SlideShare a Scribd company logo
©2018 Lacework, Inc. Confidential and Proprietary.
Security Redefined
for Cloud Scale
Andrew Wesbecher
VP of Sales
andrew@lacework.com
1
Chris Pedigo
Sr Sales Engineer
chris@lacework.com
©2018 Lacework, Inc. Confidential and Proprietary.
Customers
2
©2018 Lacework, Inc. Confidential and Proprietary.
Data leaks
Publicly exposed S3 buckets
Highjacked resources
Compromised AWS Accounts
Highjacked compute capacity
Compromised hosts
Security Incidents on AWS
3
©2018 Lacework, Inc. Confidential and Proprietary.
(mis)Configurations AWS Accounts
• AWS accounts and users
• S3 buckets left open
• APIs left open
• AWS Accounts & regions
• IAM users & assumed roles
• AWS Security groups
• Applications & containers
• Machine connections
• User access & files
Workloads & Hosts
AWS Attack Surfaces
4
EC2
ECS
EKS
©2018 Lacework, Inc. Confidential and Proprietary.
What Lacework Does
5
Workload / Container
Security
AWS Account
Security
AWS Configuration
Auditing
 Continuous compliance
 Use of security best practices
 Automated alerts on violations
 Analysis of CloudTrail data
 Automated alerts on anomalies
 Point & click UI for investigation
 Automated 24x7 monitoring
 Host IDS for security & compliance
 File Integrity Monitoring (FIM)
 Point & click UI for investigation
 End-to-end visibility at all layers
©2018 Lacework, Inc. Confidential and Proprietary.
Continuous Compliance / Configuration Validation
6
©2018 Lacework, Inc. Confidential and Proprietary.
AWS Account Security: CloudTrail Event Analysis
7
©2018 Lacework, Inc. Confidential and Proprietary.
Application / Workload Security
8
©2018 Lacework, Inc. Confidential and Proprietary.
Security Monitoring at Cloud Scale
9
©2018 Lacework, Inc. Confidential and Proprietary.
End-to-End Protection
Applications Containers Machines
AWS Accounts File Integrity Networks Users
Configurations
10
©2018 Lacework, Inc. Confidential and Proprietary.
 Audit your AWS configuration
 Spot at-risk S3 buckets
 Stop illicit Bitcoin mining
 Track privilege escalations
 Detect brute-force attacks
Try Lacework for free!
www.lacework.com/free
10-min set-up
11
©2018 Lacework, Inc. Confidential and Proprietary.
Monitor all components and their activities
End-to-end behavior analysis – User to Network to Workloads to Data
12
acme/process
OBSERVATIONS
Application launch
Initiated connection
External IP calls
Information exchanged
Configurations
File changes
Threat intelligence
…
• Analyze behaviors
• Define rules of normal behavior
• Detect deviations
• Decide whether anomaly is a threat
Users
Apps
Processes
VMs / Containers
Accounts
Files
Machines
Scored
alerts
Compliance
violations
Visibility
graphical view
All data
to investigate
POLYGRAPH™
©2018 Lacework, Inc. Confidential and Proprietary.
Automated Security for AWS
13
End-to-end. Continuous. Integrated with AWS Services.
AWS Accounts
EC2/ECS/EKS
S3 buckets
Compliance Monitoring, Intrusion
Detection, Alerting
Incident Investigation
and resolution
 Analyze CloudTrail events
(Polygraph)
 Polygraph of Workloads
 Polygraphs of Workloads (S3
layer)
 CloudTrail event analysis
Value prop
Continuous validation of
AWS configuration for
security & compliance
[Security & compliance teams]
Easy to navigate UI to get to
incident root cause and get
insight needed to fix.
[DevOps & Security teams]
Automatic detection and
scoring of anomalies with
high quality alerts
[DevOps & Security teams]
 CIS benchmark
 S3 controls
 (HIPAA & PCI controls
coming soon)
 Lacework UI and Polygraphs
 Lacework UI and Polygraphs

