Conf42 Cloud Native 2024 - Online

Securing the Sky: Strategies for Protecting Against Cloud Hacking

Video size:

Abstract

In a world where data is the lifeblood of businesses, ‘Securing the Skies’ offers a comprehensive blueprint for safeguarding your organization’s data in the cloud. We explore the latest techniques to protect your cloud infrastructure against cyber attacks.

Summary

  • Sena is senior cloud security engineer at Lirabar Studio. He talks about why cloud security is a nightmare for developers and DevOps engineers. There are lots of attack surfaces in the cloud, he says. Securing the cloud and security of the cloud are really important for us.
  • Do not use public resources unless you really really need. Reading the documentation ensures that security features are configured and configured correctly. maximizing protection against threats is important for us. Alerting is most important in the most important thing in the cloud.
  • Do not isolate teams because everyone needs the security, marketing needs of security. Each team brings unique skills and perspectives to the table. Dive ongoing security enhancements and updates with your team. Always think like what if scenarios.
  • So that's it for my session. Again, this is a recording session, so I cannot get questions. If you want to connect me, you can search from the LinkedIn. You can follow me from here. Thank you for joining me today and see you soon.

Transcript

This transcript was autogenerated. To make changes, submit a PR.
I am Sena. I am AWS Security Hero and senior cloud security engineer at Lirabar Studio. If you want to connect with me, you can use my LinkedIn, my Twitter and my medium account. Today we are going to talk about cloud security, securing the sky strategies for protecting against cloud hacking let's get started. First of all, we can start with why cloud security is so complicated and a nightmare for developers and DevOps engineers. First of all, there are lots of cloud providers in the market. Sometimes we struggle to choose which cloud provider is good and fit for us. In these providers there are lots of services that we need to learn and effectively use. Secondly, there are lots of product requirements in our company. We need to choose what is the best solution for us, what is the best solution for us to integrate the security with them. Product requirements can change quickly, so sometimes it's hard to detect security requirements and threat management between these product requirements. On the other side, actually, we all know there is a shared responsibility model for the cloud providers. Securing in the cloud and security of the cloud are the cloud terms are really important for us. Sometimes companies want to know what responsibilities they have and sometimes it can be complicated, analyze it all and get the best explanation. In addition to all of this, there are lots of cloud resources we need to use right now. You are going to use and you have lots of cloud resources in your cloud environment. You need to analyze all of them like unused resources, used resources that you need to remediate security findings. And this is a challenge for us. Depending on cloud resources, there are lots of attack surfaces in the cloud. We need to aware all of these. Like there are lots of endpoints, network environments, databases, AI services, iot services, blah blah. Attackers love using different attack surfaces, even if you don't know. And for the last one, there are lots of tools. We have lots of different tools and lack of experience in the cloud security. Sometimes companies get lots of tools to use, check the cloud security installs and configure them, and after that forget them. It's not the best way to protect the cloud. We need to know and use these tools and protect ourselves from the attackers. So we love the cloud, so attackers do. In this slide, there are some analytics about cloud security. It's from the Orca security report. Thanks to them for this. If you want to read them detail, you can see the report in their site. So there is a 91% of organizations have at least one vulnerability older than ten years and 46% of organizations have a vulnerability more than 20 years old. So it's important so what does it mean? It means we have lots of environment, we have lots of vulnerabilities and we have lots of old vulnerabilities and new vulnerabilities that we need to remediate. On the other side, there is analytics about the cloud malware attacks. So 38% of the cloud malware attacks are known the Trojans and for the malware by asset type we can see container storage bucket and the virtual machine. And these asset types are the most usage of the cloud. So we need to get a plan for this, for the containers, for the storage bucket and for the virtual machine, and the last one for the log for shell. You can see the numbers from it. Log four shell and the log 4G are some exploits in the recent years. So I can easily say it's important to protect the cloud with these numbers. For the recommendations and some points that we need to share, we can start with do not use public resources unless you really really need. What does it mean for your storage resources, for your container registries, for your publicly accessible databases, for your AI notebooks like Amazon Sagemaker? Please do not use public resources, publicly accessible resources unless you really really need. What does it mean really need? Like if you have a static website and if you have some publicly accessible photos in your website, it's fine to share in the s three bucket publicly. There is no issue in here. But if you have some public resources in the s three and some attacker can write on it, it's a problem or destroy on it, it's another problem. Or maybe there is some large files in the S three that is publicly accessible. It's also a problem for the denial of wallet amplification attack. And also if you have some publicly accessible databases and publicly notebooks, it's also a problem. They are also a problem because we don't want to databases can publicly accessible and we don't want someone use our AI notebooks, Amazon sagemaker models in our AWS account. So the publicly accessible resources we do not use publicly accessible resources is the number one recommendation from me for the two. Be aware of resources. Yes. It's also important which resources, where and why? We need to answer these questions, how your architecture is designed. There are lots of resources and there are lots of like in the AWS. There are lots of maybe regions, maybe different AWS accounts. And we need to know and be aware of our resources and what are the possible vulnerabilities on it. Like your EC two ECs AWs environment that I mentioned. Maybe you have lots of vulnerabilities in your environment and you need to all of them. You need to know all of them. So what are the misconfigurations in your cloud resources? Like unused access keys, like publicly accessible s, three buckets, like cloud trail that aren't enabled yet. All of it are the misconfigurations. And we need to follow and aware and check all misconfigurations, maybe daily, weekly or monthly, I don't know. It depends on your company. And what are the endpoints? For the endpoints, there are lots of endpoints like EIB endpoints, like lambda functions, like API gateway endpoints. I don't know if an endpoint is an external, this is an issue for us and this is an attack surface for the attackers. So you need to know what the endpoints are and they are vulnerable