SlideShare a Scribd company logo
TOP 5 PRIORITIES FOR
CLOUD SECURITY
TERI RADICHEL
2ND SIGHT LAB
@TERIRADICHEL
ABOUT THIS PRESENTATION
For Executives
New approach to security
Not technical details, design concepts
Get a handle on security problems
5 Priorities - Where to invest
1. DESIGN FOR FAILURE
Ransomware recovery
Malware recovery
System patches
Disaster recovery
Code Spaces ~ The
company that was deleted
Can't Patch That…
It Might Break
S3 failure ~ people can't
turn on lights
Stolen data is encrypted
and cannot be accessed
AWS Patches Spectre on
AWS in a few days
Netflix failover to new
region in 7 minutes
DESIGNED TO FAIL DESIGNED FOR FAILURE
2. SEGMENTATION
People
Data
Networks
Processes
System Components (Microservices)
Security software ~ One
key to rule them all
Admin holds city of San
Francisco systems hostage
Security engineer stalks
women via access to PII
Separate teams for
different systems
3-Party Collusion Model
to access data
Systems not directly
accessible to Internet
NOT SEGMENTED SEGMENTED
3. CONFIGURATION AS CODE
Stored in source control
Track who changed, why, when
Use a repository for components
Test deployments
Security has no idea
what’s going on.
Changes can’t be rolled
back or re-deployed
Frequent Error Due to
Human Error
Code is scanned for
errors when checked in
Auto-remediation before
code reaches production
Test deployments and
rollback in advance
BUTTON PUSHING CHECKED IN CODE
4. CICD + SECURITY
CICD = Automated Deployment
Security checkpoint
Invest in team + time
Security pros + developers
Event-driven, automated
CONTINUOUS INTEGRATION + DEPLOYMENT (CICD)
PROMOTE
CODE
TRIGGERS
JOB
SECURITY
CHECKS
DEPLOYPASS
FAIL
Security review bottleneck
for deployment.
People eventually get
frustrated; bypass security.
Security reacts to problems
after in production.
Automated software
inventory.
Automated governance
(enforce policies).
Auto-remediation and
training before deployment.
OLD SCHOOL CICD SECURITY CHECKS
5. C-LEVEL SECURITY REPORTING
Security reports the C-level can understand
Security posture of the organization
Track root cause of recent security breaches
Security training for executives?
WHY SECURITY REPORTING?
Those responsible for assigning priorities other than security are held responsible
for security vulnerabilities and failure…not the person following orders.
Well-designed reports make source of security problem transparent – prioritize and
clearly assign the work to fix the security problems.
Attribution shifts from the C-Level to the person who didn’t follow instructions.
SAMPLE REPORT ~ DATA DRIVEN
Metric % Related Breach
Systems with fully patched operating systems 95 WannaCry
Systems with fully patched software 25 Equifax
Encrypted data 85 S3 Buckets
Systems directly exposed to Internet 30 WannaCry
Systems with least privilege host-based firewall 75 NotPetya
Systems tested for failure recovery 15 Ransomware
Secrets stored separated from code, secured 20 Many…
PUTTING IT ALL TOGETHER
1. Design and TEST systems for failure recovery
2. Segment teams, networks, data, etc.
3. All deployments via CODE stored in source control
4. INVEST in secure, automated deployment system
5. C-Level reporting that drives remediation
THANK YOU!
Teri Radichel | CEO, 2nd Sight Lab | @teriradichel

More Related Content

PDF
From Ukraine to Pacemakers!
PDF
Servers compliance: audit, remediation, proof
DOCX
Surelog Intelligence
PPTX
Take a sneak peek into Saner 2.0
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PPTX
Six Steps to SIEM Success
PDF
Need of SIEM when You have SOAR
From Ukraine to Pacemakers!
Servers compliance: audit, remediation, proof
Surelog Intelligence
Take a sneak peek into Saner 2.0
SIEM 101: Get a Clue About IT Security Analysis
Six Steps to SIEM Success
Need of SIEM when You have SOAR

What's hot (20)

PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PDF
SIEM evaluator guide for soc analyst
PPTX
Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: ...
PDF
OSB130 Patch Management Best Practices
PPTX
Security protection
PPTX
Cyber threat detection by siem tools
PDF
Outlier+Overview
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
Saner 2.0 product sheet
PPT
Lumension Security Solutions
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Qualys Corporate Brochure
DOCX
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
PDF
SureLog intelligent response
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PDF
Security Information and Event Management
PDF
Security Implications of the Cloud
PPTX
7 Steps to Build a SOC with Limited Resources
PPTX
Beginner's Guide to SIEM
DOCX
Why taxonomy is critical
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
SIEM evaluator guide for soc analyst
Making (Implicit) Security Requirements Explicit for Cyber-Physical Systems: ...
OSB130 Patch Management Best Practices
Security protection
Cyber threat detection by siem tools
Outlier+Overview
Malware detection how to spot infections early with alien vault usm
Saner 2.0 product sheet
Lumension Security Solutions
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Qualys Corporate Brochure
Monitoring Privileged User Actions for Security and Compliance with SureLog: ...
SureLog intelligent response
Improve Threat Detection with OSSEC and AlienVault USM
Security Information and Event Management
Security Implications of the Cloud
7 Steps to Build a SOC with Limited Resources
Beginner's Guide to SIEM
Why taxonomy is critical
Ad

Similar to Teri_Radichel_Top_5_Priorities_for_Cloud_Security (20)

PDF
CISSP-2022 Update domain 3 certification handouts
PPT
Software Security Testing
PDF
How Organizations can Secure Their Database From External Attacks
ODP
Securing control systems v0.4
PPTX
Securing Systems - Still Crazy After All These Years
PDF
Using security to drive chaos engineering - April 2018
PDF
The Intersection of Security & DevOps
PPTX
Sql server security in an insecure world
PDF
The Intersection of Security & DevOps
PDF
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
PPT
3.Secure Design Principles And Process
PDF
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
PPTX
Prevent Getting Hacked by Using a Network Vulnerability Scanner
PPTX
For Business's Sake, Let's focus on AppSec
ODP
Cloud Computing
PDF
The Intersection of Security and DevOps
PDF
The Intersection of Security & DevOps
PDF
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
PDF
Rapid Threat Modeling Techniques
PDF
01_Metasploit - The Elixir of Network Security
CISSP-2022 Update domain 3 certification handouts
Software Security Testing
How Organizations can Secure Their Database From External Attacks
Securing control systems v0.4
Securing Systems - Still Crazy After All These Years
Using security to drive chaos engineering - April 2018
The Intersection of Security & DevOps
Sql server security in an insecure world
The Intersection of Security & DevOps
Secure-by-Design Using Hardware and Software Protection for FDA Compliance
 
3.Secure Design Principles And Process
GISEC 2015 Your Network in the Eyes of a Hacker - DTS Solution
Prevent Getting Hacked by Using a Network Vulnerability Scanner
For Business's Sake, Let's focus on AppSec
Cloud Computing
The Intersection of Security and DevOps
The Intersection of Security & DevOps
5-Ways-To-Future-Proof-Your-SIEM-Securonix[1].pdf
Rapid Threat Modeling Techniques
01_Metasploit - The Elixir of Network Security
Ad

More from TriNimbus (20)

PDF
Convergence of Containers and Serverless by Mency Woo
PPTX
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
PPTX
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
PPTX
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
PDF
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
PDF
Using Active Directory in AWS
PDF
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
PPTX
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
PPTX
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
PPTX
Virtual Desktops on AWS by Mike Burke, Farm Credit Canada
PPTX
Dan Crawford - Canadian Executive Cloud & DevOps Summit Presentation
PPTX
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
PPTX
Eric_Gales_Amazon_June_9_2017_presentation
PPTX
Darin Briskman_Amazon_June_9_2017_Presentation
PDF
Web App Security Presentation by Ryan Holland - 05-31-2017
PDF
VMware + Amazon Web Services
PDF
DevOps in the Amazon Warehouse - Shawn Gandhi
PDF
The New Normal - Eric Gales, AWS Canada
PDF
Staying Secure When Moving to the Cloud - Dave Millier
PDF
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...
Convergence of Containers and Serverless by Mency Woo
Juni_Mukherjee_The_DevSecOps_Journey_AntiPatterns_Analytics_and_Insights
Peter_Smith_PhD_ACL_10000_Foot_View_of_Big_Data
Darin_Briskman_AWS_Machine_Learning_Beyond_the_Hype
Amazon Elastic Container Service for Kubernetes (EKS), AWS Fargate and Beyond
Using Active Directory in AWS
AWS 2017 re:Invent re:Cap - TriNimbus Presentation Slides
Performance Optimization of Cloud Based Applications by Peter Smith, ACL
Building and Operating AI Services at Scale by Randall Hunt, Amazon Web Services
Virtual Desktops on AWS by Mike Burke, Farm Credit Canada
Dan Crawford - Canadian Executive Cloud & DevOps Summit Presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Eric_Gales_Amazon_June_9_2017_presentation
Darin Briskman_Amazon_June_9_2017_Presentation
Web App Security Presentation by Ryan Holland - 05-31-2017
VMware + Amazon Web Services
DevOps in the Amazon Warehouse - Shawn Gandhi
The New Normal - Eric Gales, AWS Canada
Staying Secure When Moving to the Cloud - Dave Millier
Goran (Kima) Kimovski, Beyond Virtualization: IT In a World of Software Defin...

