SlideShare a Scribd company logo
SESSION ID:SESSION ID:
#RSAC
Aaron McKeown
Hardening the Cloud: Assuring Agile
Security in High-Growth Environments
(Moving from span ports to virtual appliances)
CSV-F01
Lead Security Architect
Xero
Fast
or
Secure
Fast
&
Secure
Beautiful cloud-based
accounting software
Connecting people with the right numbers
anytime, anywhere, on any device
3
1,450+ staff globally
$474m raised in capital
$202m sub revenue FY16
$1tr incoming and outgoing transactions in past 12 mths
450m incoming and outgoing transactions in past 12 mths
All figures shown are in NZD
2009 2010 2011 2012 2013 2014 2015 2016
862,000+
Subscribers globally
#RSAC
Public Cloud Migration
5
Supporting
the next wave
of growth
Reducing our
cost to serve
Improving data
protection
Eliminating
scheduled
downtime
Maintaining and
improving
security
#RSAC
Key Challenges
6
Skills are scarce
Regional representation
and recommendations
Application architecture
has to change
Automation is
key
Third-party commercial models
need to change
Need to focus on
visibility
#RSAC
Challenge #1: Skills are scarce
7
Challenge #1: Skills are scarce
Make an initial investment in education
Join industry groups and forums
Selective engagement of contractors
Promotion of industry wide cyber skills
#RSAC
Challenge #2: Regional representation
8
Challenge #2: Regional representation and recommendations
Build a strong relationship with AWS
Reach out to your contacts
Look at alternatives
Build a communication path to remote organizations
#RSAC
Challenge #3: Application architecture changes
9
Challenge #3: Application architecture has to change
Work in cross-functional teams
Deliver in short, frequent cycles
Communicate quickly and effectively
Build and deliver “security as a service”
#RSAC
Challenge #4: Automation is key
10
Challenge #4: Automation is key
Make automation a core principle
Start with basic use of CloudFormation
Use a code repository
Build a Continuous Integration (CI) and
Continuous Delivery (CD) system
#RSAC
Challenge #5: Focus on visibility
11
Challenge #5: Need to focus on visibility
CloudTrail is enabled by default for all accounts
Track configuration drift
Get the development teams invested
Extended into a virtual team
#RSAC
Challenge #6: Third-party commercial models
12
Challenge #6: Third-party commercial models need to change
Do what we advise others to do, use the cloud
Work with our technology partners and vendors
Move from perpetual licenses, to core based licenses
Address commercial and legal issues first
#RSAC
Key Principles
13
Repeatable, automated
build and management
of security systems
Accelerated pace of
security innovation
On-demand security
infrastructure that
works at any scale
#RSAC
Key Learnings
14
Security by
design-
what’s that?
Communication is
key
Welcome to the
cloud - “Where’s
my span port?”
Measure & Test,
monitor everything
#RSAC
Key Learnings: Security by design
15
Security by
design-
what’s that?
Build security into every layer
Treat your infrastructure as code
Iterate, iterate, iterate
Build security into the product lifecycle
#RSAC
Key Learnings: Communication is key
16
Communication is
key
Make everyone a spokesperson
Evangelize and sell your service
Communicate success (as well as failure)
Documentation is critical
#RSAC
Key Learnings: Measure everything
17
Measure & test,
monitor everything
How do you know what normal looks like?
Continually track configuration drift
Do a gap analysis
Perform internal and external testing
#RSAC
Key Learnings: Where’s my span port?
18
Welcome to the
cloud - “Where’s
my span port?”
Change your way of thinking
Expand your scope of responsibility
It is a shared journey for all
Use cross-functional teams
#RSAC
The New Paradigm of Shared Responsibility
19
AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Identity & Access
Control
Network
Security
Xero Applications & Content
Security IN the Cloud
Security OF the Cloud
Xero +
Partner
Ecosystem Inventory 

