automating security operations in aws

41
Automating Security Operations on AWS Tim Prendergast CEO and Co-Founder at Evident.io

Upload: amazon-web-services

Post on 12-Jan-2017

295 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Automating Security Operations in AWS

Automating Security Operations on AWS

Tim Prendergast CEO and Co-Founder at Evident.io

Page 2: Automating Security Operations in AWS

$6.53M

56% 70%Increase in theft of hard

intellectual property

Of consumers indicated

they’d avoid businesses

following a security breach

Average cost of a

data breach

Why?

https://www.csid.com/resources/stats/data-breaches/

http://www.pwc.com/gx/en/issues/cyber-

security/information-security-survey.htmlhttps://www.csid.com/resources/stats/data-breaches/

Page 3: Automating Security Operations in AWS

What if I told you the Cloud is

SAFER than your datacenter?

Page 4: Automating Security Operations in AWS

Your Datacenter Team

Hates Me

Page 5: Automating Security Operations in AWS

How does your Datacenter compare?

Some API-enabled services

Disparate APIs

No true control plane

Physical concealments

Often co-habited

Fully API-enabled

API homogeneity

A “source of truth” control plane

Nowhere to hide

Nobody can “climb into” your account

Page 6: Automating Security Operations in AWS

Security Considerations on AWS:

Page 7: Automating Security Operations in AWS

#1 - Rate of Change (Dynamism)

Page 8: Automating Security Operations in AWS

Rate of Change

With the advent of CI/CD & DevOps,

rapid change is reality. Not the Enemy.

Page 9: Automating Security Operations in AWS

Security People be like

Page 10: Automating Security Operations in AWS

But it’s true — speed works both ways

Page 11: Automating Security Operations in AWS

Security scan runs at time (T)

Scan Node

Host NHost NHost NHost N

Cloud API Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc N

Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc A

No unexpected results/changes

Page 12: Automating Security Operations in AWS

Security event at time (T+1)

Scan Node

Host NHost NHost NHost N

Cloud API Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc N

Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc A

A user identity disabled MFA

Identity

Change

Page 13: Automating Security Operations in AWS

Security event at time (T+2)

Scan Node

Host NHost NHost NHost N

Cloud API Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc N

Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc A

A new host running an unapproved image

appears

Malicious

Host

Page 14: Automating Security Operations in AWS

Security scan runs at time (T+3)

Scan Node

Host NHost NHost NHost N

Cloud API Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc N

Svc NSvc NSvc NSvc NSvc NSvc NSvc NSvc NSvc A

Both malicious security events have exited

Scan looks clean

Page 15: Automating Security Operations in AWS

The RoC Question:

Who saw it?

Page 16: Automating Security Operations in AWS

Resources in AWS have dynamic lives…

measured in minutes, or years.

Page 17: Automating Security Operations in AWS

Automating Audit(s) to embrace RoC

Participants: Engineering, IT Security, Policy Makers

Activities:

Create Continuous Scanning capability

Populate with business-related Cloud Security policies/rules

Create reporting function and model

Page 18: Automating Security Operations in AWS

YouAWS

Automating Audit(s) (Example)

AWS

CloudTrail

All API feeds

AWS Config

App

Logs/Intellige

nce

Config Mgmt

Data

External

Threat Intel

Continuous

Monitoring &

Response

Engine

Alerting, Triggers, Humans

Page 19: Automating Security Operations in AWS

Automating Audit(s) (Example)

Page 20: Automating Security Operations in AWS

Automating Audit(s) (Example)

Page 21: Automating Security Operations in AWS

Automating Audit(s) (Example)

Page 22: Automating Security Operations in AWS

Automating Audit(s) (Example)

Page 23: Automating Security Operations in AWS

Automating Audit(s) (Example)

Page 24: Automating Security Operations in AWS

#2 - Distribution of Control

Page 25: Automating Security Operations in AWS

Distribution of Control/Responsibility

Firewalls

IDS/IPS

Network(s)

Legacy

Servers

Compliance

App Security

Page 26: Automating Security Operations in AWS

Distribution of Control/Responsibility

Firewalls

IDS/IPS

Network(s)

Legacy (normalized for reality)

Servers

Compliance

App Security

Page 27: Automating Security Operations in AWS

Distribution of Control/Responsibility

Firewalls

IDS/IPS

Network(s)

Modern (Cloud)

Servers

Compliance

App Security

+Engineering

Page 28: Automating Security Operations in AWS

Automating Enforcement

Participants: Code-capable staff

Activities:

Identify desired states

Create default remediation scripts

Attach workflow to trigger remediations

Log and review remediation histories

Page 29: Automating Security Operations in AWS

If you can’t articulate your security policy in plain

English*, you cannot codify it.

* (or your native language)

Page 30: Automating Security Operations in AWS

Automating Enforcement

Security Event

Match

Remediation

Execute Functional

Remediation

Page 31: Automating Security Operations in AWS

This can be done many ways…

here’s a fun example

Page 32: Automating Security Operations in AWS

#3 - Reaction Time

Page 33: Automating Security Operations in AWS

Reaction Time (Inequality thereof…)

Attackers (minutes) > Defenders (days)

Page 34: Automating Security Operations in AWS

Automating Containment

Participants: Code-capable staff, IT/Forensics Team

Activities:

Identify IoCs or “breach states”

Define containment timing(s) and plan(s)

Define chain-of-custody issues/strategy

Create containment actions (just like automated remediations)

Iterate actions and validate

Page 35: Automating Security Operations in AWS

Automating Containment

Instance

Compromised

Anomaly or

Suspicion

Immutable

redeployContainment

IR

Secure

Storage

Page 36: Automating Security Operations in AWS

Automating Forensics

Participants: Code-capable staff, IT/Forensics Team

Activities:

Create chain-of-custody+secure cloud account/space

Build automated test/investigation process

Enjoy!

Page 37: Automating Security Operations in AWS

Automating Forensics

Instance

Compromised

Anomaly or

Suspicion

Immutable

redeployContainment

IR

Secure

Storage

Page 38: Automating Security Operations in AWS

Process Results

Automating Forensics (AWS example)

Secure

StorageCreate VPC

Isolate Network

Summon Instance

Trigger ScanRe-snap instanceTo Human

Human

To Humans

Page 39: Automating Security Operations in AWS

Q&A — Ask away! (or @auxome)

Page 40: Automating Security Operations in AWS

Evident Security Platform (ESP)

Built by Cloud pioneers from Adobe,

AWS, and Netflix

Agentless deployment (<5 mins)

Continuously monitors security state to

drive automated audit, compliance,

and incident response.

The only platform solution that covers

50+ API-enabled AWS services

Leading the charge into a DevSecOps

world for cloud believers

Try it free - https://Evident.io

Visit Us at

Booth #601!

Page 41: Automating Security Operations in AWS

Thank You!

Visit Evident.io at Booth #601!