SlideShare une entreprise Scribd logo
1  sur  39
Digital Security:
The CISO Perspective
Apigee
@apigee
Subra Kumaraswamy
@subrak
Randy Barr
CISO, Saba Software
youtube.com/apigee
slideshare.net/apigee
@Subrak
Subra Kumaraswamy
Randy Barr
Agenda
• The changing Digital landscape
• Trends: technology and threats
• Security enablers
• Key takeaways
What’s keeping you up at night?
6
Data Theft
The Forces@Work
Source: TheFutureOrganization.com
overwhelmed
employee
Talent Challenges@Work
diversity
Trends
DevOps is growing exponentially
Node.js exploding
Breaches continue to haunt the enterprise
Source: Verizon 2014
Paradox of choice
The changing landscape
B A C K - E N D S Y S T E M S
M O B I L E
S E C U R I T Y
APIs
S O C I A L A N D S A A S
Contextual & behavioral security
Encrypt everything
Identity-as-a-Service
SaaS security/identity plugin
Fraud detection
APT security analytics
E N D P O I N T
S E C U R I T Y
Digital security is shifting from defense to
analytics (predictive) & prevention
Technologies driving digital transformations
Mobile
DevOpsCloud
API
Digital security as an
enabler
What’s the role of InfoSec in enabling digital
transformation?
Top areas of CISO concern
Source: Wisegate
The role of digital security: enabling DevOps
20
• End-to-end security managed
through configuration and global policies
• Data-centric controls such as encryption,
tokenization, and key management
• Leverage API for security automation activities
including patching, user and access management,
logging, and auditing
• Security verification through tool automation,
aligned with SDLC: Dev->Stage->Prod
Enabling DevOps
Role of digital security: enabling cloud
Compliance
Trust
Architecture
Identity and
Access
Availability
Incident
Response
Data
Protection
Governance
22
• Governance of Data and Identity
• Security Architecture standard
• Technology Services & Tools to Support:
– Data Protection – Encryption/Hashing/Anonymization
– Access management – Privileged and End Users
– Threat monitoring and protection
– Compliance (PCI, HIPAA) management
– Availability Management – DDoS mitigation, Multi-
region operation
– Operational Hygiene – Patching, Logging, etc
• Establish Incident Response with service provider
Enabling cloud
• Most Cloud providers leverage this as their security story
• This only covers the data centers policies, employees, standards
– CCTV
– 24x7x365 security personnel
– Entry and Exits of facility
• What about
– When a server needs to be changed, it is not covered
– When new employee at cloud provider starts it is not covered
– Security Policies, Standards apply to cloud vendor
– Monitoring of the environment
– Business Continuity / Disaster Recovery
– Incident Management
– Vulnerability Penetration Testing
– Etc.
Data center security audit/assessments
Role of digital security: enabling mobile
25
Enabling mobile
• Leveraging solutions to perform
automated scans
• There are vendors that provide both
automated and hands on reviews of mobile apps
• Performed once a new version is uploaded to the store
• Should perform
– Run-time scanning (Dynamic and app logic analysis)
– Network Scanning
– Serverside scanning
• Mobile security training
• Rogue App monitoring
So how does API-first architecture manifest itself?
API-first architecture
API Tier
All Apps
Analytics
App
Servers
ESB
Social
Apps
Web
Apps
Mobile
Apps
Backend
Services
OrchestrationPersistence Security
Internet
API services for
mobile and
cloud apps
Consistent
security
across
channels
Developers
IT security
architect
Technologies driving digital transformations
Mobile
DevOpsCloud
API
Information security must be able to meet governance
requirements and manage compliance when handling
PCI DSS or HIPAA use cases
Top technology considerations and takeaways
• Focus on data-centric controls such as masking,
encryption and hashing to protect data at rest.
• Work closely with DevOps teams to “bake in”
security controls into the orchestration layer and
cloud hosting systems.
• Leverage APIs to build consistent, secure and
scalable mobile solutions.
• Automate security monitoring and management
using APIs.
DeveloperUser APIApp API Team Backend
Security as a Enabler: Summary
• Security is a competitive differentiator
– IT security must remove barriers to enable
business and developers/DevOps
• DevOps (need for speed, flexibility) and InfoSec
(need for consistent protection) go hand-in-hand
• API-first architecture provides consistent security
enforcement for mobile and cloud use cases
DeveloperUser APIApp API Team Backend
@Subrak
Subra Kumaraswamy
Randy Barr
Questions?
Thank You
Apigee
@apigee
Identity landscape in the digital world
•What drives adoption of cloud solutions within a
company
•Selecting IT solutions are as easy as reading the
numbers off your credit card
•Small implementations can lead to adoption by
other users
•Ability for mobility is key to further adoption of the
solution
•Growth leads to managing the solution
•Security is then brought in
Choices
SECURITY TRANSPARENCY
• Reliance on Data Center Audits
• Privacy
• White papers with no details
• Reluctant to share details citing protecting their
existing customers
• Customer audits
• Cloud Controls Matrix
• Consensus Assessments Initiative Questionnaire
• Independent 3rd party report of Saba’s policies,
standards and processes
• SOC II Type II report
• DR Executive Summary
• Policies & Standards table of contents
• Independent 3rd party penetration test
• Network and Application Vulnerability executive report
within 48 hours of request
Completecustomervisibility
Enabling the DevOps to securely expose the back-
end services with necessary authentication,
authorization, message security, and Auditing
Security considerations
• Authentication of Apps, APIs and Users: LDAP, active
directory, SAML, OAuth, two-way TLS
• User and role management
• Protect sensitive data stored and processed in the
cloud and mobile devices
• Threat management (DoS, spikes, injection attacks)
• Logging and auditing
Role of InfoSec

