Slide 1

Slide 1 text

Security on Cloud

Slide 2

Slide 2 text

About:me Fon - Kamolphan Liwprasert Senior Machine Learning Engineer @Sertis Master in Computer Science student About:me

Slide 3

Slide 3 text

What I will cover: ● Cloud security ○ Why it’s important ● Security compliance ○ PDPA / GDPR ● Secured data on GCP ○ IAM & Organizational structure ○ Service Account ○ Object life cycle ○ Cloud Data Loss Prevention (DLP) ○ Data encryption options ○ Secured practice for BigQuery ● Tips & Tricks ● Q&A

Slide 4

Slide 4 text

Cloud Security

Slide 5

Slide 5 text

Why it’s important? https://www.cxo-community.com/2018/01/5-reasons-why-cloud-security-is.html 1. Security breaches are always big news 2. All service providers aren’t equal 3. Know where your data is stored 4. Security roles should be clearly defined 5. Backing up data is just as important

Slide 6

Slide 6 text

How secured a cloud is? https://cloud.google.com/security/

Slide 7

Slide 7 text

Security Ecosystem

Slide 8

Slide 8 text

Mitigate the loss https://lifehacker.com/how-to-protect-yourself-in-microsofts-recent-data-breac-1841185226

Slide 9

Slide 9 text

“Security is Only as Strong as the Weakest Link”

Slide 10

Slide 10 text

Security Compliance

Slide 11

Slide 11 text

Data Protection Policy

Slide 12

Slide 12 text

GDPR

Slide 13

Slide 13 text

PDPA in Thailand

Slide 14

Slide 14 text

Data Protection Guideline https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other -Guides/Guide-to-Data-Protection-by-Design-for-ICT-Systems -(310519).pdf https://www.pdpc.gov.sg/-/media/Files/PDPC/PDF-Files/Other -Guides/Technical-Guide-to-Advisory-Guidelines-on-NRIC-Nu mbers---260819.pdf

Slide 15

Slide 15 text

Secure Data on GCP

Slide 16

Slide 16 text

1 Cloud IAM and Organizational Structure

Slide 17

Slide 17 text

Cloud IAM https://www.youtube.com/watch?v=ZQHoC0cR6Qw&hl=th

Slide 18

Slide 18 text

Use Groups, with logical names https://www.youtube.com/watch?v=ZQHoC0cR6Qw&hl=th

Slide 19

Slide 19 text

Organization Structure https://cloud.google.com/docs/enterprise/best-practices-for-enterprise-organizations Organization Resource Projects Folders Resources

Slide 20

Slide 20 text

Match resources to company structure Organization Resource Projects Folders Resource TIPS: Verbose project names provide clarity on resource structure and ownership i.e. company-sales-clientinsight-prod

Slide 21

Slide 21 text

2 Service Accounts

Slide 22

Slide 22 text

Service Account https://www.youtube.com/watch?v=ZQHoC0cR6Qw&hl=th

Slide 23

Slide 23 text

Service Account Tips https://www.youtube.com/watch?v=ZQHoC0cR6Qw&hl=th Don’t rely on default Service Account

Slide 24

Slide 24 text

How many Service Accounts https://www.youtube.com/watch?v=ZQHoC0cR6Qw&hl=th

Slide 25

Slide 25 text

We should centralize the service account creation and rotation! https://cloud.google.com/blog/products/gcp/help-keep-your-google-cloud-service-account-keys-safe

Slide 26

Slide 26 text

3 Object Life Cycle

Slide 27

Slide 27 text

cannot be undeleted. Lifecycle configuration https://cloud.google.com/storage/docs/lifecycle#actions Delete Multi-Regional Storage/ Regional Storage Nearline Storage Coldline Storage Archive Storage OR

Slide 28

Slide 28 text

Storage Classes

Slide 29

Slide 29 text

How to add a Lifecycle rule

Slide 30

Slide 30 text

How to add a Lifecycle rule (2)

Slide 31

Slide 31 text

How to add a Lifecycle rule (3) Done :)

