SlideShare a Scribd company logo
Thank you.
REALITY CHECK:
SECURITY IN THE CLOUD
Charles Johnson
Director, Sales Engineering – US WEST
The Cloud Is Secure
AWS has all the tools you need to secure your cloud!
• AWS WAF
• CloudFront
• Security Groups
• AWS Artifact
• Certificate Manager
• AWS Cloud HSM
• Amazon Cognito
• AWS Firewall Manager
• Guardduty
• AWS IAM
• Inspector
• AWS KMS
• Amazon Macie
• AWS Shield
• AWS Secrets Manager
• AWS SSO
Sometimes…
• Through 2022, at least 95% of cloud security failures will be the customer’s
fault – Gartner
• More than 1.5 billion sensitive corporate and other files are visible on the
public internet due to human error – Digital Shadows
• 88% of Java applications had at least one component-based vulnerability,
56% of all PHP apps had at least one SQLi vulnerability - Veracode
• Attackers are outpacing enterprises with technology such as machine learning
and artificial intelligence (AI) – Ponemon/ServiceNow
Alert Logic Security Operations Center
Alert Logic Cloud Security Report 2017
CONFIDENTIAL
550 DAYS
AUG 1, 2015 –JAN 31 2017
3807 CUTOMERS
ANALYZED
452
SIC CODES ACROSS 3 CONTINENTS
32.5 MILLION
EVENTS DRIVING ESCALATED INCIDENTS
147 PETABYTES
OF DATA ANALYZED
2,207,795
TOTAL TRUE POSITIVE SECURITY INCIDENTS ANALYZED
Key Findings
1. Watch your whole Attack Surface
2. Vulnerabilities have Emergent Properties
3. The Hybrid Chasm is real
4. No one detection method is enough
WEB
APP…
Brute
Force
16%
Recon
5%
Server-side
Malware
2%
DoS / DDoS
1%
Other
1%
75
%
DOS/DDOS
1% OTHER
1%
SERVER-SIDE
MALWARE
2%
RECON
5%
Web App Attacks – King of the Hill
BRUTE
FORCE
5%
SQL INJECTION
55% REMOTE
CODE
EXECUTION
22%
XXE
3%
APACHE
STRUTS
RCE
6%
WEB APP
ATTACK
RECON
5%
FILE
UPLOAD
6%
OTHER
4%
SECURITY INCIDENT TYPES ESCALATED
Increasing vulnerabilities at every layer
Vulnerabilities in
YOUR CODE
Vulnerabilities in
YOUR CONFIGS
Vulnerabilities
YOU INHERIT
Workload Environments Impact Incident Volumes
2.5x
more security incidents
observed in Hybrid vs
Public Cloud
51%
higher rate of
security incidents in
on premises vs Cloud
AVERAGE PER CUSTOMER SECURITY INCIDENT COUNTS
Ok, Now what?
• Find the Vulnerabilities
- DON’T FORGET PLATFORM
• Block Known Bad
• Always Be Watching
• Compliance is an Outcome
Alert Logic can help!
Address Vulnerabilities
Source: SC Magazine: scmagazine.com/one-year-later-heartbleed-still-a-threat/article/407803/
SHELLSHOCK HEARTBLEED
% of Global 2000
Organizations
Vulnerable to
Heartbleed in
August 2014: 76%
April, 2015: 74%
359 of 6000 analyzed containers – Tenable, 2018
Leverage Multiple Detection Techniques
Anomaly Detection – Something Just Doesn’t Look Right
Multi-stage Application Attacks Appear As Noise
Enter Machine Learning
Over nine months :
8-10% of the customers we
monitored were targeted by
actors with better-than-average
levels of skill and determination
Each attack
had a High
degree of
complexity
Identified,
approx. 231
attacks
Multi-stage Attacks
Time: Day 1
Event: Early stage recon event
Criticality: Medium
Time: Day 19
Event: SQL Injection recon
Criticality: Medium
Time: Day 38
Event: SQL table enumeration
Criticality: High
Time: Day 71
Event: Injection
Criticality: Critica
Situation: Multiple address spaces and disparate unrelated events over days
Compliance without ComplexityCompliance is an outcome!
Best Practices
Know your Shared
Security
Responsibilities with
AWS
Attack surface
isn’t just where
your data resides
Continually assess for
exposures across all
environments
Understand impacts
from applicable
compliance mandates
Implement controls
built for cloud ,
containers, and
DevOps
We can help
Thank you.

