SlideShare a Scribd company logo
Cloud Security:
Perception vs. Reality

March 21, 2012




                         #cloudsecurity
Agenda




     Introductions and Internap Overview



     Security Drivers and Concerns - Industry Perspectives



     Security Risk Evaluation – Service Provider vs. On-Premise



     Questions?



                                                                  #cloudsecurity
2
Today’s speakers & moderator
                                             Marek Vesely
             Mark Fitzgerald                 Chief Technology Officer
             Manager,                        Casenet LLC
             Infrastructure & Strategy
             Turbine




                  John Freimuth          Randy Rosenbaum
                  VP, Mgd Hstg &         Partner Executive
                  Cloud                  Alert Logic
                  Internap




 Moderator
                                                   #cloudsecurity
   3
Our intelligent IT
          Infrastructure solutions
          can take your business
          to a higher level.



3,700+ Enterprise Customers   500 Employees   2011 Revenue: $245M   NASDAQ: INAP




                                                                                   #cloudsecurity
4
End user
              to the
    Performance
                                                IT Vendor

                                                                   IT Vendor
                                  IT Vendor




                                                                IT Vendor
                                        IT Vendor


                                                    IT Vendor
                                                                               IT Vendor



                   Platform
                         Flexibility



                                                                                           #cloudsecurity   5
5
Performance
    to the End user
                                           Platform
                                           Flexibility
          IP Connectivity                     Colocation
          •  Enterprise IP                    •  Space, Power, Cooling
          •  TCP Acceleration                 •  Interconnection


          Content Delivery Network            Hosting
          •  Media Delivery, Transparent      •  Managed Hosting
             Caching, Mobile Delivery         •  Dedicated Hosting
          •  Analytics

                                              Cloud
                                              •  Private Cloud
                                              •  Public Cloud
                                              •  Cloud Storage
    We live and breathe a full
    range of intelligent IT
    Infrastructure services



                                                                     #cloudsecurity
6
Poll Question




                    What is your greatest
                    concern about a cloud
                       environment?




                                            #cloudsecurity
7
What is top of mind today for
enterprises regarding
security and cloud services?




                                #cloudsecurity
Panel Question: Business Drivers




                                              VP, IT
                                              Dell SecureWorks
                     What business drivers
                    influence your security
                          decisions?




                                                   #cloudsecurity
9
Panel Question: Cloud Security Concerns




                                           VP, IT
                                           Dell SecureWorks
                 What are your security
                 concerns when using a
                  cloud environment?




                                                #cloudsecurity
10
Panel Question: Levering Cloud Services




                                           VP, IT
                      Given security       Dell SecureWorks

                  requirements, how will
                   you leverage cloud in
                        the future?




                                                #cloudsecurity
11
Poll Question




                  Which methods of
                 attack concerns you
                 most in terms of your
                  customers’ data?




                                         #cloudsecurity
12
Security-­‐as-­‐a-­‐Service	
  solu0ons	
  for	
  
        more	
  than	
  1,500	
  customers	
  
     Threat	
  Manager	
                    Ac-veWatch	
  
     •    Intrusion detection and vulnerability assessment
     •    PCI Approved Scanning Vendor (ASV)
     •    Custom dashboards and reports
     •    24x7 monitoring and review services


          Log	
  Manager	
                    LogReview	
  
     •  Log data collection and aggregation
     •  Identify suspicious activity and automatically issue
        threat alerts
     •  Powerful search and reporting
     •  Daily analysis and review services


                 Web	
  Security	
  Manager	
  
     •  Award-winning web application firewall
     •  Adaptive learning and easy tuning
     •  24x7 monitoring for consistent protection




