SlideShare a Scribd company logo
Join Us:
https://www.linkedin.com/compa
ny/application-security-virtual-
meetups
QR Link:
Trending Actual Cloud Attacks - Eliminate the
noise
Alex Geleg
Trending
Actual
Cloud
Attacks
Eliminate the noise
@alexpeleg
alex@cynergy.app
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
Exploiting
exposed cloud
instances
Attack Flow
Attacker’s
Machine
Vulnerable
Cloud Hosted
Website
Cloud
Instance/Pod
Internal
Infrastructure
Roles and
Permissions
Impact
• Reputation
• Disruption of Service
• Leakage of sensitive data
• Regulatory fines
Mitigation
Access to internal services
Restrict
Continuously for web and infrastructure vulnerabilities
Scan
Privileges and Roles
Control
Access to
Sensitive Data
Attack Flow
Attacker’s
Machine
Organization
GitHub
Cloud
accounts and
resources
S3 buckets and Blobs
Website Source Code
API-Keys
And Secret keys
Impact
• Financial damage from key abuse
• Infrastructure access and takeover
• Sensitive data leakage
Mitigation
Git, Web Applications and Exposed Storage
Scan
Developers not to store cleartext keys
Train
Control Privileges
Control
Poor Identity
protection
Attack Flow
Attacker’s
Machine
Compromised
Credentials
Accounts and
resources
Cloud Identity
Impact
• Lack of detection
• Long time organization assets abuse
• Cloud Account takeover
Mitigation
a strong and long Password Policy
Maintain
Multi Factor Authentication (MFA)
Enable
Inactive Identities and empty groups
Delete
Access Keys
Rotate
Thank
You!
@alexpeleg
alex@cynergy.app
Reducing Operational Costs by Automating
Data Security
Ben Herzberg
January 2023
© 2023 Satori Inc. All rights reserved.
Reducing Operational
Costs by Automating
Data Security
20
About Me
@KernelXSS
https://www.linkedin.com/in/sysadmin
ben@satoricyber.com
● Co-author of “Snowflake
Security” (Apress)
● A DataSecOps Guy
● Chief Scientist, Satori
● Now also VPM :)
● Formerly:
○ Head of Research
(Imperva)
○ CTO (Cynet)
21
Agenda
● Data & Data Security
● DataSecOps
● Why Automate? And Why Now?
● What & How Do You Automate?
● Examples
● Q&A
Intro: Data and
Data Security
23
*Source: Statista, 7 June 2021 .
24
Default To Know
Need To Know
Need To Share
25
Everybody
wants
value from
data
26
Data Teams
Data-Driven Value
27
Data
is getting
hard to
control
28
More
risks
around
data
Compliance
Security
Privacy
Operational
DataSecOps
30
Learning From DevOps
31
DevOops
DevOps as a team, not as a mindset
Misconfigurations and Change
Management
Cost of security-as-a-patch can be high
Security has to be bolted into the process!
32
From DevOps to DevSecOps
● Shift-left
● Incremental changes
● Automation
● Security is embedded into the
process
Source: https://meming.world
33
So… What’s DataSecOps?
An agile, holistic, security-embedded approach to
coordination of the ever-changing data and its users,
aimed at delivering quick data-to-value, while keeping
data private, safe and well-governed.
34
DataSecOps Principles
● Security as continuous part of their data operations,
not an afterthought
● Ad-hoc continuous
● Separation of environments, testing & automation
● Prioritization is key - mostly sensitive data
● Data is clearly owned
● Simplified & deterministic data access
35
DataSecOps
Data-Driven Value
36
Would you do Manual DevSecOps?
Why Automate?
We are a billion dollar company but
anyone can run a SQL query and
get a million email addresses.
VP Data Engineering, SaaS Company
‫״‬ I have an army of people creating
users, roles and views. By the time
they are done, it's already outdated.
CDO, Financial Services Company
‫״‬
Security vs. Productivity
We all know…
29% loss of revenue due
to Data Breach.
But this is AS IMPORTANT…
Between 60% and 85% of
