SlideShare a Scribd company logo
REALITY CHECK:
SECURITY IN THE CLOUD
Chris Camaclang, Sales Engineer – Alert Logic
The Cloud Is Secure
AWS has all the tools you need to secure your cloud!
• AWS WAF
• CloudFront
• Security Groups
• AWS Artifact
• Certificate Manager
• AWS Cloud HSM
• Amazon Cognito
• AWS Firewall Manager
• Macie
• GuardDuty
• AWS IAM
• Inspector
• AWS Config
• AWS KMS
• Amazon Macie
• AWS Shield
• AWS Secrets Manager
• AWS SSO
Sometimes…you might wonder what could go wrong?
• Through 2022, at least 95% of cloud security failures will be the customer’s
fault – Gartner
• More than 1.5 billion sensitive corporate and other files are visible on the
public internet due to human error – Digital Shadows
• 88% of Java applications had at least one component-based vulnerability,
56% of all PHP apps had at least one SQLi vulnerability - Veracode
Cloud Has Disrupted Traditional Security
Agility & Automation Hyper-scalability
The Cloud Attack Service
Cloud Landscape
The Cloud Attack Surface /s
443
Web App Attacks – King of the Hill
WEB APP
ATTACK
DoS / DDoS
1% Other
1%
75%
DOS/DDOS
1% OTHER
1%
SERVER-SIDE
MALWARE
2%
RECON
5%
BRUTE
FORCE
5%
SQL INJECTION
55% REMOTE
CODE
EXECUTION
22%
XXE
3%
APACHE
STRUTS
RCE
6%
WEB APP
ATTACK
RECON
5%
FILE
UPLOAD
6%
OTHER
4%
SECURITY INCIDENT TYPES ESCALATED
With great power, comes those that seek to abuse it.
Check your sources…
Attacks are cloud scale
just like your application.
Check your surroundings…
Your adversary is
leveraging ML and AI
against you.
Multi-stage Web Application Attacks Appear As Noise
Enter Machine Learning
Over nine months :
8-10% of the customers we
monitored were targeted by
actors with better-than-
average levels of skill and
determination
Each attack
had a High
degree of
complexity
Identified,
approx. 231
attacks
Multi-stage Attacks
Time: Day 1
Event: Early stage recon event
Criticality: Medium
Time: Day 3
Event: SQL Injection recon
Criticality: Medium
Time: Day 4
Event: SQL table enumeration
Criticality: High
Time: Day 4
Event: Injection
Criticality: Critica
Situation: Multiple address spaces and disparate unrelated events over days
Behind the Data
Web apps and misconfigurations can be the final destination…or initial entry
point
Perimeter AND Network AND
System /log-based Detection
defend your hosts
see N / S / E / W in all of your
protected environments
WAF blocking/virtual patching,
IDS, and log monitoring as air
cover as you burn down your
web app vulnerabilities
• Redistribute malware directly / indirectly
(exploit kits / watering hole)
• Monetization through fraud (SEO, Coin Mining,
Spam)
• Entry point into Infrastructure
• Lateral movement, privilege escalation
• Steal data (exfiltration of information from
databases)
Leverage Multiple Detection Techniques
Best Practices
Know your Shared
Security Responsibilities
with AWS
Attack surface
isn’t just where
your data resides
Continually assess for
exposures across all
environments
Understand impacts
from applicable
compliance mandates
Implement controls
built for cloud…and
work on-premises
A Few Parting Thoughts
• 24-hour monitoring
• Validation & enrichment
• Remediation advice
ANALYTICS
• Signatures & rules
• Anomaly detection
• Machine learning
LIVE EXPERTS
ActiveWatch™ Managed Threat Detection
DETECT
DATA COLLECTION & INSPECTION
•Web (HTTP) requests & responses
•System logs
•Network packets
BLOCK
In-Line Web
Application
Firewall (WAF)
COMPLY
• PCI, HIPAA, SOX COBIT
• Attestation reporting
• Log review & archiving
ASSESS
VULNERABILITY SCANNING
• Software CVEs
• Network config
• Remediation workflows
AWS CONFIG AUDITING
• Configuration exposures
• Pre-authorized with AWS
• Auto-discovery, topology
Priority Alerts
AlertsIncident
Reports
Incident
Workflows
HOSTEDON-PREMISES
Alert Logic Cloud Security Report 2017
550 DAYS
AUG 1, 2015 – JAN 31 2017
2,207,795 INCIDENTS
TOTAL TRUE POSITIVE SECURITY INCIDENTS
ANALYZED
32.5 MILLION EVENTS
DRIVING ESCALATED INCIDENTS
147 PETABYTES
OF DATA ANALYZED
3807 CUSTOMERS
ANALYZED
452 INDUSTRIES
ACROSS 3 CONTINENTS
Who Can I Speak To?
Need 1-on-1 time with Security Experts?
Speak to Alert Logic to have all your questions
answered.
Alert Logic 2017 Cloud Security Report
www.alertlogic.com
Thank you.

