Upgrade to Pro — share decks privately, control downloads, hide ads and more …

Journey to the Cloud: An Introduction and Secur...

Sena Yakut
December 21, 2023
40

Journey to the Cloud: An Introduction and Security Overview

Sena Yakut

December 21, 2023
Tweet

Transcript

  1. About Me! • Senior Cloud Security Engineer @Lyrebird Studio •

    DevSecOps Team Lead & Senior CloudSec Engineer @PurpleBox • Cyber Security & CloudSec Engineer @Vestel • Master @Ege University senayakut.com /sena-yakut Security & Identity @sena_yakutt
  2. Overview What is Cloud Computing? Why do We Need Cloud?

    Advantages of Cloud Computing Challenges of Cloud Computing Cloud Security – The Nightmare Cloud Security Statistics Cloud Security and AI Cloud Security and IoT Cloud Security and Data Analytics Automate Everything for Your Cloud
  3. • Database storage, applications, and other IT resources, • Pay-as-you-go

    pricing, • Simple way to access servers, storage, databases and a set of application services What is Cloud Computing?
  4. Why do We Need Cloud? • The data center management?

    • Power supply, cooling payments? • Hardware Maintenance? • Limited Scaling? • Earthquake, power shutdown, fire disasters? • Hire a team for monitoring? With cloud technology, we can solve all of them!
  5. Why is this so complex? • Lots of work to

    do, • Storage, server, database, IAM etc.. • Lack of cloud security and skills, • New technology, • Attackers love cloud & new exploits, • Changing existing architectures is complex • Cloud providers provides lots of security services à Our responsibility to use them! Cloud Security – The Nightmare
  6. Cloud Security and AI Automated Threat Intelligence: •Collecting, processing, and

    analyzing lots of data, •Gathering information from lots of environments identify emerging attacks targeting cloud environments, •AI faster than human analysis, •Threat alerts to security teams in real-time Anomaly Detection: •Normal user, system behavior or anomaly, •AI tools can analyze parameters like login attempts, data access patterns, API calls, and network traffic to flag outliers.
  7. Cloud Security and AI Vulnerability Assessments: •Continuously identifying weaknesses in

    the infrastructure, applications, databases, containers, APIs, and other components, •Detect misconfigurations, risky permissions, and flaws Real Time Monitoring and Alerts: •Monitor suspicious behaviors, •Generate alerts from them, •Aware of the cloud security attacks.
  8. •Lots of data, •Lots of work to do! •Sensors •Devices

    •Mobile apps •Web apps à Connectivity all of them! Cloud Security and IoT
  9. Cloud Security and Data Analytics • Detect threats before they

    impact your system, • Security information and event management systems (SIEM), • Identifying attack patterns is challenge, • Attackers are becoming more dynamic, using increasingly complex techniques and tactics
  10. Automate Everything for Your Cloud • Delivery team's efficiency, •

    Improve the quality of systems and networks, • Reduce the risk associated with slow systems or downtime, • Reduce human errors.