tiecon 2016 keynote - security challenges & opportunities with public cloud adoption

30
Ravi Amanaganti Vice President of Engineering, Cisco Systems Inc. May 6 th 2016 Security Challenges and Solutions Public Cloud Adoption

Upload: ravinder-reddy-amanaganti

Post on 16-Apr-2017

1.111 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Ravi Amanaganti

Vice President of Engineering, Cisco Systems Inc.May 6th 2016

Security Challenges and SolutionsPublic Cloud Adoption

Page 2: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

My Journey

Page 3: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption
Page 4: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

The Traditional Enterprise

DATA CENTER is

DISAPPEARING

Page 5: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Private Cloud(63% Enterprises)

Public Cloud (88% Enterprises)

Hybrid Cloud(58% Enterprises)

Single Tenant Multi-Tenant

IT in Transition

Source: Rightscale 2015 State of the Cloud Report

Page 6: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

$191 billion

$97 billion

2015

2020

Estimated Growth of Public Cloud

2010$15 billion

Source: Forrester Research Inc.

Cloud as a % of IT spending

< 1%

4.3%

14.5%

2010 2015 2020

Page 7: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Businesses & Organizations Using Public Cloud

Page 8: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Why Are Enterprises Moving to Public Cloud?

Cost Savings SpeedElasticity & Scalability

Page 9: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Top Cloud Providers

Page 10: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Other

Lack of Visibility

Outages and Availability

Lock-in

No Concerns

Ability to Manage Hybrid

Cost

Security

0.00% 10.00% 20.00% 30.00% 40.00% 50.00% 60.00% 70.00%

Top Concerns About Moving to Public Cloud

Source: platform9.com

Page 11: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Top Data Breaches of 2015

191 million Registered

Voter records

Anthem80 million

records

Securus70 million prisoner

phonecalls

Ashley Madison

37 million records

Office of Personnel

Management21.5 million

recordsExperian

15 million records

MacKeeper13 million

records

VTech11.3 million

records

Premera11 million

records

Excellus10 million

records$575B Lost Annually

Page 12: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

The Changing Cloud Security ThreatsThe Treacherous Twelve

2010 2013 2015 Top Threats

5 1 1 Data Breaches

2 Insufficient Identity, Credentials and Access Management

2 4 3 Insecure Interfaces and APIs

4 System Vulnerabilities

6 3 5 Account Hijacking

3 6 6 Malicious Insiders

7 Advanced Persistent Threats

5 2 8 Data Loss

7 8 9 Insufficient Due Diligence

1 7 10 Abuse and Nefarious Use of Cloud Services

5 11 Denial of Service

4 9 12 Shared Technology Issues

Source: Cloud Security Alliance

Page 13: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Cloud Delivery Models & Security

Application

Data

Guest OS

Virtualization

Compute & Storage

Network

Facility

IaaS PaaS SaaS

Tenant

Provider

Application

Data

Guest OS

Virtualization

Compute & Storage

Network

Facility

Application

Data

Guest OS

Virtualization

Compute & Storage

Network

Facility

Application

Data

Guest OS

Virtualization

Compute & Storage

Network

Facility

Private Cloud

Page 14: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Data Lifecycle Protection

Stolen CredentialsMalwareSpoofingPivot

End Devices

Visible pipeWeak encryptionKey compromise

Data in transit

Data visibilityData loss

Rogue/Weak/DirtyApplications

Compute

Compute

Page 15: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

How to Achieve Effective Security?

Visibility Enforcement Automation

Do we have sufficient visibility into our apps and network ?

Are we able to apply policy effectively ?

Can we automate our operations ?

Page 16: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Cloud Access Security Broker

IaaS

PaaS

SaaS

CASB

Compliance

Malware Detection

End Devices

Visibility

Page 17: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

17© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

Cisco Security Solutions

OpenDNS‣ Security from the cloud‣ Blocks 95% of threats before they

cause damage

AMP‣ See a threat once, block it

everywhere‣ Most effective solution for known

and emerging advanced threats

Next-Gen Firewall‣ Prioritizes threats‣ Automates response‣ Improved malware protection ‣ Fully integrated management

Lancope‣ Alerts attempted communication

with an infected host ‣ Prevents infected host from

communication within the network ‣ Uses Network as a Sensor to

contain and minimize threats

Page 18: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Users

The Changing Landscape

Mobile

Network Software Defined Networks

Application Microservices Architecture

Compute Containers

Storage Data Virtualization

Page 19: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Application Architecture Evolution

Database Access

Service Service

Service Service

Presentation Layer

HTTP HTTP

API Gateway

RPC HTTP AMQP HTTP

Monolith Microservice

AMQP

Page 20: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Popular Containers & Adoption

Adoption up 5X in 2015Source: datadog.com

Page 21: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Container Threats

Infrastructure

Operating System

Container Infrastructure

Bins/Libs

App 1

Bins/Libs

App 2

Bins/Libs

App 3

Attacks on host and its networkAttacks on other

Containers

Attacks on Container Infrastructure

Things to worry about

‣ Kernel Exploits‣ DOS Attacks‣ Container breakouts‣ Poisoned images‣ Compromising secrets

Page 22: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Hardening Container Security

Isolation via

Namespaces

Control Groups

Linux Capabilities

Linux Security Modules

Run the Container inside a Virtual

Machine

Page 23: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Vulnerability Management

Compliance

Runtime Defense

Access Control

Policy Enforcement in Network

Essential Steps to Secure ContainersManage vulnerabilities spanning Linux distributions, containers, and app frameworks

Monitor activities, detect anomalies, and policy violations

Enforce configurations, best practices, and trusted images

Enforce user access policies for containers

Enforce security policies in network for applications running inside containers

Page 24: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Microservice Infrastructure Solutions

Page 25: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Network Visibility for Container Workloads

Network

No Policy application

No Visibility into individual flows

Page 26: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Network Visibility with Cisco

Network

Group Based Policy

Visibility into individual flows

Page 27: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Hybrid Environments

Dynamic End-point Scale

Auto-botsData Analytics

& Machine Learning

Operational Policies for

Containerized Apps

Innovation Opportunities

Page 28: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Competitive Landscape

Page 29: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

Cisco Entrepreneurs in Residence

Page 30: TiEcon 2016 Keynote - Security Challenges & Opportunities with Public Cloud Adoption

30© 2016 Cisco and/or its affiliates. All rights reserved. Cisco Confidential

THANK YOU