SlideShare a Scribd company logo
Slashing Your Cloud Risk: 3 Must-Do's
About Security Innovation
• Securing software in all the challenging places….
• ….while helping clients get smarter
Assessment: show me the gaps
Standards: set goals and make it easy
Education: help me make good decisions
Over
3 Million
Users
Authored
18
Books
Named
6x
Gartner MQ
Mitigating Cloud Risk
Minimize
Attack
Surface
Harden
Servers
Configure
Services
Harden
Application
New Traditional
Application
Infrastructure
Mitigating Cloud Risk
1. Identify Necessary Services
2. Configure Services Appropriately
3. Traditional Server and Application Hardening
Identify Necessary
Services
Minimize Attack Surface
ID Necessary Services
• Only enable what is necessary
• Use what is necessary in its intended way and configuration
• Configure existing services properly
• Understand security configurations
Only enable what is necessary
• Can be attractive to enable services pre-emptively
• Only enable services that you need to use or that you
understand
• There’s no need to go “all in” on the cloud
• Migrate from traditional infrastructure piecemeal
• Plan your migration carefully and securely
• SI can help plan your migration to the cloud
Use in the way it was intended
• It might be easy to migrate whole servers to EC2
• RDS, S3, SES, etc. can be more cost effective, faster and
more resilient
• Using services as intended can also give you better
configuration, authentication management, and visibility
Configure existing services properly
Azure Resource Manager
• Define & Codify Standards
• Implement them as Infrastructure as Code (IaC)
• Improves repeatability, reliability, enables scalability
• Reduces mistakes
ID Necessary Services
• Understand security
configurations
• Logging centrally
CloudTrail/Azure Monitor
• Configure Virtual Networks or
VPNs Appropriately
• Configure Authorization Models
and Permissions properly
(TechCrunch)
Minimize Attack
Surface
• Turn off unnecessary services
• Ensure services don’t restart
automatically due to a script or
config
• Double check firewalls or security
groups
Turn off unnecessary services
• AWS has more than 100 services,
you don’t need to try them all
• If you try a new service out be sure
to disable it if it’s not necessary
• Some services have different
configurations
• S3 vs S3 Infrequent Access
• Some services are only to be used
infrequently
• DB Migration Services
• Application Migration Services
• Turn them off when finished
Limit Access to Services
• Provide service access through an internal tool
• Only give access to services that have been reviewed
• Only give access to configurations known to be good
• Scan out of compliant services and configurations and
disable them before they can be used
• Public S3 bucket, disable before data can be uploaded
• Notify user of their mistake with a solution
Configure Services
Appropriately
Perform Assessments Frequently
Double Check Firewalls and Security
Groups
• Same as internet connected traditional
infrastructure
• Minimize open ports (80, 443, 3306)
• Consider disabling direct access
• Require an additional hop for critical
infrastructure
• Do both!
• Security Groups and Azure Firewall rules are
great Infra Level protection
• Manage your own server level firewalls for a
belt and suspenders approach
Authentication
• AWS/Azure/GCP tie AuthN/AuthZ
together
• It’s good to keep them separate in
your mind, threats are different
• AuthN is identity, AuthZ is access
• Authentication to your Cloud Provider is critical
• Imagine what somebody could do if they had direct access to
your infrastructure from anywhere in the world
• MFA/2FA is well supported on all platforms
• Don’t discout SIM cloning attacks for critical infrastructure
Authorization
• Who has access to what is complicated in the cloud
• AWS Cognito and Azure AD define access
• Access to servers through: Firewalls,
Roles, service configurations or
network configurations
• AssumeRole for temporary access
• Can be abused by an attacker
