SlideShare une entreprise Scribd logo
1  sur  24
Sumo Logic Confidential
Implementing and Maintaining a DevSecOps
Approach in the Cloud
Operational and Security Tips, Tricks and Best Practices
Wednesday January 25
10am PST / 12 noon CST
Sumo Logic Confidential
Today’s Presenters
George Gerchow, VP Security & Compliance
As Sumo Logic's Vice President of Security and Compliance, George Gerchow brings 18 years
of information technology and systems management expertise to the application of IT
processes and disciplines. His expertise impacts the security, compliance, and operational
status of complex, heterogeneous, virtual and cloud computing environments. Mr. Gerchow's
practical experience and insight from managing the infrastructures of some of the world's
largest corporate and government institutions, make him a highly regarded speaker and invited
panelist on topics including cloud secure architecture design, virtualization, configuration
management, operational security and compliance. George was one of the original founders of
the VMware Center for Policy and Compliance and he holds CISSP, ITIL, Cisco, and Microsoft
Certifications. Mr. Gerchow is also an active Board Member for several technology start ups
and the coauthor of Center for Internet Security Quick Start Cloud Infrastructure Benchmark
v1.0.0 and is a Faculty Member for IANS Institute of Applied Network Security.
Mark Bloom, Dir. Product Marketing, Security & Compliance
Mark has over 15 years of sales, marketing and business development experience in a variety
of financial service and high-technology markets. Past clients/employers have included Ford,
Motorola, United Technologies, Cisco, Chrysler, SonicWall/Dell, Trend Micro and Compuware.
Sumo Logic Confidential
DevSecOps in the Cloud
"Security must be more tightly integrated into the DevOps process to
deliver a DevSecOps process that builds in security from the earliest
stages of application design."
Gartner Top 10 Strategic Technology Trends for
2016: Adaptive Security Architecture
Gartner Top 10 Strategic Trend for 2016
http://www.gartner.com/document/3229017
Sumo Logic Confidential
Challenges
Sumo Logic Confidential
Security Challenges in Our Cloud Journey
• Starts simple, get more complex
• CSP offerings are growing
• Filling in the CSP offerings with 3rd party solutions
• Compliance, audit and more regulations are coming
• Attacks on the Cloud are increasing
Sumo Logic Confidential
Sumo Logic’s AWS Footprint
Sumo Logic Confidential
1,300+Customers in the cloud
100+ PBDataAnalyzed Daily
10M+Keys Under Management
Sumo Logic at Scale in the Cloud
SECURITY BAKED IN
10K+EC2 Instances
Sumo Logic Confidential
Sumo Logic’s AWS Technology Stack
Sumo Logic Confidential
The Sumo Logic Security Stack in AWS Cloud
Shared
responsibility
Functional Areas:
• Threat Intelligence
• File Integrity Monitoring
• IDS / IPS
• End Point Protection
• Security Analytics
Sumo Logic Confidential
Drinking Your Own Champagne
Sumo Logic Confidential
AWS Operational and Security Visibility
Sumo Logic Confidential
Regulatory Compliance
Sumo Logic Confidential
Sumo Logic: Fully Secure
Protecting Customer Data with Best-in-Class Security
• PCI/DSS 3.1 Service Provider Level 1 Certified
• SOC 2 Type attestation
• ISO 27001 certified
• CSA Star certified
• HIPAA-HITECH compliance
• U.S. – EU Privacy Shield
• AES 256-bit encryption at rest
• TLS encryption in transit
• FIPS 140-2 compliant
Industry’s Most
Secure
Cloud-Native
Analytics Service
Sumo Logic Confidential
Sumo Logic PCI App for AWS CloudTrail
Protecting Customer Data with Best-in-Class Security
Sumo Logic Confidential
Security & Operational Excellence
Sumo Logic Confidential
Security, Compliance & Operational Excellence
PLATFORM SECURITY
CONTINUOUS MONITORING
COMPLIANCE
END POINT PROTECTION
Sumo Logic Confidential
Threat Landscape
Sumo Logic Confidential
• Password Hygiene is still the #1 threat to security
• People who should be the most responsible are not
• Audit everything
• BitCoin Miners
The Cloud Attack that never goes away
Sumo Logic Confidential
Bitcoin mining in AWS
• Only 21 Million BitCoin Allowed to be Mined
• International Non Regulated Currency
• AWS GPU EC2 P2 Instances are perfect for mining
Bitcoins
• Use two-factor authentication.
• Never hardcode your cloud computing credentials
• Use Identity Access Management
Seeking Free Compute Power! please put your AWS credentials into a config file and upload
to GitHub
“Don’t put your Amazon credentials into source code and then share
that source code in a public place like GitHub!”
Sumo Logic Confidential
• Recent DDoS attacks targeted Dynamic Network Services Inc.,
better known as Dyn
• Dyn is one of many DNS providers to AWS
• AWS has some services (Shield)in place to help, and we have
3rd party tools but…
• Could AWS eat itself or be used to attack Azure in Mass?
“Security may be critical, but “agility is the single biggest reason enterprise are moving to the
cloud”
The latest Akamai security report highlights a 138 percent YoY increase in total DDoS
Sumo Logic Confidential
Sumo Logic Confidential
In Summary
Simplicity & visibility = scale
SecOps: Do more with less
Visibility & compliance
Sumo Logic Confidential
Sign up for a free trial of Sumo Logic at:
https://www.sumologic.com/signup-free

