CSA Cloud Threat Hunting
CSA Cloud Threat Hunting
HUNTING
Jim Reavis
CEO and Founder
Cloud Security Alliance
December 2017
BUILDING SECURITY BEST PRACTICES
ABOUT THE FOR NEXT GENERATION IT
CLOUD
SECURITY GLOBAL, NOT-FOR-PROFIT
ALLIANCE ORGANIZATION
Strategic partnerships
with governments,
research institutions,
professional associations
and industry
SINGAPORE //
CSA research is ASIA PACIFIC
FREE! HEADQUARTERS
Cloud Definitions
D E V E L O P E R P L A T F O R M A S
T O O L S A S E R V I C E
M A N A G I N G I N F R A S T R U C T U R
H A R D W A R E / O S E A S A S E R V I C E
https://gdpr.cloudsecurityalliance.org/
CSA Top Threats Report
https://cloudsecurityalliance.org/group/top-threats/
Threat 1: Data Breach
Shared Responsibility
Threat 2: Insufficient Identity,
Inherit Security
• We need IaaS cloud providers to enable
their customers for threat intelligence
sharing & secure-by-default usage of
platforms (among many other things)
• Need to solve the “provider within a
provider” problem – it’s the ecosystem
stupid!
The cloud ecosystem threat problem
Galactic Bank’s
cloud presence
Email: [email protected]
Twitter: @Cloudsa
Site: www.cloudsecurityalliance.org
Learn: www.cloudsecurityalliance.org/research/cloudbytes
Download: www.cloudsecurityalliance.org/download
H T T P S : / / C L O U D S E C U R I T Y A L L I A N C E . O R G /
23