or not. And for the awareness. Actually there are lots of tools in the CSPM cloud security posture management. CSPM, it's not enough, but it's a good start for your posture management. Like you can get your security posture score, you can get general visibility of your cloud environment. Like for the CIS benchmark, what are my paths, what are my fails for cis Azure benchmark, what are my failed ones and what should I need to remediate them? This is a good start, but it's not enough. We need to do lots of work to protect our cloud. So for the other one, please read the documentation. I know that reading the documentation can be challenging and unwanted stuff for developers, for sometimes the security engineers, but it's so important. Following the documentation ensures that security features are configured and configured correctly. And sometimes there are some additional security features in the documentation and if we don't know it, we cannot enable it. So reading the documentation is very important in this point. And maximizing protection against threats, again, maximizing protection against threats is important for us. And the cloud engineers are updated on the Neve security features. Yes, that's why I'm saying and best practices and maximizing the use of documentation minimizes reliance of external support, saving time and for your resources. So please read the documentation whenever you see an AWS service, Azure service, whenever see a security service, maybe compute service, database service, it's so important. Yes. The other one get alerted from everything you need. Alerting is most important in the most important thing in the cloud I think, because there can be lots of anomalies in your AWS account, in your Azure environment, whatever you are going to use. And there are always some class resource threats. There are always cloud resources, configurations, chains, and we need to follow all of it. Like what are your anomalies? What are your cloud resources threats? What are your configuration chains? Like if someone, if an attacker gets in your AWS account and creates a new IM user for herself or himself, it's very dangerous for us and we need to be aware of it. So we need to get alerts from everything we need. And also getting alerts is an issue. But after getting the alerts, we need to have a plan for the alerts is another issue. Yes, we got lots of alerts. And if we do not analyze them, it's another issue because every alert should be analyzed deep dive. And if someone or something is bad on your cloud environment, you need to be aware of it. With these cool alerts, even if false positive alerts, you need to analyze all of it. And with the alerts we need to monitor everything. Yes, I am sure you know it, but again, I want to say it, we need to monitor everything because the constant monitoring enables early detection and suspicious activities or anomalies in our cloud environment. And the timely monitoring allows for rapid response to security incidents like there is some anomalies in it. And if we monitor it, there is a fast solution for this security incident. And also monitoring provides valuable insights into emerging threats and attack patterns. And also monitoring some resources helps control the cost anomalies and prevention of unnecessary expenses. So it's important to monitor everything. So the encryption we know the encryption we need to encrypt everything. We need to dance like no one is watching. Encrypt like everyone is. Encryption in transit is number one, encryption in rest is number one. Following the best practices in the encryption usage encryption stage like what is the best encryption key for the asymmetric encryption? What is the best TLS version for my HTTPs on the Erb? Like we need to follow the best practice for it and also follow up the cybersecurity work for encryption changes like TLS 100 and zero is not secure anymore. SSL version two is not secure anymore, something like that. Follow up cybersecurity word for encryption changes helps for us and the other stuff be open to change. I love this phrase. So I want to add in my presentation the most dangerous phrase in English languages. We always done it this way. This is the best dangerous phrase because yes, you have always done in this web and it's the most dangerous thing in your cloud environment. So it's important to be open to change open. Maybe you need to change all architecture, maybe you need to change your containers, maybe you need to change the code, I don't know, but it's important to be open to change and please do not use a phrase like, we have always done it this way and we didn't hack for ten years, so why do we need to change it? It's too dangerous. Please do not use and always be open to change for everything, for your architecture, for your code, maybe for your team, I don't know. It's important point for the cloud security and also for the teams. I believe you shouldn't isolate teams because everyone needs the security, marketing needs of security. Cloud security needs to security developer needs the security and each team brings unique skills and perspectives to the table. And if we do not isolate the teams, this improves the visibility across teams and helps identify and address security risks more efficiently. Maybe some developer knows about the architectural, maybe some architects in your team knows about the security stuff in your EC two. And if you don't isolate teams, it can be very helpful to solve things, to mitigate things, and to find a solution for the security incident. And also it avoids the duplication of efforts and resources, because if one team looks at a vulnerability, for example, if different teams isolated different teams, different teams analyzes the same vulnerability, it's a duplication. And for the efforts and for the resources, we don't want that. So please do not isolate teams in your company. And the last one, think what if. As a security professionals, we always think what if, what if I get hacked? What if someone gets my credentials from here? Think what if an attacker gets here and do this and do this after do this and after do this, what should I do? Considering the potential scenarios in their impacts on the cloud security posture and identify the vulnerabilities and weaknesses before they can be exploited. Always think like what if scenarios. Dive ongoing security enhancements and updates with your team. Like do not isolate teams and think always what if. And after that, I think with these recommendations, with this to do list, I think you can protect your cloud environments from the attacks and you can increase your visibility in your cloud environment. So that's it for my session. Thank you for joining me today. Again, this is a recording session, so I cannot get questions, but if you want to connect me, you can search from the LinkedIn, you can search in the twitter and to my medium, I write some blog posts on it. You can follow me from here. Thank you for joining me today and see you soon.
...

Sena Yakut

Senior Cloud Security Engineer @ Lyrebird Studio

Sena Yakut's LinkedIn account Sena Yakut's twitter account



Join the community!

Learn for free, join the best tech learning community for a price of a pumpkin latte.

Annual
Monthly
Newsletter
$ 0 /mo

Event notifications, weekly newsletter

Delayed access to all content

Immediate access to Keynotes & Panels

Community
$ 8.34 /mo

Immediate access to all content

Courses, quizes & certificates

Community chats

Join the community (7 day free trial)