SlideShare a Scribd company logo
Managed Threat Detection and Response
Alert Logic Security-as-a-Service
We deliver our own
security software +
services
in hybrid
environments
Hosted
Data Center
with an integrated
multi-layer solution
to protect enterprise apps
& cloud workloads
Web application attacks
• SQL injection
• Cross-site scripting
• Other OWASP Top 10
Server & network activity
• Brute force
• Privilege escalation
• Command and control
Vulnerabilities across stack
• Frameworks, CMSs
• Middleware & OS’s
• IaaS configurations
ASSESS
BLOCK
DETECT
COMPLYSecurity experts
included
SaaS
security services
AWS
Other
Clouds
SECURING YOUR AWS
ENVIRONMENT
STORAGE DB NETWORKCOMPUTE
Logical network segmentation
Perimeter security services
External DDoS, spoofing, and scanning prevented
Hardened hypervisor
System image library
Root access for customer
Secure coding and best practices
Software and virtual patching
Configuration management
Access management
Application-level attack monitoring
Understand the Shared Responsibility Model
Access management
Patch management
Configuration hardening
Security monitoring
Log analysis
Network threat detection
Security monitoring
Configuration best practices
CUSTOMER RESPONSIBILITY
APPS
CLOUD PROVIDER RESPONSIBILITY
FOUNDATION
SERVICES
HOSTS
NETWORKS
Remember There Are Multiple Models…
Remember There Are Multiple Models…
Guideline to Risk Modeling
Rank the Importance of Your Applications
• Is it customer facing?
• Does it have access to sensitive or controlled data?
• How is the data segregated?
Prioritize Remediations
• Maintaining inventory of what's running and their use case
• Enforcing a well-defined tagging strategy
Where To Focus Limited Resources
Best Practices to Securing Your AWS Account
• Lock down the root account
• Follow least privilege for IAM Users and Roles
• Ensure S3 ACLs and Bucket Policies are properly configured.
• Enable a strong password policy and MFA requirement for IAM users.
• Enable CloudTrail and AWS Config
• Leverage encryption for services that have KMS integration
• Not a one time activity – Continuously monitor for changes.
60 Most Common AWS Configuration Remediations
Unencrypted AMI Discovered
Unencrypted EBS Volume
S3 Logging not Enabled
Unrestricted Outbound Access on All Ports
User not configured to use MFA
User Access Key not configured with Rotation
IAM Policies are attached directly to User
Dangerous User Privileged Access to S3
Dangerous IAM Role for S3
Dangerous User Privileged Access to RDS
Disable Automatic Access Key Creation
Dangerous User Privileged Access to DDB
Dangerous User Privileged Access to IAM
IAM Access Keys Unused for 90 Days
ELB Listener Security (2 of 4)
ELB Listener Security (1 of 4)
Dangerous IAM Role for RDS
RDS Encryption is not Enabled
Dangerous IAM Role for DDB
Unrestricted Inbound Access - Specific Ports 2
Dangerous IAM Role for IAM
Unrestricted Inbound Access to SSH Port 22/tcp
Unrestricted Inbound Access to HTTP Port 80/tcp
Amazon S3 Bucket Permissions (2 of 2)
Inactive user account
Ensure AWS CloudTrail is Enabled in All Regions
ELB Listener Security (4 of 4)
Unrestricted Inbound Access
Publicly Accessible RDS Database Instance
Passwords not set to enforce complexity
ACL permissions enabled for Authenticated Users in an S3 Bucket
CloudTrail Logging Disabled
Passwords not configured to expire
Ensure Hardware Multi-Factor Authentication is Enabled for the Root Account
Unrestricted Inbound Access to Windows RDP Port 3389/tcp
Enable Amazon GuardDuty on AWS Account
Unrestricted Inbound Access to PostgreSQL Port 5432/tcp
Global View ACL permissions enabled in an S3 Bucket
Unrestricted Inbound Access to mySQL Port 3306/tcp
Unrestricted Inbound Access to NetBIOS over TCP/IP 137/udp/tcp, 138/udp or
139/udp/tcp
Unrestricted Inbound Access to SMTP Port 25/tcp
Root account not using MFA
Unrestricted Inbound Access to FTP Port 21/tcp
Unrestricted Inbound Access to DNS Port 53/tcp
Unrestricted Inbound Access to SQLServer Port 1433,1434/tcp
Unrestricted Inbound Access to FTP Port 20/tcp
Unrestricted Inbound Access to VNC Port 5500,5900/tcp
Unrestricted Inbound Access to MSQL Port 4333/tcp
Unrestricted Inbound Access to SMTP over TLS/SSL Port 465/tcp
Unrestricted Inbound Access to ElasticSearch Port 9300/tcp
Unrestricted Inbound Access to CIFS/SMB over TCP 445/tcp
Root Account Used Recently
Unrestricted Inbound Access to Windows RPC Port 135/tcp
Publicly Accessible AMI Discovered
Unrestricted Inbound Access to Telnet Port 23/tcp