Contenu connexe

Tendances

Tendances (20)

Identity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust StrategyIdentity's Role in a Zero Trust Strategy
Identity's Role in a Zero Trust Strategy
 
Building better security for your API platform using Azure API Management
Building better security for your API platform using Azure API ManagementBuilding better security for your API platform using Azure API Management
Building better security for your API platform using Azure API Management
 
Hacker vs AI
Hacker vs AI Hacker vs AI
Hacker vs AI
 
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
(SACON) Suhas Desai - The Power of APIs – API Economy Trends & Market Drivers...
 
Trust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai PlatformTrust No One - Zero Trust on the Akamai Platform
Trust No One - Zero Trust on the Akamai Platform
 
Protecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond OauthProtecting APIs from Mobile Threats- Beyond Oauth
Protecting APIs from Mobile Threats- Beyond Oauth
 
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
Standard Based API Security, Access Control and AI Based Attack - API Days Pa...
 
Ten security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard ofTen security product categories you've (probably) never heard of
Ten security product categories you've (probably) never heard of
 
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
Gartner IAM London 2017 Session - Security, Standards & User Experience: The ...
 
Zero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at AdobeZero Trust Enterprise Network at Adobe
Zero Trust Enterprise Network at Adobe
 
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
API Days, Paris, January 2018 - Sharing API Economy Observations: Business dr...
 
The Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force AwakensThe Future of CASBs - A Cloud Security Force Awakens
The Future of CASBs - A Cloud Security Force Awakens
 
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
Centralize and Simplify Secrets Management for Red Hat OpenShift Container En...
 
You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA You Can't Spell Enterprise Security without MFA
You Can't Spell Enterprise Security without MFA
 
Applying API Security at Scale
Applying API Security at ScaleApplying API Security at Scale
Applying API Security at Scale
 
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
Hybrid IAM: Fuelling Agility in the Cloud Transformation Journey | Gartner IA...
 