• S3/Blob Storage buckets can be world readable
• This has led to an enormous number of data breaches
Real World Misconfiguration
The Upguard RNC Breach
• Accidentally exposed 200 million registered voters due to an
open S3 bucket
• Lesson learned:
• Need to understand the underpinnings of the cloud infrastructure
• Had Upguard configured their AWS S3 bucket to not allow
download or access privileges, this could have been avoided
• Why attack simulations and red teaming are necessary
• Would have likely found the dra-dw amazon subdomain, realized it
was an attack vector, and secured it
Misconfigurations, both obvious and obscure, happen frequently
with cloud operations; thus, regular expert scrutiny is necessary
Encryption
• Can be offloaded to cloud services
• Configuration and use can be
challenging
• Key Rotation, Automatic Key Removal,
MFA, can and should be automated.
Ties access to a user/role, not a key
• Secrets Manager & KMS – Stores keys
safely
• Encryption Services – Stores data
securely
Scaling a two sided sword
• Scaling is one of the great benefits of the cloud
• Allows you to meet demand as necessary
• But you pay for it
• Attackers can see both sides
• DDoS Attack without scaling leads to a true DoS
• DDoS Attack with scaling may rack up costs
• GuardDuty-like services can help a bit, should be part of a
broader IDS/IPS strategy
Perform Regular Assessments
• Mistakes happen, automate as much as possible
• The security landscape changes
• Keep up with best practices as they change
• Perform frequent scans with automation
• Perform in depth manual security assessments
• SI can help perform cloud configuration reviews
Build Pipelines can be dangerous
• CodeStar and Azure DevOps are powerful tools
• Critical to lockdown source access appropriately
• What could an attacker do if they had access
to your code?
• Lambda and Azure Functions need your
attention
• Permissions and roles
• Resource consumption
• Tracing
Traditional Server and
Application Hardening
Standard Server Hardening
• Cloud Providers have enabled a lot of services
that can help you with this
• Virtual Servers in the Cloud, though, don’t take
advantage
• Logging & Monitoring & Alerting
• Patching & Docker Build Pipelines may inherit
backdoors
• Configuration Management
• Backup & Restore
• Disaster Recovery
Application Hardening
• Most vulnerabilities are still at the application level
• Won’t protecting you from a SQLi based data breach
• Make sure you get regular assessments on your application
• Follow security best practices for development, testing,
deployment
Data Security Best Practices
• Compliance and Policy can be aided by the Cloud
• But is a shared responsibility
• Encryption requirements for compliance to regulations
• Storage location
• May have jurisdiction
implications
Cloud Supported Application
Hardening
• Web Application Firewall (WAF) –
• Cloud providers can help scan for malicious behavior
• Can be a powerful first line of defense
• Absolutely not sufficient
• TLS Configuration and Rotation
• Cloud Providers can take the guesswork
out of TLS
• Automate it with Let’s Encrypt for free!
Thank you! Any questions?
• Identify Necessary Services &
Minimize Attack Surface
• Only Enable what is necessary
• Configure each service properly
• Understand and deploy central logging
and monitoring
• Use IaC to minimize mistakes and improve
repeatability
• Configure Services Appropriately
• Deploy firewall and security group services
• Understand AuthN/AuthZ best practices
• Take care with assume role
• Enable 2FA
• Disable world readable S3 buckets
• Leverage Cloud encryption Services
• Take care with scaling
• Perform regular security assessments
• Traditional Server and Application
Hardening
• Follow standard server hardening best
practices
• Don’t forget Application security best
practices
• Compliance and Regulation are your
responsibility
• Deploy a WAF and TLS
Joe Basirico
SVP of Engineering
jbasirico@securityinnovation.com

