20
ARMOR | 2018 SAM CORONADO Solu%ons Consultant October 16, 2018 Leveraging the Cloud to Meet Security Requirements for Telemedicine

Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

ARMOR | 2018

SAM CORONADO Solu%ons Consultant

October 16, 2018

Leveraging the Cloud to Meet Security Requirements for Telemedicine

Page 2: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

2CONFIDENTIAL. DO NOT DISTRIBUTE.

PATIENTS DEMANDINNOVATION & AGILITY

Page 3: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

3CONFIDENTIAL. DO NOT DISTRIBUTE.

⚕"

Page 4: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

4CONFIDENTIAL. DO NOT DISTRIBUTE.

Page 5: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

5CONFIDENTIAL. DO NOT DISTRIBUTE.

THAT’S IT, RIGHT?

Page 6: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

6CONFIDENTIAL. DO NOT DISTRIBUTE.

SHARED RESPONSIBILITY

Page 7: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

7CONFIDENTIAL. DO NOT DISTRIBUTE.

!⏱!⏱!⏱!⏱!⏱!⏱!SECURITY IS EXPEN$IVE

!⏱!⏱!⏱!⏱!⏱!⏱!

Page 8: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

8CONFIDENTIAL. DO NOT DISTRIBUTE.

AM I REALLY A TARGET? !

Page 9: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

9CONFIDENTIAL. DO NOT DISTRIBUTE.

A TALE OF THREE SERVERS

Page 10: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

10CONFIDENTIAL. DO NOT DISTRIBUTE.

ATTACKS WERE DETECTED WITHIN MINUTES OF ACTIVATING HONEYPOT

SENSORS

EACH SERVER WAS SCANNED 1,000’s OF TIMES BY THREAT

ACTORS

THE MAJORITY OF THE ATTACKS WERE AUTOMATED, BRUTE FORCE

AUTHENTICATION ATTACKS

Page 11: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

11CONFIDENTIAL. DO NOT DISTRIBUTE.

DO YOU HAVE SENSITIVE DATA?

Page 12: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

12CONFIDENTIAL. DO NOT DISTRIBUTE.

ARE YOU A SECURITY COMPANY?

Page 13: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

13CONFIDENTIAL. DO NOT DISTRIBUTE.

THE PROBLEM WITH TOOLS !

Page 14: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

14CONFIDENTIAL. DO NOT DISTRIBUTE.

CAPABILITIES: WHAT YOU SHOULD CARE ABOUT

Page 15: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

15CONFIDENTIAL. DO NOT DISTRIBUTE.

THE STATE OF TELEMEDICINE CLOUD ARCHITECTURES

Page 16: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

16CONFIDENTIAL. DO NOT DISTRIBUTE.

THE FUTURE OF CLOUD TELEMEDICINE ARCHITECTURES

Page 17: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

17CONFIDENTIAL. DO NOT DISTRIBUTE.

SECURITY IS NOT AN AFTERTHOUGHT

Page 18: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

18CONFIDENTIAL. DO NOT DISTRIBUTE.

SECURITY INCIDENTS ARE INEVITABLE

Page 19: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

19CONFIDENTIAL. DO NOT DISTRIBUTE.

HAVE A PLAN & TEST IT

Page 20: Leveraging the Cloud to Meet Security Requirements for ...wa.himsschapter.org/sites/himsschapter/files... · a tale of three servers. confidential. do not distribute. 10 attacks were

THANK YOU.