More Related Content

PDF
Reducing Your Attack Surface
PDF
Security Implications of the Cloud
PDF
The Intersection of Security & DevOps
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Security Implications of the Cloud - CSS Dallas Azure
PDF
Realities of Security in the Cloud
PDF
Realities of Security in the Cloud
PDF
Realities of Security in the Cloud
Reducing Your Attack Surface
Security Implications of the Cloud
The Intersection of Security & DevOps
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Security Implications of the Cloud - CSS Dallas Azure
Realities of Security in the Cloud
Realities of Security in the Cloud
Realities of Security in the Cloud

What's hot (20)

PDF
Realities of Security in the Cloud
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Implications of the Cloud - CSS ATX 2017
PDF
Security Implications of the Cloud
PPTX
#ALSummit: Live Cyber Hack Demonstration
PDF
Realities of Security in the Cloud - CSS ATX 2017
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Protecting Against Web Attacks
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
Stories from the Security Operations Center
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PDF
Managed Threat Detection and Response
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
CSS 17: NYC - Stories from the SOC
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PPTX
Cyber Resiliency
PDF
Stories from the Security Operations Center (S.O.C.)
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
Realities of Security in the Cloud
The AWS Shared Responsibility Model in Practice
Security Implications of the Cloud - CSS ATX 2017
Security Implications of the Cloud
#ALSummit: Live Cyber Hack Demonstration
Realities of Security in the Cloud - CSS ATX 2017
#ALSummit: Cyber Resiliency: Surviving the Breach
#ALSummit: Architecting Security into your AWS Environment
Protecting Against Web Attacks
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Stories from the Security Operations Center
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Managed Threat Detection and Response
Managed Threat Detection & Response for AWS Applications
CSS 17: NYC - Stories from the SOC
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Cyber Resiliency
Stories from the Security Operations Center (S.O.C.)
CSS 17: NYC - Realities of Security in the Cloud
Extending Amazon GuardDuty with Cloud Insight Essentials
Ad

Similar to Reality Check: Security in the Cloud (19)

PDF
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
PPTX
Security in the cloud Workshop HSTC 2014
PDF
Azure 101: Shared responsibility in the Azure Cloud
PPTX
AWS Security and SecOps
PPTX
Shared Security Responsibility for the Azure Cloud
PDF
RightScale Webinar: Security and Compliance in the Cloud
PPTX
Securing Your Public Cloud Infrastructure
PDF
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
PDF
Lacework slides from AWS Meetups
PPTX
Keeping the wolf from 1000 doors.
PPTX
Automating AWS security and compliance
PDF
8 Elements of Multi-Cloud Security
PDF
Outpost24 webinar - Mastering the art of multicloud security
PPTX
Automating your AWS Security Operations
PPTX
How to prepare for & respond to security incidents in your AWS environment
PPTX
Hide and seek - Attack Surface Management and continuous assessment.
PDF
Information Security in AWS - Dave Walker
PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
PDF
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
Security in the cloud Workshop HSTC 2014
Azure 101: Shared responsibility in the Azure Cloud
AWS Security and SecOps
Shared Security Responsibility for the Azure Cloud
RightScale Webinar: Security and Compliance in the Cloud
Securing Your Public Cloud Infrastructure
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Lacework slides from AWS Meetups
Keeping the wolf from 1000 doors.
Automating AWS security and compliance
8 Elements of Multi-Cloud Security
Outpost24 webinar - Mastering the art of multicloud security
Automating your AWS Security Operations
How to prepare for & respond to security incidents in your AWS environment
Hide and seek - Attack Surface Management and continuous assessment.
Information Security in AWS - Dave Walker
NIST Cybersecurity Framework (CSF) on the Public Cloud
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
Ad

More from Alert Logic (17)

PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Rent-A-Center
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security and DevOps
PDF
Security Spotlight: The Coca Cola Company
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Implications of the Cloud
PDF
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
PDF
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
Extending Amazon GuardDuty with Cloud Insight Essentials
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
The Intersection of Security & DevOps
Security Spotlight: Rent-A-Center
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
The Intersection of Security and DevOps
Security Spotlight: The Coca Cola Company
The AWS Shared Responsibility Model in Practice
Security Implications of the Cloud
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure

Recently uploaded (20)

PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Big Data Technologies - Introduction.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
cuic standard and advanced reporting.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Approach and Philosophy of On baking technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Electronic commerce courselecture one. Pdf
CIFDAQ's Market Insight: SEC Turns Pro Crypto
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Big Data Technologies - Introduction.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
cuic standard and advanced reporting.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Machine learning based COVID-19 study performance prediction
Building Integrated photovoltaic BIPV_UPV.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Chapter 3 Spatial Domain Image Processing.pdf
NewMind AI Weekly Chronicles - August'25 Week I
20250228 LYD VKU AI Blended-Learning.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Approach and Philosophy of On baking technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Spectral efficient network and resource selection model in 5G networks
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Electronic commerce courselecture one. Pdf

