SlideShare a Scribd company logo
Thank you.
Thank you.Reducing Your Attack Surface
Ryan Holland – Senior Director of Cloud Architecture, Alert Logic
Summary
• Understanding your attack surface is critical to deploying the
right security controls
• Attack surface in cloud environments is significantly different
than on-premises
• Dominant cloud exposures are often misunderstood
2nd attack HVAC vendor application
Result Successful. Never detected.
Vector SQL Injection
Las Vegas
Bethlehem
1st attack Account Brute Force
Result Detected by the SIEM. Blocked
#1 Sands Casino Breach
2nd attack HVAC vendor application
Result Successful. Never detected.
Vector SQL Injection
Las Vegas
Bethlehem
1st attack Account Brute Force
Result Detected by the SIEM. Blocked • Compromised
admin credentials
• Moved laterally
through Windows
AD
• Used malware to
destroy all hosts
on the network
Sands Casino Breach
1
49
56
86
125
155
172
197
525
908
Denial of Service
Crimeware
Physical Theft / Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Web App Attacks
Security risk is shifting to unprotected web applications
Web app attacks are now the #1
source of data breaches
But less than 5% of data center security
budgets are spent on app security
Source: Verizon
UP 500% SINCE 2014
$23 to $1
Percentage of Breaches
10% 20% 30% 40%
Source: Gartner
Web App Attacks
1
49
56
86
125
155
172
197
525
908
Denial of Service
Crimeware
Physical Theft / Loss
Payment Card Skimmers
Everything Else
Cyber-espionage
Privilege Misuse
Miscellaneous Errors
POS Intrusions
Web App Attacks
Security risk is shifting to unprotected web applications
Web app attacks are now the #1
source of data breaches
But less than 5% of data center security
budgets are spent on app security
Source: Verizon
UP 500% SINCE 2014
$23 to $1
Percentage of Breaches
10% 20% 30% 40%
Source: Gartner
Web App Attacks
Underreported. Misunderstood.
What Drives This Awareness Disconnect?
• Breach disclosure in a number of states is mandatory,
but technical details are not in disclosure scope
• News media naturally gravitates towards human interest security stories
• Mobile phones
• Endpoint malware
• Email theft
Ransomware
Malware
All other terms: SQL injection,
web application attack, Wordpress vulnerability,
PHP vulnerability, Apache Struts vulnerability
Our Perspective on Cloud Attack Surface
• 4,000+ customers
• 80% of deployments in data centers
• 50% of deployments in
public and hybrid cloud
• Dominant workload: business
critical web applications
Real world view from our SOC
#2 Yahoo
Impact
Number of exposed accounts increased
from 1B to 3B.
How it happened
Exploited a WordPress/PHP vulnerability in
2013
Where are they now?
Sold to Verizon. Valuation revised by
$350M
Meet “M4g” AKA Alexsey Belan
• One of the most prolific
hackers between 2013 -
2015
• Estimated to have
compromised 1.2 billion
user accounts
• Prime suspect in
numerous breaches
Alexsey Belan’s Techniques
1. Identified peripheral sites and key people via Google and
LinkedIn
2. Initial compromise via CVE-2011–4106 WordPress vulnerability.
Modified authentication mechanisms to capture credentials
3. Used NMAP & internal Wiki to learn the environment and move
laterally
4. Reused cookies from development staging systems, client
certificates from emails and trouble tickets
5. Used developer credentials to introduce backdoors into code
Source: https://medium.com/@chrismcnab/alexseys-ttps-1204d9050551
Why WordPress?
Used in 28% of all web
sites on the internet
• WP CVE-2011–4106 vulnerability in resulted in 1.2 million compromised sites
• 53 similar vulnerabilities in last 10 years (CVSS 6+)
#3 RNC breach
Impact
200M voter records exposed
How it happened
Misconfiguration in Amazon Web Services
