SlideShare a Scribd company logo
1 of 23
Download to read offline
Practical Cloud Security
Lessons Learned from the Bleeding Edge
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
Background
•  Production hybrid cloud security at scale
o  Deployed distributed, hybrid cloud WAF
o  Co-developed CloudHSM for IaaS HW root of trust
•  Corporate IT “all-cloud” security strategy
o  Cloud-first, mobile-first infrastructure model
o  Mix of public cloud, best-of-breed SaaS
o  This is the Future of corporate IT services
•  RSAC Program Committee, Startup Technical Advisory
Boards, ISSA CISO Forum & Career Lifecycle
•  Netflix, AOL, Netscape, Accenture Research
Topics
•  Cloud: Why now? What’s changed?
•  Forcing functions and new perimeters
•  Cloud Security Controls: What’s new?
•  Third-Party Risks: InfoSec and The Business
•  Herding Data: Getting Started
•  Security startups
Forcing Functions on IT Security
Cloud
Services
Network Access
Ubiquity
Mobility
Consumerization /
BYOD
Work/Life
Integration
Business
Risk
Agile/
DevOps
Cloud Forcing Function - Mobility
Source: Mary Meeker, KPCB
Cloud Forcing Function - Consumerization
•  58% / 42% of Americans now own a smartphone / tablet(1)
•  By 2017: 50% of employers will require employees to
BYOD for work purposes(2)
(1) Pew Research, Jan 2014
(2) Gartner, May 2013
Forcing Function - Network AccessForcing Function - Network Access
•  Network connectivity & seamless roaming
o  802.11ac – wireless networking now “just works”
§  Faster than typical wired ports, easier to provision
o  Mobile 4G LTE is “fast enough”
§  Faster than home ISPs
§  2018: 25% of corporate data will flow directly mobile-cloud(3)
•  Blending work/life integration
o  Aruba’s “#GenMobile”initiative
o  Starbucks wants to be your life’s “3rd Place”
(3) Gartner, Nov 2013
Old: Perimeter Firewalls
•  Castle and Moat defense
•  Provisioning was serialized, expensive
•  Place people, data behind datacenter firewalls
•  “Behind firewalls” = Trusted
New Perimeters : Follow the Data
•  Controls evolving to be more:
o  Proximal - Controls are close to the application/data
o  Mobile - Move with the infrastructure/application
o  Resilient - Emphasize recovery, response
o  Holistic - Technical, legal, and business-level input
o  Coordinated - Reliant on communications, automation
o  Tiered - Nothing new here
New Perimeters : Follow the Data
What’s Your Cloud Comfort Level?
•  Cloud Adoption / Maturity:
o  Naysayers: you can’t do that (but can’t articulate why)
o  Pathfinders: here’s how to do it, lessons learned
o  Optimizers: here’s how to do it well, what not to do
What’s Your Cloud Comfort Level?
•  Cloud Adoption/Maturity
o  Naysayers
o  Pathfinders
o  Optimizers
o  Cloud is inevitable. Learn how to manage it.
o  Example: “We have 10 years of legacy work to deal with,
we don’t have time to look at our cloud usage!”
•  It’s about the business
o  Board-level discussion on results, competition, risk
Cloud Security: New(ish) tech controls
•  Goal: Track movement, access to data
o  DRM/DLP-like controls, applied closer to the data
o  Encrypt data, SoD for encryption keys
o  Even though the data is not in your datacenter
•  Goal: Restrict access to data, applications
o  Forward and Reverse proxy servers
o  Old: Port/protocol-based network, subnets, host firewalls
o  New: Tags, labels, data and host classification/sensitivity
o  Log management, anomaly detection
o  IAM - Risk-based authentication, SSO (for free)
Risks: InfoSec and The Business
Q: Who owns the risk in a new business endeavor?
Risks: InfoSec and The Business
•  Who owns the risk in a new business endeavors?
•  The business does
•  InfoSec’s role:
•  Be a trusted advisor to the business
•  Anticipate security risk/controls changes and needs