More Related Content

PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
The AWS Shared Responsibility Model in Practice
PDF
The Intersection of Security & DevOps
PDF
Reality Check: Security in the Cloud
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PPTX
#ALSummit: Architecting Security into your AWS Environment
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
The AWS Shared Responsibility Model in Practice
The Intersection of Security & DevOps
Reality Check: Security in the Cloud
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Realities of Security in the Cloud
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: Architecting Security into your AWS Environment

What's hot (20)

PDF
Reducing Your Attack Surface
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Securing Healthcare Data on AWS for HIPAA
PDF
CSS17: Houston - Protecting Web Apps
PDF
CSS17: Houston - Introduction to Security in the Cloud
PDF
Security Implications of the Cloud
PDF
Realities of Security in the Cloud
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PDF
Protecting Against Web Attacks
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
CSS 17: NYC - Protecting your Web Applications
PPTX
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
PDF
Managed Threat Detection & Response for AWS Applications
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
CSS17: Atlanta - Realities of Security in the Cloud
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PDF
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Reducing Your Attack Surface
Realities of Security in the Cloud
The Intersection of Security & DevOps
Securing Healthcare Data on AWS for HIPAA
CSS17: Houston - Protecting Web Apps
CSS17: Houston - Introduction to Security in the Cloud
Security Implications of the Cloud
Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
Protecting Against Web Attacks
#ALSummit: Cyber Resiliency: Surviving the Breach
CSS 17: NYC - Protecting your Web Applications
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
Managed Threat Detection & Response for AWS Applications
Security Spotlight: The Coca Cola Company - CSS ATX 2017
CSS 17: NYC - Stories from the SOC
CSS17: Atlanta - Realities of Security in the Cloud
CSS17: Houston - Azure Shared Security Model Overview
CSS 17: NYC - Building Secure Solutions in AWS
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Ad

Similar to Realities of Security in the Cloud (20)

PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Secure application deployment in Apache CloudStack
PPTX
Secure application deployment in the age of continuous delivery
PPTX
Solnet dev secops meetup
PPTX
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
PDF
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
PPTX
Security in the age of open source - Myths and misperceptions
PPTX
Vmug birmingham mar2013 trendmicro
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
PPTX
Empowering Application Security Protection in the World of DevOps
PPTX
Empowering Application Security Protection in the World of DevOps
PDF
Secure Application Development in the Age of Continuous Delivery
PPTX
Secure Application Development in the Age of Continuous Delivery
PDF
Estratégia de segurança da Cisco (um diferencial para seus negócios)
PPTX
Rik Ferguson
PPTX
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
PDF
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
PDF
Lacework slides from AWS Meetups
PDF
Container Security: What Enterprises Need to Know
Secure application deployment in the age of continuous delivery
Secure application deployment in the age of continuous delivery
Secure application deployment in Apache CloudStack
Secure application deployment in the age of continuous delivery
Solnet dev secops meetup
Disrupting the Malware Kill Chain - What's New from Palo Alto Networks.
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Security in the age of open source - Myths and misperceptions
Vmug birmingham mar2013 trendmicro
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Empowering Application Security Protection in the World of DevOps
Empowering Application Security Protection in the World of DevOps
Secure Application Development in the Age of Continuous Delivery
Secure Application Development in the Age of Continuous Delivery
Estratégia de segurança da Cisco (um diferencial para seus negócios)
Rik Ferguson
TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud A...
Stranger Danger: Your Java Attack Surface Just Got Bigger | JBCNConf 2022
Lacework slides from AWS Meetups
Container Security: What Enterprises Need to Know
Ad

More from Alert Logic (20)

PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
Security Spotlight: Rent-A-Center
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security and DevOps
PDF
Security Spotlight: The Coca Cola Company
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Implications of the Cloud
PDF
Security Implications of the Cloud - CSS Dallas Azure
PDF
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
Security Spotlight: Rent-A-Center
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
The Intersection of Security and DevOps
Security Spotlight: The Coca Cola Company
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
The AWS Shared Responsibility Model in Practice
Security Implications of the Cloud
Security Implications of the Cloud - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
August Patch Tuesday
PPTX
Tartificialntelligence_presentation.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Encapsulation theory and applications.pdf
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
TLE Review Electricity (Electricity).pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Unlocking AI with Model Context Protocol (MCP)
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Accuracy of neural networks in brain wave diagnosis of schizophrenia
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Approach and Philosophy of On baking technology
PPTX
Machine Learning_overview_presentation.pptx
PDF
Getting Started with Data Integration: FME Form 101
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
August Patch Tuesday
Tartificialntelligence_presentation.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Encapsulation theory and applications.pdf
A comparative analysis of optical character recognition models for extracting...
TLE Review Electricity (Electricity).pptx
A Presentation on Artificial Intelligence
Unlocking AI with Model Context Protocol (MCP)
Group 1 Presentation -Planning and Decision Making .pptx
Accuracy of neural networks in brain wave diagnosis of schizophrenia
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Approach and Philosophy of On baking technology
Machine Learning_overview_presentation.pptx
Getting Started with Data Integration: FME Form 101
Empathic Computing: Creating Shared Understanding
Spectroscopy.pptx food analysis technology
Digital-Transformation-Roadmap-for-Companies.pptx
MIND Revenue Release Quarter 2 2025 Press Release
Spectral efficient network and resource selection model in 5G networks