13
Industry-­‐First	
  Data-­‐Driven	
  Compara0ve	
  Analysis	
  of	
  Threats	
  in	
  
          Hosted	
  and	
  Cloud	
  vs.	
  On-­‐Premise	
  IT	
  Environments	
  

14
Alert Logic provides a rich data set
Threat data from more than 1500 customers



Customers	
  of	
  over	
  
  half	
  the	
  top	
  30	
                  Consistently-­‐
 North	
  American	
                         collected	
  data	
  
 service	
  providers	
                        from	
  both	
  	
  
                                            service	
  provider	
  
                                                    and	
  	
  
                                               on-­‐premise	
  
     On-­‐premise	
  
     enterprise	
                            environments	
  
environments	
  from	
  a	
  
  range	
  of	
  ver-cals	
  




15
Customer Data Set

     •  Analyzed network
        traffic from over 1600
        customers
        –  1300 + Managed
           Hosting/Cloud
           Customers
        –  300 + On-Premise
           Customers




16
                                 Page 16
How threats are identified




17
Security Incident Categories
     INCIDENT	
  TYPE	
               DEFINITION	
                                                                                     EXAMPLES	
  
     Applica-on	
  ALack	
            Exploit	
  aLempts	
  against	
  applica-ons	
  or	
  services	
  that	
  are	
  not	
           Buffer	
  overflow	
  
                                      running	
  over	
  HTTP	
  protocol	
  	
  

     Brute	
  Force	
                 Exploit	
  aLempts	
  enumera-ng	
  a	
  large	
  number	
  of	
  combina-ons,	
                 Password	
  cracking	
  aLempts	
  
                                      typically	
  involving	
  numerous	
  creden-al	
  failures	
  	
  

     Malware/Botnet	
  Ac-vity	
      Malicious	
  soUware	
  installed	
  on	
  a	
  host	
  engaging	
  in	
  unscrupulous	
         Conficker,	
  Zeus	
  botnet	
  	
  
                                      ac-vity,	
  data	
  destruc-on,	
  informa-on	
  gathering	
  or	
  crea-on	
  of	
  
                                      backdoor.	
  Included	
  in	
  this	
  category	
  is	
  botnet	
  ac-vity:	
  post-­‐
                                      compromise	
  ac-vity	
  displaying	
  characteris-cs	
  of	
  command	
  and	
  
                                      control	
  communica-on	
  
     Misconfigura-on	
                 Network/Host/Applica-on	
  configura-on	
  issues	
  that	
  introduce	
                          Weak	
  patch	
  management,	
  
                                      possible	
  security	
  vulnerabili-es,	
  typically	
  a	
  result	
  of	
  inadequate	
        unnecessary	
  services	
  running	
  
                                      hardening	
  	
  

     Reconnaissance	
                 Reconnaissance	
  ac-vity	
  focused	
  on	
  mapping	
  the	
  networks,	
                      Port	
  scans	
  and	
  fingerprin-ng	
  
                                      applica-ons	
  and/or	
  services	
  	
  

     Vulnerability	
  Scan	
          Automated	
  vulnerability	
  discovery	
  in	
  applica-ons,	
  services	
  or	
                Unauthorized	
  Nessus	
  scan	
  
                                      protocol	
  implementa-ons	
  	
                                                                 	
  	
  

     Web	
  Applica-on	
  ALack	
     ALacks	
  targe-ng	
  the	
  presenta-on,	
  logic	
  or	
  database	
  layer	
  of	
  web	
     SQL	
  injec-on	
  
                                      applica-ons	
  




18
Metrics to answer basic questions


      OCCURRENCE	
                            FREQUENCY	
                    THREAT	
  DIVERSITY	
  
 What	
  percentage	
  of	
             How	
  oUen	
  did	
  impacted	
     How	
  many	
  unique	
  threat	
  
 customers	
  were	
  impacted	
        customers	
  experience	
            types	
  did	
  customers	
  
 by	
  each	
  threat	
  type?	
        each	
  threat	
  type?	
            experience?	
  


                                                                             What	
  is	
  the	
  complexity	
  
      What	
  threats	
  are	
  actually	
  experienced	
  in	
  on-­‐
                                                                             of	
  the	
  threat	
  landscape	
  
     premise	
  vs	
  service	
  provider	
  environments,	
  and	
  
                                                                             (and	
  resul-ng	
  security	
  
                             how	
  oUen?	
  
                                                                                         program)?	
  