•  Communicate technical risks in business terms
•  Propose options, help the business take smart risks
•  Implement guardrails based on risk, sensitivity
•  Measure risk, managing remediation/response
•  Measure of success: Repeat business for your team!
Risks: InfoSec and The Business
•  Legal, business perspectives
•  Managing the risk – legal levers
o  Risk-based: Level of scrutiny based on data sensitivity
o  Add boilerplate language in your contracts, MSAs, etc.
o  Strive to require partners to have security
fundamentals in place: operational security basics,
secure development, security incident notification, etc.
o  Right to audit, assess => partner with your partners
Risks: InfoSec and The Business
•  Managing the risk – technical levers
o  Trust but verify their controls. It’s your data!
o  Do an initial assessment, plus ongoing automated tests
o  Partner with your partners on results you find
o  Things to watch out for …
Risks: InfoSec and The Business
•  Proving data security, good security hygiene
o  Service Providers should be more secure than SMBs
§  Laser-focused, homogeneous environment, etc.
o  Doesn’t scale: Every customer pentesting their provider
§  Open Item: Which standard should we trust?
•  Which controls are most relevant, important for
your data?
o  Encryption, incident response, audit, SoD, …
o  Prioritize those during negotiations, evaluations
Lessons learned: Getting Started
•  Start simple
o  Move least-risky workflows first
o  Orchestrate, automate security controls
o  Stage patches like other bugs and new features
o  Datacenter-to-Cloud connectivity, WAN-like latency
o  Wholesale migration vs. re-architecting apps
•  Migration phase
o  Running “hybrid”, “dual stack” or “riding roman”
o  Migrate workflows systematically
o  Inter-service dependencies
Lessons learned: Getting Started
•  Infrastructure Services
o  Plan: Pick 1-3 security metrics you’d like to improve in your
cloud, compare them to legacy infrastructure
o  Days to patch vulns, avg host uptime, fw ACLs used
o  Do: Start simple, fail fast on “uninteresting” workflows and
transactions; test response protocols
o  Improve: Start codifying security policies, patches,
automating provisioning and inventory controls
o  Good security starts with solid operational hygiene
o  Repeat: review lessons learned often, make small course
corrections.
Lessons learned: Getting Started
•  Corporate Services & “Shadow IT”
o  Baseline: Get visibility into your cloud services
§  You’re using more than you realize
§  Meet and share with IT, legal, other stakeholders
§  Facts lead to business-level conversations
o  Log: Start collecting/mining SaaS access, audit logs
o  Protect and Observe:
§  Deploy SAML, 2FA, integrate with your directory
§  Evaluate cloud service brokers, features
Evaluating Security Startups
•  Investors:
o  Management team domain expertise, background
o  Competitive advantages
o  Market readiness, fit
o  Product fit
•  Customers:
o  Support fit, scalability
o  Roadmap fit, ability to execute against it
o  Risk fit, operational hygiene / best practices
Guidance for Security Startups
o  Be 10x better - provide superior customer value
o  Look for disruptive technologies, approaches
o  What else does the solution require?
o  What can I turn off?
o  Think API first
o  Defenders & DevOps: The future is automation, interoperability,
integration
o  No cheating: Build your GUI on your API
o  Model, measure, provide insights
o  A/B testing, modeling allows safe experimentation
o  Provide insights of current risk state
o  Manage my cloud risk better than my legacy infrastructure
o  A good deployment strategy starts with a great migration strategy
Thank you
Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3