data projects fail.
DevOps + Data
engineering teams
experience 20%-30% loss
of productivity.
Or looking at it from another perspective…
62% says security & compliance
slows down data projects
71%-79% Of Data Leaders
Deal with PII
Automated Compliance
Always know
where data is, who has
access to it, what are
they doing with it
Tight Security
User can only access
data they need when
they need it
Productivity
Central governance,
distributed operations
with no restrictions on
data architecture
Key benefits of Just-in-Time Automated Access
Why (especially)
Now?
The Hacking Games - Security vs Productivity and Operational Efficiency 20230119
What & How To
Automate
46
What To Automate?
● Whatever:
○ has the most effect on security & compliance
○ is taking its toll
● Meaning:
○ Log processing
○ Data access (Authentication & Authorization)
○ Security policies
47
The Challenge
● Security teams are in charge of security
● Data is (usually) a black box
48
The Journey to Access Automation
Level 1 Level 2 Level 3
Data Access Model Ad-hoc Access Basic Access
Management
Just-in-Time Access
Provisioning Employees get access
upfront when they join or
ad-hoc when requested.
Basic RBAC framework. Employees get access
Just-in-Time based on
business needs.
Permissions Persistence 100% High 90% Based on business needs
(~20%)
Automation Fully manual Role provisioning
Some policies
Fully automated
Typical Time 1-3 months 6-9 months 12-18 months
49
How?
● DIY
● Orchestration
● Data Security Platform 😸
Some Automation
Results
51
DevOps: Access To Production
● Productivity was NOT top concern.
● 25% of DevOps time was spent on granting/revoking
permissions, etc.
● Moving to JIT → several headcounts are now working on
MEANINGFUL things.
● Factors: # data users, grant time, revoke time,
monitoring time, pager duties
52
Data Engineers: DWH
● Project initiated by the data team (DIY)
● Tale chasing:
○ Masking, RLS
○ Managing RBAC, ABAC
○ Moving targets
● # data users, time to set policies which gets longer,
roles management/explosion
Conclusion
54
Takeaways
● It’s 2023
● Got data? users? congrats, you need to automate.
● Choose how!
55
Thanks! (+Questions)
@KernelXSS
https://www.linkedin.com/in/sysadmin
ben@satoricyber.com
Keep in touch!
Read More
satoricyber.com
blog.satoricyber.com
Keep your BigQuery data encrypted
Ran Tibi
Keep your BigQuery
data encrypted
Ran Tibi
58
59
Application
BigQuery
60
Application
BigQuery
GCS
61
Application
BigQuery
GCS
PubSub Dataflow
62
{"id": "1", "email": "ran@example.com"}
{"id": "2", "email": "rose@example.com"}
{"id": "3", "email": "fox@example.com"}
{"id": "4", "email": "pilot@example.com"}
users.json
63
64
Application
BigQuery
GCS
PubSub Dataflow
65
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
SSL
SSL
SSL
SSL
SSL
SSL
SSL
66
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
SSL
SSL
SSL
SSL
SSL
SSL
SSL
67
68
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
Application layer
encryption
SSL
SSL
SSL
SSL
SSL
SSL
SSL
69
SELECT email,
DECRYPT(email) decrypted_email
FROM `app.users_encrypted`
70
AEAD Functions
Authenticated Encryption with Associated Data
● Encrypt
● Decrypt
● Create keyset
● …
71
72
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
73
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
74
But…
DECLARE keyset BYTES;
set keyset = from_base64('CKeEwo...MOqyAB');
select
email,
DETERMINISTIC_DECRYPT_STRING(keyset, email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`;
75
DEK
Data Encryption Key
KEK
Key Encryption Key
Symmetric
Encryption
Wrapper
Encrypted DEK
Data encryption / decryption process
76
76
DEK
KEK
Symmetric
Decryption
Wrapper
Encryption
Algorithm
Sensitive
message
Encrypted
