2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud

上传人:东****0 文档编号:156466319 上传时间:2020-12-18 格式:PDF 页数:22 大小:1.41MB
返回 下载 相关 举报
2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud_第1页
第1页 / 共22页
2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud_第2页
第2页 / 共22页
2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud_第3页
第3页 / 共22页
2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud_第4页
第4页 / 共22页
2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud_第5页
第5页 / 共22页
亲,该文档总共22页,到这儿已超出免费预览范围,如果喜欢就下载吧!
资源描述

《2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud》由会员分享,可在线阅读,更多相关《2020_USA20_CSV-F02_01_Hacking Your Security Culture for the Cloud(22页珍藏版)》请在金锄头文库上搜索。

1、#RSAC SESSION ID: #RSAC SESSION ID: Brian Riley Hacking Your Security Culture for the Cloud CSV-F02 Senior Director, Global Cyber Risk Management Liberty Mutual Insurance #RSAC 2 or: How an InfoSec Curmudgeon Learned to Stop Worrying and Love the Cloud #RSAC $ whoami 3 Brian Riley, Senior Director G

2、lobal Cyber Risk Management 25 years of experience with cybersecurity in financial services #RSAC 4 At Liberty, we believe progress happens when people feel secure. Liberty Mutual #RSAC 5 Liberty by the numbers Founded 1912, based in Boston Nearly 50,000 employees in 30 countries and economies world

3、wide 5thlargest global P&C insurer* Ranked 75th on Fortune 100 list of largest companies* *Based 2018 gross written premium and revenue, respectively. #RSAC 6 An early (mistaken) understanding of the Cloud “Ill tell you exactly what Cloud Computing is Cloud is nothing more than the current crop of v

4、acuous, meaningless marketing nonsense that vendors use to try to open new markets. It really means nothing but is generally applied to large-scale virtualization (which we have been doing for years), just with fewer controls and less oversight.” B. Riley, 9/2013 #RSAC 7 The classic InfoSec mindset

5、vs. PerfectBroken #RSAC 8 Early steps: Drawing some wrong conclusions The cloud is really just our 4thData Center. So lets protect it with the same controls we use in the other three. But we know how to do all of this. If the cloud is just another data center, why is it so hard to do what just works

6、 everywhere else? #RSAC 9 Thinking differently “We cannot solve our problems with the same thinking we used when we created them.” Albert Einstein #RSAC 10 Implications for security: Two paradigms shift Servers are fixed assets that depreciate over time, creating the incentive to keep systems around

7、 for as long as possible to maximize return on investment creating many traditional security problems. We pay only for what we use, creating the incentive to destroy environments as quickly as possible and rebuild them only when they are needed. This reduces risk (a threat can only be persistent in

8、an environment that is persistent). OpportunitiesChallenges Cloud computing shifts the economics of security in ways that affect both attackers and enterprises. Everything is software which presents opportunities and creates new challenges Traditional handoffs and security checks no longer occur Whi

9、le automation eliminates many common risks, mistakes can have much bigger impact Some security controls are harder or more expensive to implement in the cloud Infrastructure and applications are built consistently through automation, simplifying disaster recovery Security and compliance controls can

10、 be automated, offering continuous compliance Automated deployments reduces the need for human interaction with systems, limiting insider threats and risk of misconfiguration Some security controls are much easier to implement in the cloud Cloud environmentsData Centers #RSAC 11 But the Cloud is mor

11、e complicated! With developers defining AWS Security Groups in CFTs, do we give enough tools to help people code the right rules? Is an understanding of how packets route relevant to making the right choices about firewall rules? How much should a developer need to think about the way BGP is configu

12、red in our network routing? #RSAC#RSAC Tools to hack your culture #RSAC 13 Infrastructure as code requires security as code #RSAC 14 #RSAC z 15 Radar architecture Account Project Subscription Region X Account Region X (encrypted) #RSAC z 16 Radar architecture Account Region X Project Subscription Ac

13、count Region X (encrypted) #RSAC 17 Our goal: Managing the blast radius of failure News flash: IT professionals are human beings and may occasionally make mistakes. How can we limit the impact of those mistakes? Small, frequent releases Modern development practices Rethink the way we structure our c

14、loud resources #RSAC 18 Offensive Security: Red, Blue, and Purple Teams Purple Team What we learn when Red works with Blue Red Team Attackers Blue Team Defenders #RSAC#RSAC Conclusions #RSAC 20 Governance as an enabler Credit: Michael St. Onge, AWS AgilityControl #RSAC 21 The future of SecOps: Behin

15、d the 8 ball SecOps is behind the 8 ball, by definition. The deck is stacked against us Mike Rothman, Securosis11/10/17 We need to think differently. Embrace automation instead of fearing it. We are entering a new world Security is largely built into the technology stacks which run our infrastructure. We must change how we do things Embrace processes which will most likely make you uncomfortable. #RSAC Hacking our culture 22 Security as a documentSecurity as code s3-encrypted: action: enableEncryption remediate-report: true trigger-events: - name: CreateBucket - name: DeleteBucketEncryption

展开阅读全文
相关资源
正为您匹配相似的精品文档
相关搜索

最新文档


当前位置:首页 > 中学教育 > 教学课件 > 高中课件

电脑版 |金锄头文库版权所有
经营许可证:蜀ICP备13022795号 | 川公网安备 51140202000112号