S3 service
Where are they now?
Survived the breach. Operational impact
unclear.
AWS S3 Data Leaks Due To Misconfigurations
#4 Code Spaces
Impact
Nearly all customer data, including
backups, deleted.
How it happened
Credential compromise.
Where are they now?
Closed down immediately after event.
60 Most Common AWS Configuration Remediations
Unencrypted AMI Discovered
Unencrypted EBS Volume
S3 Logging not Enabled
Unrestricted Outbound Access on All Ports
User not configured to use MFA
User Access Key not configured with Rotation
IAM Policies are attached directly to User
Dangerous User Privileged Access to S3
Dangerous IAM Role for S3
Dangerous User Privileged Access to RDS
Disable Automatic Access Key Creation
Dangerous User Privileged Access to DDB
Dangerous User Privileged Access to IAM
IAM Access Keys Unused for 90 Days
ELB Listener Security (2 of 4)
ELB Listener Security (1 of 4)
Dangerous IAM Role for RDS
RDS Encryption is not Enabled
Dangerous IAM Role for DDB
Unrestricted Inbound Access - Specific Ports 2
Dangerous IAM Role for IAM
Unrestricted Inbound Access to SSH Port 22/tcp
Unrestricted Inbound Access to HTTP Port 80/tcp
Amazon S3 Bucket Permissions (2 of 2)
Inactive user account
Ensure AWS CloudTrail is Enabled in All Regions
ELB Listener Security (4 of 4)
Unrestricted Inbound Access
Publicly Accessible RDS Database Instance
Passwords not set to enforce complexity
ACL permissions enabled for Authenticated Users in an S3 Bucket
CloudTrail Logging Disabled
Passwords not configured to expire
Ensure Hardware Multi-Factor Authentication is Enabled for the Root Account
Unrestricted Inbound Access to Windows RDP Port 3389/tcp
Enable Amazon GuardDuty on AWS Account
Unrestricted Inbound Access to PostgreSQL Port 5432/tcp
Global View ACL permissions enabled in an S3 Bucket
Unrestricted Inbound Access to mySQL Port 3306/tcp
Unrestricted Inbound Access to NetBIOS over TCP/IP 137/udp/tcp, 138/udp or
139/udp/tcp
Unrestricted Inbound Access to SMTP Port 25/tcp
Root account not using MFA
Unrestricted Inbound Access to FTP Port 21/tcp
Unrestricted Inbound Access to DNS Port 53/tcp
Unrestricted Inbound Access to SQLServer Port 1433,1434/tcp
Unrestricted Inbound Access to FTP Port 20/tcp
Unrestricted Inbound Access to VNC Port 5500,5900/tcp
Unrestricted Inbound Access to MSQL Port 4333/tcp
Unrestricted Inbound Access to SMTP over TLS/SSL Port 465/tcp
Unrestricted Inbound Access to ElasticSearch Port 9300/tcp
Unrestricted Inbound Access to CIFS/SMB over TCP 445/tcp
Root Account Used Recently
Unrestricted Inbound Access to Windows RPC Port 135/tcp
Publicly Accessible AMI Discovered
Unrestricted Inbound Access to Telnet Port 23/tcp
Unencrypted Redshift Cluster
Unrestricted Inbound Access to DNS Port 53/udp
Publicly Accessible Redshift Cluster Nodes
Dangerous use of Root Access Keys
Unrestricted Inbound Access to CIFS/SMB over TCP 445/udp
Across
31,235 EC2 instances / workloads
155,911 vulnerabilities and
exposures sampled
On 381 VPC’s in Dec 2017
Cloud Insight Essentials check
Misconfigurations
Cloud Attack Surface
Attacks
Web App
Attacks
OWASP
top 10
Platform /
library
attacks
App /
System
misconfig
attacks
Web Apps
Server-side Apps
App Frameworks
Dev Platforms
Server OS
Hypervisor
Hardware
The Application Stack
Databases
Attackersaremovingupthestack
1. Wide range of attacks at
every layer of the stack
2. Rapidly changing
codebase can introduces
unknown vulnerabilities
3. Long tail of exposures
inherited from 3rd party
development tools
4. Extreme shortage of cloud
and application security
expertise
Attack Surface Factors
Importance of Eliminating Dwell Time
The Realities of Dwell Time
1. Ponemon Institute 2017 Cost of Data Breach Study
Thank you.

