28
Identify and Neutralise Tomorrow’s Threats Today Damian Skeeles Strategic Regional Architect HP Enterprise Security Products @secureisd #CLOUDSEC

Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Identify and Neutralise Tomorrow’s Threats Today Damian Skeeles Strategic Regional Architect HP Enterprise Security Products

@secureisd #CLOUDSEC

Page 2: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

• A Problem Statement

• Applying HP technologies to the threat

• To IaaS

• To SaaS

• To the private cloud

AGENDA

2

Page 3: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

A PROBLEM STATEMENT

3 www.cloudsec.com | #CLOUDSEC

Page 4: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

“We have a problem”

A PROBLEM STATEMENT

4

Page 5: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

80% of organisations use the cloud

A PROBLEM STATEMENT

5

Source: HP Cloud - Public Cloud Security Research, November 2013

Page 6: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

40% don’t realise they use the cloud

A PROBLEM STATEMENT

6

Source: HP Cloud - Public Cloud Security Research, November 2013

Page 7: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

16% admitted a public cloud breach in 12mo

A PROBLEM STATEMENT

7

Source: HP Cloud - Public Cloud Security Research, November 2013

Page 8: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

39% aware they have Shadow IT problems

A PROBLEM STATEMENT

8

Source: HP Cloud - Public Cloud Security Research, November 2013

Page 9: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

26% had applications in cloud without approval

A PROBLEM STATEMENT

9

Source: HP Cloud - Public Cloud Security Research, November 2013

Page 10: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

And the threats are there

A PROBLEM STATEMENT

10

Page 11: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

ADDRESSING THE THREAT TO… IAAS

11 www.cloudsec.com | #CLOUDSEC <insert speaker organization logo>

Page 12: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our

Enterprise Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle The Attack Lifecycle (On-Premise)

ADDRESSING THE THREAT

Discovery

Research

Their

ecosystem

Infiltration

Capture

Exfiltration

Package and navigate out

Extract data

Move laterally via creds, network

Research admins, Webapps, VPNs

Enter via phished user, web app…

Our

Enterprise

Page 13: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our IaaS Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle (IaaS) The Attack Lifecycle (IaaS)

ADDRESSING THE IAAS THREAT

Discovery

Research

Their

ecosystem

Infiltration

Capture

Exfiltration

Package and navigate out

Extract data

Move laterally via creds, network

Research admins, Webapps, API keys

Enter via phished user, web app…

Our IaaS

Page 14: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our IaaS Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle (IaaS)

ADDRESSING THE IAAS THREAT

Compromised

Identity

HP User

Behaviour

Analytics (UBA)

Compromised

Web App

HP Fortify

AppDefender

HP Advanced

Threat

Appliance (ATA)

Log-evident

Behaviour HP ArcSight

Page 15: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our IaaS Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle (IaaS)

ADDRESSING THE IAAS THREAT

Unusual

Behaviour

HP User

Behaviour

Analytics (UBA)

Unusual logins

Application

Errors

Services

crashing

Unusual netflow

HP ArcSight

Page 16: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our IaaS Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle (IaaS)

ADDRESSING THE IAAS THREAT

DBA actions

SQL commands

App events

OS File Events

HP ArcSight

Page 17: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Discovery

Research

Our IaaS Their

ecosystem

Infiltration

Capture

Exfiltration

The Attack Lifecycle (IaaS)

ADDRESSING THE IAAS THREAT

Admin activity

Unusual Netflow

HP ArcSight

Encrypt

Databases

Encrypt Big Data

Tokenise Data

Encrypt Files

Keep the keys

HP Security

Voltage

SecureData

FPE

HP Atalla IPC

HP Atalla ESKM

Page 18: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

ArcSight Monitoring

ADDRESSING THE IAAS THREAT

18

• Take events from

• IaaS Activity APIs

• IAM / VPN

• OS

• Applications

• Networking

• Store and Search

• Correlate for Suspicious Activity

• Run SIEM/LM in IaaS or On-Prem

Page 19: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

ADDRESSING THE THREAT TO… SAAS

19 www.cloudsec.com | #CLOUDSEC <insert speaker organization logo>

Page 20: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Research

Our SaaS

Accounts

Their

ecosystem

Infiltration

Exfiltration

The Attack Lifecycle (SaaS)

ADDRESSING THE SAAS THREAT

Research

Their

ecosystem

Infiltration

Exfiltration

View data

Research admins, Webapps, API keys

Enter via phished user, web app…

The Attack Lifecycle (IaaS)

Our SaaS

Accounts

Page 21: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Activity

Encryption

Security Touchpoints (SaaS)

ADDRESSING THE SAAS THREAT

Identity

Access

Network /

Geo Context

Identity Check /

Block

Behaviour

Secure the data

Adallom Reverse

Proxy

Adallom Federated AD

ArcSight UBA

ArcSight ESM

Adallom Rules

Atalla ESKM, CE, IPC,

Voltage SecureData

Page 22: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Adallom

ADDRESSING THE SAAS THREAT

22

Page 23: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

SaaS

ADDRESSING THE SAAS THREAT

23

Page 24: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Adallom + ArcSight

ADDRESSING THE SAAS THREAT

24

Page 25: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Adallom + UBA

ADDRESSING THE SAAS THREAT

25

Page 26: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

SUMMARY

28 www.cloudsec.com | #CLOUDSEC <insert speaker organization logo>

Page 27: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Summary

• IaaS threat defence is similar to On-Premise

• SaaS defence focus is on Identity and Encryption

• User Behaviour Analytics is useful in all aaS models

• Encryption is “key”

SPEAKER TOPIC

29

Page 28: Identify and Neutralise - CLOUDSEC · Source: HP Cloud - Public Cloud Security Research, November 2013 . 26% had applications in cloud without approval A PROBLEM STATEMENT 9 Source:

Damian Skeeles Regional Strategic Architect HP Enterprise Security Products

@secureisd #CLOUDSEC