SlideShare une entreprise Scribd logo
1  sur  35
THE ANATOMY of
a CLOUD DATA BREACH
80 million
records
Anthem
500K
records
IRS
18 million
records
OPM
37 million
records
Ashley
Madison
4.5 million
records
UCLA
Med Center
Some say we have
Breach Fatigue
Sources and per record cost of a data breach
Malicious or
criminal
attack
Human
error
System
glitch
Source: 2015 Ponemon cost of a data breach
Most Data Breaches Involve Advanced
Persistent Threats (APTs)
• An APT is a set of stealthy and continuous
computer hacking processes, often orchestrated
by human(s) targeting a specific entity.
• Usually targets organizations and/or nations for
business or political motives.
• Processes require a high degree of covertness
over a long period of time.
From Wikipedia APT lifecycle (Gartner)
APT lifecycle simplified
• Infiltration – Attempt to gain a
foothold in the environment
• Command and Control – Injects
a payload into the compromised
system to direct malware on
what to do
• Exfiltration of Data -
Unauthorized transfer of
sensitive data
Infiltration
Command
& Control
Exfiltration
of Data
APT
INSERT A CLOUD GRAPHIC
What role does
the cloud play in
data breaches?
If your organization had 100 cloud apps and added 25 more in
a 12-month period, you would increase your probability (and
expected economic impact) of a data breach by 75%*
Increase use and
increase probability
*source: 2014 Ponemon report cost of a data breach
9
apps
• 700+ cloud apps
per enterprise
• 90% are not
enterprise-ready
users
• Malicious or
non- intentional
• 15% of corporate
users have had their
account credentials
compromised
10
THE
HUMAN
FACTOR
11
apps
• 700+ cloud apps
per enterprise
• 90% are not
enterprise-ready
users
• Malicious or
non- intentional
• 15% of corporate
users have had their
account credentials
compromised
data
• 18% of files in cloud
apps constitute a
policy violation
• 22% of those files are
shared publicly
activities
• Cloud makes it
easy to share
• When is an activity
an anomaly?
Cloud Usage and APT lifecycle
APT
Data Breach Study: Phase 1 - Infiltration
CLOUD APP USED FOR MALWARE DELIVERY
Step 1
Upload your
file to
uploading.com
Data Breach Study: Phase 1 - Infiltration
CLOUD APP USED FOR MALWARE DELIVERY
Step 2
Download your
file
Data Breach Study: Phase 1 - Infiltration
CLOUD APP USED FOR MALWARE DELIVERY
Step 3
Check for
Virus /
Malware
Data Breach Study: Phase 2 Command & Control
CLOUD APP USED FOR C&C SERVER
• Initial Infection vector – spear phishing
• Malware component – crafted RTF files
– Exploits vulnerability CVE-2014-1761
(Microsoft Word RTF Object
Confusion)
• Command & Control Server –
CloudMe.com (100 accts)
– Data ex-filtrated to cloud storage app
CloudMe.com
– New payloads & instructions
downloaded
• Data Retrieval – network of compromised
home routers
source: Blue Coat
Data Breach Study: Phase 2 Command & Control
CLOUD APP USED FOR C&C SERVER
• Initial Infection vector – spear phishing
• Malware component – crafted RTF files
– Exploits vulnerability CVE-2014-1761
(Microsoft Word RTF Object
Confusion)
• Command & Control Server –
CloudMe.com (100 accts)
– Data ex-filtrated to cloud storage app
CloudMe.com
– New payloads & instructions