More Related Content

PDF
Realities of Security in the Cloud
PDF
The AWS Shared Responsibility Model in Practice
PDF
The Intersection of Security & DevOps
PDF
Reality Check: Security in the Cloud
PDF
Reducing Your Attack Surface
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
Realities of Security in the Cloud
The AWS Shared Responsibility Model in Practice
The Intersection of Security & DevOps
Reality Check: Security in the Cloud
Reducing Your Attack Surface
#ALSummit: Realities of Security in the Cloud
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: Alert Logic & AWS - AWS Security Services

What's hot (20)

PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
The Intersection of Security & DevOps
PDF
Realities of Security in the Cloud
PDF
Realities of Security in the Cloud
PDF
Security Implications of the Cloud
PDF
Securing Healthcare Data on AWS for HIPAA
PDF
CSS17: Houston - Protecting Web Apps
PDF
Protecting Against Web Attacks
PPTX
#ALSummit: Cyber Resiliency: Surviving the Breach
PPTX
CSS 17: NYC - Realities of Security in the Cloud
PPTX
CSS 17: NYC - Protecting your Web Applications
PDF
Realities of Security in the Cloud
PDF
CSS17: Houston - Introduction to Security in the Cloud
PDF
Managed Threat Detection & Response for AWS Applications
PDF
Realities of Security in the Cloud - CSS ATX 2017
PPTX
CSS 17: NYC - Stories from the SOC
PPTX
#ALSummit: Live Cyber Hack Demonstration
PDF
CSS17: Houston - Azure Shared Security Model Overview
PPTX
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
#ALSummit: Architecting Security into your AWS Environment
The Intersection of Security & DevOps
Realities of Security in the Cloud
Realities of Security in the Cloud
Security Implications of the Cloud
Securing Healthcare Data on AWS for HIPAA
CSS17: Houston - Protecting Web Apps
Protecting Against Web Attacks
#ALSummit: Cyber Resiliency: Surviving the Breach
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Protecting your Web Applications
Realities of Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Managed Threat Detection & Response for AWS Applications
Realities of Security in the Cloud - CSS ATX 2017
CSS 17: NYC - Stories from the SOC
#ALSummit: Live Cyber Hack Demonstration
CSS17: Houston - Azure Shared Security Model Overview
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Ad

Similar to Reducing Your Attack Surface & Your Role in Cloud Workload Protection (20)

PPTX
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
PDF
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
PDF
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
PDF
Anatomy of a Cloud Hack
PDF
Cloud Security Engineering - Tools and Techniques
PDF
The Anatomy of a Cloud Security Breach
PPT
CyberCrime in the Cloud and How to defend Yourself
PPTX
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
PPTX
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
PDF
Slashing Your Cloud Risk: 3 Must-Do's
PDF
Protecting Against Web App Attacks
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PDF
Staying safe in the cloud
PDF
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
PPTX
Practical Security for the Cloud
PPTX
Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities f...
PDF
Are Your Files Really Safe? The Hidden Cloud Security Threats | CyberPro Maga...
PPTX
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
DOCX
Cloud Computing Security
PPTX
Hack proof your aws cloud cloudcheckr_040416
Cloud Security or: How I Learned to Stop Worrying & Love the Cloud
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Anatomy of a Cloud Hack
Cloud Security Engineering - Tools and Techniques
The Anatomy of a Cloud Security Breach
CyberCrime in the Cloud and How to defend Yourself
BlueHat v17 || All Your Cloud Are Belong to Us; Hunting Compromise in Azure
001 - Get acquainted with the AWS platform -- hide01.ir.pptx
Slashing Your Cloud Risk: 3 Must-Do's
Protecting Against Web App Attacks
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Staying safe in the cloud
DEF CON 25 - Gerald-Steere-and-Sean-Metcalf-Hacking-the-Cloud.pdf
Practical Security for the Cloud
Kicking in the Door to the Cloud: Exploiting Cloud Provider Vulnerabilities f...
Are Your Files Really Safe? The Hidden Cloud Security Threats | CyberPro Maga...
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Cloud Computing Security
Hack proof your aws cloud cloudcheckr_040416
Ad

More from Alert Logic (19)

PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
Managed Threat Detection and Response
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Spotlight: Presidio
PDF
Security Spotlight: Rent-A-Center
PDF
The Intersection of Security & DevOps
PDF
Security Spotlight: Presidio
PDF
Security Implications of the Cloud
PDF
CSS 2018 Trivia
PDF
The AWS Shared Responsibility Model in Practice
PDF
Realities of Security in the Cloud
PDF
The Intersection of Security and DevOps
PDF
Security Spotlight: The Coca Cola Company
PDF
The AWS Shared Responsibility Model in Practice
PDF
Security Implications of the Cloud
PDF
Security Implications of the Cloud - CSS Dallas Azure
PDF
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
PDF
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure
Extending Amazon GuardDuty with Cloud Insight Essentials
Managed Threat Detection and Response
Extending Amazon GuardDuty with Cloud Insight Essentials
The AWS Shared Responsibility Model in Practice
Security Spotlight: Presidio
Security Spotlight: Rent-A-Center
The Intersection of Security & DevOps
Security Spotlight: Presidio
Security Implications of the Cloud
CSS 2018 Trivia
The AWS Shared Responsibility Model in Practice
Realities of Security in the Cloud
The Intersection of Security and DevOps
Security Spotlight: The Coca Cola Company
The AWS Shared Responsibility Model in Practice
Security Implications of the Cloud
Security Implications of the Cloud - CSS Dallas Azure
Microsoft Azure Security Overview - Microsoft - CSS Dallas Azure
10 Step Guide to Cloud Security - 10th Magnitude - CSS Dallas Azure