More Related Content

PPTX
Cyber Ranges: A New Approach to Security
Security Innovation
 
PPTX
cloud security ppt
Devyani Vaidya
 
PDF
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
RightScale
 
PDF
Security OF The Cloud
Mark Nunnikhoven
 
PPTX
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
PPTX
Assessing System Risk the Smart Way
Security Innovation
 
PPTX
7 Ways To Cyberattack And Hack Azure
Abdul Khan
 
PDF
Cloud Computing and Virtualisation
anupriti
 
Cyber Ranges: A New Approach to Security
Security Innovation
 
cloud security ppt
Devyani Vaidya
 
[RightScale Webinar] Architecting Databases in the cloud: How RightScale Doe...
RightScale
 
Security OF The Cloud
Mark Nunnikhoven
 
Venom vulnerability Overview and a basic demo
Akash Mahajan
 
Assessing System Risk the Smart Way
Security Innovation
 
7 Ways To Cyberattack And Hack Azure
Abdul Khan
 
Cloud Computing and Virtualisation
anupriti
 

What's hot (14)

PPTX
Cloud security comparisons between aws and azure
Abdul Khan
 
PPTX
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
PPTX
8 cloud design patterns you ought to know - Update Conference 2018
Taswar Bhatti
 
PDF
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
Sharique Rizvi
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PDF
Security Considerations for Microservices and Multi cloud
Neelkamal Gaharwar
 
PPTX
Azure Fundamentals Part 3
CCG
 
PPTX
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Perimeter 81
 
PPTX
Cloud Design Patterns - Hong Kong Codeaholics
Taswar Bhatti
 
PPTX
Cloud Security
Giovanni Mazzeo
 
PPTX
Secure Hadoop clusters on Windows platform
Remus Rusanu
 
PPTX
Cloud Design Patterns
Taswar Bhatti
 
PPTX
Ransomware-Recovery-as-a-Service
Sagi Brody
 
PPTX
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
TriNimbus
 
Cloud security comparisons between aws and azure
Abdul Khan
 
Guide to security patterns for cloud systems and data security in aws and azure
Abdul Khan
 
8 cloud design patterns you ought to know - Update Conference 2018
Taswar Bhatti
 
The Trouble with Cloud Forensics :Sharique M. Rizvi Head of IT Security & Fo...
Sharique Rizvi
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Security Considerations for Microservices and Multi cloud
Neelkamal Gaharwar
 
Azure Fundamentals Part 3
CCG
 
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
Perimeter 81
 
Cloud Design Patterns - Hong Kong Codeaholics
Taswar Bhatti
 
Cloud Security
Giovanni Mazzeo
 
Secure Hadoop clusters on Windows platform
Remus Rusanu
 
Cloud Design Patterns
Taswar Bhatti
 
Ransomware-Recovery-as-a-Service
Sagi Brody
 
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
TriNimbus
 
Ad

Similar to Slashing Your Cloud Risk: 3 Must-Do's (20)

PPTX
Cloud computing
Hamza Sajjad
 
PPTX
40369A Microsoft Cloud Fundamentals - Chapter 1
AndersPistaceci1
 
PPT
CLOUD COMPUTING.ppt
Dss
 
PPTX
Securing Applications in the Cloud
Security Innovation
 
PPTX
Aws security best practices
Sundeep Roxx
 
PDF
AWS Certified Cloud Practitioner Slides v13 (1)_1.pdf
vaibhav721
 
PPTX
Configure cloud services Presentation.pptx
RoyTari
 
PPTX
Cloud computing(ppt)
priyas211420
 
PPT
When small problems become big problems
Adrian Cole
 
PPTX
Cloud broadcasting and computing
AMEED KHAN
 
PDF
Introduction-to-Cloud-Computing.pdf
prajwalalaladinni
 
PPTX
Security as an Enabler – Cloud Security
Tom Laszewski
 
PPTX
Cloud computing & windows azure intro
Haddy El-Haggan
 
PPTX
#ALSummit: Architecting Security into your AWS Environment
Alert Logic
 
PDF
Ccna sec 01
EduclentMegasoftel
 
PPTX
Cloud Security_Module_1_Module_2_3_4.pptx
shahils1301
 
PPTX
DevCon13 System Administration Basics
sysnickm
 
PDF
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
DineshKumar746335
 
PPTX
ciplaasfqewfefewtwegndkvndsgjbsdz-dfafd.pptx
kreshenka
 
PPTX
The move-to-hybrid-cloud-itsmf-april2015
Eduserv
 
Cloud computing
Hamza Sajjad
 
40369A Microsoft Cloud Fundamentals - Chapter 1
AndersPistaceci1
 
CLOUD COMPUTING.ppt
Dss
 
Securing Applications in the Cloud
Security Innovation
 
Aws security best practices
Sundeep Roxx
 
AWS Certified Cloud Practitioner Slides v13 (1)_1.pdf
vaibhav721
 
Configure cloud services Presentation.pptx
RoyTari
 
Cloud computing(ppt)
priyas211420
 
When small problems become big problems
Adrian Cole
 
Cloud broadcasting and computing
AMEED KHAN
 
Introduction-to-Cloud-Computing.pdf
prajwalalaladinni
 
Security as an Enabler – Cloud Security
Tom Laszewski
 
Cloud computing & windows azure intro
Haddy El-Haggan
 
#ALSummit: Architecting Security into your AWS Environment
Alert Logic
 
Ccna sec 01
EduclentMegasoftel
 
Cloud Security_Module_1_Module_2_3_4.pptx
shahils1301
 
DevCon13 System Administration Basics
sysnickm
 
Fallsem2021 22 ita2012-eth_vl2021220101938_reference_material_i_06-aug-2021_m...
DineshKumar746335
 
