SlideShare a Scribd company logo
SESSION ID:
#RSAC
Dana Elizabeth Wolf
Take it to the Cloud:
The Evolution of Security
Architecture
BAS-M07
Head of Products, OpenDNS
OpenDNS/Cisco
@dayowolf
#RSAC
Desktops Business
Apps
Critical Infrastructure
#RSAC
Desktops Business
Apps
Critical Infrastructure
Critical Infrastructure
(Amazon, Rackspace,
Windows Azure, etc.)
Business Apps
(Salesforce, Marketo,
DocuSign, etc.)
Laptops /
Tablet Users
Remote
Users
#RSAC
When we talk about cloud security…
Security
Delivered in Cloud
Security for
New Architecture
Virtual Appliances
Hosted in Cloud
4
#RSAC
Cloud Security Alliance
The Notorious Nine
2010 2013 2015 Top Threats
5 1 Data Breaches
5 2 Data Loss
6 3 Account Hijacking
2 4 Insecure Interfaces and APIs
N/A 5 Denial of Service (DoS)
3 6 Malicious Insiders
1 7 Abuse of cloud services
7 8 Insufficient Due Diligence
4 9 Shared technology vulnerabilities
5
#RSAC
#1&2 Data Breach/Data Loss
What is it?
Data in the cloud that is exposed, lost or inaccessible
New Vectors for Data Breach
Oct 2015 – “Seriously, Get Off My Cloud!” –
Exposure of AWS customer crypto keys
Multi-Tenant Architecture Flaws in databases
Data Loss is similar, but exacerbated
Secure Tunnel != Protection of Data
Losing encryption key
Offline backups
6
#RSAC
#3 Account Hijacking
What is it?
Access to user identity &
associated accounts
How have attacks changed?
Reuse of credentials/passwords
amplifies impacts of attacks
Man-In-The-Cloud stealing copy of
synchronization token
7
#RSAC
#4 Insecure APIs
What is it about?
APIs enables cross-cloud compatibility
What are API attacks?
Kardashian Website Security Issues
The Buffer attack – due to improper
OAUTH code
8
#RSAC
#5 Denial of Service (DoS)
What is it about?
An attempt to make a machine or network
resource unavailable to its intended users
How have attacks changed?
Frequency: attacks per month on the rise
Collateral Damage
Size: Largest attack in 2004 was 8 Gbps. Now
upwards of 400 Gbps
Complexity: multi-vector attacks are
becoming more common
9
#RSAC
#6 Malicious Insiders
What is it?
A threat to the organization that
originates from people within the
organization such as employees,
contractors, etc..
How have attacks changed?
Amplified for cloud services due to
convergence of IT Services/customers
under a single management domain
Management of Identity once an
individual leaves the organization
10
#RSAC
Insufficient Due Diligence
What is it?
Investigation into a CSP prior to signing a
contract. Clarity on SLAs
Why does it matter?
You are now more dependent on another
provider for success of your business
Added complexity of auditing multiple
vendors’ security
Where cloud data resides, different laws
apply
11
#RSAC
Solutions
12
#RSAC
Visibility
Problems you want to solve
What Cloud Applications are being used across my
enterprise?
What type of communication is happening to
sanctioned & unsanctioned applications
How risky are the cloud applications being used?
Who does it?
Secure Web Gateways
Cloud Access Security Brokers (CASB)
Next-Generation Firewall (NGFW)
#RSAC
Encryption / Data Loss Prevention (DLP)
Making a comeback?
Problems you want to solve
Secure my data & reduce impact of data
breach
Reduce impact data loss
What do I need?
Use SSL
Encryption / Tokenization / Key Management
Apply DLP policies for Cloud Applications
Governance – Retention policy
#RSAC
Watching the User
Problems you want to solve
Trust that proper controls are in place (CSP)
Prevent misuse of admin / employee
accounts
What do I need?
Identity Management
Access Management (audit trail, time-bound access, request for
access)
User Entity Behavior Analytics
15
#RSAC
DDoS protection – who does it better?
Problems you want to solve
Service stay up and running during a DoS or
DDoS attack
What do I need?
Leverage cloud architecture!
Absorption and mitigation of DDoS attacks
16
#RSAC
Researching your cloud vendor
Problems you want to solve
Higher confidence level in the CSPs security posture
Incorporate CSPs SLAs and security processes into main IT
process
Protection
What do I need?
Ask the CSP to share their internal security processes or
assessment/audit
Legally bind them to assessments. Review/negotiate
indemnification clause.
Review all SLAs
Review of Architecture – look for APIs
17
#RSAC
In Review
18
#RSAC
Apply What You Have Learned Today
Next week you should:
Identify sanctioned and unsanctioned applications in your company
In the first three months following this presentation you should:
Understand cloud administrative accounts & monitor them
Review if/where critical company data resides in the cloud
Review existing legal contracts with CSPs to understand SLAs
Within six months you should:
Identify new processes to put in place to integrate CSP security with internal
security workflow
Identify new key technologies for protection of cloud assets
19
#RSAC
Questions?

More Related Content

PDF
Designing Virtual Network Security Architectures
PDF
Cloud Breach – Preparation and Response
PDF
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
PDF
Security Program Development for the Hipster Company
PDF
Aspirin as a Service: Using the Cloud to Cure Security Headaches
PDF
How Google Protects Its Corporate Security Perimeter without Firewalls
PDF
Identity-Based Security and Privacy for the Internet of Things
PDF
CSA SV Threat detection and prediction
Designing Virtual Network Security Architectures
Cloud Breach – Preparation and Response
CLOUD SECURITY ESSENTIALS 2.0 Full Stack Hacking & Recovery
Security Program Development for the Hipster Company
Aspirin as a Service: Using the Cloud to Cure Security Headaches
How Google Protects Its Corporate Security Perimeter without Firewalls
Identity-Based Security and Privacy for the Internet of Things
CSA SV Threat detection and prediction

What's hot (20)

PDF
BeyondCorp - Google Security for Everyone Else
PPTX
How to Overcome Network Access Control Limitations for Better Network Security
PDF
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
PDF
How VPNs and Firewalls Put Your Organization at Risk
PDF
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
PPTX
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
PDF
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
PDF
From IT to IoT: Bridging the Growing Cybersecurity Divide
PDF
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
PDF
Cisco amp for meraki
PDF
How Zero Trust Changes Identity & Access
PDF
63 Requirements for CASB
PDF
Soc analyst course content
PDF
Workshop on CASB Part 2
PPTX
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
PDF
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
PPTX
Disección de amenazas en entornos de nube
PPTX
How sdp delivers_zero_trust
PDF
Rise of the Hacking Machines
PPTX
Kent King - PKI: Do You Know Your Exposure?
BeyondCorp - Google Security for Everyone Else
How to Overcome Network Access Control Limitations for Better Network Security
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
How VPNs and Firewalls Put Your Organization at Risk
Stop Translating, Start Defending: Common Language for Managing Cyber-Risk
Kevin Glavin - Continuous Integration, Continuous Delivery, and Deployment (C...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
From IT to IoT: Bridging the Growing Cybersecurity Divide
Crypto 101: Encryption, Codebreaking, SSL and Bitcoin
Cisco amp for meraki
How Zero Trust Changes Identity & Access
63 Requirements for CASB
Soc analyst course content
Workshop on CASB Part 2
Timothy Wright & Stephen Halwes - Finding the Needle in the Hardware – Identi...
The Good, the Bad and the Ugly of the Ultrasonic Communications Ecosystem
Disección de amenazas en entornos de nube
How sdp delivers_zero_trust
Rise of the Hacking Machines
Kent King - PKI: Do You Know Your Exposure?
Ad

Viewers also liked (20)

PPTX
Enterprise Security in Hybrid Cloud ISACA-SV 2012
PDF
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
PDF
Simple cloud reference architecture
PDF
Enterprise Security Architecture: From access to audit
PPTX
Cloud reference architecture as per nist
PPTX
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
PDF
Mobile security-reference-architecture
PDF
PCI Compliance and Cloud Reference Architecture
PDF
Intro to Cloud Computing in the Federal Government
PDF
The Enterprise Reference Architecture and Tools
PPTX
Reference Architecture for Data Loss Prevention in the Cloud
PDF
The F5 DDoS Protection Reference Architecture (Technical White Paper)
PDF
Extending Active Directory to Box for Seamless IT Management
PPTX
F5 Application Services Reference Architecture (Audio)
PDF
Security Building Blocks of the IBM Cloud Computing Reference Architecture
PPTX
AWS Security Architecture - Overview
PDF
A brief history of cloud computing
PPTX
Identity Management with the ForgeRock Identity Platform - So What’s New?
PDF
Oracle Cloud Reference Architecture
PDF
TOGAF 9 - Security Architecture Ver1 0
Enterprise Security in Hybrid Cloud ISACA-SV 2012
Sukumar Nayak-Detailed-Cloud Risk Management and Audit
Simple cloud reference architecture
Enterprise Security Architecture: From access to audit
Cloud reference architecture as per nist
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Mobile security-reference-architecture
PCI Compliance and Cloud Reference Architecture
Intro to Cloud Computing in the Federal Government
The Enterprise Reference Architecture and Tools
Reference Architecture for Data Loss Prevention in the Cloud
The F5 DDoS Protection Reference Architecture (Technical White Paper)
Extending Active Directory to Box for Seamless IT Management
F5 Application Services Reference Architecture (Audio)
Security Building Blocks of the IBM Cloud Computing Reference Architecture
AWS Security Architecture - Overview
A brief history of cloud computing
Identity Management with the ForgeRock Identity Platform - So What’s New?
Oracle Cloud Reference Architecture
TOGAF 9 - Security Architecture Ver1 0
Ad

Similar to Take It to the Cloud: The Evolution of Security Architecture (20)

PDF
Whose Cloud is It Anyway - Data Security in the Cloud
PPSX
The security of SAAS and private cloud
PDF
Hardening the cloud : Assuring agile security in high-growth environments
PPTX
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
PPT
Cloud Computing Security Needs & Problems Alon Refaeli
PDF
Security in the App Economy: How to Ride the Wave Without Wiping Out!
PPTX
Predicting The Future: Security and Compliance in the Cloud Age
PDF
A Different Approach to Securing Your Cloud Journey
PPSX
Zero-Trust SASE DevSecOps
PPTX
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
PDF
Skip the Security Slow Lane with VMware Cloud on AWS
PPTX
Compliance in the Cloud
PPTX
Cloud security for banks - the central bank of Israel regulations for cloud s...
PDF
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
PDF
A Comparative Review on Data Security Challenges in Cloud Computing
PDF
Asset Discovery in India – Redhunt Labs
PDF
Cloud services and it security
PPTX
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
PPTX
Chap 6 cloud security
PDF
Keys to success and security in the cloud
Whose Cloud is It Anyway - Data Security in the Cloud
The security of SAAS and private cloud
Hardening the cloud : Assuring agile security in high-growth environments
The Notorious 9 Cloud Computing Threats - CSA Congress, San Jose
Cloud Computing Security Needs & Problems Alon Refaeli
Security in the App Economy: How to Ride the Wave Without Wiping Out!
Predicting The Future: Security and Compliance in the Cloud Age
A Different Approach to Securing Your Cloud Journey
Zero-Trust SASE DevSecOps
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
Skip the Security Slow Lane with VMware Cloud on AWS
Compliance in the Cloud
Cloud security for banks - the central bank of Israel regulations for cloud s...
Blocking Viral SaaS Adoption is Blocking Innovation - Novosco & Amplipahe
A Comparative Review on Data Security Challenges in Cloud Computing
Asset Discovery in India – Redhunt Labs
Cloud services and it security
Get Your Head in the Cloud: A Practical Model for Enterprise Cloud Security
Chap 6 cloud security
Keys to success and security in the cloud