Recently uploaded (20)

PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Cloud computing and distributed systems.
PDF
Empathic Computing: Creating Shared Understanding
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPT
Teaching material agriculture food technology
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
cuic standard and advanced reporting.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Understanding_Digital_Forensics_Presentation.pptx
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectral efficient network and resource selection model in 5G networks
Chapter 3 Spatial Domain Image Processing.pdf
Cloud computing and distributed systems.
Empathic Computing: Creating Shared Understanding
The AUB Centre for AI in Media Proposal.docx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
Reach Out and Touch Someone: Haptics and Empathic Computing
cuic standard and advanced reporting.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

Reducing Your Attack Surface & Your Role in Cloud Workload Protection

  • 2. Thank you.Reducing Your Attack Surface Ryan Holland – Senior Director of Cloud Architecture, Alert Logic
  • 3. Summary • Understanding your attack surface is critical to deploying the right security controls • Attack surface in cloud environments is significantly different than on-premises • Dominant cloud exposures are often misunderstood
  • 4. 2nd attack HVAC vendor application Result Successful. Never detected. Vector SQL Injection Las Vegas Bethlehem 1st attack Account Brute Force Result Detected by the SIEM. Blocked #1 Sands Casino Breach
  • 5. 2nd attack HVAC vendor application Result Successful. Never detected. Vector SQL Injection Las Vegas Bethlehem 1st attack Account Brute Force Result Detected by the SIEM. Blocked • Compromised admin credentials • Moved laterally through Windows AD • Used malware to destroy all hosts on the network Sands Casino Breach
  • 6. 1 49 56 86 125 155 172 197 525 908 Denial of Service Crimeware Physical Theft / Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Web App Attacks Security risk is shifting to unprotected web applications Web app attacks are now the #1 source of data breaches But less than 5% of data center security budgets are spent on app security Source: Verizon UP 500% SINCE 2014 $23 to $1 Percentage of Breaches 10% 20% 30% 40% Source: Gartner Web App Attacks
  • 7. 1 49 56 86 125 155 172 197 525 908 Denial of Service Crimeware Physical Theft / Loss Payment Card Skimmers Everything Else Cyber-espionage Privilege Misuse Miscellaneous Errors POS Intrusions Web App Attacks Security risk is shifting to unprotected web applications Web app attacks are now the #1 source of data breaches But less than 5% of data center security budgets are spent on app security Source: Verizon UP 500% SINCE 2014 $23 to $1 Percentage of Breaches 10% 20% 30% 40% Source: Gartner Web App Attacks Underreported. Misunderstood.
  • 8. What Drives This Awareness Disconnect? • Breach disclosure in a number of states is mandatory, but technical details are not in disclosure scope • News media naturally gravitates towards human interest security stories • Mobile phones • Endpoint malware • Email theft Ransomware Malware All other terms: SQL injection, web application attack, Wordpress vulnerability, PHP vulnerability, Apache Struts vulnerability
  • 9. Our Perspective on Cloud Attack Surface • 4,000+ customers • 80% of deployments in data centers • 50% of deployments in public and hybrid cloud • Dominant workload: business critical web applications
  • 10. Real world view from our SOC
  • 11. #2 Yahoo Impact Number of exposed accounts increased from 1B to 3B. How it happened Exploited a WordPress/PHP vulnerability in 2013 Where are they now? Sold to Verizon. Valuation revised by $350M
  • 12. Meet “M4g” AKA Alexsey Belan • One of the most prolific hackers between 2013 - 2015 • Estimated to have compromised 1.2 billion user accounts • Prime suspect in numerous breaches