More Related Content

What's hot

Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
Jisc
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
Penelope Toth
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
Brenda Majewski
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
Penelope Toth
 

What's hot (19)

Rsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battleRsac2015 burns-fighting the right battle
Rsac2015 burns-fighting the right battle
 
CD and the curse of legacy
CD and the curse of legacyCD and the curse of legacy
CD and the curse of legacy
 
Abb e guide3
Abb e guide3Abb e guide3
Abb e guide3
 
Cloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared CarstensenCloud computing - Assessing the Security Risks - Jared Carstensen
Cloud computing - Assessing the Security Risks - Jared Carstensen
 
Metrics, Risk Management & DLP
Metrics, Risk Management & DLPMetrics, Risk Management & DLP
Metrics, Risk Management & DLP
 
Helping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threatsHelping SME’S to face cybersecurity threats
Helping SME’S to face cybersecurity threats
 
Wasn't expecting that! Now what?
Wasn't expecting that! Now what?Wasn't expecting that! Now what?
Wasn't expecting that! Now what?
 
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
Digital Transformation in the Cloud: What They Don’t Always Tell You [2020]
 
Whos role is it anyway
Whos role is it anywayWhos role is it anyway
Whos role is it anyway
 
ISS CAPSTONE TEAM
ISS CAPSTONE TEAMISS CAPSTONE TEAM
ISS CAPSTONE TEAM
 
A case for Managed Detection and Response
A case for Managed Detection and ResponseA case for Managed Detection and Response
A case for Managed Detection and Response
 
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
Business Continuity Planning During and After the Coronavirus (COVID-19) Pand...
 
Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)Best Practices for Implementing Data Loss Prevention (DLP)
Best Practices for Implementing Data Loss Prevention (DLP)
 
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
SIA Tas Safety Symposium 2017: Doing Safety Better by Doing Less Safety - The...
 
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
[Webinar Slides] Work Where Your Content Really Lives: The Ideal Hybrid ECM E...
 
NARCA Presentation - IT Best Practice
NARCA Presentation - IT Best PracticeNARCA Presentation - IT Best Practice
NARCA Presentation - IT Best Practice
 
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
SIA Tas Safety Symposium 2017: Workplace incident response options, alternati...
 
Kyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epoKyle Taylor – increasing your security posture using mc afee epo
Kyle Taylor – increasing your security posture using mc afee epo
 
Paging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng OverviewPaging, Alerting, Chaos Eng Overview
Paging, Alerting, Chaos Eng Overview
 

Viewers also liked

Viewers also liked (17)

The Current State of OAuth 2
The Current State of OAuth 2The Current State of OAuth 2
The Current State of OAuth 2
 
Null Singapore 2015 accomplishments
Null Singapore 2015 accomplishmentsNull Singapore 2015 accomplishments
Null Singapore 2015 accomplishments
 
Pentesting RESTful webservices
Pentesting RESTful webservicesPentesting RESTful webservices
Pentesting RESTful webservices
 
Defense in Depth – Your Security Castle
Defense in Depth – Your Security CastleDefense in Depth – Your Security Castle
Defense in Depth – Your Security Castle
 
Exploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null SingaporeExploit development 101 - Part 1 - Null Singapore
Exploit development 101 - Part 1 - Null Singapore
 
Assembly language part I
Assembly language part IAssembly language part I
Assembly language part I
 
Cross site scripting attacks and defenses
Cross site scripting attacks and defensesCross site scripting attacks and defenses
Cross site scripting attacks and defenses
 
Automated API pentesting using fuzzapi
Automated API pentesting using fuzzapiAutomated API pentesting using fuzzapi
Automated API pentesting using fuzzapi
 
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg HuntingSystem Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
System Hacking Tutorial #3 - Buffer Overflow - Egg Hunting
 
Network security - Defense in Depth
Network security - Defense in DepthNetwork security - Defense in Depth
Network security - Defense in Depth
 
Pentesting ReST API
Pentesting ReST APIPentesting ReST API
Pentesting ReST API
 
Authorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice EnvironmentsAuthorization and Authentication in Microservice Environments
Authorization and Authentication in Microservice Environments
 
DevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to SecurityDevSecOps: Taking a DevOps Approach to Security
DevSecOps: Taking a DevOps Approach to Security
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
Deep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons LearnedDeep Dive into Keystone Tokens and Lessons Learned
Deep Dive into Keystone Tokens and Lessons Learned
 
