 강사] bithumb_Privacy_Lecture(2021.12)
 
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
[이찬우 강사] Information security and digital sex crime_lecture(2020.09)
 
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
[이찬우 강사] Hyundai hcn busan_4th_indusry(2020.02.13)
 
[이찬우 강사] Persons with disabilities education(2020.02.05)
[이찬우 강사] Persons with disabilities education(2020.02.05)[이찬우 강사] Persons with disabilities education(2020.02.05)
[이찬우 강사] Persons with disabilities education(2020.02.05)
 
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
[이찬우 강사] Study on isms-p integration issues and major defects(20181017)
 
[이찬우 강사] Osstem implant information security education_final version(20181011)
[이찬우 강사] Osstem implant information security education_final version(20181011)[이찬우 강사] Osstem implant information security education_final version(20181011)
[이찬우 강사] Osstem implant information security education_final version(20181011)
 
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
[이찬우 강사] Sua_mentoring_career war vs employment battle_final_version(20180901)
 
[이찬우 강사] Korea it information security academy public seminar presentation_st...
[이찬우 강사] Korea it information security academy public seminar presentation_st...[이찬우 강사] Korea it information security academy public seminar presentation_st...
[이찬우 강사] Korea it information security academy public seminar presentation_st...
 
[이찬우 강사] Korea it information security academy dongyang mirae university job ...
[이찬우 강사] Korea it information security academy dongyang mirae university job ...[이찬우 강사] Korea it information security academy dongyang mirae university job ...
[이찬우 강사] Korea it information security academy dongyang mirae university job ...
 
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
[이찬우 강사] Hsp 4th industry innovation and financial security fn(20180721)
 
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
[이찬우 강사] Global convergence forum security of crypto currency exchange 20180714
 
[이찬우 강사] Ing life information security education 20180625 final version
[이찬우 강사] Ing life information security education 20180625 final version[이찬우 강사] Ing life information security education 20180625 final version
[이찬우 강사] Ing life information security education 20180625 final version
 
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
[이찬우 강사] Gyeonggi Institute of Science & Technology Promotion_employee inform...
 
Cyber resilience 201705
Cyber resilience 201705Cyber resilience 201705
Cyber resilience 201705
 
사이버 보안 트렌드_이찬우_2018020309_최종발표버전
사이버 보안 트렌드_이찬우_2018020309_최종발표버전사이버 보안 트렌드_이찬우_2018020309_최종발표버전
사이버 보안 트렌드_이찬우_2018020309_최종발표버전
 
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_finalIsaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
Isaca knowledge concert 금융보안 발표자료 이찬우(2017.07.17)_final
 
2016 sua 발표스터디 이찬우
2016 sua 발표스터디 이찬우2016 sua 발표스터디 이찬우
2016 sua 발표스터디 이찬우
 
2016 레몬세미나 발표자료 이찬우 final
2016 레몬세미나 발표자료 이찬우 final2016 레몬세미나 발표자료 이찬우 final
2016 레몬세미나 발표자료 이찬우 final
 
2016 산업보안 공모전 일반부 장려상
2016 산업보안 공모전 일반부 장려상2016 산업보안 공모전 일반부 장려상
2016 산업보안 공모전 일반부 장려상
 

Recently uploaded

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 

Recently uploaded (16)