message
Encryption
Decryption
Google KMS
✔ Create key
✔ Encrypt / Decrypt
✘ Export key
77
78
DEK Wrapper
Encrypted DEK
KEK
Google
KMS
encrypt
Runtime encryption process using KMS
79
79
DEK
KEK
Application
Wrapper
Encryption
Algorithm
Sensitive
message
Encrypted
message
Encryption
Decryption
Google
KMS
decrypt
80
gcloud kms keyrings create poc-keyring 
--location us-central1
gcloud kms keys create kek 
--keyring poc-keyring 
--location us-central1 
--purpose "encryption"
Create KEK in KMS
81
SET kms_resource_name = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SELECT KEYS.NEW_WRAPPED_KEYSET(
kms_resource_name,
'DETERMINISTIC_AEAD_AES_SIV_CMAC_256')
Generate wrapper
82
CJ6fqK4GEmQKWAowdHlwZS5nb29nbGVhcGlzL
mNvbS9nb29nbGUuY3J5cHRvLnRpbmsuQWVzR2
NtS2V5EiIaIOpnR2FJQUAwmaCGcBBUxAmw7HD
UOGP//YAe3PkJ5AeEGAEQARien6iuBiAB
On-demand decrypt in BigQuery
83
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
On-demand decrypt in BigQuery
84
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
On-demand decrypt in BigQuery
85
CREATE OR REPLACE FUNCTION `aead-poc.app.decrypt`(encodedText bytes)
RETURNS STRING AS (
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN('gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek',
b'004324........003'),
encodedText, "")
);
SELECT email,
`aead-poc.app.decrypt`(email) decrypted_email
FROM `app.users_encrypted`
86
IAM
roles/cloudkms.cryptoKeyEncrypterDecrypter
VS
roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation
87
IAM
roles/cloudkms.cryptoKeyEncrypterDecrypter
VS
roles/cloudkms.cryptoKeyEncrypterDecrypterViaDelegation
88
No one except for the application
runtime has access to the DEK
89
Use Tink for encryption in application side
90
import tink
daead.register()
keyset_handle = tink.KeysetHandle.read(
tink.JsonKeysetReader('{"encryptedKeyset":"Ci..g=",...}'),
gcpkms.GcpKmsClient('',gcp_credential_path)
.get_aead('gcp-kms://projects/…/kek'))
cipher = keyset_handle.primitive(daead.DeterministicAead)
ciphertext = cipher.encrypt_deterministically(b'plaintext', b'')
plaintext = cipher.decrypt_deterministically(ciphertext, b'')
Decrypt the wrapper
Wrapper
KEK URI
Create Cipher object
Encrypt / Decrypt using the DEK
On-demand encrypt in BigQuery
91
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
CREATE TABLE `aead-poc.app.users_encrypted` as
SELECT
DETERMINISTIC_ENCRYPT(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") email
FROM `aead-poc.app.users`
92
Application
BigQuery
GCS
PubSub Dataflow
Encryption in transit
Encryption at rest
Application layer
encryption
SSL
SSL
SSL
SSL
SSL
SSL
SSL
Deterministic VS Nondeterministic
93
Performance
94
100M
Records
64
Bytes
Plain text Decrypt first
Elapsed time Slot time Elapsed time Slot time
Substring + group by 14 sec 10 min 15 sec 18 min
Select distinct 21 sec 23 min 22 sec 35 min
~50-80%
Almost the same
Pricing
95
SET KMS_RESOURCE_NAME = 'gcp-kms://projects/aead-
poc/locations/us-central1/keyRings/poc-
keyring/cryptoKeys/kek';
SET WRAPPER =
FROM_BASE64("CiQA14LE......................brY9fZ3U=");
SELECT
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, WRAPPER),
email, "") decrypted_email
FROM `aead-poc.app.users_encrypted`
Pricing
96
Storage overhead
21 Bytes per encrypted field
Limitations
● Key per tenant - not supported
97
select
email,
DETERMINISTIC_DECRYPT_STRING(
KEYS.KEYSET_CHAIN(KMS_RESOURCE_NAME, tp.wrapper),
email, "") AS decrypted_email
FROM `aead-poc.app.users_encrypted`
JOIN `aead-poc.app.tenants_wrappers` tw
USING (tenant_id)
Keep it in mind
98
Follow me
runtibi@gmail.com
/rantibi
@rantb
99
Q & A
100
Thank You!
Questions?
To be continued…
https://www.linkedin.com/company/application-security-virtual-meetups