The Case For Next Generation IAM
The Case For Next Generation IAM The Case For Next Generation IAM
The Case For Next Generation IAM
 
Optimize Your Zero Trust Infrastructure
Optimize Your Zero Trust InfrastructureOptimize Your Zero Trust Infrastructure
Optimize Your Zero Trust Infrastructure
 
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
Criteria for Effective Modern IAM Strategies (Gartner IAM 2018)
 
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security FactorWebinar: Three Steps to Transform Your Mobile App into a Security Factor
Webinar: Three Steps to Transform Your Mobile App into a Security Factor
 

En vedette

PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
PSFK
 
I Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
I Love APIs 2015: Create Design-driven APIs with Node.js and SwaggerI Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
I Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
Apigee | Google Cloud
 
The API Facade Pattern: Technology - Episode 3
The API Facade Pattern: Technology - Episode 3The API Facade Pattern: Technology - Episode 3
The API Facade Pattern: Technology - Episode 3
Apigee | Google Cloud
 

En vedette (20)

Digital security
Digital securityDigital security
Digital security
 
Digital Security Slide Show
Digital Security Slide ShowDigital Security Slide Show
Digital Security Slide Show
 
Deep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital AgeDeep-Dive: API Security in the Digital Age
Deep-Dive: API Security in the Digital Age
 
PSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & SecurityPSFK Presents the Future of Digital Safety & Security
PSFK Presents the Future of Digital Safety & Security
 
Digital security presentation
Digital security presentationDigital security presentation
Digital security presentation
 
Deep-Dive: Secure API Management
Deep-Dive: Secure API ManagementDeep-Dive: Secure API Management
Deep-Dive: Secure API Management
 
Digital Security
Digital SecurityDigital Security
Digital Security
 
APIs: The New Security Layer
APIs: The New Security LayerAPIs: The New Security Layer
APIs: The New Security Layer
 
The ‘Data Driven Video Business’
The ‘Data Driven Video Business’The ‘Data Driven Video Business’
The ‘Data Driven Video Business’
 
PPT FOR SECURITY
PPT FOR SECURITYPPT FOR SECURITY
PPT FOR SECURITY
 
WSO2Con EU 2016: API Driven Innovation Within the Enterprise
WSO2Con EU 2016: API Driven Innovation Within the EnterpriseWSO2Con EU 2016: API Driven Innovation Within the Enterprise
WSO2Con EU 2016: API Driven Innovation Within the Enterprise
 
Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)Asset slide-show-identifying-it-security-threats (1)
Asset slide-show-identifying-it-security-threats (1)
 
Security framework
Security frameworkSecurity framework
Security framework
 
Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.Mobile Security: Apps are our digital lives.
Mobile Security: Apps are our digital lives.
 
Home Security Systems - Your First Defense
Home Security Systems - Your First DefenseHome Security Systems - Your First Defense
Home Security Systems - Your First Defense
 
Webcast: Apigee Edge Product Demo
Webcast: Apigee Edge Product DemoWebcast: Apigee Edge Product Demo
Webcast: Apigee Edge Product Demo
 
I Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
I Love APIs 2015: Create Design-driven APIs with Node.js and SwaggerI Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
I Love APIs 2015: Create Design-driven APIs with Node.js and Swagger
 
Does your API need to be PCI Compliant?
Does your API need to be PCI Compliant?Does your API need to be PCI Compliant?
Does your API need to be PCI Compliant?
 
Developers Hate Marketing! Driving API Adoption
Developers Hate Marketing! Driving API AdoptionDevelopers Hate Marketing! Driving API Adoption
Developers Hate Marketing! Driving API Adoption
 
The API Facade Pattern: Technology - Episode 3
The API Facade Pattern: Technology - Episode 3The API Facade Pattern: Technology - Episode 3
The API Facade Pattern: Technology - Episode 3
 

Similaire à Security as an Enabler for the Digital World - CISO Perspective

Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
rkadayam
 

Similaire à Security as an Enabler for the Digital World - CISO Perspective (20)

Embracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and CentrifyEmbracing secure, scalable BYOD with Sencha and Centrify
Embracing secure, scalable BYOD with Sencha and Centrify
 
Web Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN TestingWeb Application Security: Beyond PEN Testing
Web Application Security: Beyond PEN Testing
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Succeeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps finalSucceeding-Marriage-Cybersecurity-DevOps final
Succeeding-Marriage-Cybersecurity-DevOps final
 
SSO Agility Made Possible - November 2014
SSO Agility Made Possible  -  November 2014SSO Agility Made Possible  -  November 2014
SSO Agility Made Possible - November 2014
 
