SlideShare a Scribd company logo
©2017 Lacework, Inc. Confidential and Proprietary.
1
Automating Cloud Security at Scale
©2018 Lacework, Inc. Confidential and Proprietary. 2
Lacework Polygraph
Threat Intelligence
and Reputation
Alerting
SIEM
SOC
InvestigationCompliance DetectionVisibility
Enforcement via APIs
Cloud
Infrastructure
Workloads Accounts
VMs ContainersFilesApps Insiders Config Logs
Use cases
Security Platform for the Cloud
©2018 Lacework, Inc. Confidential and Proprietary.
Get started by simply configuring your AWS
CloudTrail and AWS Config Accounts. Then
deploy our agent. We support all modern
deployment methods: Kubernetes, Docker,
Puppet/Chef, etc…
Capture Relevant Activity
Ingested data is used to build relationships
between key activities: CloudTrail data,
API user and account behavior, machines,
containers, applications, processes and
network behaviors.
Build Relationships
Security for your Public Cloud
Data Analysis at Scale
©2018 Lacework, Inc. Confidential and Proprietary.
Ingested data (not samples) runs through
detection algorithms to detect known
threats. Are you failing compliance? Do you
have high risk configuration changes? Have
you been breached? Is data being actively ex-
filtrated to known bad sites, are brute-force
password attacks occurring?
Identify Known Threats
Once a baseline of known behaviors for your
cloud is established, we detect outliers and
potential security threats automatically. Our
”Polygraph” then provides real-time insights
into unknown attacks.
Identify Unknown Risks & Threats
©2018 Lacework, Inc. Confidential and Proprietary.
Upon discovering known or unknown
attacks, alerts are created with context
and supporting evidence combined with
severity levels.
Deliver Alerts / Insights
Upon discovering known or unknown
attacks alerts are created with context
and supporting evidence combined with
severity levels.
Integrated Workflow
©2018 Lacework, Inc. Confidential and Proprietary.
Our core value proposition: auditing of your
public cloud configuration for compliance, threat
prevention, log correlation, and storage in a sub-
second query interface to all the data.
Compliance, Intrusion Prevention,
Container Security, & Analytics
©2018 Lacework, Inc. Confidential and Proprietary.
Example Customer Value (1 month)
©2018 Lacework, Inc. Confidential and Proprietary. 10
46B Events a Month Visualized
©2018 Lacework, Inc. Confidential and Proprietary. 11
Customer – Bitcoin Mining Attack
©2018 Lacework, Inc. Confidential and Proprietary. 12
Customer – Bitcoin Mining Attack
©2018 Lacework, Inc. Confidential and Proprietary.
www.lacework.com/free-trial

More Related Content

PDF
Lacework slides from AWS Meetups
PPTX
Lacework for AWS Security Overview
PPTX
Lacework Overview: Security Redefined for Cloud Scale
PPTX
Lacework Kubernetes Meetup | August 28, 2018
PDF
Security for AWS: Journey to Least Privilege
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PDF
Securing aws workloads with embedded application security
PPTX
Lacework | Top 10 Cloud Security Threats
Lacework slides from AWS Meetups
Lacework for AWS Security Overview
Lacework Overview: Security Redefined for Cloud Scale
Lacework Kubernetes Meetup | August 28, 2018
Security for AWS: Journey to Least Privilege
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Securing aws workloads with embedded application security
Lacework | Top 10 Cloud Security Threats

What's hot (19)

PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
#ALSummit: Architecting Security into your AWS Environment
PPTX
Alert Logic: Realities of Security in the Cloud
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PPTX
Defcon 27 - Phishing in the Cloud Era
PDF
The Intersection of Security & DevOps
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Phishing in the Cloud Era (BSides)
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PPTX
Securing Applications in the Cloud
PDF
Phishing in the cloud era
PDF
The New Economics of Cloud Security
PDF
MozDef Workshop slide
PPTX
Cloud Security Demo
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
#ALSummit: Live Cyber Hack Demonstration
#ALSummit: Realities of Security in the Cloud
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Architecting Security into your AWS Environment
Alert Logic: Realities of Security in the Cloud
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
Defcon 27 - Phishing in the Cloud Era
The Intersection of Security & DevOps
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Phishing in the Cloud Era (BSides)
5 Highest-Impact CASB Use Cases - Office 365
Securing Applications in the Cloud
Phishing in the cloud era
The New Economics of Cloud Security
MozDef Workshop slide
Cloud Security Demo
Extending Amazon GuardDuty with Cloud Insight Essentials
#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Live Cyber Hack Demonstration
Ad

Similar to Lacework AWS Security Week Presentation (20)

PPTX
Containers At-Risk: A Review of 21,000 Cloud Environments
PDF
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Kubernetes meetup k8s_aug_2019
PDF
Biznesa infrastruktūras un datu drošības juridiskie aspekti
PDF
Security for AWS : Journey to Least Privilege
PDF
Resetting Your Security Thinking for the Public Cloud
PDF
Preventing Cloud Data Breaches.pdf
PDF
CSA SV Threat detection and prediction
PDF
Top 10 Threats to Cloud Security
PPTX
9 Things You Need to Know Before Moving to the Cloud
PPTX
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
PPTX
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
PDF
NCC Group Pro-active Breach Discovery: Network Threat Assessment
PDF
How Secure Is Cloud
PPTX
Securing your Cloud Deployment
PPTX
IBM Relay 2015: Securing the Future
 
