Cloud Security Today Presenter: Jason Sheffield Topics What are - - PowerPoint PPT Presentation

cloud security today
SMART_READER_LITE
LIVE PREVIEW

Cloud Security Today Presenter: Jason Sheffield Topics What are - - PowerPoint PPT Presentation

Cloud Security Today Presenter: Jason Sheffield Topics What are the issues today? What is the Cloud? How the Cloud is delivered: Iaas, PaaS and SaaS Cloud security challenges and risk Current Cloud security report Cloud security technology


slide-1
SLIDE 1

Cloud Security Today

Presenter: Jason Sheffield

slide-2
SLIDE 2

Topics

2

How the Cloud is delivered: Iaas, PaaS and SaaS Cloud security challenges and risk Current Cloud security report Common use cases for Cloud security technologies What is the Cloud? What technologies exist to address risk? Cloud security technology drivers What are the issues today?

slide-3
SLIDE 3

Designed for Controlled Access

Web

FW SWG VPN Endpoi nt IPS Data Center Apps

Old IT Security Architecture From Yesterday

slide-4
SLIDE 4

Designed for Controlled Access

IaaS SaaS Web

FW SWG VPN Endpoi nt IPS Data Center Apps

Old IT Security Architecture From Yesterday

slide-5
SLIDE 5

With Digital Transformation … Everything Changed

5

IaaS SaaS Web

Data Center Apps FW SWG VPN Endpoint IPS

slide-6
SLIDE 6

With Digital Transformation … Data is Everywhere

6

IaaS SaaS Web

Data Center Apps FW SWG VPN Endpoint IPS

slide-7
SLIDE 7

7

DATA FLOWS LIKE WATER

slide-8
SLIDE 8

8

LACK OF VISIBILITY

slide-9
SLIDE 9

9

COMPLEXITY

slide-10
SLIDE 10

1

CONTROLS CREATES FRICTION

slide-11
SLIDE 11

What is the Cloud?

11

  • Gartner defines the Cloud as a style of computing in which scalable and elastic IT-

enabled capabilities are delivered as a service using Internet technologies.

  • Public Cloud: Computing, Networking, Server and Storage resources owned and
  • perated by a third party Cloud Service Provider and delivered over the Internet.

Public Cloud resources are shared with other organizations and separated into individual tenants.

  • Private Cloud: Computing resources used exclusively by one business or
  • rganization. In the Private Cloud services and infrastructures are maintained by

your organization. Private Clouds can be physically located in your organizations data center or can be hosted by a third party service provider.

  • Hybrid Cloud: Hybrid Clouds are a mixture on-premise infrastructure, Private

Clouds and Public Clouds.

slide-12
SLIDE 12

What is the Cloud?

slide-13
SLIDE 13

Who in the Organization is Buying and Why?

13

slide-14
SLIDE 14

How is the Cloud delivered: Key differences between Iaas, PaaS and SaaS

14

slide-15
SLIDE 15

Cloud Security Challenges and Risks

Data

Disrupt Destroy Extort Exposure Access Theft INTERNAL RISK EXTERNAL RISK

Sensitive data shared publicly Download to personal device Exfiltration via unsanctioned cloud Malware upload to sanctioned cloud Ransomware via cloud Cloud account hijacking

slide-16
SLIDE 16

Current Cloud Security Report

Enterprise Use of Cloud Services

On average the number of cloud services in use per enterprise, there was an increase to 1,246 from 1,181 last report.

Source: Netskope Cloud Security Report, October 2018

slide-17
SLIDE 17

Current Cloud Security Report

17

CIS Benchmark Violations for AWS

By category in the CIS benchmark for AWS, the majority of violations are in the Identity and Access Management category at 71.5 percent. Monitoring followed with 19.0 percent, Networking with 5.9 percent, and Logging with 3.6 percent. This may indicate that while many organizations have controls around cloud services and implemented things like multi-factor authentication (MFA) and single sign-on solutions, I/PaaS identity and access policies still need to be set. Source: Netskope Cloud Security Report, October 2018

slide-18
SLIDE 18
slide-19
SLIDE 19

Cloud Security Technology Drivers

19

  • Professionals now work from multiple devices in multiple locations
  • Instantaneous sharing and collaboration happens through numerous

applications

  • Firewalls cannot protect data stored throughout various cloud applications
  • Traditional security tools cannot provide visibility in the cloud
  • Non-enterprise cloud applications are consumed by end users without

regard for their risk exposure

slide-20
SLIDE 20

Common Use Cases for Cloud Security Technologies

20

Safely Enable Cloud Apps Discover Shadow IT Unified Cloud Policies Detect Cloud Threats Continuous Security Assessments Prevent Data Exfiltration

slide-21
SLIDE 21

What Technologies Exist to Address Risk?

21

SaaS IaaS Web

Analytics Policy Data Protection Threat Protection

Any User Any Device Any Location

CASB & Cloud Security Platform

slide-22
SLIDE 22

Mapping of Cloud Security Controls

slide-23
SLIDE 23

Mapping of Cloud Security Controls cont.

Source: Peerlyst Post – Adrian Grigorof, February 2019

slide-24
SLIDE 24

What Technologies Exist to Address Risk

24

Technical capabilities needed to address todays risk

Data Loss Prevention Encryption Adaptive Access Control Visibility into Cloud Application Use Continuous Security Assessment Anomaly Detection Threat Protection Web Security

slide-25
SLIDE 25

Questions?

slide-26
SLIDE 26

Appendix

  • Netskope Cloud Report:

https://resources.netskope.com/cloud-reports/netskope-cloud-report-

  • ctober-2018
slide-27
SLIDE 27

Thank You!