Why Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t EnoughWhy Network and Endpoint Security Isn’t Enough
Why Network and Endpoint Security Isn’t Enough
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Bridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD PipelineBridging the Security Testing Gap in Your CI/CD Pipeline
Bridging the Security Testing Gap in Your CI/CD Pipeline
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Building an API Security Strategy
Building an API Security StrategyBuilding an API Security Strategy
Building an API Security Strategy
 
End to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOpsEnd to-End Monitoring for ITSM and DevOps
End to-End Monitoring for ITSM and DevOps
 
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
Outpost24 webinar - The new CISO imperative: connecting technical vulnerabili...
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud Security
 
API and App Ecosystems - Build The Best: a deep dive
API and App Ecosystems - Build The Best: a deep diveAPI and App Ecosystems - Build The Best: a deep dive
API and App Ecosystems - Build The Best: a deep dive
 
Managed security services
Managed security servicesManaged security services
Managed security services
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
How to Achieve Agile API Security
How to Achieve Agile API SecurityHow to Achieve Agile API Security
How to Achieve Agile API Security
 
Digital Product Security
Digital Product SecurityDigital Product Security
Digital Product Security
 

Plus de Apigee | Google Cloud

Plus de Apigee | Google Cloud (20)

How Secure Are Your APIs?
How Secure Are Your APIs?How Secure Are Your APIs?
How Secure Are Your APIs?
 
Magazine Luiza at a glance (1)
Magazine Luiza at a glance (1)Magazine Luiza at a glance (1)
Magazine Luiza at a glance (1)
 
Monetization: Unlock More Value from Your APIs
Monetization: Unlock More Value from Your APIs Monetization: Unlock More Value from Your APIs
Monetization: Unlock More Value from Your APIs
 
Apigee Demo: API Platform Overview
Apigee Demo: API Platform OverviewApigee Demo: API Platform Overview
Apigee Demo: API Platform Overview
 
Ticketmaster at a glance
Ticketmaster at a glanceTicketmaster at a glance
Ticketmaster at a glance
 
AccuWeather: Recasting API Experiences in a Developer-First World
AccuWeather: Recasting API Experiences in a Developer-First WorldAccuWeather: Recasting API Experiences in a Developer-First World
AccuWeather: Recasting API Experiences in a Developer-First World
 
Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?Which Application Modernization Pattern Is Right For You?
Which Application Modernization Pattern Is Right For You?
 
Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2Apigee Product Roadmap Part 2
Apigee Product Roadmap Part 2
 
The Four Transformative Forces of the API Management Market
The Four Transformative Forces of the API Management MarketThe Four Transformative Forces of the API Management Market
The Four Transformative Forces of the API Management Market
 
Walgreens at a glance
Walgreens at a glanceWalgreens at a glance
Walgreens at a glance
 
Apigee Edge: Intro to Microgateway
Apigee Edge: Intro to MicrogatewayApigee Edge: Intro to Microgateway
Apigee Edge: Intro to Microgateway
 
Managing the Complexity of Microservices Deployments
Managing the Complexity of Microservices DeploymentsManaging the Complexity of Microservices Deployments
Managing the Complexity of Microservices Deployments
 
Pitney Bowes at a glance
Pitney Bowes at a glancePitney Bowes at a glance
Pitney Bowes at a glance
 
Microservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices SuccessMicroservices Done Right: Key Ingredients for Microservices Success
Microservices Done Right: Key Ingredients for Microservices Success
 
Adapt or Die: Opening Keynote with Chet Kapoor
Adapt or Die: Opening Keynote with Chet KapoorAdapt or Die: Opening Keynote with Chet Kapoor
Adapt or Die: Opening Keynote with Chet Kapoor
 
Adapt or Die: Keynote with Greg Brail
Adapt or Die: Keynote with Greg BrailAdapt or Die: Keynote with Greg Brail
Adapt or Die: Keynote with Greg Brail
 
Adapt or Die: Keynote with Anant Jhingran
Adapt or Die: Keynote with Anant JhingranAdapt or Die: Keynote with Anant Jhingran
Adapt or Die: Keynote with Anant Jhingran
 
London Adapt or Die: Opening Keynot
London Adapt or Die: Opening KeynotLondon Adapt or Die: Opening Keynot
London Adapt or Die: Opening Keynot
 
London Adapt or Die: Lunch keynote
London Adapt or Die: Lunch keynoteLondon Adapt or Die: Lunch keynote
London Adapt or Die: Lunch keynote
 
London Adapt or Die: Closing Keynote — Adapt Now!
London Adapt or Die: Closing Keynote — Adapt Now!London Adapt or Die: Closing Keynote — Adapt Now!
London Adapt or Die: Closing Keynote — Adapt Now!
 

