Cyber Security WCA - 2019 1 BILLION users Lets level set with - - PowerPoint PPT Presentation

cyber security
SMART_READER_LITE
LIVE PREVIEW

Cyber Security WCA - 2019 1 BILLION users Lets level set with - - PowerPoint PPT Presentation

App Engine A Practical Approach To Cyber Security WCA - 2019 1 BILLION users Lets level set with some Defjnitions and Examples Protecting digital data and assets (a subset of information security) Confidentiality 1 Integrity 2


slide-1
SLIDE 1

App Engine

A Practical Approach To

Cyber Security

WCA - 2019

slide-2
SLIDE 2
slide-3
SLIDE 3

1

BILLION

users

slide-4
SLIDE 4

Let’s level set with some

Defjnitions and Examples

slide-5
SLIDE 5

Protecting digital data and assets (a subset of information security)

slide-6
SLIDE 6

Confidentiality

1

Integrity

2

Availability

3

slide-7
SLIDE 7

Activists

1

Profiteers

2

Nation States

3

slide-8
SLIDE 8

Data Exfiltration

1

Ransomware

2

Advanced Persistent Threats

3

slide-9
SLIDE 9

Typical View of Security

slide-10
SLIDE 10 Confidential & Proprietary Google Cloud Platform 10 10

Traditional Security

slide-11
SLIDE 11

As you conduct periodic assessments of risk, here are

Five Things to Consider

slide-12
SLIDE 12

Use Policy to Limit Access

  • Least privilege access is imperative
  • Focus on central administration and monitoring
  • Regularly audit your accounts and review access privileges
slide-13
SLIDE 13

Protect the Logs

  • Compromise of logs can lead to a complete systems compromise
  • Know where your logs are being stored and who can access them
  • Consolidate and retain your logs for as long as possible
slide-14
SLIDE 14

Understand Your Network Boundaries

  • Connections to the cloud open new attack vectors for your network
  • Define a connectivity strategy to the cloud from on-premises
  • Options: Trusted Internet Connections, Virtual Private Cloud, etc
slide-15
SLIDE 15

Inventory Your Endpoints

  • Build and maintain an inventory of your endpoints
  • Understand your endpoint statuses (patched, virus scanned, etc)
  • Employ a rules engine that grants access based on status
slide-16
SLIDE 16

Patch, Patch, Patch

  • Patch your systems as soon as patches are available
  • Make sure your providers are patching their services
  • Get out of the patching business where able
slide-17
SLIDE 17

A view of the Google’s cyber security landscape from

Concrete to Customer

slide-18
SLIDE 18

Google Cloud Platgorm

Our global infrastructure

PLCN (HK, LA) 2019 Faster (US, JP, TW) 2016 Unity (US, JP) 2010 Dunant (US, FR) 2020 Monet (US, BR) 2017 Junior (Rio, Santos) 2018 Tannat (BR, UY, AR) 2018 SJC (JP, HK, SG) 2013 Indigo (SG, ID, AU) 2019 HK-G (HK, GU) 2019 JGA (AU, GU, JP) 2019 Curie (CL, US) 2019 Havfrue (US, IE, DK) 2019

Network Edge points

  • f presence

CDN nodes

Mumbai Singapore Kuala Lumpur Sydney Tokyo Chennai Taipei Seatule San Francisco Montréal Hamburg Zurich Madrid Paris London Hong Kong Osaka Toronto Chicago Los Angeles Denver Dallas Miami Atlanta Washington DC New York Rio de Janeiro São Paulo Buenos Aires Munich Milan Marseille Amsterdam Stockholm Frankfuru

Dedicated Interconnect Current regions and number of zones Future regions and number of zones

3 3 3 3 3 3 3 3 3 3 3 3 3 3 4 3 3 3 3 3 3 3 3

slide-19
SLIDE 19

Usage Operations Deployment Application Network Storage OS + IPC Boot Hardware

Defense in depth at scale

slide-20
SLIDE 20

Infrastructure defense against key attack vectors

Usage

Log Auditing Safe Browsing API BeyondCorp Security Key Enforcement

Operations

Compliance & Certifications Live Migration Infra maintenance & patching Threat analysis and intelligence Open Source Forensics tools Anomaly Detection (Infrastructure) Incident Response (Infrastructure)

Deployment

Google Services TLS encryption with perfect forward secrecy Certificate Authority Free and automatic certificates DDoS Mitigation (PaaS & SaaS)

Application

Peer code review & Static Analysis (Infrastructure SLDC) Source code/Image provenance (Infrastructure) Binary authorization (Infrastructure code) WAF (PaaS & SaaS Use cases) IDS/ IPS (PaaS & SaaS Use cases) Web Application Scanner (Google Services)

Network

Infrastructure RPC encryption in transit between data centres DNS Global Private Network Andromeda SDN Controller Jupiter Datacenter Network B4 SDN Network

Storage

Encryption at rest Logging Identity and Access Management Global at scale Key Management Service

OS + IPC

Hardened KVM Hypervisor Authentication for each host and each job Curated Host Images Encryption of Interservice Communications

Boot

Trusted Boot Cryptographic Credentials

Hardware

Purpose-built Chips Purpose-built Servers Purpose-built Storage Purpose-built Network Purpose-built Data Centers

slide-21
SLIDE 21

Thanks!