36
www.cloudsec.com | #cloudsec Security for your Applications from the Inside Out Mick McCluney, ANZ Technical Leader | Trend Micro

Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

  • Upload
    others

  • View
    1

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

www.cloudsec.com | #cloudsec

Security for your Applications from the Inside Out

Mick McCluney, ANZ Technical Leader | Trend Micro

Page 2: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Security for your applications from the inside out

Abstract: Traditional security measures are struggling to keep up with the rise of cloud, containerised and serverless workloads. With the majority of traffic now encrypted and thousands of ephemeral instances across multiple clouds, a new approach to application security is required. In this session, we will discuss the challenges traditional security teams are facing then take a look at how enterprises can overcome them by integrating security into the heart of their applications

Page 3: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2017 Trend Micro Inc.3

Evolution of Infrastructure & Applications

Page 4: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.4

Infrastructure Change…

PhysicalServers

Page 5: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.5

Virtual Servers

Virtual Desktops

Infrastructure Change…

PhysicalServers

Page 6: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.6

Cloud

Virtual Servers

Virtual Desktops

Infrastructure Change…

PhysicalServers

Page 7: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.7

Cloud

Virtual Servers

Virtual Desktops

Application Change…

PhysicalServers

Monoliths

Page 8: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.8

Cloud

Virtual Servers

Virtual Desktops

Application Change

PhysicalServers

AWS Lambda Azure Functions

ContainersServerless

Google Functions

Monoliths

Microservices

Page 9: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.9

Traditional Applications (Monoliths)

• Monolithic

• Treated as pets

• Hard to scale

• Bloated Windows & Linux OS

Page 10: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.10

DevOps Applications

• Microservices:– Fine-grained

– Extremely scalable

– Treated as cattle

• Containers:– Package code and all dependencies

– Lightweight and standalone

• Serverless:– Code with “no” underlying OS

Page 11: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.11

Cloud

Virtual Servers

Virtual Desktops

A Challenging Journey Application Change…means

PhysicalServers

AWS Lambda Azure Functions

ContainersServerless

Google Functions

Monoliths

Microservices

Organisational Change

Page 12: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.12

5 Emerging technologies for Cloud Security

Host OS Protection

Docker Protection

Container Protection

Full Protection

Kubernetes Protection

Physical, Virtual or Cloud Container Nodes

New

New

New

New

Application Container

(e.g. NGINX)

Docker Engine

Operating System

Deep Security Agent

Kubernetes

Application Container

(e.g.Webapp)

Application Container

(e.g. MySQL)

Application Protection

Transit Gateway

ZDI Network Protection

CI/

CD

-Sm

art

Ch

eck

Pip

elin

e P

rote

ctio

n

New

Page 13: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2017 Trend Micro Inc.13

Securing Your Pipeline

Page 14: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Page 15: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2017 Trend Micro Inc.15

Protect the Network

Page 16: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.16

The problem with cloud network security today

Today’s network security solutions are complex, expensive and introduce friction• unnatural, not purpose built for the

cloud

• disrupts business, causing friction, slowing down ops & devops

• re-architecting is time consuming and you lose the benefits of the cloud

Page 17: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Network Protection powered by TippingPoint

Security Services VPC VPC

Workloads

VPC

Workloads

Network Protection

Transit Gateway

Transit Gateway

Transit Gateway

Internet

Page 18: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2017 Trend Micro Inc.18

Protecting the Host

Page 19: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2018 Trend Micro Inc.19

Hybrid Cloud Security Solution

Network Security

Firewall Vulnerability Scanning

Intrusion Prevention

Stop network attacks, shield vulnerable applications &

servers

Anti-MalwareSandbox Analysis

Malware Prevention

Stop malware & targeted attacks

Behavioral Analysis & Machine Learning

System Security

Lock down systems & detect suspicious activity

Application Control

Integrity Monitoring

Log Inspection

Page 20: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2017 Trend Micro Inc.20

Securing your Containers

Page 21: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Container Security Challenges

Vendor and tool proliferation

IT thinks they need a container specific product separate from a unified solution which leads to additional tools and environment complexity