Dernier

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
masabamasaba
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
chiefasafspells
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 

Dernier (20)

%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Atlanta Psychic Readings, Attraction spells,Brin...
 
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park %in ivory park+277-882-255-28 abortion pills for sale in ivory park
%in ivory park+277-882-255-28 abortion pills for sale in ivory park
 
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
Love witchcraft +27768521739 Binding love spell in Sandy Springs, GA |psychic...
 
Architecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the pastArchitecture decision records - How not to get lost in the past
Architecture decision records - How not to get lost in the past
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
AI & Machine Learning Presentation Template
AI & Machine Learning Presentation TemplateAI & Machine Learning Presentation Template
AI & Machine Learning Presentation Template
 
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
%+27788225528 love spells in Knoxville Psychic Readings, Attraction spells,Br...
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
Direct Style Effect Systems -The Print[A] Example- A Comprehension AidDirect Style Effect Systems -The Print[A] Example- A Comprehension Aid
Direct Style Effect Systems - The Print[A] Example - A Comprehension Aid
 
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With SimplicityWSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
WSO2Con2024 - Enabling Transactional System's Exponential Growth With Simplicity
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital TransformationWSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
WSO2Con2024 - WSO2's IAM Vision: Identity-Led Digital Transformation
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
WSO2CON 2024 - Navigating API Complexity: REST, GraphQL, gRPC, Websocket, Web...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 

