Michael - Wylie - Continuous Cloud Security Monitoring (CCSM) v4
Michael - Wylie - Continuous Cloud Security Monitoring (CCSM) v4
Michael - Wylie - Continuous Cloud Security Monitoring (CCSM) v4
linkedin.com/mwylie
twitter.com/TheMikeWylie
My Dream
# To have my own viral overly used cybersecurity acronym
# Continuous Cloud Security Monitoring (CCSM)
# One that people could drink to when used too much at RSA
# Something like AI, Cloud, Machine Learning, or Next Gen anything
# I thought CCSM was it
# Coca-Cola Signature Mixers (CCSM) stole my dream
About Me
Michael Wylie, MBA, CISSP
# Director, Cybersecurity Services @ RMTS
# Former DoD contractor & business owner
# Marine Corps Volunteer Cyber Auxiliary
# Cybersecurity professor
# Qualified TPN Assessor
Certifications
CISSP CCNA R&S CCNA CyberOps GPEN
Source: amazon.com
Azure Shared Responsibility Model
Source: Microsoft.com
GCP Shared
Responsibility Model
Source: Google.com
CloudTrail – API Calls Log Analytics – System Logs Multiple Tools – API Logging
Config - Configuration State Azure Security Center – Stackdriver - System Log
CloudWatch – System Logs Configuration State Cloud Security Scanner -
Trusted Advisor – High-Level API Console – Direct Activity Vulnerability Assessment
Security Events
Inspector – Vulnerability
Assessment
GuardDuty – Threat Detection
CloudFormation – Gold Images
Macie – Data Breach Detection
WAF/Shield – Web App Firewall
Security Hub – Compliance Checks
Control Tower – Detect Policy
Violations
Dwell Time
(time from breach to detection)
Source: q-files.com
Defensible Agra Red Fort
# High thick walls with archers
# Draw bridges
# Water moat with crocodiles
# Dry moat with tigers
# Layered corridors for trapping intruders Source: travel.in
# Inventory of systems/services
# Continuous security monitoring
# Detective & preventative controls
CIS Basic Best Practices
Center for Internet Security (CIS)
# Developed by SANS Institute
# Response to increased breaches and incidents
# Top 20 controls to make defense easier
# Benchmarks for secure configuration
# More than 100 contributors:
$ US-CERT
$ US DoD
$ MITRE
$ SANS
Inventory Control
The Cloud
# Before the “Cloud”:
$ Process: Purchase Order > Dell Quote > Purchase > Shipping > etc.
$ Accounting, server, network, and developers involved
# In the “Cloud”:
$ Process: Developers can start build public facing servers in seconds
> EC2 Startup < 60 seconds & Lightsail < 30 seconds
> DevOps involved
# VM Sprawl or account takeover
# Insider threats
Verizon
2019 DBIR
breaches by role
Inventory Control
Terraform
# Helps with building, changing, & versioning infrastructure
safely/efficiently
# Works with Alibaba Cloud, AWS, GCP, Microsoft Azure, OpenStac
# Plan/execute deployments Create-S3-Bucket.tf
# Minimize human error resource "aws_s3_bucket" "bucket" {
bucket = "mike-test-bucket"
# Build/teardown quickly acl = "private"
# Overwrite unauthorized changes tags = {
Name = “Mike’s Test Bucket"
Created_By = “Mike"
}
}
Solution: PBNJ
Wikipedia.org
vs.
twitter.com/TheMikeWylie
www.TheMikeWylie.com