Whether you’ve got SaaS apps deployed, depend on IaaS solutions like AWS, run on a PaaS platform lik Force.com, or have an IDaaS solution in place, finding common ground for your entire cloud ecosystem's security is tough. It’s where all these come together that security becomes chaotic and fascinating.
WSO2's API Vision: Unifying Control, Empowering Developers
Cloud Cybersecurity Beyond SaaS
1. April 28, 2015
Cloud Cybersecurity Beyond
SaaS
Tsahy Shapsa
Co-Founder
Russell Miller
Director of Product Marketing
2. The Enterprise Cloud IT Backbone & Cloud Factory
Business Backbone People Factory (PaaS & IaaS)
Legacy Security
Solutions
ON-PREMISECLOUD
CyberSecurity
Fabric
Messaging & Collaboration
Sales & marketing
HR & Skills
Finance
Sharepoint
Apps
App Server
Database
force.com
CloudLock Confidential - DO NOT DISTRIBUTE 2
3. Agenda
01
02
03
04
Cyberlab Research: The 1% Who Can Take
Down Your Organization
The Anatomy of a Cloud Cyberattack
To Proxy or Not To Proxy
CloudLock Cybersecurity Fabric
3
05
Requirements for a Cloud Security Solution
6. Agenda
01
02
03
04
Cyberlab Research: The 1% Who Can Take
Down Your Organization
The Anatomy of a Cloud Cyberattack
To Proxy or Not To Proxy
CloudLock Cybersecurity Fabric
6
05
Requirements for a Cloud Security Solution
7. Anatomy of a pure cloud cyberattack
Deliver ActRecon
1 2 3
12. Agenda
01
02
03
04
Cyberlab Research: The 1% Who Can Take
Down Your Organization
The Anatomy of a Cloud Cyberattack
CloudLock Cybersecurity Fabric
12
05
Requirements for a Cloud Security Solution
To Proxy or Not To Proxy
15. 15
To detect account compromises, look across platforms!
▪
▪
● Distance from the US to the Central African Republic: 7,362 miles
● At a speed of 800 mph, it would take 9.2 hours to travel between
them
24. Agenda
01
02
03
04
Cyberlab Research: The 1% Who Can Take
Down Your Organization
The Anatomy of a Cloud Cyberattack
CloudLock Cybersecurity Fabric
24
05
Requirements for a Cloud Security Solution
To Proxy or Not To Proxy
25. Questions You Must Ask Yourself
SaaS
force.com
PaaS and IaaS
force.com
IDaaS
What do users do in
my Cloud Apps?
How do I identify
compromised
Accounts?
What Shadow Apps
are my users using?
Are Shadow Apps
connected to
sanctioned Ones ?
Do I have sensitive
Toxic/regulated
data in the cloud?
How do I encrypt/
Quarantine
sensitive data in
the cloud?
27. “I fear not the man who has
practiced 10,000 kicks once, but I
fear the man who has practiced
one kick 10,000 times.”
Focus is Success
28. Agenda
01
02
03
04
Cyberlab Research: The 1% Who Can Take
Down Your Organization
The Anatomy of a Cloud Cyberattack
CloudLock Cybersecurity Fabric
28
05
Requirements for a Cloud Security Solution
To Proxy or Not To Proxy
29. Enterprise
Cloud Cybersecurity Platform
App Developer
Homegrown Apps
ISV Cloud Apps
End - User 29CloudLock Confidential - DO NOT DISTRIBUTE
DLP / Content
Classification
Encryption
Management
Apps
Firewall
Configuration
Security
ITSecurity
User Behavior
Analytics
. . .
Enterprise
SaaS
force.com
PaaS and IaaS IDaaS
31. Case Study: PCI Compliance on AWS
● ACME Runs a Video Streaming Service on AWS
● Home-grown apps process CC info
● Recent Data Breaches sparked audit board to
assess ‘PCI risk profile’
Company Profile
Business Requirements
● PCI Risk Assessment of data stored in S3
● Establish on-going PCI compliance
enforcement controls on S3
● Create a PCI Compliance reporting Readiness
for internal & external audit
● ‘Everything-as-a-Service’ DNA
32. Solution: PCI-Compliance-as-a-Service
Enterprise
■ POC - one day
■ Subscribe to CloudLock’s ‘Content
Classification’ API service
■ Minor modification to home-grown
app
Solution
CloudLock
APIs
File /
Object
Query:
PCI Data?
10 ‘hits’ of PCI Data
33. Next Step: Get a Cybersecurity Assessment
bit.ly/cloudlock-assessment
35. CloudLock Cybersecurity Report
CloudLock Cloud Cybersecurity Report: 1% Who Can Take Down Your Organization
Key Findings:
FREE DOWNLOAD
35
Apps
Top 25 apps that connect to corporate accounts comprise 62% of all
installs - each representing a digital inroad to your organization, yet there
is a long tail of hundreds of apps with fewer installs but higher risk profiles
Collaboration
75% of inter-organization collaboration is with 25 other organizations,
despite an average of 865 collaborative organizations per company
Users
The Top 1% of Users Create 75% of Cloud Cybersecurity Risk
36. 36
CloudLock: Proven Leader for Cloud Cybersecurity
91,000
APPS
DISCOVERED
10 Million
USERS FILES
MONITORED DAILY
1 Billion
38. Q1 2015 Cloud Cybersecurity Report: The Extended Perimeter
38
39. CloudLock’s DNA
Business
Investors
Trust
Value Prop
Approach
Founded in 2011, 135 Employees, global offices
Unified multi-cloud solution for Cloud Data Protection & Governance, Risk & Compliance, App
Discovery & Control, Auditing & Forensics, Threat Protection & User Behavior Analytics
SaaS: Cloud-Native and 100% API-based
No gateways, no proxies, no impact on workflows, users, or platform performance