Slide 32

Slide 32 text

Bucket Lock & Retention Policy Retention Policy To keep it at a certain amount of time before be able to delete. ** be careful, some action cannot be undone

Slide 33

Slide 33 text

4 Cloud Data Loss Prevention

Slide 34

Slide 34 text

What can happen? https://www.youtube.com/watch?v=MY3PjFpI3rE

Slide 35

Slide 35 text

PII Personally Identifiable Information

Slide 36

Slide 36 text

● SSN / ID ● Name ● Date of Birth ● Phone number ● Email ● Photos ● . . . Personally Identifiable Information

Slide 37

Slide 37 text

Redaction https://www.youtube.com/watch?v=MY3PjFpI3rE

Slide 38

Slide 38 text

Cloud Data Loss Prevention (DLP) Provides methods for detection, risk analysis, and de-identification of privacy-sensitive fragments in text, images, and Google Cloud Platform storage repositories. https://cloud.google.com/solutions/automating-classification-of-data-uploaded-to-cloud-storage

Slide 39

Slide 39 text

Cloud Data Loss Prevention (DLP) https://cloud.google.com/solutions/automating-classification-of-data-uploaded-to-cloud-storage

Slide 40

Slide 40 text

5 Data Encryption Options

Slide 41

Slide 41 text

Data Encryption Options ● Google managed key ○ Encryption by Default ○ AES-256 standard ● Customer-managed encryption keys (CMEK) ○ Store keys within Cloud KMS ● Customer-Supplied Encryption Keys (CSEK) ○ Data encryption key (DEK): A key used to encrypt data. ○ Key encryption key (KEK): A key used to encrypt, or "wrap", a data encryption key. https://cloud.google.com/security/encryption-at-rest/

Slide 42

Slide 42 text

6 Security Practice for BigQuery

Slide 43

Slide 43 text

Big Data Reference Architecture Cloud Composer

Slide 44

Slide 44 text

BigQuery - Project BigQuery workshop

Slide 45

Slide 45 text

BigQuery - Datasets BigQuery workshop

Slide 46

Slide 46 text

BigQuery - Tables BigQuery workshop

Slide 47

Slide 47 text

BigQuery - Jobs BigQuery workshop

Slide 48

Slide 48 text

Tips and Tricks

Slide 49

Slide 49 text

New Arrival!

Slide 50

Slide 50 text

Tips and Tricks 1. Least Privileges! > Only allow the necessity roles. No more than that. 2. Least Privileges. Same to people in project. > Only allow people 3. Don’t use default firewall rule > It allows port 22 (default-allow-ssh). Should be removed 4. Don’t use default service account in production > The permission in default service account can be changed without notice. 5. Delete the unused projects! > Cause it co$t money $$$$! > CONSULT YOUR TEAM, PM, AND ANYONE RELATED FIRST! 6. Keep updating :) https://polleyg.dev/posts/shoot-yourself -gcp/

Slide 51

Slide 51 text

Resources ● https://cloud.google.com/security/infrastructure/design/res ources/google_infrastructure_whitepaper_fa.pdf ● https://cloud.google.com/docs/enterprise/best-practices-fo r-enterprise-organizations ● https://cloud.google.com/storage/docs/bucket-lock ● https://cloud.google.com/security/encryption-at-rest/custo mer-supplied-encryption-keys/ ● https://cloud.google.com/storage/docs/encryption/custome r-managed-keys ● https://cloud.google.com/blog/products/identity-security/int roducing-google-clouds-secret-manager ● https://cloud.google.com/dlp/ ● https://www.etda.or.th/app/webroot/content_files/13/files/1. PDPA%20Presentation_CyberSecurity%20Week%20201 9.pdf

Slide 52

Slide 52 text

“Security is Only as Strong as the Weakest Link”

Slide 53

Slide 53 text

Q & A

Slide 54

Slide 54 text

Thanks! Kamolphan Liwprasert (Fon) [email protected] linkedin.com/in/fonylew/ Sertis is hiring :)

Slide 55

Slide 55 text

SERTIS IS HIRING :) Feedback IS A GIFT :) https://forms.gle/cQrUDeJeyvYnDpVw5