using behavior to protect cloud servers

30
Using Behavior to Protect Cloud Servers

Upload: banerjeea

Post on 22-Jan-2018

128 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: Using Behavior to Protect Cloud Servers

Using Behavior to Protect

Cloud Servers

Page 2: Using Behavior to Protect Cloud Servers

HELLO!I am Anirban Banerjee.

I am the Founder and

CEO of Onion ID. [email protected]

https://calendly.com/anirban/enterprise-demo/

Page 3: Using Behavior to Protect Cloud Servers

THE STATUS QUO

CHALLENGES AND THREATS

BEHAVIOR BASED SECURITY

Page 4: Using Behavior to Protect Cloud Servers

THE STATUS QUO

4

Page 5: Using Behavior to Protect Cloud Servers

CLOUD

INFRASTRUCTURE

TODAY

AWS - IaaS

Heroku/GC

Docker

Azure

Page 6: Using Behavior to Protect Cloud Servers

WHO IS

ACCESSING

Devops

IT

Developers

Shadow IT

Bloggers

Marketing

Automated Software

Deploy and Build software

Vendors and 3rd parties

Page 7: Using Behavior to Protect Cloud Servers

THE STATUS

QUO

Usernames/

passwords

SSH Keys

▹ Helps login automatically

IP filters

▹ Only talk to certain computers

VPNs

▹ Some Security

▹ Encrypted traffic

Page 8: Using Behavior to Protect Cloud Servers

DIRECTORY

SERVICES

Various Directory Services

- Ties very basic Identity

- IAM solutions, first step

- IAM for infrastructure, way behind

Page 9: Using Behavior to Protect Cloud Servers

CHALLENGES

AND THREATS

Page 10: Using Behavior to Protect Cloud Servers

CHALLENGES

▸ Multiple dev teams

▹ Geographically distributed

▹ Shadow IT

▸ High Velocity Changes – IaaS/PaaS via APIs▹ AWS, Rackspace, Docker

▹ All types of web apps

▸ Employee churn

▸ Compliance and Audits

▸ Attack surface has changed▸ Horizontal attacker movement

▸ Vertical privilege escalation

Page 11: Using Behavior to Protect Cloud Servers

THE THREAT

LANDSCAPE

Horizontal and Vertical Attacker Movement

Page 12: Using Behavior to Protect Cloud Servers

GOING FORWARD

Page 13: Using Behavior to Protect Cloud Servers

ACTIVE

AUTHENTICATION

CAN HELP

▸ Concept of least privilege

▸ Risk score everything

▸ Every command is analyzed

▸ Learn, Match, Act, Update

Page 14: Using Behavior to Protect Cloud Servers

WHAT TO LOOK

FOR AND WHAT

TO DO

Usually never runs visudo /etc/shadow – high risk

COMMANDS BEING RUN

Where are you connecting from, time, # of connections

CONNECTION STATISTICS

Risk score every command: White, Grey, Black

EVERY COMMAND IS ANALYZED

Invisible 2FA for Grey, Physical 2FA for BlackTAKE ACTION

Apache Spark, Pykit Sci, SSH proxiesTOOLS

Page 15: Using Behavior to Protect Cloud Servers

COMPLIANCE

▸PCI DSS, HIPAA, FedRamp, FFIEC, SOX,

SOC I,II

▸Legal consequences

▸Provide proof of controls

▸Keep the board informed

▸Use tools for reporting, automate

Page 16: Using Behavior to Protect Cloud Servers

BEHAVIOR

▸What is Behavior

▸What to look for

▸Analyzing behavior

▸Making it actionable

▸Continuous improvement

▸OSS tools and plumbing

Page 17: Using Behavior to Protect Cloud Servers

WHAT IS

BEHAVIOR

▸Markers for your Identity

▸What commands are used

▸What style is used

▸When do you use what

17

Page 18: Using Behavior to Protect Cloud Servers

WHAT TO

LOOK FOR

▸Command history

▸Command Style

▸Mistakes and mistypes

▸Time of day, IP, Geo-location

▸Type of Resource

18

Page 19: Using Behavior to Protect Cloud Servers

WHAT TO

LOOK FOR

▸Frequency analysis ;

▸Type of commands▹Network

▹Stats

▸Identify patterns▹Per Server, per user - profile

▹Profiles need to change

19

Page 20: Using Behavior to Protect Cloud Servers

ANALYZING

BEHAVIOR

▸Create Feature sets

▸Feed Feature set to classifier

▸Obtain Score

▸Take Action

20

- What they run

- How they code

- Where from

- When

Source: http://www.cinemablend.com/images/news_img/71655/Bad_Grandpa_71655.jpg

Page 21: Using Behavior to Protect Cloud Servers

ANALYZING

BEHAVIOR

▸Supervised▹Classification (Bayes, SVM..)

▹Regression

▸Unsupervised▹Clustering (expectation maximization,

k-means..)

▹Decomposition (PCA)

▸Gotchas▹More data is always better – no

▹Bias, noise, beware of feature greed

21

Page 22: Using Behavior to Protect Cloud Servers

MAKING IT

ACTIONABLE

▸Block access, Kill Sessions

▸Send alerts with actions

▸Dealing with FPs is easier

▸Distribute manual auth.

▸Dynamic ACL modification

22

Page 23: Using Behavior to Protect Cloud Servers

CONTINUOUS

IMPROVEMENT

Your system needs to keep “learning”

Think about rule based approach, don’t obsess

Follow good login hygiene

Audit shadow IT accounts

Page 24: Using Behavior to Protect Cloud Servers

OSS Tools

and Plumbing

▸Scikit Py,Weka

▸Apache Kafka

▸Apache Spark

▸Twilio

▸Nodejs

▸Try SVM, Ladtree, Stumps

24

Page 25: Using Behavior to Protect Cloud Servers

OSS Tools

and Plumbing

25

Register Servers

Dynamic DNS

Change Keys

Page 26: Using Behavior to Protect Cloud Servers

Why Stop

Here?

▸Tadaaaaa! Browser

Extension▹How are you using the web app

▹# of actions per second

▹Curvature of mouse movement

▹Typing patterns

▹- not typing speed

▹- do you use tab

26

Page 27: Using Behavior to Protect Cloud Servers

Customization

▸No vendor lock in

▸You decide actions

▸You decide on FP mitigation

▸Adaptive 2FA

▸Low Friction – very important

27

Page 28: Using Behavior to Protect Cloud Servers

Making the

Case for C

Level

▸More Compliant, Less Risk

▸Time Savings for IT, SecOps

▸Better Control

▸Protect Customer Data

▸Don’t end up on Techcrunch

28

Page 29: Using Behavior to Protect Cloud Servers

Thank you

29

[email protected]

▸1-888-315-4745

▸Twitter - @onion_id

▸Connect with us on FB or Linkedin

▸We will be posting these slides

▸Feedback is very welcome

https://calendly.com/anirban/enterprise-demo/

Page 30: Using Behavior to Protect Cloud Servers

THANK YOU!Any questions?

You can find more about us at:

Onion ID – Privilege Management in 60 Seconds

www.onionid.com , [email protected]

Tel: +1-888 315 4745