Impact on continuous releases

Security teams are negatively impacted by the limited ways they can protect continuously delivered container applications and allow DevOps to move faster

Unsecured pipeline risks

DevOps teams are focused on application output and uptime overlooking IT Security protocols and early warning threat signals

Challenges With Securing Containers

Page 22: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.22

BUILD SECURESecurity fit for DevOps

at the speed of business from the first build

RUN ANYWHERECloud neutral, and multi-

architecture for modern applications

SHIP FASTAutomated security for the

CI/CD pipeline and cloud based container applications

Full Lifecycle, Full Stack Container Security

Page 23: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.23

Growing Threats Across Container Environments

Vulnerable codeMalware from public sources

Embedded secretsNon-compliant content

Attacks against running applications

Attacks against container platforms

Attacks against OS hosting containers

Host RuntimeSoftware Build Pipeline

BuildCommit Push Deploy

Page 24: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.24

Build Pipeline Scanning/Detection

Protection Deployment

Securing your CI/CD Pipeline & Docker Runtime

Pre-registry Scanning

Registry Scanning

Protection for Container Workload Host

Container Security

Kubernetes & Docker Platform Protection

Full Lifecycle, Full Stack Container Security

Compliance & Configuration

BuildCommit Push Deploy

❑ New Capabilities

Secrets & Keys

Vulnerabilities

CVE Whitelisting

Host Agent

Custom/IoC Sweeping

Inter-Container (E-W) Traffic inspection

Malware

Page 25: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.25

Protecting your Application from the Inside

Page 26: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.26

• What is App Protect?

• What are the benefits?

• How does it work?

• How is it different from existing tech?

Page 27: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.27

What is App Protect?

• RASP Technology – Runtime Application Self-Protection– Self-defending apps

• Secures applications from exploitation of OWASP-style vulnerabilities by simply including a library/module in the application code

• Also includes Deep Security IPS and Anti-malware engines

Page 28: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.28

Benefits of App Protect3 major problem areas• App Protect allows you to secure what has been difficult/impossible to secure

– Serverless (Functions-as-a-Service) – AWS Lambda, Azure Functions, Google Functions

• Where the only thing you can control is the code itself

– Fargate (Fully Managed Kubernetes – Cannot manage the host)

• The only thing you can control is the code and the container it runs in

– SSL/TLS encrypted communications

• No need for a decryption appliance

• App Protect sees all application data from the code’s point of view

– Less room for error / rules are fewer and more effective

– Inspects ALL I/O of the application (not just the network traffic)

Page 29: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.29

How does App Protect work?

• To use App Protect, all development has to do is include/import the App Protect library/module in their code

• The library/module hooks important I/O functions within the application and applies a set of configurable rules

• Rules can be set to mitigate or report

• The library/module sends important events back to central management

– Includes line-of-code visibility into the threat

Page 30: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.30

How is App Protect Different?

• Better visibility than traditional WAF; More accurate

• Works with Functions as a Service (FaaS)

• Works with Fargate

• Also excellent with container based Micro-Services

• Works anywhere you have code

– Apps currently under development

– Apps you’ve inherited/acquired

• Includes IPS and Anti-Malware protection

Page 31: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.31

App Protect GA Platform Support

Page 32: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

Copyright 2019 Trend Micro Inc.32

Architecture

• Deep Instrumentation at the

runtime, framework, and library

level

• Security Logic runs in embedded,

JIT-compiled runtime(Lua)

• Configuration is updated as

IMMUNIO learns about application

operation.

Page 33: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.33

App Protect Demo

Page 34: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.34

Application Attack & Prevention on AWS

Page 35: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

© 2019 Trend Micro Inc.35

Sample Dockerfile – Java Spring

Page 36: Security for your Applications from the Inside Out Trend Micro_Mick McCluney.pdf · 2019-10-01 · Security for your applications from the inside out Abstract: Traditional security

#cloudsec www.cloudsec.com

THANK YOUMick McCluney, ANZ Technical Leader | Trend Micro