SlideShare a Scribd company logo
Security Teams & Tech In A Cloud World
Mark Nunnikhoven, Vice President Cloud Research
@marknca
Audience: Public
Security “Facts”
Security “Facts”* About your organization or one just like it
We will respond
quickly to an incident
Attackers are on a
network an average
of 154 days
We need more tools
Canadian companies
spend just under
10% on IT security
Canadian companies
spend just under
10% on IT security
* 60% of companies didn’t mention people or
process as an area of focus
Users are a major
problem
Security is considered
the opposite of
usability
Security is everyone’s
responsibility
You have one,
isolated security team
You have one,
isolated security team
* …and a wildly unsuccessful “awareness” program
Security Teams & Tech In A Cloud World
Mark Nunnikhoven
Vice President, Cloud Research
Trend Micro
@marknca
Modern Security
Video available at https://vimeo.com/111631197
Video available at https://vimeo.com/111631197
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log Store
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
Event-driven
Function
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log StoreMonitoring
CSP API Event-driven
Function
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log Store
Restrict
Access
Monitoring
CSP API Event-driven
Function
© Trend Micro, 201615
Automated Response
Web UIWeb UIWeb UIVM
SIEM / Log Store
Restrict
Access
Monitoring
Web UI
CSP API Event-driven
Function
2014
What’s the hold up?
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
Security Teams & Tech In A Cloud World
Running in the Cloud
IaaS

(Infrastructure)
PaaS

(Container)
SaaS

(Abstract)
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Shared Responsibility Model
Setup
• Lock down operating system, applications, and data

Harden system according to NIST / best practices

Encrypt everything
• Enable service health monitoring features

Check your CSP’s documentation
• Monitor service API activities

Look for unauthorized; replication, start up, termination, etc.
Steps:
IaaS
Setup
• Read all the documentation

Seriously, RTFM
• Implement strong code quality systems

Automation is critical to success
• Configure access control and other security features

Check your CSP’s documentation
Steps:
PaaS
Setup
• Read all the documentation

Seriously, RTFM
• Configure access control and other security features

Check your CSP’s documentation
Steps:
SaaS
Setup
• Evaluate controls against acceptable level of risk for data
used in service

I shouldn’t have to say this
• Monitor all service provider status updates and
communications channels

Remember to include them in your IR plans
Steps:
Any Cloud Service
IaaS

(Infrastructure)
PaaS

(Container)
SaaS

(Abstract)
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Data
Application
Operating System
Virtualization
Infrastructure
Physical
Shared Responsibility Model
Opportunity
© Trend Micro, 201627
Physical
Weeks
Virtual
Days
Cloud
Minutes
Container
Seconds
Function
Immediate
{ Time to deploy }
{ Environment }
© Trend Micro, 201628
Physical
Weeks
Virtual
Days
Cloud
Minutes
Container
Seconds
Function
Immediate
{ Time to deploy }
{ Environment }
© Trend Micro, 201629
Move faster Focus on value
Goal
© Trend Micro, 201630
Deploy using the method that delivers
the most value
Goal
© Trend Micro, 201631
Every tool adds overhead
Constraint
© Trend Micro, 201632
Automation allows for the speed, scale,
and consistency required
Relief
© Trend Micro, 201633
Deploy using the method that delivers
the most value
Goal
© Trend Micro, 201634
…with minimal operational impact
Deploy using the method that delivers
the most value
Goal
DevOps
Flickr deploys 10+/day
Success
Etsy deploys 50+/day
Flickr deploys 10+/day
Success
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Flickr deploys 10+/day
Success
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Adobe +60% app development
Flickr deploys 10+/day
Success
Etsy deploys 50+/day
Amazon deploys 11.7 seconds
Adobe +60% app development
Fidelity $2.3M saved for one app
Flickr deploys 10+/day
Success
Where’s security?
…can have a much stronger security
posture in AWS and the cloud than
they can on-premises
Andy Jassy, AWS CEO
* From an interview with the Wall Street Journal, http://www.wsj.com/articles/amazons-andy-jassy-on-the-promise-of-the-cloud-1477880220
Security is everyone’s
responsibility
Security Everyone
Team Challenges
Security Teams & Tech In A Cloud World
New Skills Needed
• Basic understanding of development practices & ability to write simple code

Everything in the cloud is an API. Security MUST BE automated
• Puts the user first

We make the tech that they “can’t use right” … not their fault
• Perspective & understanding of practical security

No more “the sky is falling”
• Educators

Written, video, presentations, Slack,…anywhere teams are working
Steps:
Security Specialist
Security Teams & Tech In A Cloud World
Your Org Chart Is Wrong
Typical Org Chart
CISO Dev
GRC Ops
Infrastructure
CIO
Ops
Updated Org Chart
CISO Dev
GRC Ops
Infrastructure
CIO
Ops
Updated Org Chart
CISO Dev
GRC
OpsInfrastructure
CIO
Ops
Updated Org Chart
CISO Dev
GRC
OpsInfrastructure
CIO
Ops
GrC
@peterme
Peter Merholz Kristin Skinner
@bettay
Specialist Distribution
Specialist Distribution
Specialist Distribution
Specialist Distribution
Specialist Distribution
Specialist Distribution
Specialist Distribution
Security Teams & Tech In A Cloud World
Coffee Shadowing Teaching
Bridges
Goal
Fabric
Security Teams & Tech In A Cloud World
1 min
1 min
Slow lane
1 min
Slow lane
Fast lane
1 min
Slow lane
Fast lane
1 min
1 min
1 min
Is this bad?
1 min
Is this bad?
1 min
Is this bad?
Is this malicious?
and
1 min
Is this bad?
Is this malicious?
and
1 min
Is this bad?
Is this malicious?
and
1 min
1 min
Aggregate information
1 min
Aggregate information
1m, h, d, w, m
Trends
1 min
Aggregate information
1m, h, d, w, m
Trends
1 min
Aggregate information
1m, h, d, w, m
Trends
Evidence of compliance
1 min
Aggregate information
1m, h, d, w, m
Trends
Evidence of compliance
Configuration
Processes
1 min
Aggregate information
1m, h, d, w, m
Trends
Evidence of compliance
Configuration
Processes
Deployment data
1 min
Aggregate information
1m, h, d, w, m
Trends
Evidence of compliance
Configuration
Processes
Deployment data
Performance
Debug
1 min
1 min
SecOps
1 min
Aggregate Evidence Deployments
SecOps
Get stuff done
© Trend Micro, 201660
Thank you!
mark_nunnikhoven@trendmicro.com | @marknca

More Related Content

PDF
AWS re:Invent 2017 re:View
PDF
Defending your workloads with aws waf and deep security
PPTX
How to implement DevSecOps on AWS for startups
PPTX
stackArmor Security MicroSummit - AWS Security with Splunk
PPTX
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
PDF
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
PPTX
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
PPT
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report
AWS re:Invent 2017 re:View
Defending your workloads with aws waf and deep security
How to implement DevSecOps on AWS for startups
stackArmor Security MicroSummit - AWS Security with Splunk
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
Tolly report: Trend Micro Deep Security 7.5 vs. McAfee and Symantec
The Perimeter Security Retreat: Fall Back, Fall Back to the Server
2013 Comscore Hong Kong China Taiwan Online Digital Marketing Report

Similar to Security Teams & Tech In A Cloud World (20)