More Related Content

PDF
Data centric security key to digital business success - ulf mattsson - bright...
PDF
Where data security and value of data meet in the cloud brighttalk webinar ...
PPTX
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
PDF
Encrypt-Everything-eB.pdf
PPTX
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
PDF
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
PDF
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
PPTX
User management - the next-gen of authentication meetup 27012022
Data centric security key to digital business success - ulf mattsson - bright...
Where data security and value of data meet in the cloud brighttalk webinar ...
Delivering User Behavior Analytics at Apache Hadoop Scale : A new perspective...
Encrypt-Everything-eB.pdf
UNCOVER DATA SECURITY BLIND SPOTS IN YOUR CLOUD, BIG DATA & DEVOPS ENVIRONMENT
Strategic Direction Session: Enhancing Data Privacy with Data-Centric Securit...
Encryption and Key Management: Ensuring Compliance, Privacy, and Minimizing t...
User management - the next-gen of authentication meetup 27012022

Similar to The Hacking Games - Security vs Productivity and Operational Efficiency 20230119 (20)

PDF
Dataguise hortonworks insurance_feb25
PPTX
IT Security Essentials
PDF
Isaca new delhi india - privacy and big data
PDF
Solving the Really Big Tech Problems with IoT
PPTX
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
PDF
Where Data Security and Value of Data Meet in the Cloud
PDF
Five_Big_Data_Security_Pitfalls
PDF
Data Breaches: The Untold Story
PPTX
Proven Practices to Protect Critical Data - DarkReading VTS Deck
PDF
eBook: 5 Steps to Secure Cloud Data Governance
PDF
CIO Review - Top 20 CyberSecurity
PPTX
Perspectives on Ethical Big Data Governance
PPT
How much does it cost to be Secure?
PDF
Data Security and Protection in DevOps
PPTX
Privacies are coming
PPTX
Security and compliance in Office 365 -Part 1
PDF
OSDC 2019 | Automating Security in Your Data Pipline by Troy Harvey
PDF
Maturing Your Organization's Information Risk Management Strategy
PPTX
From reactive to automated reducing costs through mature security processes i...
PPTX
Integrate Security into DevOps - SecDevOps
Dataguise hortonworks insurance_feb25
IT Security Essentials
Isaca new delhi india - privacy and big data
Solving the Really Big Tech Problems with IoT
"Cryptography, Data Protection, and Security For Start-Ups In The Post Snowde...
Where Data Security and Value of Data Meet in the Cloud
Five_Big_Data_Security_Pitfalls
Data Breaches: The Untold Story
Proven Practices to Protect Critical Data - DarkReading VTS Deck
eBook: 5 Steps to Secure Cloud Data Governance
CIO Review - Top 20 CyberSecurity
Perspectives on Ethical Big Data Governance
How much does it cost to be Secure?
Data Security and Protection in DevOps
Privacies are coming
Security and compliance in Office 365 -Part 1
OSDC 2019 | Automating Security in Your Data Pipline by Troy Harvey
Maturing Your Organization's Information Risk Management Strategy
From reactive to automated reducing costs through mature security processes i...
Integrate Security into DevOps - SecDevOps

More from lior mazor (20)

