ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps



Similar documents
Top Five Security Must-Haves for Office 365. Frank Cabri, Vice President, Marketing Shan Zhou, Senior Director, Security Engineering

The Cloud App Visibility Blindspot

Visibility and Control for Sanctioned & Unsanctioned Cloud Apps

IBM Cloud Security Draft for Discussion September 12, IBM Corporation

IBM QRadar Security Intelligence April 2013

Secure Cloud Computing

Cisco Secure BYOD Solution

Cloud Access Security Broker. Ted Hendriks HP Atalla Pre-Sales Consultant, APJ Region HP Enterprise Security Products

What is Security Intelligence?

Securing and Monitoring Access to Office 365

Centrify Cloud Connector Deployment Guide

Security of Cloud Computing for the Power Grid

Executive s Guide to Cloud Access Security Brokers

Q1 Labs Corporate Overview

Securely Yours LLC IT Hot Topics. Sajay Rai, CPA, CISSP, CISM

Blending Embedded Hardware OTP, SSO, and Out of Band Auth for Secure Cloud Access

What Cloud computing means in real life

How to Grow and Transform your Security Program into the Cloud

SANS Top 20 Critical Controls for Effective Cyber Defense

The Benefits of an Integrated Approach to Security in the Cloud

Obtaining Enterprise Cybersituational

Virginia Government Finance Officers Association Spring Conference May 28, Cloud Security 101

Addressing Security for Hybrid Cloud

Automating User Management and Single Sign-on for Salesforce.com OKTA WHITE PAPER. Okta Inc nd Street Suite 350 San Francisco CA, 94107

Assessment & Monitoring

Three Ways to Integrate Active Directory with Your SaaS Applications OKTA WHITE PAPER. Okta Inc. 301 Brannan Street, Suite 300 San Francisco CA, 94107

How to Provide Secure Single Sign-On and Identity-Based Access Control for Cloud Applications

Enabling Business Beyond the Corporate Network. Secure solutions for mobility, cloud and social media

AirWatch Solution Overview

Cloud and Critical Infrastructures how Cloud services are factored in from a risk perspective

Take the Red Pill: Becoming One with Your Computing Environment using Security Intelligence

Unified Security, ATP and more

Top 8 Identity and Access Management Challenges with Your SaaS Applications. Okta White paper

RE Think. IT & Business. Invent. IBM SmartCloud Security. Dr. Khaled Negm, SMIEEE, ACM Fellow IBM SW Global Competency Center Leader GCC

Continuous Network Monitoring for the New IT Landscape. March 16, 2015 (Revision 4)

CALNET 3 Category 7 Network Based Management Security. Table of Contents

Cisco & Big Data Security

Safeguarding the cloud with IBM Dynamic Cloud Security

next generation privilege identity management

ForeScout CounterACT CONTINUOUS DIAGNOSTICS & MITIGATION (CDM)

identity as the new perimeter: securely embracing cloud, mobile and social media agility made possible

IBM Security QRadar SIEM & Fortinet FortiGate / FortiAnalyzer

How To Protect Cloud Services From Attack From A Threat From A Cloud (Cloud)

How To Protect Your Mobile Device From Attack

Beyond passwords: Protect the mobile enterprise with smarter security solutions

RSA Identity and Access Management 2014

Speeding Office 365 Implementation Using Identity-as-a-Service

Symantec Enterprise Security: Strategy and Roadmap Galin Grozev

McAfee Network Security Platform

Secure Clouds - Secure Services Trend Micro best-in-class solutions enable data center to deliver trusted and secure infrastructures and services

NCSU SSO. Case Study

Continuous Monitoring for the New IT Landscape. July 14, 2014 (Revision 1)

Avoid the Hidden Costs of AD FS with Okta

State of SIEM Challenges, Myths & technology Landscape 4/21/2013 1

Advanced Visibility. Moving Beyond a Log Centric View. Matthew Gardiner, RSA & Richard Nichols, RSA

Integrating Single Sign-on Across the Cloud By David Strom

Replacing Microsoft Forefront Threat Management Gateway with F5 BIG-IP. Dennis de Leest Sr. Systems Engineer Netherlands

聚 碩 科 技 主 題 : 如 何 幫 企 業 行 動 商 務 建 立 安 全 機 制 職 稱 : 技 術 顧 問

Identity & Access Management The Cloud Perspective. Andrea Themistou 08 October 2015

