SlideShare une entreprise Scribd logo
1  sur  28
Télécharger pour lire hors ligne
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Scott C. Kennedy, Security Scientist, Intuit
Erik Naugle, Director Cloud Security, Intuit
October 2015
SEC326
Security Science via Big Data
What to Expect from the Session
• Get introduced to DevSecOps
• Learn about security science
• See how Intuit is using security science & big data
Our Mission at Work…
The Cloud Security Team (CST) will deliver transparent security
oversight and monitoring that enables safe use of cloud
resources without friction for our online business, by:
• Becoming the team to follow by establishing a DevSecOps
function that solves for secure use of cloud services.
• Automating our processes and solutions to ensure scaled
global delivery.
• Partnering across Intuit to ensure speed & ease for our
innovation.
Compliance Engineering
OperationsScience
Why is DevSecOps Needed ?
What is DevSecOps
• Agile discipline
• Best of each security specialty in one framework
• Value provided as security services
• Make it easy for business to take the right risks
• Reduce friction and disruptions
• Continuous improvement mindset
… Requires profiling, testing, and an ability to put
security in perspective
Drivers for DevSecOps
Embedding into DevOps was a disaster…
• Compliance checklists didn’t take us far before we
stopped scaling…
• We couldn’t keep up with deployments without
automation…
• Traditional security operations did not work…
• And we needed far more data than we expected to help
the business make decisions…
The Tenets of DevSecOps
1. Customer-focused mindset
2. Scale, scale, scale
3. Objective criteria
4. Proactive hunting
5. Continuous detection & response
The Art of DevSecOps
DevSecOps
Security
Engineering
Experiment,
Automate, Test
Security
Operations
Hunt, Detect,
Contain
Compliance
Operations
Respond,
Manage, Train
Security
Science
Learn, Measure,
Forecast
Security Science?
• Need to change the conversation from F.U.D. to facts
• Science is a fact-based examination
• Theories established
• Testable against real data
• Revised and retested as the landscape changes…
• Question -> Hypotheses -> Experiment -> Analyze -> Repeat
• Answers simple questions
Examples of Security Science
• What is your password policy?
• Why?
• How frequently should you restack your hosts?
• Can you make choices beforehand to improve this?
Ways Intuit is using Security Science
• Advocacy
• Education
• Threat reduction
Enhance Ability to “Detect & Contain”
Use big data analytics to improve detection methods
• Looking for the slow & steady attacker
• Find the one-packet-only attacks
• Find coordinated spread spectrum scans
• Detect AWS misuse cases before incidents occur
Use data visualization to uncover unseen existing issues
• Hunt the wumpus
It’s Log! It’s Big! It’s Heavy! It’s Wood!
• As of 9/2015, we have 990+ separate AWS accounts
• We use Splunk™ as our logging platform
• Partner with 3rd party to add value
• Operate a 24/7 SOC to trigger on AWS incidents
• Compliance
• Security
• Ingest CloudTrail/S3/ELB/etc. into unified logs
• Send all logs into TAP for further aggregation and alerts
• Looking to migrate to Hunk/EMR as future directions?
Using Logs to Profile Drift from Standards
Insights
Security
scienceSecurity
tools & data
AWS
accounts
Amazon S3
Amazon
Glacier
Amazon
EC2
AWS
CloudTrail
Ingestion
Threat intel
Benefits of Unified Logs
• Single pane of glass to see everything
• Allows complex queries and lookups
Egress Monitoring + Threat Intel to Detect Misuse
EC2
Subnet
VPC
Account
Ingestion
Incident Handling Triggered on Events?
• Use triggers/reports on AWS usage patterns
• Detect misuse early
Diving Through the Unified Views
Using combined views of data to find underlying patterns
Steer PD to “Ensure Apps are Secure”
• Develop insights to illustrate the rationale behind CST
• Win over the PD teams to use the CST model
• Increase overall security posture by illuminating security gaps
• Help PD teams overcome friction on security issues
• Create tooling to allow PD teams to self educate
• Guide them to right decisions via scoring
• Allow them to model scoring impacts before implementation
Portal – Gateway to Success in Cloud Adoption
• Displays account details
• Education access
• Tools to help scale
Why Focus on This?
Why is Scoring Important?
• Grades are powerful motivators
• Allows the PD leader to drill down
• Why am I failing?
• Where am I using that?
• But, then what?
CVSS modeling
• How to the decisions I make affect my grading scores?
• How frequently do I have to restack?
• What is the impact of package choices?
• Ruby or Python?
• MySQL or Postgres?
• Apache or Nginx?
Future directions
• Continue to create tooling for PD teams
• Encryption methods vs. cracking costs
• Key rotation tempo vs. re-encryption speed/costs
• Deep dive on DNS queries
• Find misuse without blocking
• Redirection for laptops, cloud, & Datacenter for intel
gathering
Wrap up
• Join DevSecOps Community via LinkedIn, GitHub, and Twitter
• DevSecOps.org
• linkedin.com/grp/home?gid=6817408
• github.com/devsecops
• twitter.com/devsecops
• Assess your org's cloud adoption strategy, security requirements
and work backwards
• Bring science into your security decisions.
Related Sessions
• BDT205 - Your First Big Data Application on AWS
• SEC308 - Wrangling Security Events in the Cloud
• SEC320 - AWS Security Beyond the Host: Leveraging
the Power of AWS to Automate Security and Compliance
• SEC402 - Enterprise Cloud Security via DevSecOps 2.0
Remember to complete
your evaluations!
Thank you!

