Cloud Security In Your Contingency Plans



Similar documents
Don t get DDoSed and Confused. Patrick Sullivan, CISSP, GSLC, GWAPT, GCIH Managed, Security Services

AKAMAI SOLUTION BROCHURE CLOUD SECURITY SOLUTIONS FAST RELIABLE SECURE.

2014 Foley & Lardner LLP Attorney Advertising Prior results do not guarantee a similar outcome Models used are not clients but may be representative

How to Evaluate DDoS Mitigation Providers:

DISTRIBUTED DENIAL OF SERVICE OBSERVATIONS

2012 Infrastructure Security Report. 8th Annual Edition Kleber Carriello Consulting Engineer

DDoS Threat Report. Chris Beal Chief Security Architect on Twitter

Stop DDoS Attacks in Minutes

SSDP REFLECTION DDOS ATTACKS

DDoS Attack Mitigation Report. Media & Entertainment Finance, Banking & Insurance. Retail

SHARE THIS WHITEPAPER. On-Premise, Cloud or Hybrid? Approaches to Mitigate DDoS Attacks Whitepaper

SHARE THIS WHITEPAPER. Top Selection Criteria for an Anti-DDoS Solution Whitepaper

Introduction to DDoS Attacks. Chris Beal Chief Security Architect on Twitter

Kaspersky Lab. Contents

How To Mitigate A Ddos Attack

/ Staminus Communications

Distributed Denial of Service (DDoS) attacks. Imminent danger for financial systems. Tata Communications Arbor Networks.

CHECKLIST: ONLINE SECURITY STRATEGY KEY CONSIDERATIONS MELBOURNE IT ENTERPRISE SERVICES

Ihr Standort bleibt erreichbar. Ihre Applikationen bleiben erreichbar!

Business Case for a DDoS Consolidated Solution

KASPERSKY DDOS PROTECTION. Discover how Kaspersky Lab defends businesses against DDoS attacks

Arbor s Solution for ISP

Rise of the Machines: An Internet-Wide Analysis of Web Bots in 2014

Akamai Cloud Security Solutions:

Corero Network Security First Line of Defense Executive Overview

SecurityDAM On-demand, Cloud-based DDoS Mitigation

Securing Your Business with DNS Servers That Protect Themselves

Stop DDoS Attacks in Minutes

Radware Attack Mitigation Solution (AMS) Protect Online Businesses and Data Centers Against Emerging Application & Network Threats - Whitepaper

Automated Mitigation of the Largest and Smartest DDoS Attacks

Security Solutions for the New Threads

FortiDDos Size isn t everything

KASPERSKY DDoS PROTECTION. Protecting your business against financial and reputational losses with Kaspersky DDoS Protection

A Layperson s Guide To DoS Attacks

Securing data centres: How we are positioned as your ISP provider to prevent online attacks.

The server will respond to the client with a list of instances. One such attack was analyzed by an information security researcher in January 2015.

Mitigating Denial of Service Attacks. Why Crossing Fingers is Not a Strategy

Infoblox Inc. All Rights Reserved. Securing the critical service - DNS

Securing Your Business with DNS Servers That Protect Themselves

First Line of Defense

Akamai Security Products

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 4 4TH QUARTER 2014

Acquia Cloud Edge Protect Powered by CloudFlare

CloudFlare advanced DDoS protection

Securing Your Business with DNS Servers That Protect Themselves

Protect your network: planning for (DDoS), Distributed Denial of Service attacks

How valuable DDoS mitigation hardware is for Layer 7 Sophisticated attacks

VALIDATING DDoS THREAT PROTECTION

Arrow ECS University 2015 Radware Hybrid Cloud WAF Service. 9 Ottobre 2015

How To Block A Ddos Attack On A Network With A Firewall

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

How to launch and defend against a DDoS

This document is licensed for use, redistribution, and derivative works, commercial or otherwise, in accordance with the Creative Commons