PPTX
Webinar_ Building Your Secure AI Roadmap.pptx
PDF
Bridging The Cloud and Application Security Gaps Meetup 15102024
PDF
The Hacking Games - Hybrid Cloud Attack Surface Reduction Meetup 09102024.pdf
PDF
Securing the Future of Applications Meetup 18092024
PDF
GenAI Risks & Security Meetup 01052024.pdf
PDF
The Power of Malware Analysis and Development.pdf
PDF
The CISO Problems Risk Compliance Management in a Software Development 030420...
PPTX
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
PPTX
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
PPTX
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
PPTX
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
PDF
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
PPTX
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
PPTX
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
PPTX
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
PPTX
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
PPTX
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
PPTX
Software Supply Chain Security Meetup 21062022
PPTX
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
PPTX
Securing and automating your application infrastructure meetup 23112021 b
Webinar_ Building Your Secure AI Roadmap.pptx
Bridging The Cloud and Application Security Gaps Meetup 15102024
The Hacking Games - Hybrid Cloud Attack Surface Reduction Meetup 09102024.pdf
Securing the Future of Applications Meetup 18092024
GenAI Risks & Security Meetup 01052024.pdf
The Power of Malware Analysis and Development.pdf
The CISO Problems Risk Compliance Management in a Software Development 030420...
Reveal the Security Risks in the software Development Lifecycle Meetup 060320...
The Hacking Games - A Road to Post Exploitation Meetup - 20240222.pptx
Secure Your DevOps Pipeline Best Practices Meetup 08022024.pptx
Why 2024 will become the Year of SaaS Security Meetup 24012024.pptx
Vulnerability Alert Fatigue and Malicious Code Attacks Meetup 11012024.pdf
The Hacking Game - Think Like a Hacker Meetup 12072023.pptx
Sailing Through The Storm of Kubernetes CVEs Meetup 29062023.pptx
Emphasizing Value of Prioritizing AppSec Meetup 11052023.pptx
The Hacking Games - Cloud Vulnerabilities Meetup 22032023.pptx
The Hacking Games - Operation System Vulnerabilities Meetup 29112022
Software Supply Chain Security Meetup 21062022
Application Security - Dont leave your AppSec for the last moment Meetup 2104...
Securing and automating your application infrastructure meetup 23112021 b

Recently uploaded (20)

PDF
Cost to Outsource Software Development in 2025
PDF
Softaken Excel to vCard Converter Software.pdf
PDF
Designing Intelligence for the Shop Floor.pdf
PPTX
Introduction to Artificial Intelligence
PDF
Adobe Illustrator 28.6 Crack My Vision of Vector Design
PPTX
history of c programming in notes for students .pptx
PDF
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
PPTX
Transform Your Business with a Software ERP System
PDF
System and Network Administration Chapter 2
PPTX
CHAPTER 2 - PM Management and IT Context
PPTX
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
PDF
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PDF
PTS Company Brochure 2025 (1).pdf.......
PDF
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
PDF
Navsoft: AI-Powered Business Solutions & Custom Software Development
PPTX
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
PDF
Upgrade and Innovation Strategies for SAP ERP Customers
PDF
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
PPTX
Why Generative AI is the Future of Content, Code & Creativity?
PDF
Design an Analysis of Algorithms II-SECS-1021-03
Cost to Outsource Software Development in 2025
Softaken Excel to vCard Converter Software.pdf
Designing Intelligence for the Shop Floor.pdf
Introduction to Artificial Intelligence
Adobe Illustrator 28.6 Crack My Vision of Vector Design
history of c programming in notes for students .pptx
Internet Downloader Manager (IDM) Crack 6.42 Build 42 Updates Latest 2025
Transform Your Business with a Software ERP System
System and Network Administration Chapter 2
CHAPTER 2 - PM Management and IT Context
Log360_SIEM_Solutions Overview PPT_Feb 2020.pptx
Claude Code: Everyone is a 10x Developer - A Comprehensive AI-Powered CLI Tool
PTS Company Brochure 2025 (1).pdf.......
Why TechBuilder is the Future of Pickup and Delivery App Development (1).pdf
Navsoft: AI-Powered Business Solutions & Custom Software Development
Oracle E-Business Suite: A Comprehensive Guide for Modern Enterprises
Upgrade and Innovation Strategies for SAP ERP Customers
T3DD25 TYPO3 Content Blocks - Deep Dive by André Kraus
Why Generative AI is the Future of Content, Code & Creativity?
Design an Analysis of Algorithms II-SECS-1021-03

The Hacking Games - Security vs Productivity and Operational Efficiency 20230119