快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 

[이찬우 강사] Security plus saas security assessment_2021.04

  • 1. 2021 SecurityPlus SaaS Security Assessment (From a practical point of view) 이 찬 우
  • 2. How to use cloud securely?
  • 3. In short, Customer should consider security in SDLC.
  • 4. 4 What’s wrong with this pictures?
  • 5. 5 Some things don’t change over time.
  • 7. Source Link : https://www.information-age.com/public-cloud-revenue-to-grow-6-3-in-2020-gartner-123490499/ The SaaS market is growing rapidly
  • 8. Source Link : https://www.bmc.com/blogs/saas-growth-trends/ What are the biggest companies?
  • 9. Source Link : https://snazlan.wordpress.com/2016/12/09/topic-0020-assessment-vs-evaluation/
  • 10. 10 Preparation → Assessment → F/up → Evaluation
  • 11. 11 “Can refer to various references for SaaS security assessment.” Preparation 2021 SecurityPlus SaaS Security Assessment ✓ KISA, Cloud Service Information Security Guide(SaaS) ✓ KISA, Cloud Vulnerability Analysis Guide ✓ SK Infosec, Cloud Security Guide ✓ CIS Benchmark for Cloud Services ✓ Vendor, Reference Architecture Guide for SaaS Copyright 2021. Chanwoo Lee All rights reserved. “Must develop our own framework.”
  • 12. Source Link : https://www.bettercloud.com/monitor/saas-operations-management/ SaaS Management Reference Architecture
  • 13. 13 “Can derive your requirements through a security assessment.” Assessment 2021 SecurityPlus SaaS Security Assessment ✓ Service : Business and background ✓ Data : Legal and Privacy ✓ Architecture : Design and Configuration ✓ Application : Vendor and Product ✓ Authority : Accounts and Authentication ✓ Security Control : Data Leakage and Malware ✓ Monitoring : Log feeding and Integration ✓ Stakeholder : Role and Responsibility Copyright 2021. Chanwoo Lee All rights reserved. “Must analyze various use cases.”
  • 14. Source Link : https://securityboulevard.com/2019/04/penetration-testing-for-saas-companies/ SaaS Security Reference Architecture
  • 15. 15 “Must implement the requirements you have derived.” F/up 2021 SecurityPlus SaaS Security Assessment [Data] ✓ Personal Information protection ✓ SSL/TLS Encryption ✓ Data and password Encryption ✓ Data Retention ✓ Tenant Restriction ✓ Sharing and Download permission disable ✓ Upload File Scanning ✓ Validation of file extension Copyright 2021. Chanwoo Lee All rights reserved.
  • 16. 16 “Must implement the requirements you have derived.” F/up 2021 SecurityPlus SaaS Security Assessment [Access] ✓ SSO/SAML Integration ✓ IP Restriction ✓ Multi-Factor Authentication ✓ Guest Access Control ✓ Session Timeout ✓ Concurrent-session Control ✓ Minimizing Pre-defined roles and permissions Copyright 2021. Chanwoo Lee All rights reserved.
  • 17. 17 “Must implement the requirements you have derived.” F/up 2021 SecurityPlus SaaS Security Assessment [Etc] ✓ Log management ✓ SIEM integration ✓ Management of API Key, Plug-in, Third-Party Program ✓ Application Configuration Analysis Copyright 2021. Chanwoo Lee All rights reserved. “Must discuss with stakeholders in advance.”
  • 18. Source Link : https://www.hubspot.com/pricing/ SaaS Pricing Model(Subscription)
  • 19. Source Link : https://www.atlassian.com/ko/software/jira Issue Tracking system(Ex. JIRA)
  • 20. 20 “Must get visibility and evaluate periodically.” Evaluation 2021 SecurityPlus SaaS Security Assessment ✓ Is the Assessment process operating as designed? ✓ What are the ways to improve the Assessment process? ✓ Has the security level of our company increased through the Assessment process? ✓ Did you miss anything in the Assessment process? ✓ What are the problems you are facing while Assessment process? ✓ What can you create after solving those problems? Copyright 2021. Chanwoo Lee All rights reserved. “Must evaluate on a paper and evidence basis.”
  • 21. Source Link : https://docs.servicenow.com/ Dashboard(Ex. ServiceNow)
  • 22. Source Link : https://congruentagile.com/2020/03/16/less-sprint/ Review and Retrospective
  • 24. 24 Wrap-up Customer should consider security in SDLC. Customer Need to develop their own framework.
  • 25. Changing people through technology Chanwoo Lee | Richard Blog blog.naver.com/jg706 Facebook www.facebook.com/jg706 Slideshare www.slideshare.net/jg706 Linkedin www.linkedin.com/in/jg706 Youtube www.youtube.com/channel/UC5Hs9p5_euXJbaf5E7Hx7Ag jg719411@nate.com | 010-4772-0130