& Config
Data Encryption
#RSAC
Security as a Service
20
VPN
connectivity
Host Based
Security
Web
Application
Security and
Delivery
Shared Key
Management
Services
Secure
Bastion
Access
Proxy
Services
Security
Operations
and
Consulting
Services
#RSAC
Multi-Factor Authentication
21
The decision to utilize MFA was a core component of security design
User awareness was initially an issue
Some users refused to utilize the system
Multiple MFA systems already in place
Enable the MFA enhanced features
#RSAC
Configuration Drift Management
22
Finding the needle in an automated and freedom-to-deploy haystack
Used Netflix Security Monkey to track, monitor, and action key AWS
resource changes
Watchers configured across all AWS accounts
Started as an internal Cloud Security tool
Adoption was driven by the product teams
Risk and compliance utilization for best practice review
#RSAC
Host Security Automation
23
Next layer of defense at the host level
Used to monitor, notify, and action instance-level
configurations, vulnerabilities and integrity
Automated roll-out and integration with all hosts
Make use of the cloud
Adopt elasticity and automation
Accelerated pace of development
#RSAC
Apply What You Have Learned Today
24
• Activate multi-factor
authentication
• Enable CloudTrail
• Start your first
automation!
• Define your principles
• Develop a security
architecture
• Start to track your
configuration drift
• Measure, test &
monitor everything
• Build a culture of
communication
• Automate more!
WEEK
1
MONTH
3
MONTH
6
www.xero.com
@xero
Aaron McKeown
Lead Security Architect
Xero

More Related Content

PDF
Securing Your Cloud Transformation
PDF
Workshop on CASB Part 2
PDF
F5 Cloud Solutions
PDF
Take It to the Cloud: The Evolution of Security Architecture
PPTX
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
PPTX
What the auditor need to know about cloud computing
PPTX
Cloud security for financial services
PPTX
Transforming cloud security into an advantage
Securing Your Cloud Transformation
Workshop on CASB Part 2
F5 Cloud Solutions
Take It to the Cloud: The Evolution of Security Architecture
Why cloud native envs deserve better security - Dima Stopel, Twistlock - Clou...
What the auditor need to know about cloud computing
Cloud security for financial services
Transforming cloud security into an advantage

What's hot (18)

PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PPTX
5 Highest-Impact CASB Use Cases
PDF
F5 Programmability & Orchestration
PPTX
Surviving the lions den - how to sell SaaS services to security oriented cust...
PDF
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
PPTX
Architect secure cloud services.
PDF
Inteligentní ochrana osobních údajů v procesu digitální transformace
PPTX
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
PPTX
Business Continuity and app Security
PDF
ScaleFocus Security Conference Part 2
PPTX
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
PDF
SACON - Devops-container (Richard Bussiere)
PPTX
Adsg presentation en
PDF
SACON - Automating SecOps (Murray Goldschmidt)
DOCX
Cloud Access Security Broker (CASB)
PPTX
Comprehensive Information on CASB
PPTX
Secure your cloud applications by building solid foundations with enterprise ...
PDF
SACON - Cloud Security Architecture (Moshe Ferber)
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
5 Highest-Impact CASB Use Cases
F5 Programmability & Orchestration
Surviving the lions den - how to sell SaaS services to security oriented cust...
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB) - POC Report
Architect secure cloud services.
Inteligentní ochrana osobních údajů v procesu digitální transformace
McAfee - MVISION Cloud (MVC) - Cloud Access Security Broker (CASB)
Business Continuity and app Security
ScaleFocus Security Conference Part 2
Defcon23 from zero to secure in 1 minute - nir valtman and moshe ferber
SACON - Devops-container (Richard Bussiere)
Adsg presentation en
SACON - Automating SecOps (Murray Goldschmidt)
Cloud Access Security Broker (CASB)
Comprehensive Information on CASB
Secure your cloud applications by building solid foundations with enterprise ...
SACON - Cloud Security Architecture (Moshe Ferber)
Ad

Similar to Hardening the cloud : Assuring agile security in high-growth environments (20)