Unencrypted Redshift Cluster
Unrestricted Inbound Access to DNS Port 53/udp
Publicly Accessible Redshift Cluster Nodes
Dangerous use of Root Access Keys
Unrestricted Inbound Access to CIFS/SMB over TCP 445/udp
Monitor Activity and Identify Insecure Configurations
Inventory the services and regions you are using.
• What regions do you have VPCs in.
• Which resources are accessible from the Internet.
• Leverage AWS CloudTrail to identify new VPCs or service usage.
• Define a consistent Tagging and Naming strategy for resources
Ensure the AWS Services you’re using remain
securely configured.
• Disable non-secure ciphers on Elastic Load Balancing.
• Remove Amazon S3 bucket permissions that allow global write
or read.
• Identify security groups or network ACLs that allow unrestricted
access to sensitive ports.
Monitor Activity and Identify Insecure Configurations (cont.)
Identify and remediate vulnerabilities in AMIs
• Patch your AMIs not your instances.
• Maintain a list of trusted AMIs, restrict users from launching
non-trusted images.
• Scan instances frequently to identify new vulnerabilities.
Scanning tools must be cloud aware
• Don’t assume your instances will be running during scan windows.
• Replace rather than patch ephemeral instances
• Watch for inherited vulnerabilities from 3rd party plugins or open
source packages
Understand Your Compliance Responsibilities
• If you have compliance requirements leverage the AWS Artifact service
to understand what controls you are responsible for implementing.
• Ensure that the AWS services you are leveraging are in-scope.
Alert Logic
Solution
PCI DSS SOX HIPAA & HITECH
Alert Logic
Web Security
Manager™
• 6.5.d Have processes in place to protect applications
from common vulnerabilities such as injection flaws,
buffer overflows and others
• 6.6 Address new threats and vulnerabilities on an
ongoing basis by installing a web application firewall in
front of public-facing web applications.
• DS 5.10 Network Security
• AI 3.2 Infrastructure resource
protection and availability
• 164.308(a)(1) Security
Management Process
• 164.308(a)(6) Security Incident
Procedures
Alert Logic
Log
Manager™
• 10.2 Automated audit trails
• 10.3 Capture audit trails
• 10.5 Secure logs
• 10.6 Review logs at least daily
• 10.7 Maintain logs online for three months
• 10.7 Retain audit trail for at least one year
• DS 5.5 Security Testing,
Surveillance and
Monitoring
• 164.308 (a)(1)(ii)(D) Information
System Activity Review
• 164.308 (a)(6)(i) Login Monitoring
• 164.312 (b) Audit Controls
Alert Logic
Threat
Manager™
• 5.1.1 Monitor zero day attacks not covered by anti-virus
• 6.2 Identify newly discovered security vulnerabilities
• 11.2 Perform network vulnerability scans quarterly by an
ASV or after any significant network change
• 11.4 Maintain IDS/IPS to monitor and alert personnel;
keep engines up to date
• DS5.9 Malicious Software
Prevention, Detection and
Correction
• DS 5.6 Security Incident
Definition
• DS 5.10 Network Security
• 164.308 (a)(1)(ii)(A) Risk Analysis
• 164.308 (a)(1)(ii)(B) Risk
Management
• 164.308 (a)(5)(ii)(B) Protection
from Malicious Software
• 164.308 (a)(6)(iii) Response &
Reporting
Alert Logic Security Operations Center providing Monitoring, Protection, and Reporting
Create, test, tune
signatures & rules
Research
vulnerabilities,
exploits, payloads
Verify attacks
& criticality
Feed findings
to analytics
team
Correlate, model
attack progression
Develop & tune
detection analytics
Assemble incident
report & notify
Assess scope
& impact
Create machine
learning models
Integrate
intelligence on
emerging threats
Analytics
Verified incident report
• Explanation of threat
• Evidence for criticality
• Related events, incidents,
affected resource IDs
• Remediation advice
Live help within
15 minutes of
high-priority threat
Analyze for incidents
• Signatures & rules
• Anomaly detection
• Machine learning
Build detection
content for new
threats
Monitor
and investigate
24x365
Escalate
with live notifications
and advice
Data from 4K+
customers
Incident Response Requires Tools and People
Q&A – Additional Resources
Ryan Holland
Senior Director, Technology Services Group
Alert Logic
Speaker
Alert Logic ActiveWatch
Stay ahead of cyber threats without adding staff. Gain managed
detection and response services through Alert Logic ActiveWatch
Gartner's 2018 IDPS Magic Quadrant Places Alert Logic as Challenger
Learn who the innovators and disruptors are in intrusion detection and
response
Thank you.