Security as an Enabler for the Digital World - CISO Perspective

  • 1. Digital Security: The CISO Perspective Apigee @apigee Subra Kumaraswamy @subrak Randy Barr CISO, Saba Software
  • 5. Agenda • The changing Digital landscape • Trends: technology and threats • Security enablers • Key takeaways
  • 6. What’s keeping you up at night? 6 Data Theft
  • 10. DevOps is growing exponentially
  • 12. Breaches continue to haunt the enterprise Source: Verizon 2014
  • 14. The changing landscape B A C K - E N D S Y S T E M S M O B I L E S E C U R I T Y APIs S O C I A L A N D S A A S Contextual & behavioral security Encrypt everything Identity-as-a-Service SaaS security/identity plugin Fraud detection APT security analytics E N D P O I N T S E C U R I T Y Digital security is shifting from defense to analytics (predictive) & prevention
  • 15. Technologies driving digital transformations Mobile DevOpsCloud API
  • 16. Digital security as an enabler
  • 17. What’s the role of InfoSec in enabling digital transformation?
  • 18. Top areas of CISO concern Source: Wisegate
  • 19. The role of digital security: enabling DevOps
  • 20. 20 • End-to-end security managed through configuration and global policies • Data-centric controls such as encryption, tokenization, and key management • Leverage API for security automation activities including patching, user and access management, logging, and auditing • Security verification through tool automation, aligned with SDLC: Dev->Stage->Prod Enabling DevOps
  • 21. Role of digital security: enabling cloud Compliance Trust Architecture Identity and Access Availability Incident Response Data Protection Governance
  • 22. 22 • Governance of Data and Identity • Security Architecture standard • Technology Services & Tools to Support: – Data Protection – Encryption/Hashing/Anonymization – Access management – Privileged and End Users – Threat monitoring and protection – Compliance (PCI, HIPAA) management – Availability Management – DDoS mitigation, Multi- region operation – Operational Hygiene – Patching, Logging, etc • Establish Incident Response with service provider Enabling cloud
  • 23. • Most Cloud providers leverage this as their security story • This only covers the data centers policies, employees, standards – CCTV – 24x7x365 security personnel – Entry and Exits of facility • What about – When a server needs to be changed, it is not covered – When new employee at cloud provider starts it is not covered – Security Policies, Standards apply to cloud vendor – Monitoring of the environment – Business Continuity / Disaster Recovery – Incident Management – Vulnerability Penetration Testing – Etc. Data center security audit/assessments
  • 24. Role of digital security: enabling mobile
  • 25. 25 Enabling mobile • Leveraging solutions to perform automated scans • There are vendors that provide both automated and hands on reviews of mobile apps • Performed once a new version is uploaded to the store • Should perform – Run-time scanning (Dynamic and app logic analysis) – Network Scanning – Serverside scanning • Mobile security training • Rogue App monitoring
  • 26. So how does API-first architecture manifest itself?
  • 27. API-first architecture API Tier All Apps Analytics App Servers ESB Social Apps Web Apps Mobile Apps Backend Services OrchestrationPersistence Security Internet API services for mobile and cloud apps Consistent security across channels Developers IT security architect
  • 28. Technologies driving digital transformations Mobile DevOpsCloud API
  • 29. Information security must be able to meet governance requirements and manage compliance when handling PCI DSS or HIPAA use cases
  • 30. Top technology considerations and takeaways • Focus on data-centric controls such as masking, encryption and hashing to protect data at rest. • Work closely with DevOps teams to “bake in” security controls into the orchestration layer and cloud hosting systems. • Leverage APIs to build consistent, secure and scalable mobile solutions. • Automate security monitoring and management using APIs. DeveloperUser APIApp API Team Backend
  • 31. Security as a Enabler: Summary • Security is a competitive differentiator – IT security must remove barriers to enable business and developers/DevOps • DevOps (need for speed, flexibility) and InfoSec (need for consistent protection) go hand-in-hand • API-first architecture provides consistent security enforcement for mobile and cloud use cases DeveloperUser APIApp API Team Backend
  • 34. Identity landscape in the digital world
  • 35. •What drives adoption of cloud solutions within a company •Selecting IT solutions are as easy as reading the numbers off your credit card •Small implementations can lead to adoption by other users •Ability for mobility is key to further adoption of the solution •Growth leads to managing the solution •Security is then brought in Choices
  • 36. SECURITY TRANSPARENCY • Reliance on Data Center Audits • Privacy • White papers with no details • Reluctant to share details citing protecting their existing customers • Customer audits • Cloud Controls Matrix • Consensus Assessments Initiative Questionnaire • Independent 3rd party report of Saba’s policies, standards and processes • SOC II Type II report • DR Executive Summary • Policies & Standards table of contents • Independent 3rd party penetration test • Network and Application Vulnerability executive report within 48 hours of request Completecustomervisibility
  • 37. Enabling the DevOps to securely expose the back- end services with necessary authentication, authorization, message security, and Auditing
  • 38. Security considerations • Authentication of Apps, APIs and Users: LDAP, active directory, SAML, OAuth, two-way TLS • User and role management • Protect sensitive data stored and processed in the cloud and mobile devices • Threat management (DoS, spikes, injection attacks) • Logging and auditing