DDoS Mitigation Solutions

Service Description DDoS Mitigation Service

Load Balancing Security Gateways WHITE PAPER

DAMAGE CONTROL: THE COST OF SECURITY BREACHES IT SECURITY RISKS SPECIAL REPORT SERIES

First Line of Defense

VERISIGN DDoS PROTECTION SERVICES CUSTOMER HANDBOOK

Guide to DDoS Attacks December 2014 Authored by: Lee Myers, SOC Analyst

White Paper. Intelligent DDoS Protection Use cases for applying DDoS Intelligence to improve preparation, detection and mitigation

DDoS Attacks: The Latest Threat to Availability. Dr. Bill Highleyman Managing Editor Availability Digest

Securing Your Business with DNS Servers That Protect Themselves

Four Considerations for Addressing the DDoS Risk for Carrier and Cloud Hosting Providers

DDoS Attacks in the United Kingdom

Threat Advisory: Trivial File Transfer Protocol (TFTP) Reflection DDoS

VERISIGN DISTRIBUTED DENIAL OF SERVICE TRENDS REPORT ISSUE 2 2ND QUARTER 2014

CERT Seminar March, 2010

Real Life DoS/DDOS Threats and Benefits of Deep DDOS Inspection. Oğuz YILMAZ CTO Labris Networks

GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

Practical Advice for Small and Medium Environment DDoS Survival

Safeguard Your Internet Presence with Sophisticated DDoS Mitigation

How Effective CSOs Prepare for DDoS Attacks. Rob Kraus & Jeremy Scott Solutionary SERT

I D C T E C H N O L O G Y S P O T L I G H T

DDoS DETECTING. DDoS ATTACKS WITH INFRASTRUCTURE MONITORING. [ Executive Brief ] Your data isn t safe. And neither is your website or your business.

WHITE PAPER Hybrid Approach to DDoS Mitigation

Availability Digest. Prolexic a DDoS Mitigation Service Provider April 2013

2015 GLOBAL THREAT INTELLIGENCE REPORT EXECUTIVE SUMMARY

[state of the internet] / DDoS Reflection Vectors. Threat Advisory: NetBIOS name server, RPC portmap and Sentinel reflection DDoS

Prolexic Quarterly Global DDoS Attack Report Q4 2012

WHITE PAPER ENSURING APPLICATION AVAILABILITY AND SECURITY IN THE CLOUD

DISASTER RECOVERY WITH AWS

Protection against DDoS and WEB attacks. Michael Soukonnik Radware Ltd

The 2014 DDoS Attacks and Impact Report

Distributed Denial of Service protection

FortiDDoS. DDoS Attack Mitigation Appliances. Copyright Fortinet Inc. All rights reserved.

A Guide to Common Cloud Security Concerns. Why You Can Stop Worrying and Start Benefiting from SaaS

How To Protect A Dns Authority Server From A Flood Attack

What to Look for When Choosing a CDN for DDoS Protection Written by Bizety

THE DANGER DEEPENS. Neustar Annual DDoS Attacks and Impact Report

Concierge SIEM Reporting Overview

A Risk Based Approach to DDoS Protection

The Expanding Role of Service Providers in DDoS Mitigation

Transcription:

Cloud Security In Your Contingency Plans Jerry Lock Security Sales Lead, Greater China

Contingency Plans Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Top Threats (2012 2015) --Business Continuity Institute Horizon Scan Report 2015 Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Comparison by Business Size Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. --Business Continuity Institute, Horizon Scan Report 2015

Attacks Are Growing in Size Traditional DDoS attacks harness the scale of global botnets Newer attacks target protocol vulnerabilities to amplify size SNMP (6.3x) 2014 320 270 DNS (28x-54x) CharGEN (358.8x) NTP (556.9x) 2013 190 144 Gbps Mpps 2005 11 2 2006 18 8 2007 22 11 2008 39 15 2009 48 29 2010 68 38 2011 79 45 2012 82 69 2015