More Related Content

PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
CSS 17: NYC - Building Secure Solutions in AWS
PDF
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
PPTX
Shared Security Responsibility for the Azure Cloud
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection & Response for AWS Applications
CSS 17: NYC - Building Secure Solutions in AWS
Css sf azure_8-9-17-microsoft_azure_security_overview_babak suzani_msft
Shared Security Responsibility for the Azure Cloud
CSS 17: NYC - Protecting your Web Applications
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al

What's hot (20)

PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PDF
CSS17: Houston - Azure Shared Security Model Overview
PDF
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
PDF
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
PPTX
#ALSummit: Architecting Security into your AWS Environment
PPTX
#ALSummit: Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PDF
Protecting Against Web Attacks
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PDF
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
The AWS Shared Responsibility Model in Practice
PDF
Protecting Against Web App Attacks
PDF
Reality Check: Security in the Cloud
PDF
CSS17: Houston - Protecting Web Apps
CSS 17: NYC - Realities of Security in the Cloud
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
CSS17: Houston - Azure Shared Security Model Overview
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Realities of Security in the Cloud
The Intersection of Security & DevOps
#ALSummit: Alert Logic & AWS - AWS Security Services
Protecting Against Web Attacks
#ALSummit: Cyber Resiliency: Surviving the Breach
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
CSS 17: NYC - Stories from the SOC
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
The AWS Shared Responsibility Model in Practice
Protecting Against Web App Attacks
Reality Check: Security in the Cloud
CSS17: Houston - Protecting Web Apps
Ad

Similar to Managed Threat Detection and Response (20)

PDF
Beginners guide to aws security monitoring
PPTX
AWS Security and SecOps
PDF
Securing Your Customers Data From Day One
PDF
Simple Security for Startups
PDF
Simple Security for Startups
PDF
Reducing Your Attack Surface
PPTX
Hack proof your aws cloud cloudcheckr_040416
PDF
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
PPTX
AWS Spotlight Series - Modernization and Security with AWS
PPTX
Cloudifying your Security Operations on AWS
PPTX
Deep dive - AWS security by design
PPTX
Security on AWS
PDF
AWS Security Best Practices
PDF
AWS Chicago user group meetup on June 24, 2014
PPTX
5 minutes on security
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PPTX
Automating your AWS Security Operations
PPTX
Pitt Immersion Day Module 5 - security overview
PDF
Serverless Security Automation on AWS - Hamburg AWS User Group
Beginners guide to aws security monitoring
AWS Security and SecOps
Securing Your Customers Data From Day One
Simple Security for Startups
Simple Security for Startups
Reducing Your Attack Surface
Hack proof your aws cloud cloudcheckr_040416
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS Spotlight Series - Modernization and Security with AWS
Cloudifying your Security Operations on AWS
Deep dive - AWS security by design
Security on AWS
AWS Security Best Practices
AWS Chicago user group meetup on June 24, 2014
5 minutes on security
Hackproof Your Cloud: Responding to 2016 Threats
Automating your AWS Security Operations
Pitt Immersion Day Module 5 - security overview
Serverless Security Automation on AWS - Hamburg AWS User Group
Ad

More from Alert Logic (20)

PDF
Security Implications of the Cloud
PDF
The Intersection of Security & DevOps
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
Security Spotlight: Rent-A-Center
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Realities of Security in the Cloud
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security and DevOps
PDF
Security Spotlight: The Coca Cola Company
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Implications of the Cloud
PDF
Security Implications of the Cloud - CSS Dallas Azure
Security Implications of the Cloud
The Intersection of Security & DevOps
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
Security Spotlight: Rent-A-Center
Realities of Security in the Cloud
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Realities of Security in the Cloud
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
The Intersection of Security and DevOps
Security Spotlight: The Coca Cola Company
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
The AWS Shared Responsibility Model in Practice
Security Implications of the Cloud
Security Implications of the Cloud - CSS Dallas Azure

Recently uploaded (20)

PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Electronic commerce courselecture one. Pdf
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Advanced Soft Computing BINUS July 2025.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Modernizing your data center with Dell and AMD
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Mobile App Security Testing_ A Comprehensive Guide.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Unlocking AI with Model Context Protocol (MCP)
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Electronic commerce courselecture one. Pdf
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Advanced Soft Computing BINUS July 2025.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
MYSQL Presentation for SQL database connectivity
Modernizing your data center with Dell and AMD
Diabetes mellitus diagnosis method based random forest with bat algorithm
Understanding_Digital_Forensics_Presentation.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025

