improving threat intelligence, detection, and response for ... · open s3 buckets overly permissive...

18
Improving Threat Intelligence, Detection, and Response for Cloud Workloads Dan Constantino Director, Security Operations Cox Automotive

Upload: others

Post on 23-May-2020

2 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Improving Threat Intelligence, Detection, and Response for Cloud

WorkloadsDan Constantino

Director, Security Operations

Cox Automotive

Page 2: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Improving Threat Intelligence, Detection, and Response for Cloud Workloads

Dan Constantino Director, Security Operations

Page 3: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

No exceptions

Threat actors don’t break in, they log in or exploit old

vulnerabilities/misconfigurations

Cloud environments can widen the scope of

a company’s risk

Here’s the brutal truth:

Page 4: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

FINANCIAL SOLUTIONS

INTERNATIONAL

INVENTORY SOLUTIONS

RETAILSOLUTIONS

MOBILITYSOLUTIONS

Page 5: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

IN THE CLOUD

Corporate Applications(SaaS)

Customer-Facing Systems (IaaS/SaaS/PaaS)

Page 6: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

CLOUD RISKSOverly Permissive Security Groups

Open S3 Buckets

Overly Permissive IAM Roles

Exposed API Keys

CI/CD Pipeline Misconfigurations (Jenkins)

Remote Code Execution – Vulnerabilities

DBAQA/ RELEASE

ENGINEER

Page 7: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

PII

Page 8: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Threat INTELLIGENCE

Threat DETECTION

Threat RESPONSE

Page 9: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code
Page 10: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Threat Intelligence, Detection, and Response for Cloud Workloads

How We Built Our:

Page 11: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Built a threat intel ecosystem to better understand our threats

1

• Create your own threat intel

• Integrate on-prem and cloud threat intelligence within a single platform

• Age out/expire threat intel

• Use your IR artifacts/findings

• Automate 2-way integration of threat intel

• Leverage your threat intel to prioritize vulnerability remediation

THREAT INTELLIGENCE

Threat INTELLIGENCE

TIP

S

Page 12: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Updated our detection capabilities to identify cloud threats and established self-service model for low-level threat alerts2

THREAT DETECTIONThreat

DETECTION

Anomalous Events

& Activities

Excessive Privileges

CompromisedAccount

or System

Resource Misuse

Page 13: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Scaled threat response through automated alerts and actions

3THREAT RESPONSE

Threat RESPONSE

Any/Any Security Group

Page 14: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

INCIDENTS BY MONTH

Phishing

Crypto mining

Acct Compromise

Create a playbook and runbook for use cases

Build IR investigation dashboards Create logical

process diagrams

Track metrics

OPERATIONALIZE

Page 15: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

KEY TAKEAWAYS

• Fully understand your cloud risks and threats

• Create your own threat intel ecosystem

• Set up accurate and actionable alerting

• Automate response for commodity-based threats

• Build a playbook with your use cases

Page 16: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

THANK YOU

Dan Constantino Director, Security Operations

Page 17: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code
Page 18: Improving Threat Intelligence, Detection, and Response for ... · Open S3 Buckets Overly Permissive IAM Roles Exposed API Keys CI/CD Pipeline Misconfigurations (Jenkins) Remote Code

Vulnerability Management:Q&A Panel Discussion

Jason CatheyCISO

Bank OZK

Dan ConstantinoDirector,

Security OperationsCox Automotive

Todd TherrienInterim CISO

City of Phoenix

Moderator: Bob Bragdon, Publisher, CSO