State of Security Monitoring of Public Cloud

Similar documents
Securing business data. CNS White Paper. Cloud for Enterprise. Effective Management of Data Security

Rethinking IT and IT Security Strategies in an Era of Advanced Attacks, Cloud and Consumerization

Logging In: Auditing Cybersecurity in an Unsecure World

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

Unified Security, ATP and more

Securing the Cloud: Making Cloud an Opportunity to Enhance Security

Security Analytics for Smart Grid

Security Issues in Cloud Computing

AccelOps Cloud Security Survey 2013

Analytics: The Future of Security

WHITE PAPER SPLUNK SOFTWARE AS A SIEM

End-user Security Analytics Strengthens Protection with ArcSight

CALNET 3 Category 7 Network Based Management Security. Table of Contents

The Magical Cloud. Lennart Franked. Department for Information and Communicationsystems (ICS), Mid Sweden University, Sundsvall.

Safeguarding the cloud with IBM Dynamic Cloud Security

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

The Cloud App Visibility Blindspot

Best Practices to Improve Breach Readiness

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

The Case For A Cloud Access Security Broker

WHITE PAPER Cloud-Based, Automated Breach Detection. The Seculert Platform

A HELPING HAND TO PROTECT YOUR REPUTATION

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

CONTINUOUS MONITORING THE MISSING PIECE TO SECURITY OPERATION (SOC) TODAY

Westcon Presentation on Security Innovation, Opportunity, and Compromise

BIG DATA. Shaun McLagan General Manager, RSA Australia and New Zealand CHANGING THE REALM OF POSSIBILITY IN SECURITY

From the Bottom to the Top: The Evolution of Application Monitoring

The Identity Defined Security Alliance

Secure Cloud Computing

Network Security Monitoring: Looking Beyond the Network

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

Increase insight. Reduce risk. Feel confident.

Orchestrating Security in the Cloud

Rashmi Knowles Chief Security Architect EMEA

APPLICATION PROGRAMMING INTERFACE

Why are Companies in the EU Adopting More and More Cloud-Based Security Solutions? François GRATIOLET, Qualys Inc., CSO EMEA

Software that provides secure access to technology, everywhere.

WAN security threat landscape and best mitigation practices. Rex Stover Vice President, Americas, Enterprise & ICP Sales

The Cloud App Visibility Blind Spot

THE EVOLUTION OF SIEM

CASE STUDY. Global Airline Empowers Mobile Workforce for SaaS Apps while Reducing Risk

SIEM Optimization 101. ReliaQuest E-Book Fully Integrated and Optimized IT Security

2012 North American Managed Security Service Providers Growth Leadership Award

While you are waiting for our webinar to begin, you might be interested in the downloads on the Attachment tab:

Intelligence Driven Security

Evolution Of Cyber Threats & Defense Approaches

The Evolution of Application Monitoring

How To Protect Your Cloud From Attack

1 Introduction Product Description Strengths and Challenges Copyright... 5

Performanta Pty Ltd. Company Profile. May Trust. Practical. Performanta.

Session 9: Changing Paradigms and Challenges Tools for Space Systems Cyber Situational Awareness

Bezpečnosť dát v HP Cloude

Find the intruders using correlation and context Ofer Shezaf

REVOLUTIONIZING ADVANCED THREAT PROTECTION

Full-Context Forensic Analysis Using the SecureVue Unified Situational Awareness Platform

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

Business Case Outsourcing Information Security: The Benefits of a Managed Security Service

Big Data and Security: At the Edge of Prediction

Effective IDS/IPS Network Security in a Dynamic World with Next-Generation Intrusion Detection & Prevention

Cyber Situational Awareness for Enterprise Security

Towards Threat Wisdom

Emerging Approaches in a Cloud-Connected Enterprise: Containers and Microservices

HP CloudSystem Enterprise

Innovative Security for an Accelerating World New Approaches for Chief Security Officers

ClearSkies SIEM Security-as-a-Service (SecaaS) Infocom Security Athens April 2014

Eoin Thornton Senior Security Architect Zinopy Security Ltd.