Notes de l'éditeur

  1. Presenter: Tim - Introduce myself; have Subra introduce himself (names & titles only here) - Thank you for joining us today….. - We do want your questions, which we will take at the end Creative Commons Attribution-Share Alike 3.0 United States License
  2. Presenter: Tim Numerous videos about APIs on our YouTube channel
  3. Presenter: Tim Numerous presentations about APIs available on SlideShare
  4. Presenter: Tim - Subra – ‘Tell our audience’ something about your background / experience, and your role here at Apigee - Tim to follow with the same (i.e., something about my background / experience, and my role here at Apigee)
  5. Presenter: Tim
  6. Community Health breached and 4.5 million patient records stolen by Chinese cyberspies. Heartbleed was used
  7. http://www.thefutureorganization.com/five-trends-shaping-future-work/ And perhaps the most significant change that we’re all dealing with is that the work itself and the skills required everyday keep changing – in fact, 47% of today’s jobs won’t even exist in 20 years, and new jobs, requiring new skills will emerge. And all these challenges and changes have to be addressed over and above the day-to-day work of attracting, developing and retaining talent.
  8. Based on recent research report from Deloitte University, Learning and Talent professionals are dealing with a myriad of challenges including leadership development, employee engagement, diversity and inclusion, collaboration, compliance, and certification. But one of the biggest challenges organizations face today is “overwhelmed” employees. Employees are faced with information overload, too many tools, and too many choices. This is negatively impacting their productivity and effectiveness.
  9. Presenter: Tim ‘That said, let’s jump into API architecture considerations’
  10. Main Points: The path to securing the Digital World is along the Mobile Value Chain. Script: Let’s start with the architecture. A typical API-centric architecture is comprised of two tiers: The API infrastructure service, or “service exposure,” tier - Composed of API service providers (internal backend services and external partner services); services that securely transform existing backend capabilities into APIs; and new data services that power apps (mobile, social, web, and partner) and are aided by self-service API and management portals. The API developer service, or “API consumption,” tier - Includes services that enable developers to build and deploy apps in a secure way; engage with a developer community; and help manage application life cycles via self-service API and developer portals. Why is this view important? One of the key tenets that enable "defense in depth" security practices within an enterprise is “separation of concerns.” This design principle will make it easier to design security into the architecture and facilitate strong security management such as “separation of duties” between the service providers (the IT architect, IT security, and business) and service consumers (developers and end users). The key benefit of following a separation of concerns principle is that developers can continue to innovate and iterate with an app-centric security model while IT security architects and operations teams can safely expose the APIs without compromising on the enterprise security standards (authentication, authorization, message security, threat mitigation, logging, and auditing).
  11. Main Points: The path to securing the Digital World is along the Mobile Value Chain. Script: Let’s start with the architecture. A typical API-centric architecture is comprised of two tiers: The API infrastructure service, or “service exposure,” tier - Composed of API service providers (internal backend services and external partner services); services that securely transform existing backend capabilities into APIs; and new data services that power apps (mobile, social, web, and partner) and are aided by self-service API and management portals. The API developer service, or “API consumption,” tier - Includes services that enable developers to build and deploy apps in a secure way; engage with a developer community; and help manage application life cycles via self-service API and developer portals. Why is this view important? One of the key tenets that enable "defense in depth" security practices within an enterprise is “separation of concerns.” This design principle will make it easier to design security into the architecture and facilitate strong security management such as “separation of duties” between the service providers (the IT architect, IT security, and business) and service consumers (developers and end users). The key benefit of following a separation of concerns principle is that developers can continue to innovate and iterate with an app-centric security model while IT security architects and operations teams can safely expose the APIs without compromising on the enterprise security standards (authentication, authorization, message security, threat mitigation, logging, and auditing).
  12. Main Points: The path to securing the Digital World is along the Mobile Value Chain. Script: Let’s start with the architecture. A typical API-centric architecture is comprised of two tiers: The API infrastructure service, or “service exposure,” tier - Composed of API service providers (internal backend services and external partner services); services that securely transform existing backend capabilities into APIs; and new data services that power apps (mobile, social, web, and partner) and are aided by self-service API and management portals. The API developer service, or “API consumption,” tier - Includes services that enable developers to build and deploy apps in a secure way; engage with a developer community; and help manage application life cycles via self-service API and developer portals. Why is this view important? One of the key tenets that enable "defense in depth" security practices within an enterprise is “separation of concerns.” This design principle will make it easier to design security into the architecture and facilitate strong security management such as “separation of duties” between the service providers (the IT architect, IT security, and business) and service consumers (developers and end users). The key benefit of following a separation of concerns principle is that developers can continue to innovate and iterate with an app-centric security model while IT security architects and operations teams can safely expose the APIs without compromising on the enterprise security standards (authentication, authorization, message security, threat mitigation, logging, and auditing).
