cybersecurity compliance automation platform
play

cybersecurity & compliance automation platform delivered in - PowerPoint PPT Presentation

cybersecurity & compliance automation platform delivered in software as a service model plug&play cybersecurity plug&play compliance Defenselayers company purpose Defenselayers is an innovative, global cybersecurity startup. We


  1. cybersecurity & compliance automation platform delivered in software as a service model plug&play cybersecurity plug&play compliance

  2. Defenselayers – company purpose Defenselayers is an innovative, global cybersecurity startup. We secure applications both in private and public clouds, applications which are built using application containers technology (Docker, Kubernetes environment). We protect applications during development as well as in production environment. This is why we say we are DevSecOps native company. Defenselayers is a cloud native company, providing application containers native cybersecurity services. Apart of securing application containers we assure in some extent compliance with GDPR, NIS and PCIDSS standards. Our mission is to reduce complex and expensive cybersecurity services usually provided by expensive specialists into automated, simple to use and affordable Software-as-a-Service. We do it through our Plug&Play Cybersecurity Automation Platform.

  3. Defenselayers’ response to market trends Business is moving to a cloud. With growing cloud adoption new software development ways appeared: microservices and application containers. Advantages of cloud computing, however, come with a cost – cybersecurity challenges. At the same time it is more difficult to find experienced cybersecurity experts and they are more and more expensive. In 2020 cybersecurity talent gap is expected to reach 3,5 mln positions globally. This is where Defenselayers comes to the stage. By providing a platform which automates cybersecurity of microservices encapsulated in application containers we allow to solve problem of cybersecurity talent gap and reduce software development costs at the same time. Application containers market is quite young, but it grows rapidly and is expected to grow further. There are very few truly application containers native cybersecurity tools. Cybersecurity of application containers is recognized as one the most necessary solutions these days.

  4. Container security Container security is recognized by CB Insights as the most necessary out of all cybersecurity industry trends. Source: CBInsights

  5. Defenselayers secure container vision To reduce complex and expensive cybersecurity services to plug&play commodity …. PLUG&PLAY CYBERSECURITY Increased level of security PLUG&PLAY COMPLIANCE Shorter time-to-market Cybersecurity standards & best practices automatically implemented Lower software development costs Compliance regulations Faster software development cycle automatically implemented Savings on cybersecurity and compliance resources Cybersecurity and compliance layers constantly kept updated Savings on cybersecurity tools plug&play cybersecurity plug&play compliance

  6. How we do it? Defenselayers produce OCI compliant application containers with pre-encapsulated and pre-hardened standard technologies (operating systems, databases, application servers, interpreters etc.). We plan to develop containers with hundreds of different technologies. Developer encapsulates his microservice into Defenselayers container (note that no change to microservice is required). Central Defenselayers Platform monitors such container and constantly updates it when new vulnerabilities appear. Customers pay periodic fee for application container monitoring and updating security layers of the container.

  7. Secure Technology Stack Defenselayers provides your microservices with out-of-the-box secure containerized technology stack just by one click.

  8. Defenselayers – General Roadmap • Stage 1 hardening and settings done to meet compliance regulations • assure that all components put into container image before it leaves our “factory” could be trusted • 17 technologies pre-encapsulated in Defenselayers Secure Containers • more security tests Stage 2 • on-line container monitoring • Further technologies encapsulated • Defenselayers e-store plug&play cybersecurity plug&play compliance

  9. Stage 1 - Defenselayers Secure Container preparation process Executable binaries hardening Secure configuration Recompilation of main components Removal of default accounts Removal of insecure modules Secure application accounts Removal of insecure functionality Secure environment variables settings Removal of insecure components File system access rights hardening Removal of unused components More strict access rights Secure configuration of included components UMASK Shell Vulnerability scanning Network services Malware scanning Daemons Integrity protection of every binary and configuration component Other component Complete manifest of all components inside container image plug&play cybersecurity plug&play compliance

  10. Stage 1 – How Defenselayers Secure Container addresses compliance PCI DSS GDPR Security/hardening requirements for CardHolder Data Secure by default, out-of-the-box = privacy by default privacy Environment (CDE) (Req 3, 4) by design (Art. 25) Integrity control (Req 6) Security testing and vulnerability management (Art 32 1 c-d) Vulnerability scanning (Req 5, Req 6, Req 11) Incident management requires integrity control (Art. 33, 34) Malware scanning (Req 5) NIS Directive Patch management (Req 11) Incident management and reporting requires integrity control Secure TLS and other encryption protocols/algorithms (Req (Art. 14) 3, Req 4) Vulnerability & patch management (Art. 14, Art. 16) System hardening / development of secure networks, systems and applications (Req 2, Req 6) Financial sector regulations Risk based hardening approach Operation Risk value reduction Vulnerability scanning Malware scanning Patch management

  11. Defenselayers Secure Containers – technology encapsulation roadmap Ready To Use Ready by the end of 2020 • • Alpine Nodejs • • Nginx PHP • • Apache Java • • SFTP/SSH MongoDB • • Python MySQL • • Go Pytest • • Redis Gunicorn • • Django RabbitMQ • Flask • Postgress

  12. Stage 1 – Scope of Defenselayers Services Unlimited license for Defenselayers Secure Containers Scope of services Constant monitoring of Defenselayers Secure Containers cybersecurity status Providing customers with information about new vulnerabilities Providing customers with new versions of Defenselayers Secure Containers free from vulnerabilities plug&play cybersecurity plug&play compliance

  13. THANK YOU info@defenslayers.com

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend