ADAM SPEAKS AT THE AGILEBLUE WEBINAR

On March 24. Tony Pietrocolo the President at AgileBlue hosted a webinar around identifying your cloud vulnerabilities and hardening your cloud posture. This webinar included two speakers, Rosemary Monroe who is a principal consultant for Online Business Systems, and Adam Rosenman the CEO of Rose IT Solutions.

The main focuses that were on the agenda for this webinar were:

1. How to continuously monitor and manage your cloud security across multi-cloud infrastructures

2. Detecting threats within your cloud

3. AgileBlue’s steps to CSPM and hardening your cloud

IDENTIFYING YOUR CLOUD VULNERABILITIES AND HARDENING YOUR CLOUD POSTURE

We are seeing more and more cloud breaches as of late. It is not because someone is hacking into them or the user is negligent and clicking on links, but because of misconfigurations. There are a million types of configurations and not everyone knows the best practices that need to be done in order to avoid cloud breaches.

“Nearly all successful attacks on cloud services are the result of customer misconfiguration, mismanagement, and mistakes.” – Gartner
— – Gartner

Businesses such as Amazon and Google are making big changes to grow in CSPM areas to avoid breaches due to misconfigurations, mismanagement, and mistakes. Google is even making deals with governments in order to bring their platforms in, bringing forth more pressure to avoid cloud security threats. As you can see in the graph below, the biggest cloud security threat is simply misconfiguration. It isn’t the more malicious threats you would assume such as hacking, but simple a misconfigured cloud platform. This is the biggest threat mainly because there is a lack of understanding when it comes to configuring cloud security.

“95% of all cloud security breaches are due to misconfigurations. Through 2024, organizations implementing a CSPM offering and extending this into development will reduce cloud-related security incidents due to misconfigurations by 80%.”
— – Garter

WHAT IS A MISCONFIGURATION?

At a general level, a misconfiguration could be anything from not having your storage configured correctly to not having your access controls configured in a way that’s controlling the access at the right levels. Runaway resources could be misconfigured because they are a part of your cloud’s ecosystem. Anything that you can apply a configuration to that controls access and utilization of your cloud, could potentially be misconfigured. A misconfiguration of the cloud is such a broad statement because the cloud itself is so broad. This could be a wide range of things that are configured incorrectly. When something is misconfigured in your environment you are jeopardizing the safety of your business and your data.


It’s important to remember that although Amazon and Google are secured systems, this does not ensure that your information is secured. This means that they are in a secured position but you have to set up configurations to make sure that your information is personally secured. You can’t forget that you are in charge of yourself when it comes to cloud security.

WHAT IS CSPM?

Cloud Security Posture Management (CSPM) is technology to identify misconfiguration issues and compliance risks in the cloud. An important purpose of CSPM programming is to continuously monitor cloud infrastructure for gaps in security policy enforcement. Visibility is everything when it comes to cyber security. When you get an attack or breach, it is likely because of a lack of that visibility.

WHY CSPM?

  • Continuous cloud and multi-cloud monitoring

  • Risk visualization and assessment

  • Automate remediation or remediate at the click of a button

  • Compliance monitoring

  • DevOps

  • Scan your storage buckets for misconfigurations that could make data accessible to the public

WHY DO WE MONITOR CLOUD INFRASTRUCTURE AND THREATS?

Adam says that we monitor cloud infrastructure and threats in order to secure our digital initiatives. Projects that businesses are moving to the cloud for efficiency and scalability purposes need to be aware of targeted attacks, security, and risk management. Leaders must adopt continuous adaptive risk and trust assessment approaches to allow real-time, risk-based decision-making.

Enterprises are overly dependent on blocking and prevention mechanisms that are decreasingly effective against advanced attacks. Comprehensive protection required an adaptive protection process integrating predictive, preventative, detective, and response capabilities.

CHALLENGES WITH MONITORING CLOUD INFRASTRUCTURE AND THREATS

  • Business transformation accelerates with or without security and risks people, processes, and infrastructure being ready

  • Information security lacks continuous visibility it needs to detect advanced attacks

  • Enterprise systems are under continuous attack and are continuously compromised, an ad hoc approach to “incident response” is the wrong mindset

  • Existing blocking and prevention capabilities are insufficient to protect against motivated, advanced attackers thus requiring predictive threat analytics to get ahead of the curve

  • Most organizations overly invest in prevention-only strategies deployed within non-integrated silos, increasing costs and decreasing effectiveness

IMPORTANCE OF MONITORING CLOUD INFRASTRUCTURE

  • Unification of IT, Net, Storage, Cloud, Dev, and Security Op’s understanding of immediate risks at hand

  • Enhancement of Infosec strategy, policy, and funding roadmaps where it matters to sustain operations based on high-risk vectors

  • Identification of risk which prioritizes mitigations identified from active threat actor tactics, techniques, and procedures

  • Extraction of additional value from EDR, NDR, and SIEM investments by aligning behavioral detections to threat actor techniques

  • Support of Zero Trust and CARTA initiatives through continuous monitoring and assessment of attack surfaces

COMMON ISSUES IN CLOUD DEPLOYMENT

One of the biggest and most common issues during cloud deployment is the misunderstanding of the Shared Responsibility Model. When the customers don’t understand the responsibilities handled by the cloud service provider and the responsibilities they themselves need to handle. When this is not fully understood it leads to inaccurate inventory, inadequate encryption, and flawed assumptions about BC/DR. Here is a graph of the Shared Responsibility Model for both the customer and the cloud service provider.

KEY TAKEAWAYS FROM THE SHARED RESPONSIBILITY MODEL

  • Review the shared responsibility model of your CSP

  • Review contracts

  • CSP’s documentation

  • Review CSP’s proof of controls

  • Review supply chain (multiple CSPs providing different services)

  • Trust but verify services provided/consumed

  • Ensure an accurate inventory is defined and maintained

KEY TAKEAWAYS FROM IDENTITY MANAGEMENT (IAM)

  • Implement centralized, automated access management and policy-driven environment creation

  • Implement least privilege and role or attribute-based access, model

  • Assign access only to modalities

  • Implement MFA for all access

BENEFITS OF CLOUD CONFIGURATION

1. Discovery and Visibility – Provides discovery and visibility into cloud infrastructure assets and security configurations. Users can access a single source of truth across multi-cloud environments and accounts.

2. Misconfiguration Management and Remediation – Eliminates security risks and accelerates the delivery process by comparing cloud application configurations to industry and organizational benchmarks so violations can be identified and remediated in real-time.

3. Continuous Threat Detection – Proactively detect threats across the application development lifecycle by cutting through the noise of multi-cloud environment security alerts with targeted threat identification and management approach. The number of alerts is reduced because the CSPM focuses on adversaries most likely to exploit areas.

4. Dev SecOps – Reduces overhead expenses and eliminates friction and complexity across multi-cloud providers and accounts via centralization of controls.

ABOUT ROSENMAN IT SOLUTIONS LLC

Rosenman IT Solutions LLC provides technical support for all your IT needs and is based in the USA. We are a managed services provider and IT consulting firm based in Troy, Michigan. Combined with our expertise, creativity, and versatility for your business’s success, our solutions are here to help your business through any IT service or challenge you may have nationwide with 24/7 support!

Previous
Previous

OKTA DATA BREACH

Next
Next

Made in Beijing: The Plan for Global Market Domination