ciplaasfqewfefewtwegndkvndsgjbsdz-dfafd.pptx
kreshenka
 
The move-to-hybrid-cloud-itsmf-april2015
Eduserv
 
Ad

More from Security Innovation (20)

PPTX
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
PPTX
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Security Innovation
 
PPTX
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
PDF
5 Ways To Train Security Champions
Security Innovation
 
PPTX
Aligning Application Security to Compliance
Security Innovation
 
PPTX
How to Hijack a Pizza Delivery Robot with Injection Flaws
Security Innovation
 
PPTX
How an Attacker "Audits" Your Software Systems
Security Innovation
 
PPTX
Opening the Talent Spigot to Securing our Digital Future
Security Innovation
 
PPTX
A Fresh, New Look for CMD+CTRL Cyber Range
Security Innovation
 
PPTX
Security Testing for IoT Systems
Security Innovation
 
PPTX
Is Blockchain Right for You? The Million Dollar Question
Security Innovation
 
PPTX
Privacy: The New Software Development Dilemma
Security Innovation
 
PPTX
Privacy Secrets Your Systems May Be Telling
Security Innovation
 
PPTX
Secure DevOps - Evolution or Revolution?
Security Innovation
 
PPTX
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
PPTX
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
PDF
GDPR: The Application Security Twist
Security Innovation
 
PDF
The New OWASP Top Ten: Let's Cut to the Chase
Security Innovation
 
PPTX
How to Test for The OWASP Top Ten
Security Innovation
 
PPTX
HTML5 - The Promise & The Peril
Security Innovation
 
Modernizing, Migrating & Mitigating - Moving to Modern Cloud & API Web Apps W...
Security Innovation
 
Develop, Test & Maintain Secure Systems (While Being PCI Compliant)
Security Innovation
 
Protecting Sensitive Data (and be PCI Compliant too!)
Security Innovation
 
5 Ways To Train Security Champions
Security Innovation
 
Aligning Application Security to Compliance
Security Innovation
 
How to Hijack a Pizza Delivery Robot with Injection Flaws
Security Innovation
 
How an Attacker "Audits" Your Software Systems
Security Innovation
 
Opening the Talent Spigot to Securing our Digital Future
Security Innovation
 
A Fresh, New Look for CMD+CTRL Cyber Range
Security Innovation
 
Security Testing for IoT Systems
Security Innovation
 
Is Blockchain Right for You? The Million Dollar Question
Security Innovation
 
Privacy: The New Software Development Dilemma
Security Innovation
 
Privacy Secrets Your Systems May Be Telling
Security Innovation
 
Secure DevOps - Evolution or Revolution?
Security Innovation
 
IoT Security: Debunking the "We Aren't THAT Connected" Myth
Security Innovation
 
Threat Modeling - Locking the Door to Vulnerabilities
Security Innovation
 
GDPR: The Application Security Twist
Security Innovation
 
The New OWASP Top Ten: Let's Cut to the Chase
Security Innovation
 
How to Test for The OWASP Top Ten
Security Innovation
 
HTML5 - The Promise & The Peril
Security Innovation
 

Recently uploaded (20)

PDF
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
PDF
Doc9.....................................
SofiaCollazos
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PPTX
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
PDF
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
PDF
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
PPTX
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
PPTX
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
PDF
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
PDF
This slide provides an overview Technology
mineshkharadi333
 
PPTX
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
PDF
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
PPTX
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
PDF
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
PDF
Software Development Company | KodekX
KodekX
 
PPTX
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
PPTX
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
PDF
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
PDF
Software Development Methodologies in 2025
KodekX
 
PDF
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 
Oracle AI Vector Search- Getting Started and what's new in 2025- AIOUG Yatra ...
Sandesh Rao
 
