Principal Engineering Lead, A1geo linkedin.com/in/cloudronin @cloudronin Many years building, securing and operaMng cloud based, data-‐driven systems for Financial, Government and Healthcare sectors. LongMme Linux user and champion of open and secure development.
parts of the infrastructure stack. The other parts of the security stack is your responsibility. You are usually responsible for ApplicaMon Security, Policies and configuraMon, machine images etc. STEP 1: KNOW YOUR RESPONSIBILITY
mechanisms and their Security implicaMons. • De-‐IdenMfy when possible • Understand the choices of EncrypMon primiMves like key strength and Ciphers types. • Don’t forget Secure Archival and Disposal of Data. • Tools: – Luks – dm-‐crypt – Truecrypt – Gnu Shred STEP 4: PROTECT YOUR DATA AT REST
possible. • TLS • SSH • RDP • Securely Tunnel traffic when not possible: – IPSEC – SSL VPN – SSH • Use a Key Management System • Tools – OpenSwan – OpenVPN STEP 5: PROTECT YOUR DATA IN TRANSIT
assets • Watch out for Zero Days • Classify Risk • Patch Affected Systems • Use a ConfiguraMon Management System • Tools – Nessus – OpenVAS STEP 6: PROTECT AND PATCH YOUR INSTANCES
• Use a Group/Role based permission model • Grant Least privilege based on Business Need • Enable MulM-‐Factor Auth (MFA) for Privileged Users • Audit all User AcMvity • Federate all User Access through a Directory Service • Root Cloud Accounts should not be used. STEP 7: PROTECT ACCESS TO YOUR INSTANCES
and AudiMng). • Familiarize yourself with the OWASP Top 10 ApplicaMon Security Flaws. • Follow Secure Development Best PracMces. • Tools: – Jenkins – PMD – FindBugs STEP 8: PROTECT YOUR APPLICATIONS
secure and separate Network • Establish baselines • Monitor all layers and Protocols • Deploy the IDS behind the Network firewall • Fine tune alert levels • Use redundant alerMng channels • Tools: – Nagios – ELK Stack – Watcher – Snort STEP 9: AUDIT AND MONITOR YOUR CLOUD
ApplicaMons separately for Security VulnerabiliMes periodically • Check for Input validaMon, session manipulaMon, authenMcaMon and informaMon leakage • Use 3rd Party Tools where possible • Tools: – Metasploit – Kali Linux – OpenVAS STEP 10: VALIDATE YOUR PROTECTION
some are harder in the Cloud • ConvenMonal security and compliance concepts sMll apply in the cloud. • The 12 Steps will get your started on your conMnuous security improvement cycle STEP 13 ? THERE IS NO MAGIC BULLET!
the xPaHerns logo are trademarks of AMgeo. The informaMon herein is for informaMonal purposes only and represents the current view of AMgeo as of the date of this presentaMon. Because AMgeo must respond to changing market condiMons, it should not be interpreted to be a commitment on the part of AMgeo, and AMgeo cannot guarantee the accuracy of any informaMon provided a\er the date of this presentaMon. ATIGEO MAKES NO WARRANTIES, EXPRESS, IMPLIED OR STATUTORY, AS TO THE INFORMATION IN THIS PRESENTATION.