PPTX
Netskope — Shadow IT Is A Good Thing
PPTX
Practical Security for the Cloud
Containers At-Risk: A Review of 21,000 Cloud Environments
How to Kickstart Security and Compliance for Your AWS, Azure, and GCP Clouds
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Avoiding Limitations of Traditional Approaches to Security
Kubernetes meetup k8s_aug_2019
Biznesa infrastruktūras un datu drošības juridiskie aspekti
Security for AWS : Journey to Least Privilege
Resetting Your Security Thinking for the Public Cloud
Preventing Cloud Data Breaches.pdf
CSA SV Threat detection and prediction
Top 10 Threats to Cloud Security
9 Things You Need to Know Before Moving to the Cloud
Cloud Security in 2025_ Top Challenges, Daily Risks & Key Threats You Need to...
The Cloud 9 - Threat & Solutions 2016 by Bobby Dominguez
NCC Group Pro-active Breach Discovery: Network Threat Assessment
How Secure Is Cloud
Securing your Cloud Deployment
IBM Relay 2015: Securing the Future
 
Netskope — Shadow IT Is A Good Thing
Practical Security for the Cloud
Ad

More from Lacework (9)

PDF
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PDF
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
PDF
All Your Containers Are Belong To Us
PDF
Practical Guide to Securing Kubernetes
PDF
Lacework Protection for AWS S3 Buckets
PDF
Guidebook Case Study
PDF
Container Security Research
PDF
Containers At-Risk A Review of 21,000 Cloud Environments
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
All Your Containers Are Belong To Us
Practical Guide to Securing Kubernetes
Lacework Protection for AWS S3 Buckets
Guidebook Case Study
Container Security Research
Containers At-Risk A Review of 21,000 Cloud Environments

Recently uploaded (20)

PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPT
Teaching material agriculture food technology
PPTX
Spectroscopy.pptx food analysis technology
PDF
Empathic Computing: Creating Shared Understanding
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
Machine learning based COVID-19 study performance prediction
PDF
Electronic commerce courselecture one. Pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Spectral efficient network and resource selection model in 5G networks
Teaching material agriculture food technology
Spectroscopy.pptx food analysis technology
Empathic Computing: Creating Shared Understanding
Building Integrated photovoltaic BIPV_UPV.pdf
Unlocking AI with Model Context Protocol (MCP)
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
Machine learning based COVID-19 study performance prediction
Electronic commerce courselecture one. Pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Programs and apps: productivity, graphics, security and other tools
Mobile App Security Testing_ A Comprehensive Guide.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy

Lacework AWS Security Week Presentation

  • 1. ©2017 Lacework, Inc. Confidential and Proprietary. 1 Automating Cloud Security at Scale
  • 2. ©2018 Lacework, Inc. Confidential and Proprietary. 2 Lacework Polygraph Threat Intelligence and Reputation Alerting SIEM SOC InvestigationCompliance DetectionVisibility Enforcement via APIs Cloud Infrastructure Workloads Accounts VMs ContainersFilesApps Insiders Config Logs Use cases Security Platform for the Cloud
  • 3. ©2018 Lacework, Inc. Confidential and Proprietary. Get started by simply configuring your AWS CloudTrail and AWS Config Accounts. Then deploy our agent. We support all modern deployment methods: Kubernetes, Docker, Puppet/Chef, etc… Capture Relevant Activity Ingested data is used to build relationships between key activities: CloudTrail data, API user and account behavior, machines, containers, applications, processes and network behaviors. Build Relationships Security for your Public Cloud Data Analysis at Scale
  • 4. ©2018 Lacework, Inc. Confidential and Proprietary. Ingested data (not samples) runs through detection algorithms to detect known threats. Are you failing compliance? Do you have high risk configuration changes? Have you been breached? Is data being actively ex- filtrated to known bad sites, are brute-force password attacks occurring? Identify Known Threats Once a baseline of known behaviors for your cloud is established, we detect outliers and potential security threats automatically. Our ”Polygraph” then provides real-time insights into unknown attacks. Identify Unknown Risks & Threats
  • 5. ©2018 Lacework, Inc. Confidential and Proprietary. Upon discovering known or unknown attacks, alerts are created with context and supporting evidence combined with severity levels. Deliver Alerts / Insights Upon discovering known or unknown attacks alerts are created with context and supporting evidence combined with severity levels. Integrated Workflow
  • 6. ©2018 Lacework, Inc. Confidential and Proprietary. Our core value proposition: auditing of your public cloud configuration for compliance, threat prevention, log correlation, and storage in a sub- second query interface to all the data. Compliance, Intrusion Prevention, Container Security, & Analytics
  • 7. ©2018 Lacework, Inc. Confidential and Proprietary. Example Customer Value (1 month)
  • 8. ©2018 Lacework, Inc. Confidential and Proprietary. 10 46B Events a Month Visualized
  • 9. ©2018 Lacework, Inc. Confidential and Proprietary. 11 Customer – Bitcoin Mining Attack
  • 10. ©2018 Lacework, Inc. Confidential and Proprietary. 12 Customer – Bitcoin Mining Attack
  • 11. ©2018 Lacework, Inc. Confidential and Proprietary. www.lacework.com/free-trial

Editor's Notes

  • #3: Lacework becomes the brain of your cloud security – components. We have the ability to operate better than any other solutions because of the visibility we have in the cloud.
  • #4: The cloud operating model is fundamentally different – to show this I used a slide from Amazon illustrating the shared responsibility model