Fuzzing: An introduction to Sulley Framework
Fuzzing: An introduction to Sulley FrameworkFuzzing: An introduction to Sulley Framework
Fuzzing: An introduction to Sulley Framework
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 

Similar to Cloud Security Summit - InfoSec World 2014

What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
Bill Burns
 
Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-final
Mauricio Godoy
 

Similar to Cloud Security Summit - InfoSec World 2014 (20)

What affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burnsWhat affects security program confidence? - may2014 - bill burns
What affects security program confidence? - may2014 - bill burns
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
Cloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-finalCloud forum-lessons-learned-20110405c-final
Cloud forum-lessons-learned-20110405c-final
 
Observability in serverless solutions
Observability in serverless solutionsObservability in serverless solutions
Observability in serverless solutions
 
AWS Services 7 Transformation Media
AWS Services 7 Transformation MediaAWS Services 7 Transformation Media
AWS Services 7 Transformation Media
 
Cloud versus On Premise
Cloud versus On PremiseCloud versus On Premise
Cloud versus On Premise
 
Auditing in the Cloud
Auditing in the CloudAuditing in the Cloud
Auditing in the Cloud
 
Secure Iowa Oct 2016
Secure Iowa Oct 2016Secure Iowa Oct 2016
Secure Iowa Oct 2016
 
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital WorldEmpired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
Empired Convergence 2017 - Keeping Pace, Staying Safe in the Digital World
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
 
To cloud or not to cloud
To cloud or not to cloudTo cloud or not to cloud
To cloud or not to cloud
 
To Cloud or Not To Cloud
To Cloud or Not To CloudTo Cloud or Not To Cloud
To Cloud or Not To Cloud
 
Unc charlotte prezo2016
Unc charlotte prezo2016Unc charlotte prezo2016
Unc charlotte prezo2016
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Enterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - BusinessEnterprise Adoption – Patterns for Success with AWS - Business
Enterprise Adoption – Patterns for Success with AWS - Business
 
Unblocking Innovation for Digital Transformation
Unblocking Innovation for Digital TransformationUnblocking Innovation for Digital Transformation
Unblocking Innovation for Digital Transformation
 
Many products-no-security (1)
Many products-no-security (1)Many products-no-security (1)
Many products-no-security (1)
 

Recently uploaded

Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
ZurliaSoop
 

Recently uploaded (20)

HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book nowGUWAHATI 💋 Call Girl 9827461493 Call Girls in  Escort service book now
GUWAHATI 💋 Call Girl 9827461493 Call Girls in Escort service book now
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Falcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investorsFalcon Invoice Discounting: The best investment platform in india for investors
Falcon Invoice Discounting: The best investment platform in india for investors
 
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDINGBerhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
Berhampur 70918*19311 CALL GIRLS IN ESCORT SERVICE WE ARE PROVIDING
 
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
Ooty Call Gril 80022//12248 Only For Sex And High Profile Best Gril Sex Avail...
 
Buy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail AccountsBuy gmail accounts.pdf buy Old Gmail Accounts
Buy gmail accounts.pdf buy Old Gmail Accounts
 
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur DubaiUAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
UAE Bur Dubai Call Girls ☏ 0564401582 Call Girl in Bur Dubai
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan CytotecJual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
Jual Obat Aborsi ( Asli No.1 ) 085657271886 Obat Penggugur Kandungan Cytotec
 
Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
Unveiling Falcon Invoice Discounting: Leading the Way as India's Premier Bill...
 
Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024Marel Q1 2024 Investor Presentation from May 8, 2024
Marel Q1 2024 Investor Presentation from May 8, 2024
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
New 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck TemplateNew 2024 Cannabis Edibles Investor Pitch Deck Template
New 2024 Cannabis Edibles Investor Pitch Deck Template
 
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service AvailableBerhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
Berhampur Call Girl Just Call 8084732287 Top Class Call Girl Service Available
 
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...joint cost.pptx  COST ACCOUNTING  Sixteenth Edition                          ...
joint cost.pptx COST ACCOUNTING Sixteenth Edition ...
 