PDF
Building and Adopting a Cloud-Native Security Program
PDF
DevSecOps in Baby Steps
PDF
DevSecOps in Baby Steps
PPTX
Cloud Security Essentials 2.0 at RSA
PDF
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
PDF
Cloud security : Automate or die
PDF
RSA 2015 Realities of Private Cloud Security
PDF
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
PDF
Secure Cloud Development Resources with DevOps
PPTX
Cybersecurity model and top cloud security controls for product development e...
PDF
Practical appsec lessons learned in the age of agile and DevOps
PPTX
API Security: Assume Possible Interference
PDF
Introducing a Security Program to Large Scale Legacy Products
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
PDF
Cloud Breach – Preparation and Response
PDF
Cloud Breach – Preparation and Response
PDF
2024_USA24_CLS-W08_01_Breaking-the-Cloud-to-Rebuild-it-A-Tale-of-3-☁️-Breache...
PDF
Whose Cloud is It Anyway - Data Security in the Cloud
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PDF
How Security can be the Next Force Multiplier in DevOps
Building and Adopting a Cloud-Native Security Program
DevSecOps in Baby Steps
DevSecOps in Baby Steps
Cloud Security Essentials 2.0 at RSA
Humans and Data Don’t Mix: Best Practices to Secure Your Cloud
Cloud security : Automate or die
RSA 2015 Realities of Private Cloud Security
Adaptive & Unified Approach to Risk Management & Compliance-via-ccf
Secure Cloud Development Resources with DevOps
Cybersecurity model and top cloud security controls for product development e...
Practical appsec lessons learned in the age of agile and DevOps
API Security: Assume Possible Interference
Introducing a Security Program to Large Scale Legacy Products
Aspirin as a Service: Using the Cloud to Cure Security Headaches
Cloud Breach – Preparation and Response
Cloud Breach – Preparation and Response
2024_USA24_CLS-W08_01_Breaking-the-Cloud-to-Rebuild-it-A-Tale-of-3-☁️-Breache...
Whose Cloud is It Anyway - Data Security in the Cloud
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
How Security can be the Next Force Multiplier in DevOps
Ad

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPTX
Cloud computing and distributed systems.
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Approach and Philosophy of On baking technology
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PPT
Teaching material agriculture food technology
PDF
KodekX | Application Modernization Development
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Big Data Technologies - Introduction.pptx
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Cloud computing and distributed systems.
NewMind AI Monthly Chronicles - July 2025
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Approach and Philosophy of On baking technology
Per capita expenditure prediction using model stacking based on satellite ima...
NewMind AI Weekly Chronicles - August'25 Week I
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Teaching material agriculture food technology
KodekX | Application Modernization Development
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
Big Data Technologies - Introduction.pptx
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
Mobile App Security Testing_ A Comprehensive Guide.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Hardening the cloud : Assuring agile security in high-growth environments