Future Threat Landscape - How will technology evolve and what does it mean for cyber security?

Comprehensive Security with Splunk and Cisco

The Crisis You Didn t See

RETHINKING CYBER SECURITY Changing the Business Conversation

IT Security Strategy and Priorities. Stefan Lager CTO Services

BREAKING THE KILL CHAIN AN EARLY WARNING SYSTEM FOR ADVANCED THREAT

Analysis of the Global Security Information and Event Management (SIEM) and Log Management (LM) Market All Information Becomes Actionable

I D C A N A L Y S T C O N N E C T I O N

THE BLUENOSE SECURITY FRAMEWORK

Average annual cost of security incidents

Protect the data that drives our customers business. Data Security. Imperva s mission is simple:

Advanced SOC Design. Next Generation Security Operations. Shane Harsch Senior Solutions Principal, MBA GCED CISSP RSA

Background. Liwei Ren. Trend Micro

The Benefits of an Integrated Approach to Security in the Cloud

GETTING REAL ABOUT SECURITY MANAGEMENT AND "BIG DATA"

Evaluating, choosing and implementing a SIEM solution. Dan Han, Virginia Commonwealth University

How we see malware introduced Phishing Targeted Phishing Water hole Download (software (+ free ), music, films, serialz)

Management of Security Information and Events in Future Internet

NE T GENERATION CLOUD SECURITY PLATFORM

Concierge SIEM Reporting Overview

Cisco Master Security Specialization Practice Areas Summary. June 2015

IBM QRadar Security Intelligence April 2013

How To Buy Nitro Security

Combating a new generation of cybercriminal with in-depth security monitoring. 1 st Advanced Data Analysis Security Operation Center

CASSIDIAN CYBERSECURITY SECURITY OPERATIONS CENTRE SERVICES

Gaining and Maintaining Support for a SOC. Jim Goddard Executive Director, Kaiser Permanente

Services. Cybersecurity. Capgemini & Sogeti. Guiding enterprises and government through digital transformation while keeping them secure

The agile Cloud Brokerage approach. An innovative, business aligned and mature IT services delivery model!

Analyzing HTTP/HTTPS Traffic Logs

Threat and Vulnerability Management (TVM) Protecting IT assets through a comprehensive program. Chicago IIA/ISACA

Dynamic Security for the Hybrid Cloud

Cisco Advanced Malware Protection

Transcription:

State of Security Monitoring of Public Cloud Shittu O. Shittu Enterprise Security Architect, BP Enterprise Security Architect, trainline.com Director and Principal Consultant, TRAIS Mavens Ltd

Highlights Why integrate Cloud with SIEM tools/services? Emerging integration architectures and Trends

Free Email for Life!

Free Email for Life!

Free Email for Life!

How do you prevent murder?

How do you prevent murder?

SIEM Integration for Public Cloud Security Information and Event Management (SIEM)

SIEM Integration for Public Cloud Security Information and Event Management (SIEM) NOT just logging for compliance and forensics BUT security intelligence technology geared to aid incident response

Cloud Security Alliance Research Approach Cloud Service Provider Events per day: 35 million Unique devices: 62k Survey Participants SIEM Provider Events per second: 10k to 100k Cloud Customer Events per day: (196 to 30k) million Unique devices: 470 to 30k Cloud Customer Cloud Service Provider SIEM/Security Provider Inquiries by email to research@cloudsecurityalliance.org

Key Findings Market Definitions Increasing focus on threat intelligence and security analytics Unmet need of early attack/breach detection SIEM Architectures Vary by service model, Cloud Service Provider and Cloud customer maturity Trend towards proxy-based architectures SecaaS Becoming major market trend Lack of standards/common log formats seen as a major issue