Realities of Security in the Cloud

  • 2. REALITY CHECK: SECURITY IN THE CLOUD Charles Johnson Director, Sales Engineering – US WEST
  • 3. The Cloud Is Secure AWS has all the tools you need to secure your cloud! • AWS WAF • CloudFront • Security Groups • AWS Artifact • Certificate Manager • AWS Cloud HSM • Amazon Cognito • AWS Firewall Manager • Guardduty • AWS IAM • Inspector • AWS KMS • Amazon Macie • AWS Shield • AWS Secrets Manager • AWS SSO
  • 4. Sometimes… • Through 2022, at least 95% of cloud security failures will be the customer’s fault – Gartner • More than 1.5 billion sensitive corporate and other files are visible on the public internet due to human error – Digital Shadows • 88% of Java applications had at least one component-based vulnerability, 56% of all PHP apps had at least one SQLi vulnerability - Veracode • Attackers are outpacing enterprises with technology such as machine learning and artificial intelligence (AI) – Ponemon/ServiceNow
  • 5. Alert Logic Security Operations Center
  • 6. Alert Logic Cloud Security Report 2017 CONFIDENTIAL 550 DAYS AUG 1, 2015 –JAN 31 2017 3807 CUTOMERS ANALYZED 452 SIC CODES ACROSS 3 CONTINENTS 32.5 MILLION EVENTS DRIVING ESCALATED INCIDENTS 147 PETABYTES OF DATA ANALYZED 2,207,795 TOTAL TRUE POSITIVE SECURITY INCIDENTS ANALYZED
  • 7. Key Findings 1. Watch your whole Attack Surface 2. Vulnerabilities have Emergent Properties 3. The Hybrid Chasm is real 4. No one detection method is enough
  • 8. WEB APP… Brute Force 16% Recon 5% Server-side Malware 2% DoS / DDoS 1% Other 1% 75 % DOS/DDOS 1% OTHER 1% SERVER-SIDE MALWARE 2% RECON 5% Web App Attacks – King of the Hill BRUTE FORCE 5% SQL INJECTION 55% REMOTE CODE EXECUTION 22% XXE 3% APACHE STRUTS RCE 6% WEB APP ATTACK RECON 5% FILE UPLOAD 6% OTHER 4% SECURITY INCIDENT TYPES ESCALATED
  • 9. Increasing vulnerabilities at every layer Vulnerabilities in YOUR CODE Vulnerabilities in YOUR CONFIGS Vulnerabilities YOU INHERIT
  • 10. Workload Environments Impact Incident Volumes 2.5x more security incidents observed in Hybrid vs Public Cloud 51% higher rate of security incidents in on premises vs Cloud AVERAGE PER CUSTOMER SECURITY INCIDENT COUNTS
  • 11. Ok, Now what? • Find the Vulnerabilities - DON’T FORGET PLATFORM • Block Known Bad • Always Be Watching • Compliance is an Outcome
  • 13. Address Vulnerabilities Source: SC Magazine: scmagazine.com/one-year-later-heartbleed-still-a-threat/article/407803/ SHELLSHOCK HEARTBLEED % of Global 2000 Organizations Vulnerable to Heartbleed in August 2014: 76% April, 2015: 74% 359 of 6000 analyzed containers – Tenable, 2018
  • 15. Anomaly Detection – Something Just Doesn’t Look Right
  • 17. Enter Machine Learning Over nine months : 8-10% of the customers we monitored were targeted by actors with better-than-average levels of skill and determination Each attack had a High degree of complexity Identified, approx. 231 attacks
  • 18. Multi-stage Attacks Time: Day 1 Event: Early stage recon event Criticality: Medium Time: Day 19 Event: SQL Injection recon Criticality: Medium Time: Day 38 Event: SQL table enumeration Criticality: High Time: Day 71 Event: Injection Criticality: Critica Situation: Multiple address spaces and disparate unrelated events over days
  • 20. Best Practices Know your Shared Security Responsibilities with AWS Attack surface isn’t just where your data resides Continually assess for exposures across all environments Understand impacts from applicable compliance mandates Implement controls built for cloud , containers, and DevOps