  • 1. SESSION ID:SESSION ID: #RSAC Aaron McKeown Hardening the Cloud: Assuring Agile Security in High-Growth Environments (Moving from span ports to virtual appliances) CSV-F01 Lead Security Architect Xero
  • 3. Beautiful cloud-based accounting software Connecting people with the right numbers anytime, anywhere, on any device 3 1,450+ staff globally $474m raised in capital $202m sub revenue FY16 $1tr incoming and outgoing transactions in past 12 mths 450m incoming and outgoing transactions in past 12 mths All figures shown are in NZD
  • 4. 2009 2010 2011 2012 2013 2014 2015 2016 862,000+ Subscribers globally
  • 5. #RSAC Public Cloud Migration 5 Supporting the next wave of growth Reducing our cost to serve Improving data protection Eliminating scheduled downtime Maintaining and improving security
  • 6. #RSAC Key Challenges 6 Skills are scarce Regional representation and recommendations Application architecture has to change Automation is key Third-party commercial models need to change Need to focus on visibility
  • 7. #RSAC Challenge #1: Skills are scarce 7 Challenge #1: Skills are scarce Make an initial investment in education Join industry groups and forums Selective engagement of contractors Promotion of industry wide cyber skills
  • 8. #RSAC Challenge #2: Regional representation 8 Challenge #2: Regional representation and recommendations Build a strong relationship with AWS Reach out to your contacts Look at alternatives Build a communication path to remote organizations
  • 9. #RSAC Challenge #3: Application architecture changes 9 Challenge #3: Application architecture has to change Work in cross-functional teams Deliver in short, frequent cycles Communicate quickly and effectively Build and deliver “security as a service”
  • 10. #RSAC Challenge #4: Automation is key 10 Challenge #4: Automation is key Make automation a core principle Start with basic use of CloudFormation Use a code repository Build a Continuous Integration (CI) and Continuous Delivery (CD) system
  • 11. #RSAC Challenge #5: Focus on visibility 11 Challenge #5: Need to focus on visibility CloudTrail is enabled by default for all accounts Track configuration drift Get the development teams invested Extended into a virtual team
  • 12. #RSAC Challenge #6: Third-party commercial models 12 Challenge #6: Third-party commercial models need to change Do what we advise others to do, use the cloud Work with our technology partners and vendors Move from perpetual licenses, to core based licenses Address commercial and legal issues first
  • 13. #RSAC Key Principles 13 Repeatable, automated build and management of security systems Accelerated pace of security innovation On-demand security infrastructure that works at any scale
  • 14. #RSAC Key Learnings 14 Security by design- what’s that? Communication is key Welcome to the cloud - “Where’s my span port?” Measure & Test, monitor everything
  • 15. #RSAC Key Learnings: Security by design 15 Security by design- what’s that? Build security into every layer Treat your infrastructure as code Iterate, iterate, iterate Build security into the product lifecycle
  • 16. #RSAC Key Learnings: Communication is key 16 Communication is key Make everyone a spokesperson Evangelize and sell your service Communicate success (as well as failure) Documentation is critical
  • 17. #RSAC Key Learnings: Measure everything 17 Measure & test, monitor everything How do you know what normal looks like? Continually track configuration drift Do a gap analysis Perform internal and external testing
  • 18. #RSAC Key Learnings: Where’s my span port? 18 Welcome to the cloud - “Where’s my span port?” Change your way of thinking Expand your scope of responsibility It is a shared journey for all Use cross-functional teams
  • 19. #RSAC The New Paradigm of Shared Responsibility 19 AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Identity & Access Control Network Security Xero Applications & Content Security IN the Cloud Security OF the Cloud Xero + Partner Ecosystem Inventory 
 & Config Data Encryption
  • 20. #RSAC Security as a Service 20 VPN connectivity Host Based Security Web Application Security and Delivery Shared Key Management Services Secure Bastion Access Proxy Services Security Operations and Consulting Services
  • 21. #RSAC Multi-Factor Authentication 21 The decision to utilize MFA was a core component of security design User awareness was initially an issue Some users refused to utilize the system Multiple MFA systems already in place Enable the MFA enhanced features
  • 22. #RSAC Configuration Drift Management 22 Finding the needle in an automated and freedom-to-deploy haystack Used Netflix Security Monkey to track, monitor, and action key AWS resource changes Watchers configured across all AWS accounts Started as an internal Cloud Security tool Adoption was driven by the product teams Risk and compliance utilization for best practice review
  • 23. #RSAC Host Security Automation 23 Next layer of defense at the host level Used to monitor, notify, and action instance-level configurations, vulnerabilities and integrity Automated roll-out and integration with all hosts Make use of the cloud Adopt elasticity and automation Accelerated pace of development
  • 24. #RSAC Apply What You Have Learned Today 24 • Activate multi-factor authentication • Enable CloudTrail • Start your first automation! • Define your principles • Develop a security architecture • Start to track your configuration drift • Measure, test & monitor everything • Build a culture of communication • Automate more! WEEK 1 MONTH 3 MONTH 6