Phases of Negotiation .pptx
 Phases of Negotiation .pptx Phases of Negotiation .pptx
Phases of Negotiation .pptx
 
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service AvailableNashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
Nashik Call Girl Just Call 7091819311 Top Class Call Girl Service Available
 

Cloud Security Summit - InfoSec World 2014

  • 1. Practical Cloud Security Lessons Learned from the Bleeding Edge Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3
  • 2. Background •  Production hybrid cloud security at scale o  Deployed distributed, hybrid cloud WAF o  Co-developed CloudHSM for IaaS HW root of trust •  Corporate IT “all-cloud” security strategy o  Cloud-first, mobile-first infrastructure model o  Mix of public cloud, best-of-breed SaaS o  This is the Future of corporate IT services •  RSAC Program Committee, Startup Technical Advisory Boards, ISSA CISO Forum & Career Lifecycle •  Netflix, AOL, Netscape, Accenture Research
  • 3. Topics •  Cloud: Why now? What’s changed? •  Forcing functions and new perimeters •  Cloud Security Controls: What’s new? •  Third-Party Risks: InfoSec and The Business •  Herding Data: Getting Started •  Security startups
  • 4. Forcing Functions on IT Security Cloud Services Network Access Ubiquity Mobility Consumerization / BYOD Work/Life Integration Business Risk Agile/ DevOps
  • 5. Cloud Forcing Function - Mobility Source: Mary Meeker, KPCB
  • 6. Cloud Forcing Function - Consumerization •  58% / 42% of Americans now own a smartphone / tablet(1) •  By 2017: 50% of employers will require employees to BYOD for work purposes(2) (1) Pew Research, Jan 2014 (2) Gartner, May 2013
  • 7. Forcing Function - Network AccessForcing Function - Network Access •  Network connectivity & seamless roaming o  802.11ac – wireless networking now “just works” §  Faster than typical wired ports, easier to provision o  Mobile 4G LTE is “fast enough” §  Faster than home ISPs §  2018: 25% of corporate data will flow directly mobile-cloud(3) •  Blending work/life integration o  Aruba’s “#GenMobile”initiative o  Starbucks wants to be your life’s “3rd Place” (3) Gartner, Nov 2013
  • 8. Old: Perimeter Firewalls •  Castle and Moat defense •  Provisioning was serialized, expensive •  Place people, data behind datacenter firewalls •  “Behind firewalls” = Trusted
  • 9. New Perimeters : Follow the Data •  Controls evolving to be more: o  Proximal - Controls are close to the application/data o  Mobile - Move with the infrastructure/application o  Resilient - Emphasize recovery, response o  Holistic - Technical, legal, and business-level input o  Coordinated - Reliant on communications, automation o  Tiered - Nothing new here New Perimeters : Follow the Data
  • 10. What’s Your Cloud Comfort Level? •  Cloud Adoption / Maturity: o  Naysayers: you can’t do that (but can’t articulate why) o  Pathfinders: here’s how to do it, lessons learned o  Optimizers: here’s how to do it well, what not to do
  • 11. What’s Your Cloud Comfort Level? •  Cloud Adoption/Maturity o  Naysayers o  Pathfinders o  Optimizers o  Cloud is inevitable. Learn how to manage it. o  Example: “We have 10 years of legacy work to deal with, we don’t have time to look at our cloud usage!” •  It’s about the business o  Board-level discussion on results, competition, risk
  • 12. Cloud Security: New(ish) tech controls •  Goal: Track movement, access to data o  DRM/DLP-like controls, applied closer to the data o  Encrypt data, SoD for encryption keys o  Even though the data is not in your datacenter •  Goal: Restrict access to data, applications o  Forward and Reverse proxy servers o  Old: Port/protocol-based network, subnets, host firewalls o  New: Tags, labels, data and host classification/sensitivity o  Log management, anomaly detection o  IAM - Risk-based authentication, SSO (for free)
  • 13. Risks: InfoSec and The Business Q: Who owns the risk in a new business endeavor?