More from Priyanka Aash (20)

PPTX
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
PDF
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
PDF
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
PDF
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
PDF
Lessons Learned from Developing Secure AI Workflows.pdf
PDF
Cyber Defense Matrix Workshop - RSA Conference
PDF
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
PDF
Securing AI - There Is No Try, Only Do!.pdf
PDF
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
PDF
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
PDF
10 Key Challenges for AI within the EU Data Protection Framework.pdf
PDF
Techniques for Automatic Device Identification and Network Assignment.pdf
PDF
Keynote : Presentation on SASE Technology
PDF
Keynote : AI & Future Of Offensive Security
PDF
Redefining Cybersecurity with AI Capabilities
PDF
Demystifying Neural Networks And Building Cybersecurity Applications
PDF
Finetuning GenAI For Hacking and Defending
PDF
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
PDF
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
PDF
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf
AI Code Generation Risks (Ramkumar Dilli, CIO, Myridius)
From Chatbot to Destroyer of Endpoints - Can ChatGPT Automate EDR Bypasses (1...
Cracking the Code - Unveiling Synergies Between Open Source Security and AI.pdf
Oh, the Possibilities - Balancing Innovation and Risk with Generative AI.pdf
Lessons Learned from Developing Secure AI Workflows.pdf
Cyber Defense Matrix Workshop - RSA Conference
A Constitutional Quagmire - Ethical Minefields of AI, Cyber, and Privacy.pdf
Securing AI - There Is No Try, Only Do!.pdf
GenAI Opportunities and Challenges - Where 370 Enterprises Are Focusing Now.pdf
Coordinated Disclosure for ML - What's Different and What's the Same.pdf
10 Key Challenges for AI within the EU Data Protection Framework.pdf
Techniques for Automatic Device Identification and Network Assignment.pdf
Keynote : Presentation on SASE Technology
Keynote : AI & Future Of Offensive Security
Redefining Cybersecurity with AI Capabilities
Demystifying Neural Networks And Building Cybersecurity Applications
Finetuning GenAI For Hacking and Defending
(CISOPlatform Summit & SACON 2024) Kids Cyber Security .pdf
(CISOPlatform Summit & SACON 2024) Regulation & Response In Banks.pdf
(CISOPlatform Summit & SACON 2024) Cyber Insurance & Risk Quantification.pdf

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Modernizing your data center with Dell and AMD
PPTX
Cloud computing and distributed systems.
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Electronic commerce courselecture one. Pdf
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Teaching material agriculture food technology
Diabetes mellitus diagnosis method based random forest with bat algorithm
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Encapsulation_ Review paper, used for researhc scholars
Per capita expenditure prediction using model stacking based on satellite ima...
Modernizing your data center with Dell and AMD
Cloud computing and distributed systems.
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Electronic commerce courselecture one. Pdf
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
Spectral efficient network and resource selection model in 5G networks
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
The AUB Centre for AI in Media Proposal.docx
Reach Out and Touch Someone: Haptics and Empathic Computing
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...