19
Consistently lower occurrence rates among service
provider customers




20
Why Do We See Differences?
Size and Diversity Increase Attack Surface




21
What does this mean?

     Cloud	
  and	
  Service	
  Provider	
  Managed	
  Environments	
  	
  
     are	
  Not	
  Less	
  Secure	
  


          Good	
  Management	
  Yields	
  Good	
  Security	
  


          Smart	
  Enterprises	
  Should	
  Exploit	
  Differences	
  in	
  	
  
          Risk	
  Profiles	
  


     Web	
  Applica-on	
  Security	
  is	
  a	
  Significant	
  Challenge	
  


22
Use data to make security investment decisions
This is aggregate data; use your own IDS and log data

      Review	
  log	
  data	
  to	
  
      detect	
  brute	
  force	
                                 Consider	
  Web	
  App	
  
          aLempts	
                                             Firewall,	
  network	
  IDS	
  


                                                                                              Use	
  IDS	
  to	
  
                                                                                                detect	
  
                                                                                              suspicious	
  
                                                                                                recon	
  




         Malware	
  protec-on	
                                        Pay	
  aLen-on	
  to	
  
       cri-cal	
  for	
  on-­‐premises	
                                configura-on	
  
            infrastructure	
                                         management,	
  patching	
  

23   Source: Alert Logic State of Cloud Security, Spring 2012
?
     Questions?


     www.internap.com
      #cloudsecurity


                        #cloudsecurity
24

More Related Content

PDF
Isc2conferancepremay15final
PPT
Trend micro - Your journey to the cloud, where are you
PDF
Bapinger Network Security
PDF
TrendMicro
PDF
Peering Through the Cloud Forrester EMEA 2010
PDF
Intel Cloud Summit: Greg Brown McAfee
PDF
Introduction - Trend Micro Deep Security
PPT
Trend micro real time threat management press presentation
Isc2conferancepremay15final
Trend micro - Your journey to the cloud, where are you
Bapinger Network Security
TrendMicro
Peering Through the Cloud Forrester EMEA 2010
Intel Cloud Summit: Greg Brown McAfee
Introduction - Trend Micro Deep Security
Trend micro real time threat management press presentation

What's hot (17)

PDF
Trend Micro Dec 6 Toronto VMUG
PPTX
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
PDF
VSD Infotech
PDF
Virtela Corp Brochure
PDF
Trend Micro - Virtualization and Security Compliance
PDF
Cloud Security Checklist and Planning Guide Summary
PPTX
Trend Micro - 13martie2012
PDF
Cat6500 Praesentation
PPTX
Trend micro v2
PDF
B fujitsu uk-and_ireland_cs.en-us
PDF
Security brochure 2012_ibm_v1_a4
PDF
Trend micro deep security
PDF
Egress Switch Datasheet
PDF
Protecting Data in the Cloud
PPTX
Hp Fortify Pillar
PDF
Security in the cloud planning guide
PDF
Cloud Security: Perception VS Reality
Trend Micro Dec 6 Toronto VMUG
Trend Micro: Security Challenges and Solutions for the Cloud (Saas) & Cloud S...
VSD Infotech
Virtela Corp Brochure
Trend Micro - Virtualization and Security Compliance
Cloud Security Checklist and Planning Guide Summary
Trend Micro - 13martie2012
Cat6500 Praesentation
Trend micro v2
B fujitsu uk-and_ireland_cs.en-us
Security brochure 2012_ibm_v1_a4
Trend micro deep security
Egress Switch Datasheet
Protecting Data in the Cloud
Hp Fortify Pillar
Security in the cloud planning guide
Cloud Security: Perception VS Reality
Ad

Viewers also liked (20)

