SlideShare une entreprise Scribd logo
1  sur  15
Is Cloud Migration
Our Best Chance to “Fix Security”?
Dr Anton Chuvakin
Security Solution Strategy @ Chronicle / Google Cloud
1
Confidential
Outline
o Security: Doomed to be an Add-on Forever … or
Not?
o From Security Failures to Cloud Failures
o Cloud Security Choices
o Ideal Cloud Security Criteria
o Can a Move to Cloud Transform your Security?
o Recommendations
2
Security: Sad History of Being a Bolt-on
● 1980: Internet without security
● 1990: Windows without security
● 2000: Mobile devices without security
● 2005: Cloud without security
● 2010: IoT without security
● 2015: ML/AI without security
● Don’t even get me started on blockchain :-)
3
Question:
Have you seen security included from day
1 in a new system or technology?
4
Cloud Security Choices
1. Cloud provider brings security
tools (paid or free)
2. Cloud customer brings own
existing security tools
3. Cloud customer purchases
tools from 3rd party vendors
just for cloud
4. Combination of the above
5
Question:
What are the pros and cons of each
approach?
6
Cloud Security Failures
Despite these approaches, we hear about cloud security
failures …
…. think “open S3 buckets” and “hard-coded API keys” and
“firewall configuration errors”
7
Whose Fault Is It?
In fact, Gartner says...
“Through 2025, 99% of cloud security
failures will be the customer’s fault.”
What does it mean?
8
Question:
Is it fair to blame cloud customers for
nearly all security problems?
9
Ideal Cloud Security Criteria
Default security
e.g. logging that just works and is always centrally collected and
searchable
Opt-out security e.g. tight permissions that loudly object to being loosened
Transparent security e.g. encryption of data in transit and at rest
Native to the system e.g. not sold separately and requiring integration work
Automated security e.g. turned on after deployment via an API
Role-based security
e.g. specific roles must be granted for management and access
(but without the headache!)
Obvious security e.g. not require the failure-prone user education
10
Question:
Can well-built cloud computing platform
make security near-transparent?
11
Deeper Examples
12
Web Server
Exposing a web server
externally should
require adequate
security checks and
controls
Container
Deployment
Securing application within the
container is responsibility of a
customer, but what about
Docker daemons
Automated
Logging
Tuned security logging
enabled by default
Shared Responsibility
1 2 3
Question:
Is this change realistic or are we doomed
to bring our pre-cloud security problems
to the cloud?
13
Recommendations
● Migration to cloud infrastructure is a unique opportunity to
dismantle the legacy security debt of the past two
decades.
● Think how you can use cloud migration to actually do
security from day one, not day +1 after the breach.
● Push your cloud provider to make it easier to secure your
assets.
● Finally, remember that joint responsibility model is
forever; there will always be security tasks that a customer
14
Further Reading
● “Move to Cloud: A Chance to Finally Transform
Security?”
● “Google Security Model”
● “Psychoanalyzing Security Cloud Fears”
● “Top Threats to Cloud Computing: Deep Dive”
15

Contenu connexe

Plus de Anton Chuvakin

Plus de Anton Chuvakin (20)

SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020  Groovy SOC Tunes aka Modern SOC TrendsSOCstock 2020  Groovy SOC Tunes aka Modern SOC Trends
SOCstock 2020 Groovy SOC Tunes aka Modern SOC Trends
 
SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC SOCstock 2021 The Cloud-native SOC
SOCstock 2021 The Cloud-native SOC
 
Modern SOC Trends 2020
Modern SOC Trends 2020Modern SOC Trends 2020
Modern SOC Trends 2020
 
Anton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in BriefAnton's 2020 SIEM Best and Worst Practices - in Brief
Anton's 2020 SIEM Best and Worst Practices - in Brief
 
Generic siem how_2017
Generic siem how_2017Generic siem how_2017
Generic siem how_2017
 
Tips on SIEM Ops 2015
Tips on SIEM Ops 2015Tips on SIEM Ops 2015
Tips on SIEM Ops 2015
 
Five SIEM Futures (2012)
Five SIEM Futures (2012)Five SIEM Futures (2012)
Five SIEM Futures (2012)
 
RSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics PresentationRSA 2016 Security Analytics Presentation
RSA 2016 Security Analytics Presentation
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton ChuvakinFive Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
Five Best and Five Worst Practices for SIEM by Dr. Anton Chuvakin
 
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton ChuvakinPractical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
Practical Strategies to Compliance and Security with SIEM by Dr. Anton Chuvakin
 