Take It to the Cloud: The Evolution of Security Architecture

  • 1. SESSION ID: #RSAC Dana Elizabeth Wolf Take it to the Cloud: The Evolution of Security Architecture BAS-M07 Head of Products, OpenDNS OpenDNS/Cisco @dayowolf
  • 3. #RSAC Desktops Business Apps Critical Infrastructure Critical Infrastructure (Amazon, Rackspace, Windows Azure, etc.) Business Apps (Salesforce, Marketo, DocuSign, etc.) Laptops / Tablet Users Remote Users
  • 4. #RSAC When we talk about cloud security… Security Delivered in Cloud Security for New Architecture Virtual Appliances Hosted in Cloud 4
  • 5. #RSAC Cloud Security Alliance The Notorious Nine 2010 2013 2015 Top Threats 5 1 Data Breaches 5 2 Data Loss 6 3 Account Hijacking 2 4 Insecure Interfaces and APIs N/A 5 Denial of Service (DoS) 3 6 Malicious Insiders 1 7 Abuse of cloud services 7 8 Insufficient Due Diligence 4 9 Shared technology vulnerabilities 5
  • 6. #RSAC #1&2 Data Breach/Data Loss What is it? Data in the cloud that is exposed, lost or inaccessible New Vectors for Data Breach Oct 2015 – “Seriously, Get Off My Cloud!” – Exposure of AWS customer crypto keys Multi-Tenant Architecture Flaws in databases Data Loss is similar, but exacerbated Secure Tunnel != Protection of Data Losing encryption key Offline backups 6
  • 7. #RSAC #3 Account Hijacking What is it? Access to user identity & associated accounts How have attacks changed? Reuse of credentials/passwords amplifies impacts of attacks Man-In-The-Cloud stealing copy of synchronization token 7
  • 8. #RSAC #4 Insecure APIs What is it about? APIs enables cross-cloud compatibility What are API attacks? Kardashian Website Security Issues The Buffer attack – due to improper OAUTH code 8
  • 9. #RSAC #5 Denial of Service (DoS) What is it about? An attempt to make a machine or network resource unavailable to its intended users How have attacks changed? Frequency: attacks per month on the rise Collateral Damage Size: Largest attack in 2004 was 8 Gbps. Now upwards of 400 Gbps Complexity: multi-vector attacks are becoming more common 9
  • 10. #RSAC #6 Malicious Insiders What is it? A threat to the organization that originates from people within the organization such as employees, contractors, etc.. How have attacks changed? Amplified for cloud services due to convergence of IT Services/customers under a single management domain Management of Identity once an individual leaves the organization 10
  • 11. #RSAC Insufficient Due Diligence What is it? Investigation into a CSP prior to signing a contract. Clarity on SLAs Why does it matter? You are now more dependent on another provider for success of your business Added complexity of auditing multiple vendors’ security Where cloud data resides, different laws apply 11
  • 13. #RSAC Visibility Problems you want to solve What Cloud Applications are being used across my enterprise? What type of communication is happening to sanctioned & unsanctioned applications How risky are the cloud applications being used? Who does it? Secure Web Gateways Cloud Access Security Brokers (CASB) Next-Generation Firewall (NGFW)
  • 14. #RSAC Encryption / Data Loss Prevention (DLP) Making a comeback? Problems you want to solve Secure my data & reduce impact of data breach Reduce impact data loss What do I need? Use SSL Encryption / Tokenization / Key Management Apply DLP policies for Cloud Applications Governance – Retention policy
  • 15. #RSAC Watching the User Problems you want to solve Trust that proper controls are in place (CSP) Prevent misuse of admin / employee accounts What do I need? Identity Management Access Management (audit trail, time-bound access, request for access) User Entity Behavior Analytics 15
  • 16. #RSAC DDoS protection – who does it better? Problems you want to solve Service stay up and running during a DoS or DDoS attack What do I need? Leverage cloud architecture! Absorption and mitigation of DDoS attacks 16
  • 17. #RSAC Researching your cloud vendor Problems you want to solve Higher confidence level in the CSPs security posture Incorporate CSPs SLAs and security processes into main IT process Protection What do I need? Ask the CSP to share their internal security processes or assessment/audit Legally bind them to assessments. Review/negotiate indemnification clause. Review all SLAs Review of Architecture – look for APIs 17
  • 19. #RSAC Apply What You Have Learned Today Next week you should: Identify sanctioned and unsanctioned applications in your company In the first three months following this presentation you should: Understand cloud administrative accounts & monitor them Review if/where critical company data resides in the cloud Review existing legal contracts with CSPs to understand SLAs Within six months you should: Identify new processes to put in place to integrate CSP security with internal security workflow Identify new key technologies for protection of cloud assets 19