Recently uploaded (20)

PPTX
Big Data Technologies - Introduction.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Empathic Computing: Creating Shared Understanding
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPTX
MYSQL Presentation for SQL database connectivity
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PPTX
A Presentation on Artificial Intelligence
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Modernizing your data center with Dell and AMD
Big Data Technologies - Introduction.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Diabetes mellitus diagnosis method based random forest with bat algorithm
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Empathic Computing: Creating Shared Understanding
Digital-Transformation-Roadmap-for-Companies.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
NewMind AI Weekly Chronicles - August'25 Week I
MYSQL Presentation for SQL database connectivity
The Rise and Fall of 3GPP – Time for a Sabbatical?
A Presentation on Artificial Intelligence
Understanding_Digital_Forensics_Presentation.pptx
Modernizing your data center with Dell and AMD

Teri_Radichel_Top_5_Priorities_for_Cloud_Security

  • 1. TOP 5 PRIORITIES FOR CLOUD SECURITY TERI RADICHEL 2ND SIGHT LAB @TERIRADICHEL
  • 2. ABOUT THIS PRESENTATION For Executives New approach to security Not technical details, design concepts Get a handle on security problems 5 Priorities - Where to invest
  • 3. 1. DESIGN FOR FAILURE Ransomware recovery Malware recovery System patches Disaster recovery
  • 4. Code Spaces ~ The company that was deleted Can't Patch That… It Might Break S3 failure ~ people can't turn on lights Stolen data is encrypted and cannot be accessed AWS Patches Spectre on AWS in a few days Netflix failover to new region in 7 minutes DESIGNED TO FAIL DESIGNED FOR FAILURE
  • 6. Security software ~ One key to rule them all Admin holds city of San Francisco systems hostage Security engineer stalks women via access to PII Separate teams for different systems 3-Party Collusion Model to access data Systems not directly accessible to Internet NOT SEGMENTED SEGMENTED
  • 7. 3. CONFIGURATION AS CODE Stored in source control Track who changed, why, when Use a repository for components Test deployments
  • 8. Security has no idea what’s going on. Changes can’t be rolled back or re-deployed Frequent Error Due to Human Error Code is scanned for errors when checked in Auto-remediation before code reaches production Test deployments and rollback in advance BUTTON PUSHING CHECKED IN CODE
  • 9. 4. CICD + SECURITY CICD = Automated Deployment Security checkpoint Invest in team + time Security pros + developers Event-driven, automated
  • 10. CONTINUOUS INTEGRATION + DEPLOYMENT (CICD) PROMOTE CODE TRIGGERS JOB SECURITY CHECKS DEPLOYPASS FAIL
  • 11. Security review bottleneck for deployment. People eventually get frustrated; bypass security. Security reacts to problems after in production. Automated software inventory. Automated governance (enforce policies). Auto-remediation and training before deployment. OLD SCHOOL CICD SECURITY CHECKS
  • 12. 5. C-LEVEL SECURITY REPORTING Security reports the C-level can understand Security posture of the organization Track root cause of recent security breaches Security training for executives?
  • 13. WHY SECURITY REPORTING? Those responsible for assigning priorities other than security are held responsible for security vulnerabilities and failure…not the person following orders. Well-designed reports make source of security problem transparent – prioritize and clearly assign the work to fix the security problems. Attribution shifts from the C-Level to the person who didn’t follow instructions.
  • 14. SAMPLE REPORT ~ DATA DRIVEN Metric % Related Breach Systems with fully patched operating systems 95 WannaCry Systems with fully patched software 25 Equifax Encrypted data 85 S3 Buckets Systems directly exposed to Internet 30 WannaCry Systems with least privilege host-based firewall 75 NotPetya Systems tested for failure recovery 15 Ransomware Secrets stored separated from code, secured 20 Many…
  • 15. PUTTING IT ALL TOGETHER 1. Design and TEST systems for failure recovery 2. Segment teams, networks, data, etc. 3. All deployments via CODE stored in source control 4. INVEST in secure, automated deployment system 5. C-Level reporting that drives remediation
  • 16. THANK YOU! Teri Radichel | CEO, 2nd Sight Lab | @teriradichel