25
Introduction to Cloud Security Ayed Al Qartah Consulting Systems Engineer – Security (GSSO)

Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

  • Upload
    others

  • View
    2

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

Introduction to Cloud Security

Ayed Al QartahConsulting Systems Engineer – Security (GSSO)

Page 2: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

We Live in a Cloud-first World

81%Evaluating or using

public cloud

73%Have a hybrid cloud

strategy

84%Will use multiple

clouds

Source: IDC InfoBrief, sponsored by Cisco, Cloud Going Mainstream. All Are Trying, Some Are Benefiting; Few Are Maximsing Value. September 2016.

Page 3: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Organizations must Adapt to the Cloud due to Four Key Trends

Business apps move towards SaaS while application

development shifts

Branch offices have direct internet access

Critical infrastructure and data moves away from corporate data centers

Mobile workforce and BYOD proliferation

Page 4: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cloud Adoption is Driving Specific Business Outcomes

Reduced Costs Enhanced ProductivityImproved Agility Increased Revenue

Page 5: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Infrastructureas a Service (IaaS)

Platformas a Service (PaaS) SaaS

People People People

Data Data Data

Applications Applications Applications

Runtime Runtime Runtime

Middleware Middleware Middleware

Operating system Operating system Operating system

Virtual network Virtual network Virtual network

Hypervisor Hypervisor Hypervisor

Servers Servers Servers

Storage Storage Storage

Physical network Physical network Physical network

Cloud Shared Responsibility – SaaS/PaaS/IaaS

CSR responsibilityCustomer responsibility

Page 6: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

“Cloud Security” Means Different Things

Security tothe cloud

“Secure my data and applications as they transition to or are accessed from the cloud”

Security forthe cloud

“Secure my cloud based workloads and applications”

Any security solution may be delivered from the cloud

BRKSEC-1776

Page 7: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

A Portfolio of Capabilities is Needed

DNS

Anti-Malware NAC DNS Security Flow Analytics CASB

Malware Sandbox

Contextual Tags and Policy Web Security Firewall IPSWAF

Email Security

BRKSEC-1776

Page 8: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

These Capabilities Handle Specific Threats

Anti-Malware NAC DNS Security Flow Analytics CASB

Malware Sandbox

Contextual Tags and Policy Web Security Firewall IPSWAF

Email Security

Malware distribution across

networks

Untrusted and compromised

devices

PhishingC&C

Insider ThreatsCompromised

Devices

UnauthorisedAccess & Data

Loss

SpamPhishing

Malicious Files

Polymorphic Threats

Content FilteringMalicious Destinations

UnauthorisedAccess and

malformed packets

Attacks against poorly coded apps

IntrusionUnauthorisedAccess and Lateral

Propagation

BRKSEC-1776

Page 9: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Organizations Need to Focus on Two Key Cloud Security Areas

Public Cloud Applications (SaaS)

Public Cloud Workloads

Private Datacentre/Cloud

Public Cloud (IaaS/PaaS)

SalesforceBox

Office365 Servicenow

SlackDropBoxGSuite

Solarwindsmsp

Vmware

ExchangeAzure

SAP HANA

AWS

Exchange

BRKSEC-1776

Page 10: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Malware and ransomware

Compromised accounts and malicious insiders

Gaps in visibility and coverage

Data breaches and compliance

Threats extend and evolve to fit new attack targets

Threats Fall Under 4 Main Categories

BRKSEC-1776

Page 11: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Key Public Cloud Application Questions

ApplicationsDataAccess Control

▪ Who is doing what in my cloud applications?

▪ How do I detect accountcompromises?

▪ Are malicious insiders extracting information?

▪ Do I have toxic and regulated data in the cloud?

▪ Do I have data that is being shared inappropriately?

▪ How do I control movement of IP within and outside of SaaS?

▪ How can I monitor app usage and risk?

▪ How do I revoke/block risky apps? ▪ What native security controls are

available to me?

BRKSEC-1776

Page 12: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Public Cloud Applications

Sanctioned Application

Unsanctioned Application

Home office user Traveling userExternal partner collaborator

IOT Security system

3rd Party application leveraging Office 365 data DocuSign

DropBoxOffice 365

BRKSEC-1776

Page 13: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Secure Access to Sanctioned File RepositoryBDM Questions• Is this user who they say they are?

Insider ThreatsCompromised

Devices

Untrusted and compromised

devices

PhishingC&C

UnauthorisedAccess & Data

Loss

Rogue AccessZero Day

TDM Questions• How is access control extended from corporate

network to cloud applications? • How does this user’s behavior correspond to their

expected or baselined behavior?

Network Access Control

FlowAnalytics

NGFW

DNS

DNS Security

Office 365CASB

Polymorphic Threats

Malware Sandbox

BRKSEC-1776

Page 14: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Managing Content within a Sanctioned File RepositoryBDM Questions• How do you enable sensitive content to live within

the cloud to support collaboration, yet still provide proper controls?

TDM Questions• How does your Data Security solution scale for the

cloud? • Malware from unmanaged devices or via

collaborators?

Untrusted and compromised

devices

Malicious file uploads and downloads

Content Filtering

UnauthorisedAccess & Data

Loss

Rogue Access

Polymorphic Threats

Network Access Control

Firewall WEB SecurityAnti-Malware

Office 365CASB

Malware Sandbox

BRKSEC-1776

Page 15: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Applying Controls for an Unsanctioned ApplicationBDM Questions• Just because an application is unsanctioned

doesn’t mean it isn’t a potential security risk. • What is the pathway towards sanctioning a new

application?