Critical Security Controls

Securing the Cloud with IBM Security Systems. IBM Security Systems IBM Corporation IBM IBM Corporation Corporation

Symantec Consulting Services

On Premise Vs Cloud: Selection Approach & Implementation Strategies

Increase the Security of Your Box Account With Single Sign-On

PROTECTED CLOUDS: Symantec solutions for consuming, building, or extending into the cloud

Simple security is better security Or: How complexity became the biggest security threat

Top Eight Identity & Access Management Challenges with SaaS Applications. Okta White Paper

Network that Know. Rasmus Andersen Lead Security Sales Specialist North & RESE

RSA Identity Management & Governance (Aveksa)

Mobile, Cloud, Advanced Threats: A Unified Approach to Security

End-user Security Analytics Strengthens Protection with ArcSight

MOVING SECURITY TO THE CLOUD. pandasecurity.com

IBM Security IBM Corporation IBM Corporation

Total Enterprise Mobility

NGFW is yesterdays news what is next in scope for the firewall in the threat intelligence age

Extending Threat Protection and Control to Mobile Workers with Cloud-Based Security Services > White Paper

Guest Speaker. Michael Sutton Chief Information Security Officer Zscaler, Inc.

/Endpoint Security and More Rondi Jamison

Securing your Mobile Workforce with Okta and Espion

Eliminating Cybersecurity Blind Spots

ControlFabric Interop Demo Guide

Separating Signal from Noise: Taking Threat Intelligence to the Next Level

The Advantages of Security as a Service versus On-Premise Security

SOLUTION BRIEF CA TECHNOLOGIES IDENTITY-CENTRIC SECURITY. How Can I Both Enable and Protect My Organization in the New Application Economy?

Enterprise Mobility Suite (EMS) Sean Lewis Principal Partner Technology Strategist

Transcription:

ISSA Phoenix Chapter Meeting Topic: Security Enablement & Risk Reducing Best Practices for BYOD + SaaS Cloud Apps

Agenda Security Enablement Concepts for BYOD & SaaS Cloud Apps! Intro and background! BYOD & SaaS adop@on and growth projec@ons! Quan@fying the risk: Users/devices VS SaaS CSP! Paradigm shik from No to Enablement! Security enablement concepts Discovery and Risk Assessment Access, authen@ca@on and SSO Managed vs Unmanaged BYOD devices User ac@vity monitoring, audi@ng, and analy@cs Account Centric Threat Detec@on Deployment considera@ons Larger eco- system! Q&A

Data Proliferation Mobile/BYOD Corporate Applica6ons becoming SaaS Applica6ons Customer- Facing Applica6ons moving to IaaS or PaaS providers Data Data Data InfoSec paradigm shik from no to enablement Data Data What s driving cloud? Tradi6onal Data Center Cost effec6ve Collabora6ve Scalable Always on No hardware Accessibility

The horse has left the barn and it s not a bad thing for InfoSec Source: Everest Group

BYOD access to cloud has increased 20% in three years Source: Cisco

More of what you already know Source: Intel

Business execs want anywhere, anytime cloud app access Source: Cisco

Not surprisingly, Security is the concern for cloud enablement Source: Forbes survey

To encrypt or not to encrypt in the cloud(s) Quan@fying the risk: Users/devices VS Cloud Service Provider?

Where is the greater risk the CSP or your users? Corporate Users Users with creden@als s@ll have access to the apps! SaaS Cloud Service Provider (CSP) Roaming Users Hackers CSP admins Knee jerk reaction? Encrypt data going to the Cloud Provider What about your 20,000 Salesforce.com users w/acct credentials? Phishing, wireless hijacking, insiders All user/device focused Prioritize based on risk

Yes you can Enablement Cloud Applications Corporate Users Cloud Security Paradigm shik from No to Enablement

SaaS Security Landscape BYOD users are biggest risk Encryption Data Leakage Prevention Account Centric Threat Prevention User & Device Activity Monitoring SaaS Discovery! Data at rest at Cloud Svs Provider Highest Risk Areas! Cyber hackers & malicious employees are the biggest security threat! Discover & prioritize Shadow IT