Contenu connexe

En vedette

Happy New Year!
Happy New Year!Happy New Year!
Happy New Year!
Checkmarx
 

En vedette (6)

Devops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLCDevops security-An Insight into Secure-SDLC
Devops security-An Insight into Secure-SDLC
 
A Successful SAST Tool Implementation
A Successful SAST Tool ImplementationA Successful SAST Tool Implementation
A Successful SAST Tool Implementation
 
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
Security Tests as Part of CI - Nir Koren, SAP - DevOpsDays Tel Aviv 2015
 
Application Security Management with ThreadFix
Application Security Management with ThreadFixApplication Security Management with ThreadFix
Application Security Management with ThreadFix
 
Happy New Year!
Happy New Year!Happy New Year!
Happy New Year!
 
Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...Bringing Security Testing to Development: How to Enable Developers to Act as ...
Bringing Security Testing to Development: How to Enable Developers to Act as ...
 

Plus de Sumo Logic

Plus de Sumo Logic (20)

Welcome Webinar Slides
Welcome Webinar SlidesWelcome Webinar Slides
Welcome Webinar Slides
 
Welcome Webinar PDF
Welcome Webinar PDFWelcome Webinar PDF
Welcome Webinar PDF
 
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with KubernetesSumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
 
Sumo Logic Cert Jam - Security & Compliance
Sumo Logic Cert Jam - Security & ComplianceSumo Logic Cert Jam - Security & Compliance
Sumo Logic Cert Jam - Security & Compliance
 
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with KubernetesSumo Logic Cert Jam - Advanced Metrics with Kubernetes
Sumo Logic Cert Jam - Advanced Metrics with Kubernetes
 
Sumo Logic Cert Jam - Metrics Mastery
Sumo Logic Cert Jam - Metrics MasterySumo Logic Cert Jam - Metrics Mastery
Sumo Logic Cert Jam - Metrics Mastery
 
Sumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security AnalyticsSumo Logic Cert Jam - Security Analytics
Sumo Logic Cert Jam - Security Analytics
 
Sumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - AdministrationSumo Logic Cert Jam - Administration
Sumo Logic Cert Jam - Administration
 
Sumo Logic Cert Jam - Search Mastery
Sumo Logic Cert Jam - Search MasterySumo Logic Cert Jam - Search Mastery
Sumo Logic Cert Jam - Search Mastery
 
Sumo Logic Cert Jam - Fundamentals
Sumo Logic Cert Jam - FundamentalsSumo Logic Cert Jam - Fundamentals
Sumo Logic Cert Jam - Fundamentals
 
Sumo Logic Cert Jam - Fundamentals (Spanish)
Sumo Logic Cert Jam - Fundamentals (Spanish)Sumo Logic Cert Jam - Fundamentals (Spanish)
Sumo Logic Cert Jam - Fundamentals (Spanish)
 