downloaded
• Data Retrieval – network of compromised
home routers
source: Blue Coat
Data Breach Study: Phase 3 Data Exfiltration
CLOUD USED FOR DATA EXFILTRATION
Exfiltration of
Data via
Personal
Cloud Storage
Employee
Credentials
Compromised
80 million
records
compromised
Catch-22
Allow is the new block (allow is new
block green light slide)
20
6 Steps to Mitigating Cloud Usage Risk
(without blocking everything)
STEP 1:
Discover the cloud
apps running in your
enterprise and
assess risk
STEP 2:
Understand cloud
usage details
v
v
Bob in
accounting
From his
mobile phone
v
Uploading
customer data
to Dropbox
v
Bob’s
credentials
have been
compromised
Traditional perimeter security is blind to cloud activity
Perimeter Security Cloud Security 2.0
Number of cloud apps Hundreds Thousands
Bytes ✔️ ✔️
Basic session Info ✔️ ✔️
Cloud app enterprise-readiness score ✔️
Activity-level details for all cloud apps ✔️
Content-level details for files tied to an activity or for files
stored in a cloud app
✔️
© 2015 Netskope. All Rights Reserved.
© 2015 Netskope. All Rights Reserved.
Perimeter security lacks activity and content visibility
26
Web session start
Login as:
mary@acme
Browser/OS
From: IP address
To: IP address
www.box.com
URL Category:
File Sharing/
Storage
HTTP GET/POST/
DELETE/CONNECT
HTTP headers
GET and POST
Body
Identity App Activity Data Summary
Perimeter
Security
Cloud
Security 2.0
Web session end
Login: mary@acme.com
URL: Box
Category: File Sharing
Using: Macbook, Safari 6.0
From: IP address
To: IP address
Login as: mary@acme
Box ID: mary@gmail
Using: Macbook/Safari
From: Mtn View, CA
Destination:
App located in Germany
To user: sharing a
doc with “John@Newco”
App: Box
Category: Cloud Storage
App Instance: Corporate
CCL: High
Risk: High
Login
Upload
Download
Share
Logout
Invite
Edit
View…
PII/PCI/PHI data
Other sensitive
classifications
Login: mary@acme.com
Box: ID mary@gmail.com
App: Box
Instance: Corporate
Using: Macbook, Safari 6.0
From: Mountain View, CA
Activities: Create Folder, Move
Files (4), Share Folder w/
John@NewCo
Anomalies: Downloaded a PII
doc from SFDC, uploaded to box
STEP
3:
Monitor activities, detect
anomalies, and conduct
forensics
STEP 4:
Find sensitive
data tied to an
activity or stored
in a cloud app
STEP
5:Use surgical
precision in
your policies,
leveraging
contextual
data
© 2015 Netskope. All Rights Reserved.
Examples of using context in your policies
32
Quarantine PII data uploaded to risky cloud storage apps
Allow marketing and support teams to post to social media, but block finance team
Don’t allow data marked “confidential” to be shared outside of our company
Alert users using their personal Dropbox to use a sanctioned cloud app instead
STEP
6:Don’t leave users in the dark.
Coach them on safe usage.
5:
Use surgical precision in your
policies, leveraging contextual
data
3:
Monitor activities, detect
anomalies, conduct forensics,
and find sensitive data
2:
Understand cloud usage
details
4:
Find sensitive data part
associated with an activity or
stored in a cloud app
1:
Discover the cloud apps
running in your enterprise and
assess risk
6:
Don’t leave users in the dark.
Coach them on safe usage.
Thank You!