Doc9.....................................
SofiaCollazos
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Comunidade Salesforce São Paulo - Desmistificando o Omnistudio (Vlocity)
Francisco Vieira Júnior
 
Automating ArcGIS Content Discovery with FME: A Real World Use Case
Safe Software
 
Presentation about Hardware and Software in Computer
snehamodhawadiya
 
Applied-Statistics-Mastering-Data-Driven-Decisions.pptx
parmaryashparmaryash
 
How to Build a Scalable Micro-Investing Platform in 2025 - A Founder’s Guide ...
Third Rock Techkno
 
A Day in the Life of Location Data - Turning Where into How.pdf
Precisely
 
This slide provides an overview Technology
mineshkharadi333
 
OA presentation.pptx OA presentation.pptx
pateldhruv002338
 
Security features in Dell, HP, and Lenovo PC systems: A research-based compar...
Principled Technologies
 
AI and Robotics for Human Well-being.pptx
JAYMIN SUTHAR
 
Advances in Ultra High Voltage (UHV) Transmission and Distribution Systems.pdf
Nabajyoti Banik
 
Software Development Company | KodekX
KodekX
 
ChatGPT's Deck on The Enduring Legacy of Fax Machines
Greg Swan
 
What-is-the-World-Wide-Web -- Introduction
tonifi9488
 
AI Unleashed - Shaping the Future -Starting Today - AIOUG Yatra 2025 - For Co...
Sandesh Rao
 