Sumo Logic Cert Jam - Metrics Mastery
Sumo Logic Cert Jam - Metrics MasterySumo Logic Cert Jam - Metrics Mastery
Sumo Logic Cert Jam - Metrics Mastery
 
Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018Security Certification: Security Analytics using Sumo Logic - Oct 2018
Security Certification: Security Analytics using Sumo Logic - Oct 2018
 
Level 3 Certification: Setting up Sumo Logic - Oct 2018
Level 3 Certification: Setting up Sumo Logic - Oct  2018Level 3 Certification: Setting up Sumo Logic - Oct  2018
Level 3 Certification: Setting up Sumo Logic - Oct 2018
 
Level 2 Certification: Using Sumo Logic - Oct 2018
Level 2 Certification: Using Sumo Logic - Oct 2018Level 2 Certification: Using Sumo Logic - Oct 2018
Level 2 Certification: Using Sumo Logic - Oct 2018
 
Sumo Logic Certification - Level 2 (Using Sumo)
Sumo Logic Certification - Level 2 (Using Sumo)Sumo Logic Certification - Level 2 (Using Sumo)
Sumo Logic Certification - Level 2 (Using Sumo)
 
Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018Using Sumo Logic - Apr 2018
Using Sumo Logic - Apr 2018
 
Sumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get CertifiedSumo Logic QuickStart Webinar - Get Certified
Sumo Logic QuickStart Webinar - Get Certified
 
You Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOpsYou Build It, You Secure It: Introduction to DevSecOps
You Build It, You Secure It: Introduction to DevSecOps
 
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic WebinarMaking the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
Making the Shift from DevOps to Practical DevSecOps | Sumo Logic Webinar
 

Dernier

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 

Dernier (20)

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
MarTech Trend 2024 Book : Marketing Technology Trends (2024 Edition) How Data...
 
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
%+27788225528 love spells in Toronto Psychic Readings, Attraction spells,Brin...
 
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
WSO2CON 2024 - WSO2's Digital Transformation Journey with Choreo: A Platforml...
 
Announcing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK SoftwareAnnouncing Codolex 2.0 from GDK Software
Announcing Codolex 2.0 from GDK Software
 
Artyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptxArtyushina_Guest lecture_YorkU CS May 2024.pptx
Artyushina_Guest lecture_YorkU CS May 2024.pptx
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
%in Rustenburg+277-882-255-28 abortion pills for sale in Rustenburg
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
%in Bahrain+277-882-255-28 abortion pills for sale in Bahrain
 
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
%+27788225528 love spells in Huntington Beach Psychic Readings, Attraction sp...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
W01_panagenda_Navigating-the-Future-with-The-Hitchhikers-Guide-to-Notes-and-D...
 
%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto%in Soweto+277-882-255-28 abortion pills for sale in soweto
%in Soweto+277-882-255-28 abortion pills for sale in soweto
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
WSO2CON 2024 - Cloud Native Middleware: Domain-Driven Design, Cell-Based Arch...
 
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni%in Benoni+277-882-255-28 abortion pills for sale in Benoni
%in Benoni+277-882-255-28 abortion pills for sale in Benoni
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 

