SESSION ID: CSV-R09 Untangling SaaS Security in the Enterprise Rehman Khan Brajesh Moni Director, Cloud & Data Security TD Ameritrade https://www.linkedin.com/in/rehmankhan/ @cryptorak Sr. Security Consultant, Cloud & Data Security TD Ameritrade https://www.linkedin.com/in/brajeshmoni/ #RSAC Public Cloud Security Threats 2 #RSAC Public Cloud Business Drivers #RSAC Disrupt legacy competitors using public cloud economy of scale Rapid businesses pace & agility due to competition Acquisitions continue to pressure the markets demanding agility Aspirations of social integration, digital innovation, agility, and scale rapidly Access to information anywhere from any device by authorized users Developers wanting to experiment IOT, AI, Analytics, and APIs Innovation focus to transform business and technology foot print 3 #RSAC Enterprise SaaS Expansion 4 https://www.gartner.com/en/newsroom/press-releases/2019-11-13-gartner-forecasts-worldwide-public-cloud-revenue-to-grow-17-percent-in-2020 What is the SaaS Security Problem ? #RSAC Public Cloud Security Program Lorem Ipsum is simply dummy text Lorem Ipsum is simply dummy text 6 #RSAC Data Security Is Key ! #RSAC #RSAC Cloud Security SaaS Engagement Model Communicate Proactively Vendor Management Build relationship with vendor assessment and procurement team Cloud Security Introduce cloud security assessment questionnaire to SaaS vendors based on cloud security standards Business Engagement Identify and build trust relationships with innovation teams, business areas that are experimenting with SaaS applications Monthly cloud security tech talks Cloud security immersion day Create a collaborative channels for innovators and developers Cloud Risk Management Process #RSAC #RSAC Foundational Cloud Security Controls Foundational Cloud Security Controls 11 #RSAC Foundational Cloud Security Controls - IAM Standardized Provisioning — Without Custom Connectors Identity & Access Management AuthN - SSO,SAML, OpenID AuthZ – OAuth 2.0 12 #RSAC Foundational Cloud Security Controls – Data Protection Proxy Encryption Data Protection 13 #RSAC Data Integration Secure Patterns #RSAC Pattern1: File Transfer from SaaS to External Vendor Pattern2: File Transfer from SaaS to On-premise Pattern3: API calls from SaaS to External Vendor Pattern4: API calls from On-premise to SaaS Pattern5: API calls from External Vendor to SaaS Data Protection 14 Foundational Cloud Security Controls – App Security APP Security Application Security Requirements Risk  Secure handling of Access token  Access Token Misuse  Storage of sensitive Information  Insecure Transmission  Secure Rest API Implementation  Third party insecure app  API access rate/traffic management implementation  Session Management 15 #RSAC Foundational Cloud Security Controls – Logging & Monitoring SaaS Logging Logging & Monitoring SaaS Monitoring Centralize & Ingest SaaS cloud Log Data Explore the data – for critical operational & security insight. Enable native logging and monitoring Source: Gartner 16 #RSAC Foundational Cloud Security Controls – Incident Response Engage Incident Response team Engage SaaS operation team and provide visibility to IR team. Incident Response Establish a joint response plan with the SaaS provider. IR team to evaluate the monitoring controls and security measures that are in place for SaaS provider. Define alerts, security events categorize & score risk events. Update IR playbook. Build Recovery Plan. Source: NIST 800-61 17 #RSAC Foundational Cloud Security Controls - Takeaways #RSAC Identity & Access Management Formalize standards and process for AuthN/AuthZ with SaaS services. [SCIM, SAML, Oauth, OpenID]  Enable MFA – Send MFA status as an attribute when using federated Auth.  Privileged Identities – Vaulted, should use MFA always.  Data Protection    Data Classification, Data Lifecycle, Data Location/Residency Encryption Engine – Provider Managed Encryption, Proxy Encryption Key management – Customer managed, Provider Managed. – Have control of the key all the time. App Security      Secure handling of Access token Storage of sensitive Information Secure Rest API Implementation API access rate/traffic management Session Management Logging  Centralize & Ingest SaaS cloud Log Data  Explore the data – for critical operational & security insight.  Enable native logging and monitoring Incid

pdf文档 2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise

安全研究库 > 国外研究报告 > 云安全和虚拟化 > 文档预览
28 页 0 下载 54 浏览 0 评论 0 收藏 3.0分
温馨提示:如果当前文档出现乱码或未能正常浏览,请先下载原文档进行浏览。
2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise 第 1 页 2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise 第 2 页 2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise 第 3 页 2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise 第 4 页 2020_USA20_CSV-R09_01_Untangling SaaS Security in the Enterprise 第 5 页
下载文档到电脑,方便使用
还有 23 页可预览,继续阅读
本文档由 张玉竹2022-04-08 10:18:37上传分享
给文档打分
您好可以输入 255 个字符
安信天行文库的中文名是什么?( 答案:安信天行 )
评论列表
  • 暂时还没有评论,期待您的金玉良言