  • 13. Alexsey Belan’s Techniques 1. Identified peripheral sites and key people via Google and LinkedIn 2. Initial compromise via CVE-2011–4106 WordPress vulnerability. Modified authentication mechanisms to capture credentials 3. Used NMAP & internal Wiki to learn the environment and move laterally 4. Reused cookies from development staging systems, client certificates from emails and trouble tickets 5. Used developer credentials to introduce backdoors into code Source: https://medium.com/@chrismcnab/alexseys-ttps-1204d9050551
  • 14. Why WordPress? Used in 28% of all web sites on the internet • WP CVE-2011–4106 vulnerability in resulted in 1.2 million compromised sites • 53 similar vulnerabilities in last 10 years (CVSS 6+)
  • 15. #3 RNC breach Impact 200M voter records exposed How it happened Misconfiguration in Amazon Web Services S3 service Where are they now? Survived the breach. Operational impact unclear.
  • 16. AWS S3 Data Leaks Due To Misconfigurations
  • 17. #4 Code Spaces Impact Nearly all customer data, including backups, deleted. How it happened Credential compromise. Where are they now? Closed down immediately after event.
  • 18. 60 Most Common AWS Configuration Remediations Unencrypted AMI Discovered Unencrypted EBS Volume S3 Logging not Enabled Unrestricted Outbound Access on All Ports User not configured to use MFA User Access Key not configured with Rotation IAM Policies are attached directly to User Dangerous User Privileged Access to S3 Dangerous IAM Role for S3 Dangerous User Privileged Access to RDS Disable Automatic Access Key Creation Dangerous User Privileged Access to DDB Dangerous User Privileged Access to IAM IAM Access Keys Unused for 90 Days ELB Listener Security (2 of 4) ELB Listener Security (1 of 4) Dangerous IAM Role for RDS RDS Encryption is not Enabled Dangerous IAM Role for DDB Unrestricted Inbound Access - Specific Ports 2 Dangerous IAM Role for IAM Unrestricted Inbound Access to SSH Port 22/tcp Unrestricted Inbound Access to HTTP Port 80/tcp Amazon S3 Bucket Permissions (2 of 2) Inactive user account Ensure AWS CloudTrail is Enabled in All Regions ELB Listener Security (4 of 4) Unrestricted Inbound Access Publicly Accessible RDS Database Instance Passwords not set to enforce complexity ACL permissions enabled for Authenticated Users in an S3 Bucket CloudTrail Logging Disabled Passwords not configured to expire Ensure Hardware Multi-Factor Authentication is Enabled for the Root Account Unrestricted Inbound Access to Windows RDP Port 3389/tcp Enable Amazon GuardDuty on AWS Account Unrestricted Inbound Access to PostgreSQL Port 5432/tcp Global View ACL permissions enabled in an S3 Bucket Unrestricted Inbound Access to mySQL Port 3306/tcp Unrestricted Inbound Access to NetBIOS over TCP/IP 137/udp/tcp, 138/udp or 139/udp/tcp Unrestricted Inbound Access to SMTP Port 25/tcp Root account not using MFA Unrestricted Inbound Access to FTP Port 21/tcp Unrestricted Inbound Access to DNS Port 53/tcp Unrestricted Inbound Access to SQLServer Port 1433,1434/tcp Unrestricted Inbound Access to FTP Port 20/tcp Unrestricted Inbound Access to VNC Port 5500,5900/tcp Unrestricted Inbound Access to MSQL Port 4333/tcp Unrestricted Inbound Access to SMTP over TLS/SSL Port 465/tcp Unrestricted Inbound Access to ElasticSearch Port 9300/tcp Unrestricted Inbound Access to CIFS/SMB over TCP 445/tcp Root Account Used Recently Unrestricted Inbound Access to Windows RPC Port 135/tcp Publicly Accessible AMI Discovered Unrestricted Inbound Access to Telnet Port 23/tcp Unencrypted Redshift Cluster Unrestricted Inbound Access to DNS Port 53/udp Publicly Accessible Redshift Cluster Nodes Dangerous use of Root Access Keys Unrestricted Inbound Access to CIFS/SMB over TCP 445/udp Across 31,235 EC2 instances / workloads 155,911 vulnerabilities and exposures sampled On 381 VPC’s in Dec 2017
  • 19. Cloud Insight Essentials check Misconfigurations
  • 20. Cloud Attack Surface Attacks Web App Attacks OWASP top 10 Platform / library attacks App / System misconfig attacks Web Apps Server-side Apps App Frameworks Dev Platforms Server OS Hypervisor Hardware The Application Stack Databases Attackersaremovingupthestack 1. Wide range of attacks at every layer of the stack 2. Rapidly changing codebase can introduces unknown vulnerabilities 3. Long tail of exposures inherited from 3rd party development tools 4. Extreme shortage of cloud and application security expertise
  • 23. The Realities of Dwell Time 1. Ponemon Institute 2017 Cost of Data Breach Study