Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Exploring Cloud Security in the Landscape of Fu...

Sena Yakut
October 24, 2023

Exploring Cloud Security in the Landscape of Future Technologies

Sena Yakut

October 24, 2023
Tweet

More Decks by Sena Yakut

Other Decks in Technology

Transcript

  1. About me • Senior Cloud Security Engineer @Lyrebird Studio •

    DevSecOps Team Lead & Senior CloudSec Engineer @PurpleBox • Cyber Security & CloudSec Engineer @Vestel • Master @Ege University @sena-yakut [email protected] Security & Identity @senayktt
  2. Overview • What is Cloud Computing? • Why do We

    Need Cloud? • Advantages of Cloud Computing • Challenges of Cloud Computing • Cloud Security – The Nightmare • Cloud Security Statistics • Cloud Security and AI • Cloud Security and IoT • Cloud Security and Data Analytics • Automate Everything for Your Cloud
  3. What is Cloud Computing? • Database storage, applications, and other

    IT resources, • Pay-as-you-go pricing, • Simple way to access servers, storage, databases and a set of application services
  4. Why do We Need Cloud? •The data center management? •Power

    supply, cooling payments? •Hardware Maintenance? •Limited Scaling? •Earthquake, power shutdown, fire disasters? •Hire a team for monitoring? With cloud technology, we can solve all of them!
  5. Cloud Security – The Nightmare • Why is this so

    complex? • Lots of work to do • Storage, server, database, IAM etc.. • Lack of cloud security and skills • New technology • Attackers love cloud & new exploits • Changing existing architectures is complex • Cloud providers provides lots of security services à Our responsibility to use them!
  6. Cloud Security and AI Automated Threat Intelligence: • Collecting, processing,

    and analyzing lots of data, • Gathering information from lots of environments identify emerging attacks targeting cloud environments, • AI faster than human analysis, • Threat alerts to security teams in real-time Anomaly Detection: • Normal user, system behavior or anomaly, • AI tools can analyze parameters like login attempts, data access patterns, API calls, and network traffic to flag outliers.
  7. Cloud Security and AI Vulnerability Assessments: • Continuously identifying weaknesses

    in the infrastructure, applications, databases, containers, APIs, and other components, • Detect misconfigurations, risky permissions, and flaws Real Time Monitoring and Alerts: • Monitor suspicious behaviors, • Generate alerts from them, • Aware of the cloud security attacks
  8. Cloud Security and IoT •Lots of data, •Lots of work

    to do! • Sensors • Devices • Mobile apps • Web apps •Connectivity all of them!
  9. Cloud Security and Data Analytics • Detect threats before they

    impact your system, • Security information and event management systems (SIEM), • Identifying attack patterns is challenge, • Attackers are becoming more dynamic, using increasingly complex techniques and tactics
  10. Automate Everything for Your Cloud •Delivery team's efficiency, •Improve the

    quality of systems and networks, •Reduce the risk associated with slow systems or downtime, •Reduce human errors.