What is the market saying? Collect Analyse Alert

Sensors, Collectors, Parsers What is the market saying? Collect Analyse Alert Logs Systems Correlation and Analytics Strengths Weaknesses Databases Hosts / Operating Systems; Applications and APIs Network appliance Available tools, processes and policies Exploitable vulnerabilities Events Applications Sensors and Taps Database activities Opportunities Security Improvements Indicators of compromise, attack or breach Threats Threat mitigation tools Network appliances Network Flows

Sensors, Collectors, Parsers What is the market saying? Collect Analyse Alert Logs Systems Correlation and Analytics Strengths Weaknesses Databases Threat Intelligence Hosts / Operating Systems; Applications and APIs Network appliance Events Applications Sensors and Taps Database activities Opportunities Available tools, processes and policies Security Improvements Exploitable vulnerabilities Indicators of compromise, attack or breach Threats Threat mitigation tools Network appliances Network Flows

Sensors, Collectors, Parsers What is the market saying? Collect Analyse Alert Logs Systems Correlation and Analytics Strengths Weaknesses Databases Threat Intelligence Hosts / Operating Systems; Applications and APIs Network appliance Events Applications Sensors and Taps Database activities Advanced Analytics Opportunities Available tools, processes and policies Security Improvements Exploitable vulnerabilities Indicators of compromise, attack or breach Threats Threat mitigation tools Network appliances Network Flows

Sensors, Collectors, Parsers What is the market saying? Collect Analyse Alert Logs Systems Correlation and Analytics Strengths Weaknesses Threat Intelligence Databases Hosts / Operating Systems; Applications and APIs Network appliance Events Applications Sensors and Taps Database activities Advanced Analytics Opportunities Available tools, processes and policies Exploitable vulnerabilities Early Indicators Security Improvements Indicators of compromise, attack or breach Threats Threat mitigation tools Network appliances Network Flows

What is the challenge? Traditional Security Past thinking and methods

What is the Public Cloud challenge?

What is the Public Cloud challenge? Scope of Control

What is the Public Cloud challenge? Scope of Control Degrees of freedom

What is the Public Cloud challenge? Scope of Control Degrees of freedom

What is the Public Cloud challenge? + O Scope of Control Blind Spot Degrees of freedom

What are the trends and good practices? Cloud Proxy / Security Gateways SecaaS SIEM as a Service SIEM SIEM Engine SIEM Logger

What are the trends and good practices? Cloud Proxy / Security Gateways SecaaS SIEM as a Service Cloud access security brokers (CASB) Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers

What are the trends and good practices? Cloud Proxy / Security Gateways SecaaS SIEM as a Service Cloud access security brokers (CASB) Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Cloud Proxy / Security Gateways SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Cloud Proxy / Security Gateways Negotiate required levels of log visibility SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Adopt SecaaS Testing the Water Incremental/hybrid approach Cloud Proxy / Security Gateways Negotiate required levels of log visibility SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Adopt SecaaS Testing the Water Incremental/hybrid approach Cloud Proxy / Security Gateways Negotiate required levels of log visibility SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Adopt SecaaS Testing the Water Incremental/hybrid approach Cloud Proxy / Security Gateways Negotiate required levels of log visibility SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

What are the trends and good practices? Adopt SecaaS Testing the Water Incremental/hybrid approach Cloud Proxy / Security Gateways Negotiate required levels of log visibility SecaaS SIEM as a Service Cloud access security brokers (CASB) Use CASB / Cloud Security Gateway for SaaS visibility Database activity monitoring proxy, Container / App logs SIEM SIEM Engine SIEM Logger Host agent, Virtual appliances, virtual sensors, SIEM Connectors and collectors, SIEM parsers Split SIEM capabilities among Cloud and on-premise E.g. Collector, parser, logger storage and virtual sensor on Cloud E.g. Analysis and correlation on-premise

Final thoughts Security Data (BYOD, IoT and Social) Security Risk Profiling Privacy concern (threat contexts) Cloud-based SIEM versus SecaaS Continuous SecaaS growth

Questions State of Security Monitoring of Public Cloud You can t protect what you can t see You can t respond to what you don t know Shittu O. Shittu