Managed Threat Detection and Response

  • 2. Alert Logic Security-as-a-Service We deliver our own security software + services in hybrid environments Hosted Data Center with an integrated multi-layer solution to protect enterprise apps & cloud workloads Web application attacks • SQL injection • Cross-site scripting • Other OWASP Top 10 Server & network activity • Brute force • Privilege escalation • Command and control Vulnerabilities across stack • Frameworks, CMSs • Middleware & OS’s • IaaS configurations ASSESS BLOCK DETECT COMPLYSecurity experts included SaaS security services AWS Other Clouds
  • 4. STORAGE DB NETWORKCOMPUTE Logical network segmentation Perimeter security services External DDoS, spoofing, and scanning prevented Hardened hypervisor System image library Root access for customer Secure coding and best practices Software and virtual patching Configuration management Access management Application-level attack monitoring Understand the Shared Responsibility Model Access management Patch management Configuration hardening Security monitoring Log analysis Network threat detection Security monitoring Configuration best practices CUSTOMER RESPONSIBILITY APPS CLOUD PROVIDER RESPONSIBILITY FOUNDATION SERVICES HOSTS NETWORKS
  • 5. Remember There Are Multiple Models…
  • 6. Remember There Are Multiple Models…
  • 7. Guideline to Risk Modeling Rank the Importance of Your Applications • Is it customer facing? • Does it have access to sensitive or controlled data? • How is the data segregated? Prioritize Remediations • Maintaining inventory of what's running and their use case • Enforcing a well-defined tagging strategy Where To Focus Limited Resources
  • 8. Best Practices to Securing Your AWS Account • Lock down the root account • Follow least privilege for IAM Users and Roles • Ensure S3 ACLs and Bucket Policies are properly configured. • Enable a strong password policy and MFA requirement for IAM users. • Enable CloudTrail and AWS Config • Leverage encryption for services that have KMS integration • Not a one time activity – Continuously monitor for changes.
  • 9. 60 Most Common AWS Configuration Remediations Unencrypted AMI Discovered Unencrypted EBS Volume S3 Logging not Enabled Unrestricted Outbound Access on All Ports User not configured to use MFA User Access Key not configured with Rotation IAM Policies are attached directly to User Dangerous User Privileged Access to S3 Dangerous IAM Role for S3 Dangerous User Privileged Access to RDS Disable Automatic Access Key Creation Dangerous User Privileged Access to DDB Dangerous User Privileged Access to IAM IAM Access Keys Unused for 90 Days ELB Listener Security (2 of 4) ELB Listener Security (1 of 4) Dangerous IAM Role for RDS RDS Encryption is not Enabled Dangerous IAM Role for DDB Unrestricted Inbound Access - Specific Ports 2 Dangerous IAM Role for IAM Unrestricted Inbound Access to SSH Port 22/tcp Unrestricted Inbound Access to HTTP Port 80/tcp Amazon S3 Bucket Permissions (2 of 2) Inactive user account Ensure AWS CloudTrail is Enabled in All Regions ELB Listener Security (4 of 4) Unrestricted Inbound Access Publicly Accessible RDS Database Instance Passwords not set to enforce complexity ACL permissions enabled for Authenticated Users in an S3 Bucket CloudTrail Logging Disabled Passwords not configured to expire Ensure Hardware Multi-Factor Authentication is Enabled for the Root Account Unrestricted Inbound Access to Windows RDP Port 3389/tcp Enable Amazon GuardDuty on AWS Account Unrestricted Inbound Access to PostgreSQL Port 5432/tcp Global View ACL permissions enabled in an S3 Bucket Unrestricted Inbound Access to mySQL Port 3306/tcp Unrestricted Inbound Access to NetBIOS over TCP/IP 137/udp/tcp, 138/udp or 139/udp/tcp Unrestricted Inbound Access to SMTP Port 25/tcp Root account not using MFA Unrestricted Inbound Access to FTP Port 21/tcp Unrestricted Inbound Access to DNS Port 53/tcp Unrestricted Inbound Access to SQLServer Port 1433,1434/tcp Unrestricted Inbound Access to FTP Port 20/tcp Unrestricted Inbound Access to VNC Port 5500,5900/tcp Unrestricted Inbound Access to MSQL Port 4333/tcp Unrestricted Inbound Access to SMTP over TLS/SSL Port 465/tcp Unrestricted Inbound Access to ElasticSearch Port 9300/tcp Unrestricted Inbound Access to CIFS/SMB over TCP 445/tcp Root Account Used Recently Unrestricted Inbound Access to Windows RPC Port 135/tcp Publicly Accessible AMI Discovered Unrestricted Inbound Access to Telnet Port 23/tcp Unencrypted Redshift Cluster Unrestricted Inbound Access to DNS Port 53/udp Publicly Accessible Redshift Cluster Nodes Dangerous use of Root Access Keys Unrestricted Inbound Access to CIFS/SMB over TCP 445/udp