Contenu connexe

En vedette

Industry Cloud Landscape - 2015 - Emergence Capital
Industry Cloud Landscape - 2015 - Emergence CapitalIndustry Cloud Landscape - 2015 - Emergence Capital
Industry Cloud Landscape - 2015 - Emergence CapitalEmergence Capital
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterAtlantic Training, LLC.
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@R_Yanus
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeAtlantic Training, LLC.
 
49009629 contoh-soal-penerapan-hukum-newton
49009629 contoh-soal-penerapan-hukum-newton49009629 contoh-soal-penerapan-hukum-newton
49009629 contoh-soal-penerapan-hukum-newtonyan sofyan
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaAtlantic Training, LLC.
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalAtlantic Training, LLC.
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityAtlantic Training, LLC.
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...Fabernovel
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Stephen Cobb
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudSymantec
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksIBM Security
 
Disruptive Innovation in 2016
Disruptive Innovation in 2016Disruptive Innovation in 2016
Disruptive Innovation in 2016Jeremy Waite
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing StudyNorth Bridge
 

En vedette (16)

Industry Cloud Landscape - 2015 - Emergence Capital
Industry Cloud Landscape - 2015 - Emergence CapitalIndustry Cloud Landscape - 2015 - Emergence Capital
Industry Cloud Landscape - 2015 - Emergence Capital
 
Security Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana ChapterSecurity Awareness Training by HIMSS Louisiana Chapter
Security Awareness Training by HIMSS Louisiana Chapter
 
Employee Security Training[1]@
Employee Security Training[1]@Employee Security Training[1]@
Employee Security Training[1]@
 
IT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community CollegeIT Security Awarenesss by Northern Virginia Community College
IT Security Awarenesss by Northern Virginia Community College
 
49009629 contoh-soal-penerapan-hukum-newton
49009629 contoh-soal-penerapan-hukum-newton49009629 contoh-soal-penerapan-hukum-newton
49009629 contoh-soal-penerapan-hukum-newton
 
Security Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by PedrazaSecurity Training and Threat Awareness by Pedraza
Security Training and Threat Awareness by Pedraza
 
Information Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn HospitalInformation Security Awareness Training by Mount Auburn Hospital
Information Security Awareness Training by Mount Auburn Hospital
 
Information Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier UniversityInformation Security Awareness Training by Wilfrid Laurier University
Information Security Awareness Training by Wilfrid Laurier University
 
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
GAFAnomics: Using APIs to gain unfair competitive advantage in the network ec...
 
Security Awareness Training by Fortinet
Security Awareness Training by FortinetSecurity Awareness Training by Fortinet
Security Awareness Training by Fortinet
 
Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...Cyber Security 101: Training, awareness, strategies for small to medium sized...
Cyber Security 101: Training, awareness, strategies for small to medium sized...
 
Cyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the CloudCyber Tech Israel 2016: Get Your Head in the Cloud
Cyber Tech Israel 2016: Get Your Head in the Cloud
 
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber AttacksLife on the Endpoint Edge: Winning the Battle Against Cyber Attacks
Life on the Endpoint Edge: Winning the Battle Against Cyber Attacks
 
16 Trends for 2016
16 Trends for 201616 Trends for 2016
16 Trends for 2016
 
Disruptive Innovation in 2016
Disruptive Innovation in 2016Disruptive Innovation in 2016
Disruptive Innovation in 2016
 
2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study2015 Future of Cloud Computing Study
2015 Future of Cloud Computing Study
 

Plus de Netskope

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!Netskope
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of SecurityNetskope
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Netskope
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesNetskope
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlNetskope
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraNetskope
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPNetskope
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationNetskope
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report Netskope
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report Netskope
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365Netskope
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use CasesNetskope
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudNetskope
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportNetskope
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Netskope
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionNetskope
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudNetskope
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Netskope
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportNetskope
 

Plus de Netskope (20)

Netskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack VectorNetskope Threat Labs: Cloud As an Attack Vector
Netskope Threat Labs: Cloud As an Attack Vector
 
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!Why Everyone Needs a Cloud-First  Security Program - SASEfaction Guaranteed!
Why Everyone Needs a Cloud-First Security Program - SASEfaction Guaranteed!
 
MalCon Future of Security
MalCon Future of SecurityMalCon Future of Security
MalCon Future of Security
 
Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)Phishing in the Cloud Era (BSides)
Phishing in the Cloud Era (BSides)
 
DEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS LoopholesDEF CON 27 - Exploiting AWS Loopholes
DEF CON 27 - Exploiting AWS Loopholes
 
Defcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and ControlDefcon 27 - The Future of Command and Control
Defcon 27 - The Future of Command and Control
 
Defcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud EraDefcon 27 - Phishing in the Cloud Era
Defcon 27 - Phishing in the Cloud Era
 
Defcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCPDefcon 27 - Exploiting IAM in GCP
Defcon 27 - Exploiting IAM in GCP
 
The Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - PresentationThe Definitive CASB Business Case Kit - Presentation
The Definitive CASB Business Case Kit - Presentation
 
June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report June 2016 EMEA Netskope Cloud Report
June 2016 EMEA Netskope Cloud Report
 
June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report June 2016 Worldwide Netskope Cloud Report
June 2016 Worldwide Netskope Cloud Report
 