SIEM Primer:
SIEM Primer:SIEM Primer:
SIEM Primer:
 
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton ChuvakinLog management and compliance: What's the real story? by Dr. Anton Chuvakin
Log management and compliance: What's the real story? by Dr. Anton Chuvakin
 
On Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton ChuvakinOn Content-Aware SIEM by Dr. Anton Chuvakin
On Content-Aware SIEM by Dr. Anton Chuvakin
 
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton ChuvakinMaking Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
Making Log Data Useful: SIEM and Log Management Together by Dr. Anton Chuvakin
 
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS  by Dr. Anton ChuvakinPCI 2.0 What's Next for PCI DSS  by Dr. Anton Chuvakin
PCI 2.0 What's Next for PCI DSS by Dr. Anton Chuvakin
 
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
How to Gain Visibility and Control: Compliance Mandates, Security Threats and...
 
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...Navigating the Data Stream without Boiling the Ocean::  Case Studies in Effec...
Navigating the Data Stream without Boiling the Ocean:: Case Studies in Effec...
 
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
Zero Day Response: Strategies for the Security Innovation in Corporate Defens...
 
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton ChuvakinWhat PCI DSS Taught Us About Security by Dr. Anton Chuvakin
What PCI DSS Taught Us About Security by Dr. Anton Chuvakin
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Tech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdfTech Trends Report 2024 Future Today Institute.pdf
Tech Trends Report 2024 Future Today Institute.pdf
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 

MindTheSec 2020 Keynote: Is Cloud Migration Our Best Chance to Fix Security?

  • 1. Is Cloud Migration Our Best Chance to “Fix Security”? Dr Anton Chuvakin Security Solution Strategy @ Chronicle / Google Cloud 1
  • 2. Confidential Outline o Security: Doomed to be an Add-on Forever … or Not? o From Security Failures to Cloud Failures o Cloud Security Choices o Ideal Cloud Security Criteria o Can a Move to Cloud Transform your Security? o Recommendations 2
  • 3. Security: Sad History of Being a Bolt-on ● 1980: Internet without security ● 1990: Windows without security ● 2000: Mobile devices without security ● 2005: Cloud without security ● 2010: IoT without security ● 2015: ML/AI without security ● Don’t even get me started on blockchain :-) 3
  • 4. Question: Have you seen security included from day 1 in a new system or technology? 4
  • 5. Cloud Security Choices 1. Cloud provider brings security tools (paid or free) 2. Cloud customer brings own existing security tools 3. Cloud customer purchases tools from 3rd party vendors just for cloud 4. Combination of the above 5
  • 6. Question: What are the pros and cons of each approach? 6
  • 7. Cloud Security Failures Despite these approaches, we hear about cloud security failures … …. think “open S3 buckets” and “hard-coded API keys” and “firewall configuration errors” 7
  • 8. Whose Fault Is It? In fact, Gartner says... “Through 2025, 99% of cloud security failures will be the customer’s fault.” What does it mean? 8
  • 9. Question: Is it fair to blame cloud customers for nearly all security problems? 9
  • 10. Ideal Cloud Security Criteria Default security e.g. logging that just works and is always centrally collected and searchable Opt-out security e.g. tight permissions that loudly object to being loosened Transparent security e.g. encryption of data in transit and at rest Native to the system e.g. not sold separately and requiring integration work Automated security e.g. turned on after deployment via an API Role-based security e.g. specific roles must be granted for management and access (but without the headache!) Obvious security e.g. not require the failure-prone user education 10
  • 11. Question: Can well-built cloud computing platform make security near-transparent? 11
  • 12. Deeper Examples 12 Web Server Exposing a web server externally should require adequate security checks and controls Container Deployment Securing application within the container is responsibility of a customer, but what about Docker daemons Automated Logging Tuned security logging enabled by default Shared Responsibility 1 2 3
  • 13. Question: Is this change realistic or are we doomed to bring our pre-cloud security problems to the cloud? 13
  • 14. Recommendations ● Migration to cloud infrastructure is a unique opportunity to dismantle the legacy security debt of the past two decades. ● Think how you can use cloud migration to actually do security from day one, not day +1 after the breach. ● Push your cloud provider to make it easier to secure your assets. ● Finally, remember that joint responsibility model is forever; there will always be security tasks that a customer 14
  • 15. Further Reading ● “Move to Cloud: A Chance to Finally Transform Security?” ● “Google Security Model” ● “Psychoanalyzing Security Cloud Fears” ● “Top Threats to Cloud Computing: Deep Dive” 15