PPTX
Capire e usare i social network
PDF
Guia de-marketing-en-internet-para-tiempos-dificiles
PPTX
COST: Programa de Cooperación Europea en Ciencia y Tecnología (Dra. Almudena ...
PPT
Vni Neumomadrid (27 Nov 07) MañAna
PDF
HIRMER Loft
PDF
PERUMIN 31: Integrated assessment of deep sedimentary structures: exploring g...
PPT
Tipos de empresas
PPT
Trespa ® division locales comerciales
PDF
Q4 year end-2013 ASSA ABLOY invetors presentation 7 february
PDF
Calor en la noche
PDF
Hogueras Alicante
PDF
Pronunciamiento confedapa
PDF
Baobaz SES - La semaine sociale 140113
PDF
Ocio Y Turismo En Mallorca Xm
PPT
Clase4 ciclovitalfamiliar
PPTX
Noviembre 2014
PPTX
Comunicacion interactiva almari manrique- m-716
PDF
Dictionnaire duweb
PDF
Preguntas novias y novios Cristianos
PPTX
Establecimiento de la conexion
Capire e usare i social network
Guia de-marketing-en-internet-para-tiempos-dificiles
COST: Programa de Cooperación Europea en Ciencia y Tecnología (Dra. Almudena ...
Vni Neumomadrid (27 Nov 07) MañAna
HIRMER Loft
PERUMIN 31: Integrated assessment of deep sedimentary structures: exploring g...
Tipos de empresas
Trespa ® division locales comerciales
Q4 year end-2013 ASSA ABLOY invetors presentation 7 february
Calor en la noche
Hogueras Alicante
Pronunciamiento confedapa
Baobaz SES - La semaine sociale 140113
Ocio Y Turismo En Mallorca Xm
Clase4 ciclovitalfamiliar
Noviembre 2014
Comunicacion interactiva almari manrique- m-716
Dictionnaire duweb
Preguntas novias y novios Cristianos
Establecimiento de la conexion
Ad

Similar to Cloud Security: Perception Vs. Reality (20)

PDF
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
PDF
Developing Your Cloud Strategy
PDF
null Bangalore meet - Cloud Computing and Security
PDF
MT81 Keys to Successful Enterprise IoT Initiatives
PPT
Security in Cloud Computing
PDF
The Cloud according to VMware
PPTX
Rik Ferguson
PDF
Data security in cloud
PPTX
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
PDF
EMEA10: Trepidation in Moving to the Cloud
PDF
Cloud security and cyber security v 3.1
PPTX
Nyc lunch and learn 03 15 2012 final
PPTX
Enterprise Security in Cloud
PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
PDF
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
PDF
CSS17: Houston - Introduction to Security in the Cloud
PDF
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
PDF
Cloud conference & expo presentation
PDF
Presentation cloud security the grand challenge
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Developing Your Cloud Strategy
null Bangalore meet - Cloud Computing and Security
MT81 Keys to Successful Enterprise IoT Initiatives
Security in Cloud Computing
The Cloud according to VMware
Rik Ferguson
Data security in cloud
Hadoop World 2011: Security Considerations for Hadoop Deployments - Jeremy Gl...
EMEA10: Trepidation in Moving to the Cloud
Cloud security and cyber security v 3.1
Nyc lunch and learn 03 15 2012 final
Enterprise Security in Cloud
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Lax breakfast forum_developing_your_cloud_strategy_05_10_2012
CSS17: Houston - Introduction to Security in the Cloud
Info Sec 2010 Possibilities And Security Challenges Of Cloud Computing (Han...
Cloud conference & expo presentation
Presentation cloud security the grand challenge

More from Internap (20)

PDF
Q3 2016-earnings-slides
PPTX
4 q15 earnings presentation
PPTX
Q3 2015 earnings presentation
PPTX
2Q15 Earnings Presentation
PDF
The Definitive Guide to Evaluating Colocation Providers guide to coloc
PDF
Considering bare metal as a viable cloud option
PPTX
Investor meeting june 8 2015
PPTX
1Q15 earnings presentation
PDF
Critical design elements for high power density data centers
PDF
Accelerate Your Website Performance
PDF
Top 10 data center strategy success
PPTX
Internap Q4 2014 Earnings Presentation
PPTX
Managed dns webinar 2015 internap
PDF
Data in Motion vs Data at Rest
PDF
Hybrid hosting webcast
PDF
Top 10 Data Center Success Criteria
PDF
Is Your IT Infrastructure Future-Proof?
PDF
Cloud Roundtable
PDF
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
PDF
Cloud: CDN Killer?
Q3 2016-earnings-slides
4 q15 earnings presentation
Q3 2015 earnings presentation
2Q15 Earnings Presentation
The Definitive Guide to Evaluating Colocation Providers guide to coloc
Considering bare metal as a viable cloud option
Investor meeting june 8 2015
1Q15 earnings presentation
Critical design elements for high power density data centers
Accelerate Your Website Performance
Top 10 data center strategy success
Internap Q4 2014 Earnings Presentation
Managed dns webinar 2015 internap
Data in Motion vs Data at Rest
Hybrid hosting webcast
Top 10 Data Center Success Criteria
Is Your IT Infrastructure Future-Proof?
Cloud Roundtable
Webinar: Top 5 Mistakes Your Don't Want to Make When Moving to the Cloud
Cloud: CDN Killer?