Contenu connexe

Tendances

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
Mark Nunnikhoven
 

Tendances (20)

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Enterprise Summit Netherlands - AWS IoT
AWS Enterprise Summit Netherlands - AWS IoTAWS Enterprise Summit Netherlands - AWS IoT
AWS Enterprise Summit Netherlands - AWS IoT
 
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS Organizations
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
(SEC301) Encryption and Key Management in AWS | AWS re:Invent 2014
 
Architecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi AccountsArchitecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi Accounts
 
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
 
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
(SEC405) Enterprise Cloud Security via DevSecOps | AWS re:Invent 2014
 
Security Day IAM Recommended Practices
Security Day IAM Recommended PracticesSecurity Day IAM Recommended Practices
Security Day IAM Recommended Practices
 
How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment 
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Reading the AWS Compliance Framework
Reading the AWS Compliance FrameworkReading the AWS Compliance Framework
Reading the AWS Compliance Framework
 
Getting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute ServicesGetting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
AWS re:Invent 2016: AWS Partners and Data Privacy (GPST303)
 

En vedette

Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and PrivacyData Science at Intersection of Security and Privacy
Data Science at Intersection of Security and Privacy
Tarun Chopra
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
DataWorks Summit
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020
Anjan Roy, PMP
 
International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)
CSCJournals
 
Scaling by Design: AWS Web Services Patterns
Scaling by Design:AWS Web Services PatternsScaling by Design:AWS Web Services Patterns
Scaling by Design: AWS Web Services Patterns
Amazon Web Services
 

En vedette (20)

Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
Security Analytics: The Promise of Artificial Intelligence, Machine Learning,...
 
Data Science at Intersection of Security and Privacy
Data Science at Intersection of Security and PrivacyData Science at Intersection of Security and Privacy
Data Science at Intersection of Security and Privacy
 
Netadminpres
NetadminpresNetadminpres
Netadminpres
 
Security analytics
Security analyticsSecurity analytics
Security analytics
 
Performing network security analytics
Performing network security analyticsPerforming network security analytics
Performing network security analytics
 
IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020IP&A109 Next-Generation Analytics Architecture for the Year 2020
IP&A109 Next-Generation Analytics Architecture for the Year 2020
 
Envisioning the Next Generation of Analytics
Envisioning the Next Generation of AnalyticsEnvisioning the Next Generation of Analytics
Envisioning the Next Generation of Analytics
 
AWS APAC Webinar Week - Launching Your First Big Data Project on AWS
AWS APAC Webinar Week - Launching Your First Big Data Project on AWSAWS APAC Webinar Week - Launching Your First Big Data Project on AWS
AWS APAC Webinar Week - Launching Your First Big Data Project on AWS
 
Next generation security analytics
Next generation security analyticsNext generation security analytics
Next generation security analytics
 
International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)International Journal of Computer Science and Security Volume (3) Issue (2)
International Journal of Computer Science and Security Volume (3) Issue (2)
 
Data Science Transforming Security Operations
Data Science Transforming Security OperationsData Science Transforming Security Operations
Data Science Transforming Security Operations
 
Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬Network Security‬ and Big ‪‎Data Analytics‬
Network Security‬ and Big ‪‎Data Analytics‬
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
Get the Most Out of Amazon EC2: A Deep Dive on Reserved, On-Demand, and Spot ...
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and Archive
 
Agile BI - Pop-up Loft Tel Aviv
Agile BI - Pop-up Loft Tel AvivAgile BI - Pop-up Loft Tel Aviv
Agile BI - Pop-up Loft Tel Aviv
 
Scaling by Design: AWS Web Services Patterns
Scaling by Design:AWS Web Services PatternsScaling by Design:AWS Web Services Patterns
Scaling by Design: AWS Web Services Patterns
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
AWS APAC Webinar Week - Understanding AWS Storage Options
AWS APAC Webinar Week - Understanding AWS Storage OptionsAWS APAC Webinar Week - Understanding AWS Storage Options
AWS APAC Webinar Week - Understanding AWS Storage Options
 
AWS March 2016 Webinar Series Getting Started with Serverless Architectures
AWS March 2016 Webinar Series   Getting Started with Serverless ArchitecturesAWS March 2016 Webinar Series   Getting Started with Serverless Architectures
AWS March 2016 Webinar Series Getting Started with Serverless Architectures
 

Similaire à (SEC326) Security Science Using Big Data

Similaire à (SEC326) Security Science Using Big Data (20)

(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015DevSecCon KeyNote London 2015
DevSecCon KeyNote London 2015
 
DevSecCon Keynote
DevSecCon KeynoteDevSecCon Keynote
DevSecCon Keynote
 
ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015ISACA Ireland Keynote 2015
ISACA Ireland Keynote 2015
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
Unleash Team Productivity with Real-Time Operations (DEV203-S) - AWS re:Inven...
 
AppSec in an Agile World
AppSec in an Agile WorldAppSec in an Agile World
AppSec in an Agile World
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = AwesomenessCloudBrew 2017 - Security + DevOps + Azure = Awesomeness
CloudBrew 2017 - Security + DevOps + Azure = Awesomeness
 
Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?Cyber Scotland Connect: What is Security Engineering?
Cyber Scotland Connect: What is Security Engineering?
 
The What, Why, and How of DevSecOps
The What, Why, and How of DevSecOpsThe What, Why, and How of DevSecOps
The What, Why, and How of DevSecOps
 
How to choose tools for DevOps and Continuous Delivery - DevOps Cardiff
How to choose tools for DevOps and Continuous Delivery - DevOps CardiffHow to choose tools for DevOps and Continuous Delivery - DevOps Cardiff
How to choose tools for DevOps and Continuous Delivery - DevOps Cardiff
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWS
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Grokking microservices in 5 minutes
Grokking microservices in 5 minutesGrokking microservices in 5 minutes
Grokking microservices in 5 minutes
 
2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics2022 Trends in Enterprise Analytics
2022 Trends in Enterprise Analytics
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
The Joy of Proactive Security
The Joy of Proactive SecurityThe Joy of Proactive Security
The Joy of Proactive Security
 
Owasp joy of proactive security
Owasp joy of proactive securityOwasp joy of proactive security
Owasp joy of proactive security
 
Owasp summit slides day 2
Owasp summit slides day 2Owasp summit slides day 2
Owasp summit slides day 2
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Dernier (20)

Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 

(SEC326) Security Science Using Big Data

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Scott C. Kennedy, Security Scientist, Intuit Erik Naugle, Director Cloud Security, Intuit October 2015 SEC326 Security Science via Big Data
  • 2. What to Expect from the Session • Get introduced to DevSecOps • Learn about security science • See how Intuit is using security science & big data
  • 3. Our Mission at Work… The Cloud Security Team (CST) will deliver transparent security oversight and monitoring that enables safe use of cloud resources without friction for our online business, by: • Becoming the team to follow by establishing a DevSecOps function that solves for secure use of cloud services. • Automating our processes and solutions to ensure scaled global delivery. • Partnering across Intuit to ensure speed & ease for our innovation.
  • 5. What is DevSecOps • Agile discipline • Best of each security specialty in one framework • Value provided as security services • Make it easy for business to take the right risks • Reduce friction and disruptions • Continuous improvement mindset … Requires profiling, testing, and an ability to put security in perspective
  • 6. Drivers for DevSecOps Embedding into DevOps was a disaster… • Compliance checklists didn’t take us far before we stopped scaling… • We couldn’t keep up with deployments without automation… • Traditional security operations did not work… • And we needed far more data than we expected to help the business make decisions…
  • 7. The Tenets of DevSecOps 1. Customer-focused mindset 2. Scale, scale, scale 3. Objective criteria 4. Proactive hunting 5. Continuous detection & response
  • 8. The Art of DevSecOps DevSecOps Security Engineering Experiment, Automate, Test Security Operations Hunt, Detect, Contain Compliance Operations Respond, Manage, Train Security Science Learn, Measure, Forecast
  • 9. Security Science? • Need to change the conversation from F.U.D. to facts • Science is a fact-based examination • Theories established • Testable against real data • Revised and retested as the landscape changes… • Question -> Hypotheses -> Experiment -> Analyze -> Repeat • Answers simple questions
  • 10. Examples of Security Science • What is your password policy? • Why? • How frequently should you restack your hosts? • Can you make choices beforehand to improve this?
  • 11. Ways Intuit is using Security Science • Advocacy • Education • Threat reduction
  • 12. Enhance Ability to “Detect & Contain” Use big data analytics to improve detection methods • Looking for the slow & steady attacker • Find the one-packet-only attacks • Find coordinated spread spectrum scans • Detect AWS misuse cases before incidents occur Use data visualization to uncover unseen existing issues • Hunt the wumpus
  • 13. It’s Log! It’s Big! It’s Heavy! It’s Wood! • As of 9/2015, we have 990+ separate AWS accounts • We use Splunk™ as our logging platform • Partner with 3rd party to add value • Operate a 24/7 SOC to trigger on AWS incidents • Compliance • Security • Ingest CloudTrail/S3/ELB/etc. into unified logs • Send all logs into TAP for further aggregation and alerts • Looking to migrate to Hunk/EMR as future directions?
  • 14. Using Logs to Profile Drift from Standards Insights Security scienceSecurity tools & data AWS accounts Amazon S3 Amazon Glacier Amazon EC2 AWS CloudTrail Ingestion Threat intel
  • 15. Benefits of Unified Logs • Single pane of glass to see everything • Allows complex queries and lookups
  • 16. Egress Monitoring + Threat Intel to Detect Misuse EC2 Subnet VPC Account Ingestion
  • 17. Incident Handling Triggered on Events? • Use triggers/reports on AWS usage patterns • Detect misuse early
  • 18. Diving Through the Unified Views Using combined views of data to find underlying patterns
  • 19. Steer PD to “Ensure Apps are Secure” • Develop insights to illustrate the rationale behind CST • Win over the PD teams to use the CST model • Increase overall security posture by illuminating security gaps • Help PD teams overcome friction on security issues • Create tooling to allow PD teams to self educate • Guide them to right decisions via scoring • Allow them to model scoring impacts before implementation
  • 20. Portal – Gateway to Success in Cloud Adoption • Displays account details • Education access • Tools to help scale
  • 21. Why Focus on This?
  • 22. Why is Scoring Important? • Grades are powerful motivators • Allows the PD leader to drill down • Why am I failing? • Where am I using that? • But, then what?
  • 23. CVSS modeling • How to the decisions I make affect my grading scores? • How frequently do I have to restack? • What is the impact of package choices? • Ruby or Python? • MySQL or Postgres? • Apache or Nginx?
  • 24. Future directions • Continue to create tooling for PD teams • Encryption methods vs. cracking costs • Key rotation tempo vs. re-encryption speed/costs • Deep dive on DNS queries • Find misuse without blocking • Redirection for laptops, cloud, & Datacenter for intel gathering
  • 25. Wrap up • Join DevSecOps Community via LinkedIn, GitHub, and Twitter • DevSecOps.org • linkedin.com/grp/home?gid=6817408 • github.com/devsecops • twitter.com/devsecops • Assess your org's cloud adoption strategy, security requirements and work backwards • Bring science into your security decisions.
  • 26. Related Sessions • BDT205 - Your First Big Data Application on AWS • SEC308 - Wrangling Security Events in the Cloud • SEC320 - AWS Security Beyond the Host: Leveraging the Power of AWS to Automate Security and Compliance • SEC402 - Enterprise Cloud Security via DevSecOps 2.0