+ All Categories
Home > Documents > Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet...

Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet...

Date post: 27-May-2020
Category:
Upload: others
View: 2 times
Download: 0 times
Share this document with a friend
27
Cloud Security Today Presenter: Jason Sheffield
Transcript
Page 1: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Cloud Security Today

Presenter: Jason Sheffield

Page 2: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Topics

2

How the Cloud is delivered: Iaas, PaaS and SaaS

Cloud security challenges and risk

Current Cloud security report

Common use cases for Cloud security technologies

What is the Cloud?

What technologies exist to address risk?

Cloud security technology drivers

What are the issues today?

Page 3: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Designed for Controlled Access

Web

FW

SWG

VPN

Endpoi

ntIPS

Data Center

Apps

Old IT Security Architecture From Yesterday

Page 4: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Designed for Controlled Access

IaaSSaaSWeb

FW

SWG

VPN

Endpoi

ntIPS

Data Center

Apps

Old IT Security Architecture From Yesterday

Page 5: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

With Digital Transformation … Everything Changed

5

IaaSSaaSWeb

Data Center

Apps

FW

SWG

VPN

Endpoint

IPS

Page 6: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

With Digital Transformation … Data is Everywhere

6

IaaSSaaSWeb

Data Center

Apps

FW

SWG

VPN

Endpoint

IPS

Page 7: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

7

DATA

FLOWS

LIKE

WATER

Page 8: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

8

LACK OF VISIBILITY

Page 9: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

9

COMPLEXITY

Page 10: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

1

0

CONTROLS CREATES FRICTION

Page 11: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

What is the Cloud?

11

• Gartner defines the Cloud as a style of computing in which scalable and elastic IT-enabled capabilities are delivered as a service using Internet technologies.

• Public Cloud: Computing, Networking, Server and Storage resources owned and operated by a third party Cloud Service Provider and delivered over the Internet. Public Cloud resources are shared with other organizations and separated into individual tenants.

• Private Cloud: Computing resources used exclusively by one business or organization. In the Private Cloud services and infrastructures are maintained by your organization. Private Clouds can be physically located in your organizations data center or can be hosted by a third party service provider.

• Hybrid Cloud: Hybrid Clouds are a mixture on-premise infrastructure, Private Clouds and Public Clouds.

Page 12: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

What is the Cloud?

Page 13: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Who in the Organization is Buying and Why?

13

Page 14: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

How is the Cloud delivered: Key differences between Iaas, PaaS and SaaS

14

Page 15: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Cloud Security Challenges

and Risks

Data

Disrupt

Destroy

Extort

Exposure

Access

Theft

INTERNAL RISK EXTERNAL RISK

Sensitive data

shared publicly

Download to

personal device

Exfiltration via

unsanctioned

cloud

Malware upload to

sanctioned cloud

Ransomware

via cloud

Cloud account

hijacking

Page 16: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Current Cloud Security Report

Enterprise Use of Cloud Services

On average the number of cloud services in use per enterprise, there was an increase to 1,246

from 1,181 last report.

Source: Netskope Cloud Security Report, October 2018

Page 17: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Current Cloud Security Report

17

CIS Benchmark Violations for AWS

By category in the CIS benchmark for AWS, the majority of violations are in the Identity and Access Management category at 71.5 percent. Monitoring followed

with 19.0 percent, Networking with 5.9 percent, and Logging with 3.6 percent. This may indicate that while many organizations have controls around cloud

services and implemented things like multi-factor authentication (MFA) and single sign-on solutions, I/PaaS identity and access policies still need to be set.

Source: Netskope Cloud Security Report, October 2018

Page 18: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources
Page 19: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Cloud Security Technology Drivers

19

• Professionals now work from multiple devices in multiple locations

• Instantaneous sharing and collaboration happens through numerous applications

• Firewalls cannot protect data stored throughout various cloud applications

• Traditional security tools cannot provide visibility in the cloud

• Non-enterprise cloud applications are consumed by end users without regard for their risk exposure

Page 20: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Common Use Cases for Cloud Security Technologies

20

Safely Enable Cloud Apps Discover Shadow IT Unified Cloud Policies

Detect Cloud ThreatsContinuous Security

AssessmentsPrevent Data Exfiltration

Page 21: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

What Technologies Exist to Address Risk?

21

SaaS

IaaS

Web

Analytics Policy

DataProtection

ThreatProtection

AnyUser

AnyDevice

AnyLocation

CASB & Cloud Security Platform

Page 22: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Mapping of Cloud Security Controls

Page 23: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Mapping of Cloud Security Controls cont.

Source: Peerlyst Post – Adrian Grigorof, February 2019

Page 24: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

What Technologies Exist to Address Risk

24

Technical capabilities needed to address todays risk

Data Loss Prevention

Encryption

Adaptive Access Control

Visibility into Cloud Application Use

Continuous

Security Assessment

Anomaly Detection

Threat Protection

Web Security

Page 25: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Questions?

Page 26: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Appendix

• Netskope Cloud Report:

https://resources.netskope.com/cloud-reports/netskope-cloud-report-october-2018

Page 27: Cloud Security Today - Texas · enabled capabilities are delivered as a service using Internet technologies. • Public Cloud: Computing, Networking, Server and Storage resources

Thank You!


Recommended