Dealing with an �Adolescent Cloud
Ross Young
CISO
CAT Financial
CYBERSECURITY
Caterpillar: Non-Confidential
Cloud Journey is Inevitable
CYBERSECURITY
Caterpillar: Non-Confidential
And Then There Were Two
CYBERSECURITY
Caterpillar: Non-Confidential
Multi-Cloud Wasn't Enough
CYBERSECURITY
Caterpillar: Non-Confidential
AWS Best Practices
Overwhelmed yet?
CYBERSECURITY
Caterpillar: Non-Confidential
Prepare
Prepare for security events
Keep
Keep people away from data
Protect
Protect data in transit and at rest
Automate
Automate security best practices
Apply
Apply security at all layers
Enable
Enable traceability
Implement
Implement a strong identity foundation
CYBERSECURITY
Caterpillar: Non-Confidential
1) Implement a strong identity foundation
Access Control, Authorization, Least Privilege, & Separation of Duties
Fundamental
Advanced - Limit the AWS resources for each Application
CYBERSECURITY
Caterpillar: Non-Confidential
Action Hero By Anthony Barbieri
CYBERSECURITY
Caterpillar: Non-Confidential
Automated Tests with Helium
CYBERSECURITY
Caterpillar: Non-Confidential
Policy Sentry by Kinnaird McQuade
CYBERSECURITY
Caterpillar: Non-Confidential
2) Enable Traceability
Monitor, alert, and audit actions and changes to your environment
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential
Things to Monitor on AWS
CYBERSECURITY
Caterpillar: Non-Confidential
CYBERSECURITY
Caterpillar: Non-Confidential
Scout Suite - Multi-cloud security-auditing tool
CYBERSECURITY
Caterpillar: Non-Confidential
3) Apply Security at All Layers
Defense in Depth approach with multiple security controls
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential
AWS Inspector – Automated AMI scanning
CYBERSECURITY
Caterpillar: Non-Confidential
Real Time Asset Inventory (Qualys Asset Inventory + Contrast Security)
CYBERSECURITY
Caterpillar: Non-Confidential
4) Automate security best practices
Make Security Policy Code
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential
CYBERSECURITY
Caterpillar: Non-Confidential
Checkov GitHub Actions for Terraform and CloudFormation
CYBERSECURITY
Caterpillar: Non-Confidential
5) Protect data in transit and at rest
Encrypt, Tokenize, and Limit Access to Your Data
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential
One Stop Shop for AWS Compliance
CYBERSECURITY
Caterpillar: Non-Confidential
6) Keep people away from data
Reduce or Eliminate Direct Access to Data
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential
Analyze Access Continuously and Remediate Broad Accesses
CYBERSECURITY
Caterpillar: Non-Confidential
7) Prepare for security events
Events happen! Have an incident response plan that’s tested
Fundamental
Advanced
CYBERSECURITY
Caterpillar: Non-Confidential