50
Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility Josh Corman David Etue Director, Security Intelligence VP, Corp Dev Strategy @joshcorman @djetue

Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

  • Upload
    safenet

  • View
    459

  • Download
    1

Embed Size (px)

DESCRIPTION

By Joshua Corman, Dir. Security Intelligence, Akamai Technologies (@joshcorman) & David Etue, VP of CorpDev Strategy, SafeNet Inc. (@djetue) Cloud, virtualization, mobility, and consumerization have greatly changed how IT assets are owned and operated. Rather than focusing on loss of security control, the path forward is cultural change that finds serenity and harnesses the control we’ve kept. The Control Quotient is a model based on control and trust, allowing proper application of security controls, even in challenging environments. Watch the full webcast: https://www.brighttalk.com/webcast/2037/72187

Citation preview

Page 1: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Josh Corman David EtueDirector, Security Intelligence VP, Corp Dev Strategy

@joshcorman @djetue

Page 2: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Agenda

Context

The Control Quotient

Today’s Reality

Making it Personal

Examples

Transcending “Control”

Apply

Page 3: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

CONTEXT

Page 4: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Forces of Security Change

Page 5: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

The IT Drunken Bender

Page 6: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

The Control Continuum

Dictator Surrender

Page 7: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Control

Sphere of Control

Page 8: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Control

Influence

Sphere of Influence vs. Control

Page 9: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Grant me the Serenity to accept the things I cannot change;

Transparency to the things I cannot control;

Relevant controls for the things I can;

And the Wisdom (and influence) to mitigate risk appropriately.

InfoSec Serenity Prayer

Page 10: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

THE CONTROL QUOTIENT

Page 11: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

The Control Quotient Definition

• Quotient: (from http://www.merriam-webster.com/dictionary/quotient )– the number resulting from the division of one number by another– the numerical ratio usually multiplied by 100 between a test score

and a standard value– quota, share– the magnitude of a specified characteristic or quality

• Control Quotient: optimization of a security control based on the maximum efficacy within sphere of control (or influence or trust) of the underlying infrastructure*

• *unless there is an independent variable…

Page 12: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

History

• RSA Conference US 2009 P2P– An endpoint has a comprehensive, but suspect, view– The network has a trustworthy, but incomplete, view

VS.

Page 13: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

In Theory There Is An Optimal Place to Deploy a Control…

˚But Degrees Of Separation Happen….

Page 14: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Avoiding the Proverbial…

Page 15: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

TODAY’S REALITY

Page 16: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Today’s Reality

• Administrative control of entire system is lost• Increased attack surface• Abstraction has made systems difficult

to assess• Expectation of anytime-anywhere

access from any device

Page 17: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Security Management & GRC

Identity/Entity Security

Data Security

Host

NetworkInfrastructure Security

ApplicationSecurity

CSA Cloud Model

The Control Quotient and the SPI Stack

Page 18: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

CSA Cloud Model

Security Management & GRC

Identity/Entity Security

Data Security

Host

NetworkInfrastructure Security

ApplicationSecurity

Virtualization, Software Defined Networks, and Public/Hybrid/Community Cloud Forces a Change in How Security Controls Are Evaluated and Deployed

The Control Quotient and the SPI Stack

Page 19: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

To Be Successful, We Must Focus on the Control Kept (or Gained!), NOT the Control Lost…

Half Full or Half Empty?

Page 20: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Controls Gained!!!

• Virtualization and Cloud– Asset, Configuration and Change Management– Snapshot– Rollback– Pause

• VDI– Asset, Configuration and Change Management

• Mobility– Encryption (with containers)

• Software-As-A-Service– Logging!

Page 21: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

MAKING IT PERSONAL

Page 22: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

A Parent’s Most Valuable Asset?

Page 23: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

A Parent’s Most Valuable Asset?

Page 24: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Most Valuable Asset?

…Yet Most Parents Allow Their Kids to Leave Their

Control

Page 25: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Choosing Child Care?

National Association for the Education of Young

Children

Page 26: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

EXAMPLES

Page 27: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Virtualization and Cloud Created An Entire New Definition of Privilege

Page 28: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Amazon EC2 - IaaS

Salesforce - SaaS

Google AppEngine - PaaS

Stack by Chris Hoff -> CSA

The Control Quotient and the SPI Stack

Page 29: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Amazon EC2 - IaaS

The lower down the stack the Cloud provider stops, the more security you are tactically responsible for implementing & managing yourself.

Salesforce - SaaS

Google AppEngine - PaaS

Stack by Chris Hoff -> CSA

The Control Quotient and the SPI Stack

Page 30: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Cloud: Who Has Control?