  • 10. Monitor Activity and Identify Insecure Configurations Inventory the services and regions you are using. • What regions do you have VPCs in. • Which resources are accessible from the Internet. • Leverage AWS CloudTrail to identify new VPCs or service usage. • Define a consistent Tagging and Naming strategy for resources Ensure the AWS Services you’re using remain securely configured. • Disable non-secure ciphers on Elastic Load Balancing. • Remove Amazon S3 bucket permissions that allow global write or read. • Identify security groups or network ACLs that allow unrestricted access to sensitive ports.
  • 11. Monitor Activity and Identify Insecure Configurations (cont.) Identify and remediate vulnerabilities in AMIs • Patch your AMIs not your instances. • Maintain a list of trusted AMIs, restrict users from launching non-trusted images. • Scan instances frequently to identify new vulnerabilities. Scanning tools must be cloud aware • Don’t assume your instances will be running during scan windows. • Replace rather than patch ephemeral instances • Watch for inherited vulnerabilities from 3rd party plugins or open source packages
  • 12. Understand Your Compliance Responsibilities • If you have compliance requirements leverage the AWS Artifact service to understand what controls you are responsible for implementing. • Ensure that the AWS services you are leveraging are in-scope. Alert Logic Solution PCI DSS SOX HIPAA & HITECH Alert Logic Web Security Manager™ • 6.5.d Have processes in place to protect applications from common vulnerabilities such as injection flaws, buffer overflows and others • 6.6 Address new threats and vulnerabilities on an ongoing basis by installing a web application firewall in front of public-facing web applications. • DS 5.10 Network Security • AI 3.2 Infrastructure resource protection and availability • 164.308(a)(1) Security Management Process • 164.308(a)(6) Security Incident Procedures Alert Logic Log Manager™ • 10.2 Automated audit trails • 10.3 Capture audit trails • 10.5 Secure logs • 10.6 Review logs at least daily • 10.7 Maintain logs online for three months • 10.7 Retain audit trail for at least one year • DS 5.5 Security Testing, Surveillance and Monitoring • 164.308 (a)(1)(ii)(D) Information System Activity Review • 164.308 (a)(6)(i) Login Monitoring • 164.312 (b) Audit Controls Alert Logic Threat Manager™ • 5.1.1 Monitor zero day attacks not covered by anti-virus • 6.2 Identify newly discovered security vulnerabilities • 11.2 Perform network vulnerability scans quarterly by an ASV or after any significant network change • 11.4 Maintain IDS/IPS to monitor and alert personnel; keep engines up to date • DS5.9 Malicious Software Prevention, Detection and Correction • DS 5.6 Security Incident Definition • DS 5.10 Network Security • 164.308 (a)(1)(ii)(A) Risk Analysis • 164.308 (a)(1)(ii)(B) Risk Management • 164.308 (a)(5)(ii)(B) Protection from Malicious Software • 164.308 (a)(6)(iii) Response & Reporting Alert Logic Security Operations Center providing Monitoring, Protection, and Reporting
  • 13. Create, test, tune signatures & rules Research vulnerabilities, exploits, payloads Verify attacks & criticality Feed findings to analytics team Correlate, model attack progression Develop & tune detection analytics Assemble incident report & notify Assess scope & impact Create machine learning models Integrate intelligence on emerging threats Analytics Verified incident report • Explanation of threat • Evidence for criticality • Related events, incidents, affected resource IDs • Remediation advice Live help within 15 minutes of high-priority threat Analyze for incidents • Signatures & rules • Anomaly detection • Machine learning Build detection content for new threats Monitor and investigate 24x365 Escalate with live notifications and advice Data from 4K+ customers Incident Response Requires Tools and People
  • 14. Q&A – Additional Resources Ryan Holland Senior Director, Technology Services Group Alert Logic Speaker Alert Logic ActiveWatch Stay ahead of cyber threats without adding staff. Gain managed detection and response services through Alert Logic ActiveWatch Gartner's 2018 IDPS Magic Quadrant Places Alert Logic as Challenger Learn who the innovators and disruptors are in intrusion detection and response