15
Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

Embed Size (px)

Citation preview

Page 1: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

Drew Reinders | GSEC

Principal Solutions Engineer

Defending Your Castle

Page 2: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

THREATLANDSCAPE

Page 3: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Daily Attack Size

1 50Gbps Gbps

Source: Akamai

2011 20122008 2010 201420132009

Page 4: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

2014e

2013

20122011

2010

20092008

20072006

2005

Attacks Are Growing in Size

Modern attacks harness the scale of growing botnets

Gbps

Mpps

11

2

18

8

22

11

39

15

48

29

68

38

79

45

82

69

160

144

275

270

Page 5: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Attack Types – Last 30 Days

Source: Akamai

Page 6: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Targeting Applications for Data Theft

Increasing number of attacks focused on data and financial theft

SQL injection is the

primary culprit in 30% of data breaches

Source: Veracode

3 out of 4 will be targeted by Web application

exploits

Web applications are

responsible for 54% of hacking-based data breaches

Page 7: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Cost of Data Breach

Cost per Record Breached ~$188-199

Brand and Loyalty Impact is Significant

Breaches Impact Business Operations

Remediation Activity is Costly

Top Executives have been Replaced

Data Breach Risk Can’t be Transferred

Ponemon Institute: http://www.ponemon.org/library/2013-cost-of-data-breach-global-analysisABCNews: http://abcnews.go.com/Business/video/big-number-target-ceo-loses-job-security-breach-23588889

Cost per Record * Number of Records = Cost of Breach

Page 8: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Attackers Using Old and New Techniques

Recent Techniques

Application Attack, Reconnaissance - Prolific Vulnerability Scanning

Application Attack - Skipfish RFI/LFI to Compromise Host

Application Attack - Injection Attacks

Capacity Attack – Targeting DNS

Capacity Attack - DNS Reflection & Amplification

Capacity Attack – Request Floods (DirtJumper)

Capacity Attack - NTP Amplification (366x amplification factor)

Capacity Attack - Resource Intensive Requests (Search, Login, etc.)

Extortion – DDoS Pay and Stop, for a while

Fraud - Account Checkers and Harvesters

Defense MUST Adapt to Evolving Landscape

Page 9: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

MULTI PERIMETER

Page 10: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Application Defense

Page 11: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Multiple Perimeters for Internet-facing Applications

Internet

WebRetrieving content and data

OriginSupporting infrastructure and other applications

User

DNSFinding the application

Page 12: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Layered Defense

Page 13: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

Nine Layers of Cloud Security

1. Cloud security platform with massive scale

2. Reverse proxy automatically drops network-layer attacks

3. Geo-based blocking

4. Validating attackers against known lists

5. Adaptive rate controls provide rapid and automated response

6. Web application firewall with an Evolving Rule Set

7. Natural resiliency through caching

8. Leverage visibility of evolving attack vectors

9. Require cloud service providers to meet FedRAMP requirements

Page 14: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle

©2014 AKAMAI | FASTER FORWARDTM

There are no rules of architecture for castles in the clouds.

-Gilbert K. Chesterton

Page 15: Drew Reinders | GSEC Principal Solutions Engineer Defending Your Castle