Our digital walls are struggling Can t scale, Can t evolve What about those beyond the wall? Source: World War Z movie

Web Apps DDoS - 320 Gbps attack in Asia (Q3 2014) Largest attack ever mitigated by Akamai against a single customer DDoS Attack: Targeted primary website, supporting network infrastructure, and DNS Multiple attack vectors: SYN / UDP floods against an entire subnet Volumetric attack against DNS DNS Attack: Attack characteristics: 320 Gbps and 71.5 Mpps peak DDoS attack traffic 2.1 million requests/s peak DNS attack traffic Point to ponder: 17 x 100Gbps attacks July to Sept to one single target

Attacks > 100 Gbps mitigated in Q2 2015 MEGA ATTACKS 249 210 144 106 109 144 118 157 145 126 121 115 April 3 April 4 April 8 April 9 April 11 April 18 April 24 April 25 April 30 May 1 May 4 May 18 2015

Straining IT staff AVERAGE DURATION 29 hours 21 hours 23 hours 17 hours 17 hours 22 hours 25 hours 21 hours Q3 2013 Q4 2013 Q1 2014 Q2 2014 Q3 2014 Q4 2014 Q1 2015 Q2 2015 2015

Web attack frequency BY TARGET INDUSTRY 27% 26% 23% 23% 16% 5% 4% 7% 6% 2% 7% 8% 13% 11% 6% 9% B2B Goods/Services B2C Goods/Services Financial Services High Technology Hotel & Travel Media & Entertainment Public Sector Retail Q1 2015 Q2 2015 2015

Increasing and Devastating Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Latest Attacks by DD4BC Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection.

Change of Attack Objectives Retaliation Competition Justice Firepower Test Reputation Nation-to-Nation Public Movement Extortion DDoS-forhire Ransom

Akamai Security Bulletin on DD4BC Latest Update: To date,dd4bc has targeted 114 Akamai customers. Industry verticals have been attacked incl.: Payment Processing Banking & Credit Unions Gambling Oil & gas E Commerce Betting Agencies High Tech Consulting/Services Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. AttackTypes: SYN Flood, UDP Fragment Flood, CharGEN Flood, GET Flood, NTP reflection flood, CharGEN reflection flood, SSDP reflection flood. Campaign has peak attack traffic over 15Gbps Conclusion: Expect the group to continue expanding its targeting to other verticals susceptible of financial loss due to downtime. Similar to an express kidnapping small ransoms Likely already received payments from the threats made to some of these victims Activity will increase as copycats enter the game Previously targeted victims likely only have the choice of either paying malicious actors or seeking DDoS protection services

XOR DDoS Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

Considerations for DDoS Protection Attacks becoming easier and cheaper for attackers to launch Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. 2015

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Attack size (claimed): 2 Tbps average 30 Tbps maximum

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Attack duration: Up to 8.33 hours

Grow revenue opportunities with fast, personalized web experiences and manage complexity from peak demand, mobile devices and data collection. Cost to attacker: $129.99 / month

In the first 6 months of 2015 saw 888 data breaches, 246 million records compromised worldwide The largest breach in the first half of 2015 includes: 1) 78.8 million records exposed by identity theft attack on Anthem Insurance 2) 50-million-record breach at Turkey s General Directorate of Population and Citizenship Affairs 3) 21-million-record breach at the U.S. Office of Personnel Management 4) 20-million-record breach at Russia s Topface The top 10 breaches accounted for 81.4% of all compromised records Source: Gemalto

Business of Fraud

The average budget required to recover from a security breach = USD$551,000 for enterprises = USD$38,000 for small and medium businesses(smb) The average enterprise bill and probability of some of the consequences break down as follows: Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. By comparison, SMBs tend to lose a significant amount of money on almost all types of breach, paying a similar high price on recovering from acts of espionage as well as DDoS and phishing attacks. Source: worldwide survey of 5,500 companies conducted by Kaspersky Lab in cooperation with B2B International