Reality Check: Security in the Cloud

  • 1. REALITY CHECK: SECURITY IN THE CLOUD Chris Camaclang, Sales Engineer – Alert Logic
  • 2. The Cloud Is Secure AWS has all the tools you need to secure your cloud! • AWS WAF • CloudFront • Security Groups • AWS Artifact • Certificate Manager • AWS Cloud HSM • Amazon Cognito • AWS Firewall Manager • Macie • GuardDuty • AWS IAM • Inspector • AWS Config • AWS KMS • Amazon Macie • AWS Shield • AWS Secrets Manager • AWS SSO
  • 3. Sometimes…you might wonder what could go wrong? • Through 2022, at least 95% of cloud security failures will be the customer’s fault – Gartner • More than 1.5 billion sensitive corporate and other files are visible on the public internet due to human error – Digital Shadows • 88% of Java applications had at least one component-based vulnerability, 56% of all PHP apps had at least one SQLi vulnerability - Veracode
  • 4. Cloud Has Disrupted Traditional Security Agility & Automation Hyper-scalability
  • 7. The Cloud Attack Surface /s 443
  • 8. Web App Attacks – King of the Hill WEB APP ATTACK DoS / DDoS 1% Other 1% 75% DOS/DDOS 1% OTHER 1% SERVER-SIDE MALWARE 2% RECON 5% BRUTE FORCE 5% SQL INJECTION 55% REMOTE CODE EXECUTION 22% XXE 3% APACHE STRUTS RCE 6% WEB APP ATTACK RECON 5% FILE UPLOAD 6% OTHER 4% SECURITY INCIDENT TYPES ESCALATED
  • 9. With great power, comes those that seek to abuse it.
  • 10. Check your sources… Attacks are cloud scale just like your application.
  • 11. Check your surroundings… Your adversary is leveraging ML and AI against you.
  • 12. Multi-stage Web Application Attacks Appear As Noise
  • 13. Enter Machine Learning Over nine months : 8-10% of the customers we monitored were targeted by actors with better-than- average levels of skill and determination Each attack had a High degree of complexity Identified, approx. 231 attacks
  • 14. Multi-stage Attacks Time: Day 1 Event: Early stage recon event Criticality: Medium Time: Day 3 Event: SQL Injection recon Criticality: Medium Time: Day 4 Event: SQL table enumeration Criticality: High Time: Day 4 Event: Injection Criticality: Critica Situation: Multiple address spaces and disparate unrelated events over days
  • 15. Behind the Data Web apps and misconfigurations can be the final destination…or initial entry point Perimeter AND Network AND System /log-based Detection defend your hosts see N / S / E / W in all of your protected environments WAF blocking/virtual patching, IDS, and log monitoring as air cover as you burn down your web app vulnerabilities • Redistribute malware directly / indirectly (exploit kits / watering hole) • Monetization through fraud (SEO, Coin Mining, Spam) • Entry point into Infrastructure • Lateral movement, privilege escalation • Steal data (exfiltration of information from databases)
  • 17. Best Practices Know your Shared Security Responsibilities with AWS Attack surface isn’t just where your data resides Continually assess for exposures across all environments Understand impacts from applicable compliance mandates Implement controls built for cloud…and work on-premises
  • 18. A Few Parting Thoughts • 24-hour monitoring • Validation & enrichment • Remediation advice ANALYTICS • Signatures & rules • Anomaly detection • Machine learning LIVE EXPERTS ActiveWatch™ Managed Threat Detection DETECT DATA COLLECTION & INSPECTION •Web (HTTP) requests & responses •System logs •Network packets BLOCK In-Line Web Application Firewall (WAF) COMPLY • PCI, HIPAA, SOX COBIT • Attestation reporting • Log review & archiving ASSESS VULNERABILITY SCANNING • Software CVEs • Network config • Remediation workflows AWS CONFIG AUDITING • Configuration exposures • Pre-authorized with AWS • Auto-discovery, topology Priority Alerts AlertsIncident Reports Incident Workflows HOSTEDON-PREMISES
  • 19. Alert Logic Cloud Security Report 2017 550 DAYS AUG 1, 2015 – JAN 31 2017 2,207,795 INCIDENTS TOTAL TRUE POSITIVE SECURITY INCIDENTS ANALYZED 32.5 MILLION EVENTS DRIVING ESCALATED INCIDENTS 147 PETABYTES OF DATA ANALYZED 3807 CUSTOMERS ANALYZED 452 INDUSTRIES ACROSS 3 CONTINENTS
  • 20. Who Can I Speak To? Need 1-on-1 time with Security Experts? Speak to Alert Logic to have all your questions answered. Alert Logic 2017 Cloud Security Report www.alertlogic.com