23
Securing the Perimeter of One Fernando Serto Head of Security Technology and Strategy, APAC

Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

  • Upload
    others

  • View
    8

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Securing thePerimeter of One

Fernando SertoHead of Security Technology and Strategy, APAC

Page 2: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Adapting Security to Your Digital Landscape

MobileCloud

Ecosystems

Page 3: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Digital Transformation and Your Attack Surface

Newbusinessinitiative

Newbusinessprocess

Newattacksurface

Page 4: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Your Evolving Attack Surface

API

API

IAASAPI

SAAS

People & Things

Complex Infrastructure

IaaS & SaaS

Apps & APIs

Digital Ecosystems

API

Page 5: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

App #1

App #2

App #3

There is no inside...

App #2

App #1

App #3

Inside = trusted

Secure Access in a Cloud Era

Page 6: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

“Initial one-time block/allow security assessments for access and protection are flawed, leaving the enterprise open to zero-day and targeted attacks, credential theft, and insider threats.”

Excerpt from Gartner’s Use a CARTA Strategic Approach to Embrace Digital Business Opportunities in an Era of Advanced Threats

Page 7: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Key Principles of CARTA

• The network is always assumed to be hostile.

• External and internal threats exist on the network at all times.

• Network locality is not sufficient for deciding trust in a network.

• Every device, user, and network flow is authenticated and authorized.

• Policies must be dynamic and calculated from as many sources of data as possible.

Page 8: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

API request constraints

Biometrics

Passive bot detectionAPI keyRequest syntax

ReputationClassification of content

Geo

Time of day

Authentication statePresence/validity of client cert

Malware C&C traffic

Device posture

Unsanctioned cloud storage usage

VISIBILITY & ADAPTIVE POLICY APPLICATION

Identity

Dynamic Threats Demand Context-Aware Defense

Page 9: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Source: https://community.akamai.com/community/cloud-security/blog/2018/04/19/drupalgeddon2-exploitation-overview-one-week-after-poc-code-released

6000 Akamai customer domains were probed in the first week

57% of Fortune Global 100 downloaded vulnerable versions of

Struts after the CVE was announced

Apps, APIs Often Source of CVEs

Page 10: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

CVEs Impact Everyone, But How Quickly Can You Fix It?

Page 11: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Legacy Architectures Can Increase Risk

Firewall

App 1

User

App 3

App 2

Client Application Access Control

?

Application Access Control

Global LBDDoSFW/IPSRAS/VPNWAN OptInternal LBMFA

DMZ

Page 12: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

User

ClientFirewall

App 1

App 3

App 2

Application Access Control

?

Application Access Control

Firewall

App 1

App 3

App 2

Application Access Control

?

Application Access Control

Datacenter

AWS/Azure

High Cost

Buy, Deploy, Manage

Global LB

DDoS

FW/IPS

RAS/VPN

WAN Opt

Internal LB

MFA

DMZ

Global LB

DDoS

FW/IPS

RAS/VPN

WAN Opt

Internal LB

MFA

DMZ

User Experience

Slow – depends on location of apps, users accessing from various locations and number of VPN gateways

Inconsistent – Different on-prem and off-net experience

Complexity

Many DMZs, Site-to-Site VPNs

Remote Access VPNs Adds Complexity for Hybrid Environments

Page 13: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Perimeter of one

Page 14: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Laptop

Micro Perimeter

Apps

Akamai

Simplifying Application Access Through an Identity Aware Proxy

Page 15: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

SaaS

AD/LDAP

On-prem

IaaS

TLSmTLS

mTL

S

SAML

App #1App #2App #3

Identity & AccessSSO & MFAApp SecurityApp Delivery & Acceleration

Centralize security & access controlsFor specific apps across I/SaaS and on-prem

Multi-factor auth for enterprise appsSupports email, SMS, TOTP or Duo

Single sign-on for all enterprise appsAcross I/SaaS and on-prem

Keep users off the corporate networkMake your infrastructure invisible on the Internet

Shift From Network to Simple and Secure Application Access

Page 16: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

SIMDA BotnetFamily of backdoors capable of stealing information such as user names, passwords, and certificates. It also executes backdoor commands, compromising the security of the infected systems

CryptojackingHigh risk to system availability and potential risk to system confidentiality due to malicious cryptocurrency mining

Multinational media conglomerate with interests primarily in film and television struggles under deluge of advanced threats and associated alerts and mitigation workflows

Targeted Attacks Are Increasing and Becoming More Sophisticated

Page 17: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Disrupt communications from compromised devicesSevers existing connections from infected devices to malicious actors’ command & control infrastructure

Prevent DNS-based data exfiltrationStops malicious actors from using the DNS protocol to extract enterprise data

z

WWW

DNS

Threats

C&C

AUP

Recursive DNSCloud Security IntelligenceAUP EnforcementZero Day MalwarePhishing

Identify and block access to malicious domains - everywhereRefuse requests to or communication with malicious domains known to host sites used to deliver malware or for phishing

Prevent access to inappropriate contentEasily enforce an enterprise’s acceptable Internet usage policy effectively and consistently

Mitigate Targeted Attacks With Recursive DNS & Threat Intelligence

Page 18: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Bottom line: security perimeters belong in the past

Page 19: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Bot Management

Application Security

DDoS Mitigation

API Management

Enterprise Security

Customizable, advanced app rules and API protection

Managed protection against the largest DDoS attacks

Machine learning to mitigate credential abuse & account takeover

Manage access, authentication and rate controls for APIs

Machine learning service to adaptively manage traffic

Malware protection using recursive DNS & Cloud Security Intelligence

Simple, unified & secure enterprise application access

Scalable authoritative DNS service with DDoS protection

Automated, blanket protection for web applications

Manage automated visitor traffic to protect revenue

Adaptive Threat Protection as a Service (ATPaaS?)

Page 20: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

No Inside

No VPN

No Passwords

Every app seems like SaaS

Every office is a hotspot

WE DRINK OUR OWN CHAMPAGNE

Page 21: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

12

3456

Conduct a Threat Check to determine exposure of devices to malware/phishing

Consider a Zero Trust Architecture Assessment to develop a comprehensive plan to migrate from your current architecture to your goal Zero Trust architecture

a. Profile users and appsb. Develop a customized phasing plan

Stop accumulating technical debt by publishing new apps based on Zero Trust

Begin migration of your Web apps, since they are easy to move to Zero Trust

Once you’ve addressed low hanging fruit with new apps and web apps, work to migrate legacy apps to Zero Trust based on the Zero Trust Architecture Assessment plan you developed earlier

Work to decommission legacy access, including VPN and privileged corporate WiFi/Ethernet segments

Best Practices to Start Your Journey

Page 22: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

Exclusive Offer to Gartner Attendees

Come to our booth and sign upfor a 30 day Free Trial

Page 23: Securing the Perimeter of One - Akamai...Application Security DDoS Mitigation API Management Enterprise Security Customizable, advanced app rules and API protection Managed protection

@fserto

[email protected]

linkedin.com/in/fserto/

Thank You!