More Related Content

PDF
Lacework slides from AWS Meetups
PPTX
Lacework for AWS Security Overview
PPTX
Lacework AWS Security Week Presentation
PPTX
Lacework Kubernetes Meetup | August 28, 2018
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PPTX
Lacework | Top 10 Cloud Security Threats
PDF
Securing aws workloads with embedded application security
PDF
Security for AWS: Journey to Least Privilege
Lacework slides from AWS Meetups
Lacework for AWS Security Overview
Lacework AWS Security Week Presentation
Lacework Kubernetes Meetup | August 28, 2018
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Lacework | Top 10 Cloud Security Threats
Securing aws workloads with embedded application security
Security for AWS: Journey to Least Privilege

What's hot (20)

PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PPTX
AWS Security Strategy
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Practical Guide to Securing Kubernetes
PPTX
5 Highest-Impact CASB Use Cases - Office 365
PPTX
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
PPTX
Are You Ready for a Cloud Pentest?
PDF
Phishing in the Cloud Era (BSides)
PDF
The AWS Shared Responsibility Model in Practice
PDF
Kubernetes meetup k8s_aug_2019
PPTX
Defcon 27 - Phishing in the Cloud Era
PDF
The Intersection of Security & DevOps
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PDF
Mining Malevolence: Cryptominers in the Cloud
PPTX
Securing Applications in the Cloud
PDF
Phishing in the cloud era
PDF
MozDef Workshop slide
PDF
RSA 2014: Skybox Security Risk Analytics Overview
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
#ALSummit: Alert Logic & AWS - AWS Security Services
AWS Security Strategy
#ALSummit: Realities of Security in the Cloud
#ALSummit: Architecting Security into your AWS Environment
Practical Guide to Securing Kubernetes
5 Highest-Impact CASB Use Cases - Office 365
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
Are You Ready for a Cloud Pentest?
Phishing in the Cloud Era (BSides)
The AWS Shared Responsibility Model in Practice
Kubernetes meetup k8s_aug_2019
Defcon 27 - Phishing in the Cloud Era
The Intersection of Security & DevOps
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Mining Malevolence: Cryptominers in the Cloud
Securing Applications in the Cloud
Phishing in the cloud era
MozDef Workshop slide
RSA 2014: Skybox Security Risk Analytics Overview
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Ad

Similar to Lacework Overview: Security Redefined for Cloud Scale (6)

PDF
The AWS Shared Responsibility Model in Practice
PDF
AWS - Security & Compliance
PPTX
PaaS or Fail: Rule the Cloud with Altus
PPTX
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
PPTX
Containers At-Risk: A Review of 21,000 Cloud Environments
PPTX
PaaS or Fail: Rule the Cloud with Altus
The AWS Shared Responsibility Model in Practice
AWS - Security & Compliance
PaaS or Fail: Rule the Cloud with Altus
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
Containers At-Risk: A Review of 21,000 Cloud Environments
PaaS or Fail: Rule the Cloud with Altus
Ad

More from Lacework (8)

PDF
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PDF
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
PDF
All Your Containers Are Belong To Us
PDF
Lacework Protection for AWS S3 Buckets
PDF
Guidebook Case Study
PDF
Container Security Research
PDF
Containers At-Risk A Review of 21,000 Cloud Environments
BSides Denver 2019 - Cloud Wars Episode V: The Cryptojacker Strikes Back
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
Batten Down the Hatches: A Practical Guide to Securing Kubernetes - RMISC 2019
All Your Containers Are Belong To Us
Lacework Protection for AWS S3 Buckets
Guidebook Case Study
Container Security Research
Containers At-Risk A Review of 21,000 Cloud Environments

Recently uploaded (20)

PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Encapsulation_ Review paper, used for researhc scholars
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Modernizing your data center with Dell and AMD
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Electronic commerce courselecture one. Pdf
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Empathic Computing: Creating Shared Understanding
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
KodekX | Application Modernization Development
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPT
Teaching material agriculture food technology
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Per capita expenditure prediction using model stacking based on satellite ima...
Encapsulation_ Review paper, used for researhc scholars
MYSQL Presentation for SQL database connectivity
Review of recent advances in non-invasive hemoglobin estimation
Modernizing your data center with Dell and AMD
“AI and Expert System Decision Support & Business Intelligence Systems”
Electronic commerce courselecture one. Pdf
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Empathic Computing: Creating Shared Understanding
Spectral efficient network and resource selection model in 5G networks
CIFDAQ's Market Insight: SEC Turns Pro Crypto
KodekX | Application Modernization Development
Diabetes mellitus diagnosis method based random forest with bat algorithm
Teaching material agriculture food technology
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
A Presentation on Artificial Intelligence
Mobile App Security Testing_ A Comprehensive Guide.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx

Lacework Overview: Security Redefined for Cloud Scale

  • 1. ©2018 Lacework, Inc. Confidential and Proprietary. Security Redefined for Cloud Scale Andrew Wesbecher VP of Sales andrew@lacework.com 1 Chris Pedigo Sr Sales Engineer chris@lacework.com
  • 2. ©2018 Lacework, Inc. Confidential and Proprietary. Customers 2
  • 3. ©2018 Lacework, Inc. Confidential and Proprietary. Data leaks Publicly exposed S3 buckets Highjacked resources Compromised AWS Accounts Highjacked compute capacity Compromised hosts Security Incidents on AWS 3
  • 4. ©2018 Lacework, Inc. Confidential and Proprietary. (mis)Configurations AWS Accounts • AWS accounts and users • S3 buckets left open • APIs left open • AWS Accounts & regions • IAM users & assumed roles • AWS Security groups • Applications & containers • Machine connections • User access & files Workloads & Hosts AWS Attack Surfaces 4 EC2 ECS EKS
  • 5. ©2018 Lacework, Inc. Confidential and Proprietary. What Lacework Does 5 Workload / Container Security AWS Account Security AWS Configuration Auditing  Continuous compliance  Use of security best practices  Automated alerts on violations  Analysis of CloudTrail data  Automated alerts on anomalies  Point & click UI for investigation  Automated 24x7 monitoring  Host IDS for security & compliance  File Integrity Monitoring (FIM)  Point & click UI for investigation  End-to-end visibility at all layers
  • 6. ©2018 Lacework, Inc. Confidential and Proprietary. Continuous Compliance / Configuration Validation 6
  • 7. ©2018 Lacework, Inc. Confidential and Proprietary. AWS Account Security: CloudTrail Event Analysis 7
  • 8. ©2018 Lacework, Inc. Confidential and Proprietary. Application / Workload Security 8
  • 9. ©2018 Lacework, Inc. Confidential and Proprietary. Security Monitoring at Cloud Scale 9
  • 10. ©2018 Lacework, Inc. Confidential and Proprietary. End-to-End Protection Applications Containers Machines AWS Accounts File Integrity Networks Users Configurations 10
  • 11. ©2018 Lacework, Inc. Confidential and Proprietary.  Audit your AWS configuration  Spot at-risk S3 buckets  Stop illicit Bitcoin mining  Track privilege escalations  Detect brute-force attacks Try Lacework for free! www.lacework.com/free 10-min set-up 11
  • 12. ©2018 Lacework, Inc. Confidential and Proprietary. Monitor all components and their activities End-to-end behavior analysis – User to Network to Workloads to Data 12 acme/process OBSERVATIONS Application launch Initiated connection External IP calls Information exchanged Configurations File changes Threat intelligence … • Analyze behaviors • Define rules of normal behavior • Detect deviations • Decide whether anomaly is a threat Users Apps Processes VMs / Containers Accounts Files Machines Scored alerts Compliance violations Visibility graphical view All data to investigate POLYGRAPH™
  • 13. ©2018 Lacework, Inc. Confidential and Proprietary. Automated Security for AWS 13 End-to-end. Continuous. Integrated with AWS Services. AWS Accounts EC2/ECS/EKS S3 buckets Compliance Monitoring, Intrusion Detection, Alerting Incident Investigation and resolution  Analyze CloudTrail events (Polygraph)  Polygraph of Workloads  Polygraphs of Workloads (S3 layer)  CloudTrail event analysis Value prop Continuous validation of AWS configuration for security & compliance [Security & compliance teams] Easy to navigate UI to get to incident root cause and get insight needed to fix. [DevOps & Security teams] Automatic detection and scoring of anomalies with high quality alerts [DevOps & Security teams]  CIS benchmark  S3 controls  (HIPAA & PCI controls coming soon)  Lacework UI and Polygraphs  Lacework UI and Polygraphs