  13. And this problem doesn’t only exist in the talent management arena. We are faced with the paradox of choice in all areas of our lives. On the one hand, we love having choices; on the hand, information overload is truly overwhelming and frustrating. This is hardly a new dilemma. In the area of consumer products, vendors have largely solved this problem by applying machine learning and intelligent recommendation technologies. For example, Netflix gets better at recommending movies to you every time you select one. Amazon does the same thing with books and technology. The Google self-driving car is actually a better driver than a human, because it processes more data faster. [optional proof point: as of April 2014, Google self-driving cars had driven over 700k miles without an accident.] What does it mean for Talent Management?
  14. 75% of organizations are using at least one cloud service 70% of of CISOs are concerned about cloud and mobile security
  15. Let’s talk about the major technology drivers
  16. Presenter: Tim ‘That said, let’s jump into API architecture considerations’
  17. Presenter: Tim - ‘Now lets begin our discussion of how to actually achieve those API security goals’ - ‘Subra, let’s start with explaining our two sided approach involving consumption and exposure’
  18. Main Points: The path to securing the Digital World is along the Mobile Value Chain. Script: Let’s start with the architecture. A typical API-centric architecture is comprised of two tiers: The API infrastructure service, or “service exposure,” tier - Composed of API service providers (internal backend services and external partner services); services that securely transform existing backend capabilities into APIs; and new data services that power apps (mobile, social, web, and partner) and are aided by self-service API and management portals. The API developer service, or “API consumption,” tier - Includes services that enable developers to build and deploy apps in a secure way; engage with a developer community; and help manage application life cycles via self-service API and developer portals. Why is this view important? One of the key tenets that enable "defense in depth" security practices within an enterprise is “separation of concerns.” This design principle will make it easier to design security into the architecture and facilitate strong security management such as “separation of duties” between the service providers (the IT architect, IT security, and business) and service consumers (developers and end users). The key benefit of following a separation of concerns principle is that developers can continue to innovate and iterate with an app-centric security model while IT security architects and operations teams can safely expose the APIs without compromising on the enterprise security standards (authentication, authorization, message security, threat mitigation, logging, and auditing).
  19. Presenter: Tim - ‘Now lets begin our discussion of how to actually achieve those API security goals’ - ‘Subra, let’s start with explaining our two sided approach involving consumption and exposure’
  20. My goal is to define a hierarchy of features that provides both convenient “roll-ups” that can be used by Sales (for example) and also a level of detail that allows for things like bug classification, etc.”
  21. Presenter: Tim - ‘Now lets begin our discussion of how to actually achieve those API security goals’ - ‘Subra, let’s start with explaining our two sided approach involving consumption and exposure’
  22. My goal is to define a hierarchy of features that provides both convenient “roll-ups” that can be used by Sales (for example) and also a level of detail that allows for things like bug classification, etc.”
  23. Presenter: Tim - ‘Now lets begin our discussion of how to actually achieve those API security goals’ - ‘Subra, let’s start with explaining our two sided approach involving consumption and exposure’
  24. My goal is to define a hierarchy of features that provides both convenient “roll-ups” that can be used by Sales (for example) and also a level of detail that allows for things like bug classification, etc.”
  25. Presenter: Tim - ‘Now lets begin our discussion of how to actually achieve those API security goals’ - ‘Subra, let’s start with explaining our two sided approach involving consumption and exposure’
  26. Presenter: Subra Be sure to also cover: API tier allows decoupling of security models and creates loose coupling between applications consuming API and backend services Consumption tier demands support for agile security functions for app developers as well as flexible security mechanism for various API consumer types. For e.g. Your mobile app accessing your employee data will have different security requirements from your application that is developed by a 3rd party developed apps available and distributed via android marketplace or Apple store. Exposure tier on the other hand focus consistently enforcing security irrespective of what apps are connecting to the backend. Exposure tier needs to be concerned about fine granular authorization to the API functions by the apps Northbound / Southbound APIs are not SOA E: So that’s why we talk about API-first D: Is this a new term? E: The idea is that you use your API tier to deliver the same services to all related apps
  27. Let’s talk about the major technology drivers
  28. Presenter: Tim
  29. Presenter: Tim
  30. Presenter: Tim
  31. Presenter: Tim - Subra – ‘Tell our audience’ something about your background / experience, and your role here at Apigee - Tim to follow with the same (i.e., something about my background / experience, and my role here at Apigee)
  32. Presenter: Tim
  33. Presenter: Tim - “Architect” on this slide
  34. Presenter: Tim - Security “administrator” this slide
  35. Presenter: Tim ‘That said, let’s jump into API architecture considerations’