Recently uploaded (20)

PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Empathic Computing: Creating Shared Understanding
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Reach Out and Touch Someone: Haptics and Empathic Computing
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
NewMind AI Monthly Chronicles - July 2025
Review of recent advances in non-invasive hemoglobin estimation
GamePlan Trading System Review: Professional Trader's Honest Take
MYSQL Presentation for SQL database connectivity
Cloud computing and distributed systems.
NewMind AI Weekly Chronicles - August'25 Week I
The Rise and Fall of 3GPP – Time for a Sabbatical?
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
solutions_manual_-_materials___processing_in_manufacturing__demargo_.pdf
Understanding_Digital_Forensics_Presentation.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Empathic Computing: Creating Shared Understanding
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...

Cloud Security: Perception Vs. Reality

  • 1. Cloud Security: Perception vs. Reality March 21, 2012 #cloudsecurity
  • 2. Agenda Introductions and Internap Overview Security Drivers and Concerns - Industry Perspectives Security Risk Evaluation – Service Provider vs. On-Premise Questions? #cloudsecurity 2
  • 3. Today’s speakers & moderator Marek Vesely Mark Fitzgerald Chief Technology Officer Manager, Casenet LLC Infrastructure & Strategy Turbine John Freimuth Randy Rosenbaum VP, Mgd Hstg & Partner Executive Cloud Alert Logic Internap Moderator #cloudsecurity 3
  • 4. Our intelligent IT Infrastructure solutions can take your business to a higher level. 3,700+ Enterprise Customers 500 Employees 2011 Revenue: $245M NASDAQ: INAP #cloudsecurity 4
  • 5. End user to the Performance IT Vendor IT Vendor IT Vendor IT Vendor IT Vendor IT Vendor IT Vendor Platform Flexibility #cloudsecurity 5 5
  • 6. Performance to the End user Platform Flexibility IP Connectivity Colocation •  Enterprise IP •  Space, Power, Cooling •  TCP Acceleration •  Interconnection Content Delivery Network Hosting •  Media Delivery, Transparent •  Managed Hosting Caching, Mobile Delivery •  Dedicated Hosting •  Analytics Cloud •  Private Cloud •  Public Cloud •  Cloud Storage We live and breathe a full range of intelligent IT Infrastructure services #cloudsecurity 6
  • 7. Poll Question What is your greatest concern about a cloud environment? #cloudsecurity 7
  • 8. What is top of mind today for enterprises regarding security and cloud services? #cloudsecurity
  • 9. Panel Question: Business Drivers VP, IT Dell SecureWorks What business drivers influence your security decisions? #cloudsecurity 9
  • 10. Panel Question: Cloud Security Concerns VP, IT Dell SecureWorks What are your security concerns when using a cloud environment? #cloudsecurity 10
  • 11. Panel Question: Levering Cloud Services VP, IT Given security Dell SecureWorks requirements, how will you leverage cloud in the future? #cloudsecurity 11
  • 12. Poll Question Which methods of attack concerns you most in terms of your customers’ data? #cloudsecurity 12
  • 13. Security-­‐as-­‐a-­‐Service  solu0ons  for   more  than  1,500  customers   Threat  Manager   Ac-veWatch   •  Intrusion detection and vulnerability assessment •  PCI Approved Scanning Vendor (ASV) •  Custom dashboards and reports •  24x7 monitoring and review services Log  Manager   LogReview   •  Log data collection and aggregation •  Identify suspicious activity and automatically issue threat alerts •  Powerful search and reporting •  Daily analysis and review services Web  Security  Manager   •  Award-winning web application firewall •  Adaptive learning and easy tuning •  24x7 monitoring for consistent protection 13
