13
DC Cloud Security Summit Conor F. Sibley, CTO 10/20/2016

Higher Logic at the Cloud Security Summit

Embed Size (px)

Citation preview

Page 1: Higher Logic at the Cloud Security Summit

DC Cloud Security SummitConor F. Sibley, CTO10/20/2016

Page 2: Higher Logic at the Cloud Security Summit

Higher Logic at a glance - Company• Founded 2007• ~100 employees• Growing fast• Product• Online Communities• Volunteer Management• Customer Advocacy Management• Small Org Web Management• Event Communities

Page 3: Higher Logic at the Cloud Security Summit

Higher Logic at a glance - Technology• Platform• AWS (auto scale ~65

instances)• Lots of AWS Services

(SES/SQS)• MSSQL • IIS• C#• .NET• Solr• HAProxy

• ClamAV• Active Directory• SSRS• MySQL• PostgreSQL• Redis• Tons of OSS in the App

tier

Page 4: Higher Logic at the Cloud Security Summit

The Problem(s)• Since founding we have seen ever increasing:• Contractual security requirements• Larger and more security conscious clients• Attack sophistication• Issues finding staff with security expertise• Number of employees

Page 5: Higher Logic at the Cloud Security Summit

What we used to do• Housed in a budget datacenter• Experience performance degradation or notification

from client• Panic• TCPDump/Scan each machine/LogParserLizard• Panic worse• IPTables Block/Reprovision servers/Deploy new code• Waste days on post issue investigation instead of

focusing on growing our business

Page 6: Higher Logic at the Cloud Security Summit

Product Security Model – Defense in Depth• Physical Security• AWS

• Network Security• Alert Logic

• Application Security• Higher Logic

• Content Security• Client

Page 7: Higher Logic at the Cloud Security Summit

AWS - Physical• Compliance Center• https://aws.amazon.com/compliance/

Page 8: Higher Logic at the Cloud Security Summit

Alert Logic - Network• Web Application Firewall• Reduces overall system load

• Offsite Log Management• Single point of investigation

• Security Operations Center• 24/7 we get to sleep and don’t have to hire extra staff

• Intrusion Detection• Active monitoring of production infrastructure while we

innovate

Page 9: Higher Logic at the Cloud Security Summit

Higher Logic• Encryption and KMS via

Virgil Security• Multiple VPCs• Firewalls• Fault tolerant• Encrypted data volumes• Application access and

auditing

• Immutable infrastructure• Mostly…

• Role Based Access Control• IAM• Group Managed Service

Accounts• Manual Testing• Automated Testing• Security Scanners• Penetration Testing

Page 10: Higher Logic at the Cloud Security Summit

Client• Education• Learning Series

• Configuration• Who can access what• Including HL staff

• Accountability• Audit who did what and when• Scheduled reports showing privileged actions

Page 11: Higher Logic at the Cloud Security Summit

Incident Response• Source• AWS/Alert Logic SOC/AppDynamics/Internal/Client Notification

• Identify• Based on system component expert is assigned primary

responsibility• Contain• Find boundaries of issue, isolate, remove from network and

snapshot EVERYTHING• DESTROY• …

• Rebuild• Let Auto Scaling Groups take over

Page 12: Higher Logic at the Cloud Security Summit

Summary – Our guiding principals for security• Use vendors!• Reduce staff• Maintain 24/7 monitoring/alerting• Focus on our core business• Control costs• Point to best practice during sales calls• Security accreditation