Software Development Methodologies in 2025
KodekX
 
MASTERDECK GRAPHSUMMIT SYDNEY (Public).pdf
Neo4j
 

Slashing Your Cloud Risk: 3 Must-Do's

  • 2. About Security Innovation • Securing software in all the challenging places…. • ….while helping clients get smarter Assessment: show me the gaps Standards: set goals and make it easy Education: help me make good decisions Over 3 Million Users Authored 18 Books Named 6x Gartner MQ
  • 4. Mitigating Cloud Risk 1. Identify Necessary Services 2. Configure Services Appropriately 3. Traditional Server and Application Hardening
  • 6. ID Necessary Services • Only enable what is necessary • Use what is necessary in its intended way and configuration • Configure existing services properly • Understand security configurations
  • 7. Only enable what is necessary • Can be attractive to enable services pre-emptively • Only enable services that you need to use or that you understand • There’s no need to go “all in” on the cloud • Migrate from traditional infrastructure piecemeal • Plan your migration carefully and securely • SI can help plan your migration to the cloud
  • 8. Use in the way it was intended • It might be easy to migrate whole servers to EC2 • RDS, S3, SES, etc. can be more cost effective, faster and more resilient • Using services as intended can also give you better configuration, authentication management, and visibility
  • 9. Configure existing services properly Azure Resource Manager • Define & Codify Standards • Implement them as Infrastructure as Code (IaC) • Improves repeatability, reliability, enables scalability • Reduces mistakes
  • 10. ID Necessary Services • Understand security configurations • Logging centrally CloudTrail/Azure Monitor • Configure Virtual Networks or VPNs Appropriately • Configure Authorization Models and Permissions properly (TechCrunch)
  • 11. Minimize Attack Surface • Turn off unnecessary services • Ensure services don’t restart automatically due to a script or config • Double check firewalls or security groups
  • 12. Turn off unnecessary services • AWS has more than 100 services, you don’t need to try them all • If you try a new service out be sure to disable it if it’s not necessary • Some services have different configurations • S3 vs S3 Infrequent Access • Some services are only to be used infrequently • DB Migration Services • Application Migration Services • Turn them off when finished
  • 13. Limit Access to Services • Provide service access through an internal tool • Only give access to services that have been reviewed • Only give access to configurations known to be good • Scan out of compliant services and configurations and disable them before they can be used • Public S3 bucket, disable before data can be uploaded • Notify user of their mistake with a solution
  • 15. Double Check Firewalls and Security Groups • Same as internet connected traditional infrastructure • Minimize open ports (80, 443, 3306) • Consider disabling direct access • Require an additional hop for critical infrastructure • Do both! • Security Groups and Azure Firewall rules are great Infra Level protection • Manage your own server level firewalls for a belt and suspenders approach
  • 16. Authentication • AWS/Azure/GCP tie AuthN/AuthZ together • It’s good to keep them separate in your mind, threats are different • AuthN is identity, AuthZ is access • Authentication to your Cloud Provider is critical • Imagine what somebody could do if they had direct access to your infrastructure from anywhere in the world • MFA/2FA is well supported on all platforms • Don’t discout SIM cloning attacks for critical infrastructure
  • 17. Authorization • Who has access to what is complicated in the cloud • AWS Cognito and Azure AD define access • Access to servers through: Firewalls, Roles, service configurations or network configurations • AssumeRole for temporary access • Can be abused by an attacker • S3/Blob Storage buckets can be world readable • This has led to an enormous number of data breaches
  • 18. Real World Misconfiguration The Upguard RNC Breach • Accidentally exposed 200 million registered voters due to an open S3 bucket • Lesson learned: • Need to understand the underpinnings of the cloud infrastructure • Had Upguard configured their AWS S3 bucket to not allow download or access privileges, this could have been avoided • Why attack simulations and red teaming are necessary • Would have likely found the dra-dw amazon subdomain, realized it was an attack vector, and secured it Misconfigurations, both obvious and obscure, happen frequently with cloud operations; thus, regular expert scrutiny is necessary
  • 19. Encryption • Can be offloaded to cloud services • Configuration and use can be challenging • Key Rotation, Automatic Key Removal, MFA, can and should be automated. Ties access to a user/role, not a key • Secrets Manager & KMS – Stores keys safely • Encryption Services – Stores data securely
  • 20. Scaling a two sided sword • Scaling is one of the great benefits of the cloud • Allows you to meet demand as necessary • But you pay for it • Attackers can see both sides • DDoS Attack without scaling leads to a true DoS • DDoS Attack with scaling may rack up costs • GuardDuty-like services can help a bit, should be part of a broader IDS/IPS strategy
  • 21. Perform Regular Assessments • Mistakes happen, automate as much as possible • The security landscape changes • Keep up with best practices as they change • Perform frequent scans with automation • Perform in depth manual security assessments • SI can help perform cloud configuration reviews
  • 22. Build Pipelines can be dangerous • CodeStar and Azure DevOps are powerful tools • Critical to lockdown source access appropriately • What could an attacker do if they had access to your code? • Lambda and Azure Functions need your attention • Permissions and roles • Resource consumption • Tracing
  • 24. Standard Server Hardening • Cloud Providers have enabled a lot of services that can help you with this • Virtual Servers in the Cloud, though, don’t take advantage • Logging & Monitoring & Alerting • Patching & Docker Build Pipelines may inherit backdoors • Configuration Management • Backup & Restore • Disaster Recovery
  • 25. Application Hardening • Most vulnerabilities are still at the application level • Won’t protecting you from a SQLi based data breach • Make sure you get regular assessments on your application • Follow security best practices for development, testing, deployment
  • 26. Data Security Best Practices • Compliance and Policy can be aided by the Cloud • But is a shared responsibility • Encryption requirements for compliance to regulations • Storage location • May have jurisdiction implications
  • 27. Cloud Supported Application Hardening • Web Application Firewall (WAF) – • Cloud providers can help scan for malicious behavior • Can be a powerful first line of defense • Absolutely not sufficient • TLS Configuration and Rotation • Cloud Providers can take the guesswork out of TLS • Automate it with Let’s Encrypt for free!
  • 28. Thank you! Any questions? • Identify Necessary Services & Minimize Attack Surface • Only Enable what is necessary • Configure each service properly • Understand and deploy central logging and monitoring • Use IaC to minimize mistakes and improve repeatability • Configure Services Appropriately • Deploy firewall and security group services • Understand AuthN/AuthZ best practices • Take care with assume role • Enable 2FA • Disable world readable S3 buckets • Leverage Cloud encryption Services • Take care with scaling • Perform regular security assessments • Traditional Server and Application Hardening • Follow standard server hardening best practices • Don’t forget Application security best practices • Compliance and Regulation are your responsibility • Deploy a WAF and TLS Joe Basirico SVP of Engineering [email protected]