TDM Questions• Out of band controls are not effective here, so how

can typical oob capabilities move in band?

Insider ThreatsCompromised

Devices

Untrusted and compromised

devices

PhishingC&C

Malicious & Risky Application

Usage

Rogue AccessZero Day

Content FilteringMalicious

Destinations

Network Access Control

FlowAnalytics

Firewall

DNS

DNS Security AVCWEB SecurityAnti-Malware

Malicious file uploads and downloads

DropBox

BRKSEC-1776

Page 16: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Traveling User on a Sanctioned AppBDM Questions• With users spending more time away from the

office, network centric controls are not applicable without requiring VPN access, which can degrade performance of cloud applications.

• What is your BYOD policy?

TDM Questions• How to replicate the inband network (and possibly

endpoint controls for BYOD) using cloud and out of band capabilities?

FlowAnalytics

Anti-Malware

Same capabilities as the corporate user, but the pillars and form factors are likely completely different.

Office 365CASB

Malware Sandbox

DNS

DNS SecurityEmail Security

BRKSEC-1776

Page 17: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

How Cisco Security Helps

Page 18: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Integrated Security Architecture

SimpleCisco built the network and internet standards and uses

pre-built integrations with customers’ existing footprints.

Open & automatedCisco’s open platforms use

security standards and turn-key integrations with

customers’ existing solutions.

Security

EffectiveCisco identifies, prevents, and detects more attacks

by using an integrated security architecture.

BRKSEC-1776

Page 19: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cloud Security Architecture - Three Focus Areas

Threat protection“Stop the breach”

Segmentation“Reduce the

attack surface”

Visibility“See everything”

Threat intelligence - Talos

Intent-based

Automation

Analytics

BRKSEC-1776

Page 20: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cisco Security Solutions – Focus Areas

• Visibility for Better Policy

• Visibility for Better Threat Detection (and Response)

VisibilityThreat protection• Intrusion Prevention• Advanced Malware

Protection (AMP)

Threat prevention• Baseline Policy• Incident Response

Policy

Segmentation

Integrated

Page 21: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cisco Security Solutions – Focus Areas

Network and application analytics• Stealthwatch / cloud• Tetration

VisibilityThreat protection• NGFW/NGIPS• Advanced Malware

Protection (AMP)

Threat preventionFirewall and access control• NGFW, ACI and

Tetration Policy Orchestration

• FMC and CloudCenter• APIC and ISE

Segmentation

Integrated

BRKSEC-1776

Page 22: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Integrated Security Architecture

APPLIANCESFTD or ASA w/Firepower1

ISR or Meraki MXWeb and Email Gateway1

Stealthwatch

AGENTSAnyConnect

AMP for EndpointsMANAGEMENT

Meraki SM

CLOUD-HOSTED APPLIANCE/AGENTS

Cloud Email SecurityESAv ASAv WSAv

Threat GridStealthwatch Cloud

MULTI-TENANT SAASUmbrellaCloudlock

Umbrella InvestigateCTA

THREAT INTELTalos2

SECURITY MANAGEMENTDefence Orchestrator

SECURITY SERVICESManaged, Advisory,and ImplementationPOLICY AND ACCESS

ISE pxGrid TrustSec

1. Additional security management via FMC and SMA2. Talos is not a product

BRKSEC-1776

Page 23: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Cisco Provides Offerings for Each Capability

DNS

Anti-Malware NAC DNS Security Flow & IaaS API Log Analytics CASB

Malware Sandbox

Contextual Tags and Policy Web Security Firewall IPSThreat Intel

Email Security

AMP ISE UmbrellaStealthwatch,

Tetration Cloudlock ESA

Threatgrid ISE, ACI, Trustsec, Pxgrid WSA Firepower FirepowerTALOS

BRKSEC-1776

Page 24: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

© 2018 Cisco and/or its affiliates. All rights reserved. Cisco Public

Enforcement and Visibility Everywhere

Data Apps

Users Endpoints

UNMANAGED ENDPOINTS

Security for all edges

Security for all assets

Security via the cloud

MANAGED ENDPOINTS

MANAGED LOCATIONS

INTERNET

THE ERODING PERIMETER

CORPORATENETWORK(S)

UNMANAGED USERS / APPS

UNMANAGED LOCATIONS

FTD / ASA;Web / Email

Gateways Meraki MX / ISR

Data

Cloudlock;NGFWv; NGIPSv;Stealthwatch Cloud, Tetration

Users Data Apps

PUBLIC & PRIVATECLOUDS

Stealthwatch;ISE; pxGrid; TrustSec,

SDA

Firepower, ACI, Tetration,

Stealthwatch

DATA CENTRE

INTERNAL SUBNET/VLANS

Umbrella

AnyConnectAMP for Endpoints;

Cloud Email Security; Meraki SM; AMP; Threat Grid; CTA; Umbrella Investigate; Active Threat Analytics

CISCO SECURITY AS A SERVICE

BRKSEC-1776

Page 25: Introduction to Cloud Security 3/secission2/1... · Security. Ayed Al Qartah. Consulting Systems Engineer – Security (GSSO) ... ISR or Meraki MX. Web and Email Gateway. 1. Stealthwatch

Thank you