Implementing a DevSecOps Approach in Cloud

  • 1. Sumo Logic Confidential Implementing and Maintaining a DevSecOps Approach in the Cloud Operational and Security Tips, Tricks and Best Practices Wednesday January 25 10am PST / 12 noon CST
  • 2. Sumo Logic Confidential Today’s Presenters George Gerchow, VP Security & Compliance As Sumo Logic's Vice President of Security and Compliance, George Gerchow brings 18 years of information technology and systems management expertise to the application of IT processes and disciplines. His expertise impacts the security, compliance, and operational status of complex, heterogeneous, virtual and cloud computing environments. Mr. Gerchow's practical experience and insight from managing the infrastructures of some of the world's largest corporate and government institutions, make him a highly regarded speaker and invited panelist on topics including cloud secure architecture design, virtualization, configuration management, operational security and compliance. George was one of the original founders of the VMware Center for Policy and Compliance and he holds CISSP, ITIL, Cisco, and Microsoft Certifications. Mr. Gerchow is also an active Board Member for several technology start ups and the coauthor of Center for Internet Security Quick Start Cloud Infrastructure Benchmark v1.0.0 and is a Faculty Member for IANS Institute of Applied Network Security. Mark Bloom, Dir. Product Marketing, Security & Compliance Mark has over 15 years of sales, marketing and business development experience in a variety of financial service and high-technology markets. Past clients/employers have included Ford, Motorola, United Technologies, Cisco, Chrysler, SonicWall/Dell, Trend Micro and Compuware.
  • 4. "Security must be more tightly integrated into the DevOps process to deliver a DevSecOps process that builds in security from the earliest stages of application design." Gartner Top 10 Strategic Technology Trends for 2016: Adaptive Security Architecture Gartner Top 10 Strategic Trend for 2016 http://www.gartner.com/document/3229017
  • 6. Sumo Logic Confidential Security Challenges in Our Cloud Journey • Starts simple, get more complex • CSP offerings are growing • Filling in the CSP offerings with 3rd party solutions • Compliance, audit and more regulations are coming • Attacks on the Cloud are increasing
  • 7. Sumo Logic Confidential Sumo Logic’s AWS Footprint
  • 8. Sumo Logic Confidential 1,300+Customers in the cloud 100+ PBDataAnalyzed Daily 10M+Keys Under Management Sumo Logic at Scale in the Cloud SECURITY BAKED IN 10K+EC2 Instances
  • 9. Sumo Logic Confidential Sumo Logic’s AWS Technology Stack
  • 10. Sumo Logic Confidential The Sumo Logic Security Stack in AWS Cloud Shared responsibility Functional Areas: • Threat Intelligence • File Integrity Monitoring • IDS / IPS • End Point Protection • Security Analytics
  • 11. Sumo Logic Confidential Drinking Your Own Champagne
  • 12. Sumo Logic Confidential AWS Operational and Security Visibility
  • 14. Sumo Logic Confidential Sumo Logic: Fully Secure Protecting Customer Data with Best-in-Class Security • PCI/DSS 3.1 Service Provider Level 1 Certified • SOC 2 Type attestation • ISO 27001 certified • CSA Star certified • HIPAA-HITECH compliance • U.S. – EU Privacy Shield • AES 256-bit encryption at rest • TLS encryption in transit • FIPS 140-2 compliant Industry’s Most Secure Cloud-Native Analytics Service
  • 15. Sumo Logic Confidential Sumo Logic PCI App for AWS CloudTrail Protecting Customer Data with Best-in-Class Security
  • 16. Sumo Logic Confidential Security & Operational Excellence
  • 17. Sumo Logic Confidential Security, Compliance & Operational Excellence PLATFORM SECURITY CONTINUOUS MONITORING COMPLIANCE END POINT PROTECTION
  • 19. Sumo Logic Confidential • Password Hygiene is still the #1 threat to security • People who should be the most responsible are not • Audit everything • BitCoin Miners The Cloud Attack that never goes away
  • 20. Sumo Logic Confidential Bitcoin mining in AWS • Only 21 Million BitCoin Allowed to be Mined • International Non Regulated Currency • AWS GPU EC2 P2 Instances are perfect for mining Bitcoins • Use two-factor authentication. • Never hardcode your cloud computing credentials • Use Identity Access Management Seeking Free Compute Power! please put your AWS credentials into a config file and upload to GitHub “Don’t put your Amazon credentials into source code and then share that source code in a public place like GitHub!”
  • 21. Sumo Logic Confidential • Recent DDoS attacks targeted Dynamic Network Services Inc., better known as Dyn • Dyn is one of many DNS providers to AWS • AWS has some services (Shield)in place to help, and we have 3rd party tools but… • Could AWS eat itself or be used to attack Azure in Mass? “Security may be critical, but “agility is the single biggest reason enterprise are moving to the cloud” The latest Akamai security report highlights a 138 percent YoY increase in total DDoS
  • 23. Sumo Logic Confidential In Summary Simplicity & visibility = scale SecOps: Do more with less Visibility & compliance
  • 24. Sumo Logic Confidential Sign up for a free trial of Sumo Logic at: https://www.sumologic.com/signup-free