  • 14. Industry-­‐First  Data-­‐Driven  Compara0ve  Analysis  of  Threats  in   Hosted  and  Cloud  vs.  On-­‐Premise  IT  Environments   14
  • 15. Alert Logic provides a rich data set Threat data from more than 1500 customers Customers  of  over   half  the  top  30   Consistently-­‐ North  American   collected  data   service  providers   from  both     service  provider   and     on-­‐premise   On-­‐premise   enterprise   environments   environments  from  a   range  of  ver-cals   15
  • 16. Customer Data Set •  Analyzed network traffic from over 1600 customers –  1300 + Managed Hosting/Cloud Customers –  300 + On-Premise Customers 16 Page 16
  • 17. How threats are identified 17
  • 18. Security Incident Categories INCIDENT  TYPE   DEFINITION   EXAMPLES   Applica-on  ALack   Exploit  aLempts  against  applica-ons  or  services  that  are  not   Buffer  overflow   running  over  HTTP  protocol     Brute  Force   Exploit  aLempts  enumera-ng  a  large  number  of  combina-ons,   Password  cracking  aLempts   typically  involving  numerous  creden-al  failures     Malware/Botnet  Ac-vity   Malicious  soUware  installed  on  a  host  engaging  in  unscrupulous   Conficker,  Zeus  botnet     ac-vity,  data  destruc-on,  informa-on  gathering  or  crea-on  of   backdoor.  Included  in  this  category  is  botnet  ac-vity:  post-­‐ compromise  ac-vity  displaying  characteris-cs  of  command  and   control  communica-on   Misconfigura-on   Network/Host/Applica-on  configura-on  issues  that  introduce   Weak  patch  management,   possible  security  vulnerabili-es,  typically  a  result  of  inadequate   unnecessary  services  running   hardening     Reconnaissance   Reconnaissance  ac-vity  focused  on  mapping  the  networks,   Port  scans  and  fingerprin-ng   applica-ons  and/or  services     Vulnerability  Scan   Automated  vulnerability  discovery  in  applica-ons,  services  or   Unauthorized  Nessus  scan   protocol  implementa-ons         Web  Applica-on  ALack   ALacks  targe-ng  the  presenta-on,  logic  or  database  layer  of  web   SQL  injec-on   applica-ons   18
  • 19. Metrics to answer basic questions OCCURRENCE   FREQUENCY   THREAT  DIVERSITY   What  percentage  of   How  oUen  did  impacted   How  many  unique  threat   customers  were  impacted   customers  experience   types  did  customers   by  each  threat  type?   each  threat  type?   experience?   What  is  the  complexity   What  threats  are  actually  experienced  in  on-­‐ of  the  threat  landscape   premise  vs  service  provider  environments,  and   (and  resul-ng  security   how  oUen?   program)?   19
  • 20. Consistently lower occurrence rates among service provider customers 20
  • 21. Why Do We See Differences? Size and Diversity Increase Attack Surface 21
  • 22. What does this mean? Cloud  and  Service  Provider  Managed  Environments     are  Not  Less  Secure   Good  Management  Yields  Good  Security   Smart  Enterprises  Should  Exploit  Differences  in     Risk  Profiles   Web  Applica-on  Security  is  a  Significant  Challenge   22
  • 23. Use data to make security investment decisions This is aggregate data; use your own IDS and log data Review  log  data  to   detect  brute  force   Consider  Web  App   aLempts   Firewall,  network  IDS   Use  IDS  to   detect   suspicious   recon   Malware  protec-on   Pay  aLen-on  to   cri-cal  for  on-­‐premises   configura-on   infrastructure   management,  patching   23 Source: Alert Logic State of Cloud Security, Spring 2012
  • 24. ? Questions? www.internap.com #cloudsecurity #cloudsecurity 24