Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Security in the world of Cloud and Chaos Engineering

Ashish
December 05, 2017

Security in the world of Cloud and Chaos Engineering

Security in the world of Cloud and Chaos Engineering - Talk for New York Information Security Meetup - Dec,2017

Ashish

December 05, 2017
Tweet

More Decks by Ashish

Other Decks in Technology

Transcript

  1. Security in the world of Cloud and Chaos Engineering Information

    Security Meetup, New York – December, 2017
  2. • Public • Multi- geo Location • Existing Security Measures

    don’t work • Shared Security Model • Public breaches • Unknown Challenges in a cloud environment
  3. IAM Identity and Access Management Join, modify, leave Role based

    Access Control (RBAC) Auditing - Identities
  4. Security Challenge - 2 Data security and compliance Data Residency

    Data Access Data Encryption (at rest) Data Encryption (in transit)
  5. Cloud Journey for security Stage - 0 Users Access Audit

    Data Residency RBAC (Users & Servers) Basic Security Posture Admin Users Access Encryption (at rest)
  6. Cloud Journey for security Stage - 1 Blast Radius CI/CD

    Pipeline API Access Encryption (in transit) Automation Log Aggregation
  7. Cloud Journey for security Stage - 2 API Key Rotation

    Incident Response Plan Key Management Plan Offsite Backups Guard Rails Security through CI/CD Pipeline
  8. §Application focused protection – WAF, CDN §OS focused security –

    Anti-Virus, Vulnerability Scanning §Binary & security testing of each committed code § Centralized Visibility Tool § Log alerting (intelligence) from SIEM Logs §Event Notifications Stage 3 and beyond
  9. Best Practices 1. Security Best Practices Whitepaper 2. Compliance section

    of the cloud provider 3. Cloud Security Alliance Standards 4. Center for Internet Security (CIS) Standard for cloud provider
  10. Take away - Security principles do not change with any

    new platform, only challenges do. - Security controls can be achieved by leveraging services from cloud provider. - Use security controls to raise the level of trust in a new platform - Trust but verify
  11. Next Evolution “IT spending is steadily shifting from traditional IT

    offerings to cloud services (cloud shift). The aggregate amount of cloud shift in 2016 is estimated to reach $111 billion, increasing to $216 billion in 2020. ” – Gartner – July,2016
  12. Next Evolution of security in a cloud world 1. Cloud

    Provider Security Posture 2. Event Driven Security 3. Compliance as Code 4. Serverless - Compliance as Code Model 5. DevSecOps - Security in CI/CD Pipeline 6. CASBs - Security broker for SaaS applications