Best Practice data risk and security rules do not change Risk & Compliance Threat Prevention Activity Monitoring & Analytics Cloud Apps Discovery & BYOD enrollment Automa6c Cyber- Intrusion Preven6on Consistent & Granular Data Access Logs Sensi6ve Data Access Reports Tracking Config. & User Permission Changes Automa6c Insider Threat Preven6on SIEM Enablement Ac6vity Analy6cs with Drill Down Privileged User Monitoring

So you want to enable, now what? Security enablement & risk reducing best prac@ces Discovery and Risk Assessment Access, authen@ca@on and SSO Managed vs Unmanaged BYOD devices User ac@vity monitoring, audi@ng, and analy@cs Account Centric Threat Detec@on Deployment considera@ons and larger eco- system

Risk and Compliance Risk & Compliance Cloud Apps Discovery & BYOD enrollment Sensi6ve Data Access Reports Tracking Config. & User Permission Changes

Your network firewall/web proxy logs are a good place to start Cloud apps in use on your network will help jus6fy managing BYOD access

Cloud Apps Discovery tool Select files / folders

Cloud App Discovery tool scan progress

SkyFence Manage discovered Cloud Apps

Access, Authentication, & SSO

Access, Authentication and Single Sign On (SSO)! Consider leveraging your existing AD environment Using Cloud SSO Providers such as Ping, Centrify, Okta, Symplified who provide pre-integrated AD based Single Sign on to 1000 s of cloud apps! Carrot and Stick approach Users get the SSO and ease of access they want IT gets centralized visibility, management and deprovisioning thru AD users and groups Some solutions synch to their cloud directory; some proxy to on-prem AD instance! Cloud Security Gateways integrate with leading SSO Providers For cloud-based access control and monitoring SSO Portals Corporate Users SSO Providers Skyfence Cloud Security Cloud Gateway

Managed vs Unmanaged BYOD Devices

Managed vs Unmanaged devices Considera@ons Push device agent sokware or agentless? User transparency - What assump@ons about device risk posture can be made if: It has already connected from the corporate network in the past? It has a correct MDM cer@ficate? It is connec@ng from a trusted IP range? If device is unmanaged: Prompt manual enrollment for unmanaged BYOD devices to connect to corporate cloud apps? Force two factor authen@ca@on? Allow limited access and ac@ons to the cloud app?

Examples of Managed/Unmanaged endpoints work flow

Endpoint Enrollment

Endpoint-based Policies

User Activity Monitoring

Activity Monitoring Activity Monitoring & Analytics Consistent & Granular Data Access Logs Corporate Users Cloud Applications Ac6vity Analy6cs with Drill Down Cloud Security Privileged User Monitoring

Activity Monitoring Cloud monitoring requirements should not have to differ from tradi6onal infrastructure Who- What- How- Where- When

Threat Prevention

In the news

Operationalize threat prevention Learn what s normal Ability to learn from past experience to apply improvements Threat Prevention Automa6c Cyber- Intrusion Preven6on Automa6c Insider Threat Preven6on SIEM Enablement Data Processing Fingerprint Creation Anomaly Detection Engine GEO Intelligence IP Intelligence Authorized devices Data restriction rules Identity-based Account Takeover Abnormal user activity (insider) Man-in-the-middle

Leveraging Your Existing Infrastructure in Deployment! Firewall, Web Proxies & Web Gateways! Use log files from perimeter devices as a primary source for app discovery Palo Alto Networks, Blue Coat, Websense and others! Forward cloud app traffic from these devices to a Cloud Security Gateway Most vendors offer both cloud and appliance (on premise) deployment options Some offer Endpoint agent approach! SIEM Tools! Integrate cloud app analytics for better insight! Correlate cloud activity! User Authentication! Active Directory integration for user and group info! Integration with SSO Portals! Mobile Device Management! Leverage certificates and existing device enrollment

Comprehensive Data Security: Imperva-Incapsula-Skyfence Cloud Apps www External Apps Amazon Web Services Data Center Databases File Servers Internal Apps

The Skyfence Advantage! Automated Scalable Secure! Intelligent endpoint fingerprinting! Automated behavioral profiling! Application intelligence and data aware! Scalable and flexible cloud +/- on premise deployment options! Accurate threat detection! Secures your data Scalable, Automatic Protection + Low TCO = Secure Cloud Enablement