PDF
Resetting Your Security Thinking for the Public Cloud
PDF
AWS Cloud Security
PDF
Automating Security in Cloud Workloads with DevSecOps
PPTX
#ALSummit: Realities of Security in the Cloud
PPTX
Shared Security Responsibility Model of AWS
PPTX
security and compliance in the cloud
PDF
The Share Responsibility Model of Cloud Computing - ILTA NYC
PPTX
Winning Governance Strategies for the Technology Disruptions of our Time
PDF
Get ahead of cloud network security trends and practices in 2020
PDF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
PPTX
Blue Chip Tek Connect and Protect Presentation #3
PPTX
Automating your AWS Security Operations
PPTX
Container Workload Security Solution Ideas by Mandy Sidana.pptx
PPTX
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
PDF
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
PDF
Avoiding Limitations of Traditional Approaches to Security
PDF
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
PDF
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
PPTX
Unc charlotte prezo2016
PDF
Launching a Highly-regulated Startup in the Public Cloud
Resetting Your Security Thinking for the Public Cloud
AWS Cloud Security
Automating Security in Cloud Workloads with DevSecOps
#ALSummit: Realities of Security in the Cloud
Shared Security Responsibility Model of AWS
security and compliance in the cloud
The Share Responsibility Model of Cloud Computing - ILTA NYC
Winning Governance Strategies for the Technology Disruptions of our Time
Get ahead of cloud network security trends and practices in 2020
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
Blue Chip Tek Connect and Protect Presentation #3
Automating your AWS Security Operations
Container Workload Security Solution Ideas by Mandy Sidana.pptx
The Share Responsibility Model of Cloud Computing - ILTA Philadelphia
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Avoiding Limitations of Traditional Approaches to Security
Migrating Critical Applications To The Cloud - ISACA Seattle - Sanitized
Migrating Critical Applications to the Cloud - isaca seattle - sanitized
Unc charlotte prezo2016
Launching a Highly-regulated Startup in the Public Cloud
Ad

More from Mark Nunnikhoven (11)

PDF
Advanced Security Automation Made Simple
PDF
AWS re:Invent 2015 re:Cap
PDF
Whodunit, The Mechanics of Attack Attribution
PDF
Power Struggle: Balancing Relationships & Responsibility in the Cloud
PDF
Security OF The Cloud
PDF
Shared Responsibility In Action
PDF
Infrastructure as (Secure) Code
PDF
Updating Security Operations For The Cloud
PDF
Shared Responsibility In Action
PDF
The Most Common Failure With Today's Defences
PDF
Is That Normal? Behaviour Modelling On The Cheap
Advanced Security Automation Made Simple
AWS re:Invent 2015 re:Cap
Whodunit, The Mechanics of Attack Attribution
Power Struggle: Balancing Relationships & Responsibility in the Cloud
Security OF The Cloud
Shared Responsibility In Action
Infrastructure as (Secure) Code
Updating Security Operations For The Cloud
Shared Responsibility In Action
The Most Common Failure With Today's Defences
Is That Normal? Behaviour Modelling On The Cheap
Ad

Recently uploaded (20)

PPTX
PptxGenJS_Demo_Chart_20250317130215833.pptx
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
PDF
An introduction to the IFRS (ISSB) Stndards.pdf
PPTX
innovation process that make everything different.pptx
PPTX
SAP Ariba Sourcing PPT for learning material
PPTX
introduction about ICD -10 & ICD-11 ppt.pptx
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
PPTX
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
PDF
Testing WebRTC applications at scale.pdf
PPTX
Funds Management Learning Material for Beg
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PDF
Paper PDF World Game (s) Great Redesign.pdf
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPTX
Internet___Basics___Styled_ presentation
PDF
Triggering QUIC, presented by Geoff Huston at IETF 123
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PDF
Cloud-Scale Log Monitoring _ Datadog.pdf
PptxGenJS_Demo_Chart_20250317130215833.pptx
Unit-1 introduction to cyber security discuss about how to secure a system
APNIC Update, presented at PHNOG 2025 by Shane Hermoso
An introduction to the IFRS (ISSB) Stndards.pdf
innovation process that make everything different.pptx
SAP Ariba Sourcing PPT for learning material
introduction about ICD -10 & ICD-11 ppt.pptx
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
WebRTC in SignalWire - troubleshooting media negotiation
CHE NAA, , b,mn,mblblblbljb jb jlb ,j , ,C PPT.pptx
Testing WebRTC applications at scale.pdf
Funds Management Learning Material for Beg
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
Paper PDF World Game (s) Great Redesign.pdf
RPKI Status Update, presented by Makito Lay at IDNOG 10
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Internet___Basics___Styled_ presentation
Triggering QUIC, presented by Geoff Huston at IETF 123
Job_Card_System_Styled_lorem_ipsum_.pptx
Cloud-Scale Log Monitoring _ Datadog.pdf

Security Teams & Tech In A Cloud World