Model Private Cloud IaaS in Hybrid / Community /

Public Cloud

PaaS/SaaS

Who’s Privilege Users? Customer Provider Provider

Who’s Infrastructure? Customer Provider Provider

Who’s VM / Instance? Customer Customer Provider

Who’s Application? Customer Customer Provider

Law Enforcement Contact? Customer Provider Provider

Page 31: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

>http://www.flickr.com/photos/markhillary/6342705495 http://www.flickr.com/photos/tallentshow/2399373550

Human Capital

More Than Just Technology…

Page 32: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

VDI Server

VDI Image Storage

VDI: Centralizing the Desktop?

Page 33: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

http://www.flickr.com/photos/patrick-allen/4318787860/

Mobile

Page 34: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

http://www.sodahead.com/fun/eight...blue-screen.../question-2038989/CachedYou/?slide=2&page=4

Embedded Devices

Page 35: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Service Providers

Page 36: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Old Ways Don’t Work in New World…

Most organizations are trying to deploy

“traditional” security controls in cloud and virtual

environments…but were the controls

even effective then?

Page 37: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

TRANSCENDING “CONTROL”

Page 38: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

A Modern Pantheon ofAdversary Classes

Methods

“MetaSploit” DoS Phishing Rootkit SQLi Auth Exfiltration Malware Physical

ImpactsReputational Personal Confidentiality Integrity Availability

Target AssetsCredit Card #s Web Properties Intellectual

Property PII / Identity Cyber Infrastructure

Core Business Processes

MotivationsFinancial Industrial Military Ideological Political Prestige

Actor ClassesStates Competitors Organized

CrimeScript

Kiddies Terrorists “Hactivists” Insiders Auditors

http://www.slideshare.net/DavidEtue/adversary-roi-evaluating-security-from-the-threat-actors-perspective

Page 39: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

HD Moore’s Law and Attacker Power

• Moore’s Law: Compute power doubles every 18 months

• HDMoore’s Law: Casual Attacker Strength grows at the rate of MetaSploit

http://blog.cognitivedissidents.com/2011/11/01/intro-to-hdmoores-law/

Page 40: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility
Page 41: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 42: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 43: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 44: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Countermeasures

Situational Awareness

Operational Excellence

Defensible Infrastructure

Page 45: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

PHI

“IP”

Web

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryption

Vulnerability Assessment

Multi-Factor Auth

Anti-SPAM

VPN

Web Filtering

DLP

Anomaly Detection

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

Anti-DDoS

Anti-Fraud

Desired OutcomesLeverage Points

Compliance (1..n)

“ROI”

Breach / QB sneak

Productivity

PHI

PCI

“IP”

Web

Control “Swim Lanes”

Page 46: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Web

PHI

“IP”

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryption

Vulnerability Assessment

Multi-Factor Auth

Anti-SPAM

VPN

Web Filtering

DLP

Anomaly Detection

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

Anti-DDoS

Anti-Fraud

Desired OutcomesLeverage Points

Compliance (1..n)

“ROI”

Breach / QB sneak

Procurement

Disruption

DevOps

Productivity

“Honest Risk”

General Counsel

Control & Influence “Swim Lanes”

Page 47: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Web

PHI

“IP”

PCI

AV

FW

IDS/IPS

WAF

Log Mngt

File Integrity

Disk Encryption

Vulnerability Assessment

Multi-Factor Auth

Anti-SPAM

VPN

Web Filtering

DLP

Anomaly Detection

Network Forensics

Advanced Malware

NG Firewall

DB Security

Patch Management

SIEM

Anti-DDoS

Anti-Fraud

Litigation

Legislation

Open Source

Hearts & Minds

Academia

Desired OutcomesLeverage Points

Compliance (1..n)

“ROI”

Breach / QB sneak

Procurement

Disruption

DevOps

Productivity

“Honest Risk”

General Counsel

Under-tapped Researcher Influence

Page 48: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Potential Independent Variables

• with good key management…

Encryption

• well, rootkits for good…

Rootkits

• Anti-DDoS, WAF, Message/Content, Identity, etc…

Intermediary Clouds

• with proper integration and process support

Identity and Access Management

• *if* the provider harnesses the opportunity

Software-As-A-Service (SaaS)

Page 49: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

Apply!

• Identify at least one opportunity to leverage a new swim lane

• Identify one opportunity this year to influence each layer of the Pyramid

► Leverage a control gained!

► Leverage the Rugged Handbook (ruggedsoftware.org)

Page 50: Not Going Quietly: Gracefully Losing Control & Adapting to Cloud and Mobility

THANK YOU!

Josh Corman David EtueDirector, Security Intelligence VP, Corp Dev Strategy

@joshcorman @djetue