Q2 2015 State of the Internet Security Report Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

2015: How Companies Now Prepare For Cyber Attacks Layered defense to DDoS new standard: Strong perimeter defense (firewalls, IDS & IPS technologies etc) Relationship & communication process with upstream ISP s Akamai globally distributed cyber attack defense network Integrating Multiple Vendors & Technologies Integrate into Disaster Recovery Plan/ Business Continuity plan Test regularly with relevant vendors and internal teams Deal with attacks using the most appropriate location Best results achieved through planning & testing

Cloud: The Right Service Delivery Model Platform Stop attacks before they reach the data center Grows with the size of DDoS attacks Provide world-class web experience Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Service Replace upfront CAPEX with OPEX Continuously refined security rules and practices Access to Akamai resources and expertise

Multiple Perimeters for Internet-Facing Applications Infrastructure Supporting infrastructure and other applications Web Retrieving content and data Avoid data theft and downtime by extending the security perimeter outside the data-center and User protect from increasing frequency, scale and sophistication of web attacks. Internet DNS Finding the application

Protecting Multiple Perimeters in the Cloud Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Perimeter 1 Web (DDoS) Always-on defense Automated (rate controls, caching) High performance HTTP / HTTPS (Port 80/Port 443) Local or cloud-based applications

Protecting Multiple Perimeters in the Cloud Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Perimeter 2 Web (WAF) Always-on defense against data theft/breach/scraping High performance and scalability Core Rule Set + Kona Rule Set Highly accurate (reduced FP, FN) HTTP / HTTPS Local or cloud-based applications

Protecting Multiple Perimeters in the Cloud Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Perimeter 3 Origin (DDoS) Always-on or on-demand 24x7 SOC (5-20 min SLA) Comprehensive (subnet granularity) Web and IP applications Network infrastructure + bandwidth ASN, Class-C, BGP Routers

Protecting Multiple Perimeters in the Cloud Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. Perimeter 4 DNS Highly scalable (<1% total capacity) Highly available (24x7 SLA) High performance (zone apex) Supports DNSSEC Primary and secondary DNS

Layered Defense to Protect DMZ 0 Cloud Based 1. Perimeter 1 Web (DDoS) 2. Perimeter 2 Web (WAF) 3. Perimeter 3 Origin (DDoS) 4. Perimeter 4 DNS DMZ 1 DMZ 2 DMZ N Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks.

How to evaluate Cloud Security Service Providers 1. Threat Intelligence Do you have an internal DDoS threat intelligence research group? What threat intelligence do you publish and provide to your customers? 2. Front-line Experiences How many years have you been providing DDoS protection service to the public? Do you have a large customer base supporting the cost of network and mitigation capacity growth? 3. Mitigation Capabilities Avoid data theft and downtime by extending the security perimeter outside the data-center and protect from increasing frequency, scale and sophistication of web attacks. What methods of traffic redirection do you support? Do you have options for both on-demand and always-on DDoS service options? Can you protect my DNS servers even if they are located in a third-party hosted environment? Do you provide a time-to-mitigate Service Level Agreement (SLA)? Do you provide any cloud security services beside DDoS? What types of attacks have you successfully mitigated? Do you offer a fully managed DDoS service? How do you drive the mitigation strategy? What types of redundancies are provided in each one of your network and mitigation platforms? 4. Mitigation Capacity What is the network and mitigation capacity for each one of your protection platforms? Are there any fixed caps or fees associated with attack size or number of attacks? How is your network and mitigation capacity distributed across the globe? Does the service use Anycast or a similar technology to distribute the attack traffic across multiple locations? Have you ever experienced a network outage due to a DDoS attack? What is the largest attack you ve ever mitigated successfully on each of your protection platforms? Have you ever denied service due to defending multiple simultaneous attacks?

Q & A wlock@akamai.com Mobile: 63896000