Notes de l'éditeur

  1. Q1: DevSecOps seems like a buzz word that everyone is using these days. What does DevSecOps really mean?
  2. Q2: So SL is a cloud native service running in AWS – why did you decide to build your service in the cloud? Can you describe a bit about that journey, what was it likes, what obstacles did you face, how did you overcome them? what did you learn?
  3. Q3: So what is your current footprint like in AWS? -- after the question, move immediately to the next slide
  4. Q4: So What Tools and Technologies are you using in AWS? -- after the question, move immediately to the next slide
  5. Q5: So how are you leveraging Sumo to secure your own service? Can you share some of the tips, tricks and best practices you have gleaned over the years?
  6. Q6: You talked earlier about the technology stack you use. How does this stack help you with Compliance?
  7. Sumo provides the most secure cloud-based analytics service on the market Only Sumo has achieved this level of validation and certification We have done this because our business is collecting and storing our customers’ sensitive log data. If they don’t trust us, then we don’t have a business model. So we have made significant investment in security certifications and attestations. Not only do we encrypt data at rest and in transit, but we hold various attestations as you can see by this comprehensive list. We are the only service in the machine data analytics space that holds the PCI DSS 3.1 certification and are helping our customers like Twitter and AirBnB simplify the process for demonstrating compliance with PCI…. particulary around Req. 10 Organizations are making different decisions based on the trust level they have with their partners, and we take this very seriously investing significant resources to achieve and maintain on an ongoing basis, these competitive differentiators Too many people try to live vicariously through the certifications AWS has and pass this on as adequate
  8. Q7: Can you talk about the operational and security best practices that SL employs to maintain a scalable, highly secure, always on service? As well as the DevSecOps methodologies that are followed? A: it all starts with embedding security directly into engineering Checks and balances Process dev QA prod All changes to production follow a well documented change management process. Traditional processes never seemed like a suitable way to implement change management at Sumo Logic. Even a Change Management Board (CMB) that meets daily is much too slow for our environment, where changes are implemented every day, at any time of the day. In this blog, I’ll describe our current solution, which we have iterated towards over the past several years. The goals for a our change management process are that: Anybody can propose a change to the production system, at anytime, and anybody can follow what changes are being proposed. A well-known set of reviewers can quickly and efficiently review changes and decide on whether to implement them. Any change to production needs to leave an audit trail to meet compliance requirements. Workflow and Audit Trail We used Atlassian JIRA to model the workflow for any System Change Request (SCR). Not only is JIRA a good tool for workflows, but we also use it for most of our other bug and project tracking, making it trivial to link to relevant bugs or issues. Here’s what the current workflow for a system change request looks like: -- after the question, move immediately to the next slide
  9. Q8: There are a lot of threat actors out there, from Cyber Criminals, Corporate Spies, Hacktivists and Nation States. My question is: How do you see the threat landscape changing wrt the cloud. Is the risk greater given the massive scale of the attack surface? If someone hacked into an account, could they cause more damage by pointing their attack at Amazon, from within the service, possibly affecting millions of customers?
  10. Mirai (Japanese for "the future") is malware that turns computer systems running Linux into remotely controlled "bots", that can be used as part of a botnet in large-scale network attacks. It primarily targets online consumer devices such as remote cameras and home routers
  11. Q9: So when you look out toward the future, wrt the DevSecOps movement, the phenomenal growth of cloud providers like AWS and Azure, Machine learning and Artificial Intelligence, the rise of security as code, …. What are your thoughts, where do you see things going, and how should companies respond?
  12. AWS and Sumo Logic and other tools provide us with an opportunity for all teams to use the same tool. We are able to scale due to the simplicity of the Sumo Logic product and the visibility that it provides. Our Security Operations team works more effectively with the Operations allowing us to do more with less. All this while providing visibility into the on-going operations and verifying compliance as needed.