  • 14. Risks: InfoSec and The Business •  Who owns the risk in a new business endeavors? •  The business does •  InfoSec’s role: •  Be a trusted advisor to the business •  Anticipate security risk/controls changes and needs •  Communicate technical risks in business terms •  Propose options, help the business take smart risks •  Implement guardrails based on risk, sensitivity •  Measure risk, managing remediation/response •  Measure of success: Repeat business for your team!
  • 15. Risks: InfoSec and The Business •  Legal, business perspectives •  Managing the risk – legal levers o  Risk-based: Level of scrutiny based on data sensitivity o  Add boilerplate language in your contracts, MSAs, etc. o  Strive to require partners to have security fundamentals in place: operational security basics, secure development, security incident notification, etc. o  Right to audit, assess => partner with your partners
  • 16. Risks: InfoSec and The Business •  Managing the risk – technical levers o  Trust but verify their controls. It’s your data! o  Do an initial assessment, plus ongoing automated tests o  Partner with your partners on results you find o  Things to watch out for …
  • 17. Risks: InfoSec and The Business •  Proving data security, good security hygiene o  Service Providers should be more secure than SMBs §  Laser-focused, homogeneous environment, etc. o  Doesn’t scale: Every customer pentesting their provider §  Open Item: Which standard should we trust? •  Which controls are most relevant, important for your data? o  Encryption, incident response, audit, SoD, … o  Prioritize those during negotiations, evaluations
  • 18. Lessons learned: Getting Started •  Start simple o  Move least-risky workflows first o  Orchestrate, automate security controls o  Stage patches like other bugs and new features o  Datacenter-to-Cloud connectivity, WAN-like latency o  Wholesale migration vs. re-architecting apps •  Migration phase o  Running “hybrid”, “dual stack” or “riding roman” o  Migrate workflows systematically o  Inter-service dependencies
  • 19. Lessons learned: Getting Started •  Infrastructure Services o  Plan: Pick 1-3 security metrics you’d like to improve in your cloud, compare them to legacy infrastructure o  Days to patch vulns, avg host uptime, fw ACLs used o  Do: Start simple, fail fast on “uninteresting” workflows and transactions; test response protocols o  Improve: Start codifying security policies, patches, automating provisioning and inventory controls o  Good security starts with solid operational hygiene o  Repeat: review lessons learned often, make small course corrections.
  • 20. Lessons learned: Getting Started •  Corporate Services & “Shadow IT” o  Baseline: Get visibility into your cloud services §  You’re using more than you realize §  Meet and share with IT, legal, other stakeholders §  Facts lead to business-level conversations o  Log: Start collecting/mining SaaS access, audit logs o  Protect and Observe: §  Deploy SAML, 2FA, integrate with your directory §  Evaluate cloud service brokers, features
  • 21. Evaluating Security Startups •  Investors: o  Management team domain expertise, background o  Competitive advantages o  Market readiness, fit o  Product fit •  Customers: o  Support fit, scalability o  Roadmap fit, ability to execute against it o  Risk fit, operational hygiene / best practices
  • 22. Guidance for Security Startups o  Be 10x better - provide superior customer value o  Look for disruptive technologies, approaches o  What else does the solution require? o  What can I turn off? o  Think API first o  Defenders & DevOps: The future is automation, interoperability, integration o  No cheating: Build your GUI on your API o  Model, measure, provide insights o  A/B testing, modeling allows safe experimentation o  Provide insights of current risk state o  Manage my cloud risk better than my legacy infrastructure o  A good deployment strategy starts with a great migration strategy
  • 23. Thank you Bill Burns | Executive-In-Residence | Scale Venture Partners | Bill@ScaleVP.com | @x509v3