5 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 3655 Highest-Impact CASB Use Cases - Office 365
5 Highest-Impact CASB Use Cases - Office 365
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the CloudCure for the Common Cloud: How Healthcare can Safely Enable the Cloud
Cure for the Common Cloud: How Healthcare can Safely Enable the Cloud
 
Autumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud ReportAutumn 2015 EMEA Netskope Cloud Report
Autumn 2015 EMEA Netskope Cloud Report
 
Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report Fall 2015 Worldwide Netskope Cloud Report
Fall 2015 Worldwide Netskope Cloud Report
 
Cloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity EditionCloud Security for Dummies Webinar — The Identity Edition
Cloud Security for Dummies Webinar — The Identity Edition
 
Reference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the CloudReference Architecture for Data Loss Prevention in the Cloud
Reference Architecture for Data Loss Prevention in the Cloud
 
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...Office 365 in Focus. Security and Governance Strategies from the Experts - We...
Office 365 in Focus. Security and Governance Strategies from the Experts - We...
 
Summer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud ReportSummer 2015 EMEA Netskope Cloud Report
Summer 2015 EMEA Netskope Cloud Report
 

Dernier

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 

Dernier (20)

"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 

The Anatomy of a Cloud Data Breach

  • 1. THE ANATOMY of a CLOUD DATA BREACH
  • 2. 80 million records Anthem 500K records IRS 18 million records OPM 37 million records Ashley Madison 4.5 million records UCLA Med Center
  • 3. Some say we have Breach Fatigue
  • 4. Sources and per record cost of a data breach Malicious or criminal attack Human error System glitch Source: 2015 Ponemon cost of a data breach
  • 5. Most Data Breaches Involve Advanced Persistent Threats (APTs) • An APT is a set of stealthy and continuous computer hacking processes, often orchestrated by human(s) targeting a specific entity. • Usually targets organizations and/or nations for business or political motives. • Processes require a high degree of covertness over a long period of time. From Wikipedia APT lifecycle (Gartner)
  • 6. APT lifecycle simplified • Infiltration – Attempt to gain a foothold in the environment • Command and Control – Injects a payload into the compromised system to direct malware on what to do • Exfiltration of Data - Unauthorized transfer of sensitive data Infiltration Command & Control Exfiltration of Data APT
  • 7. INSERT A CLOUD GRAPHIC What role does the cloud play in data breaches?
  • 8. If your organization had 100 cloud apps and added 25 more in a 12-month period, you would increase your probability (and expected economic impact) of a data breach by 75%* Increase use and increase probability *source: 2014 Ponemon report cost of a data breach
  • 9. 9 apps • 700+ cloud apps per enterprise • 90% are not enterprise-ready users • Malicious or non- intentional • 15% of corporate users have had their account credentials compromised
  • 11. 11 apps • 700+ cloud apps per enterprise • 90% are not enterprise-ready users • Malicious or non- intentional • 15% of corporate users have had their account credentials compromised data • 18% of files in cloud apps constitute a policy violation • 22% of those files are shared publicly activities • Cloud makes it easy to share • When is an activity an anomaly?
  • 12. Cloud Usage and APT lifecycle APT
  • 13. Data Breach Study: Phase 1 - Infiltration CLOUD APP USED FOR MALWARE DELIVERY Step 1 Upload your file to uploading.com
  • 14. Data Breach Study: Phase 1 - Infiltration CLOUD APP USED FOR MALWARE DELIVERY Step 2 Download your file
  • 15. Data Breach Study: Phase 1 - Infiltration CLOUD APP USED FOR MALWARE DELIVERY Step 3 Check for Virus / Malware
  • 16. Data Breach Study: Phase 2 Command & Control CLOUD APP USED FOR C&C SERVER • Initial Infection vector – spear phishing • Malware component – crafted RTF files – Exploits vulnerability CVE-2014-1761 (Microsoft Word RTF Object Confusion) • Command & Control Server – CloudMe.com (100 accts) – Data ex-filtrated to cloud storage app CloudMe.com – New payloads & instructions downloaded • Data Retrieval – network of compromised home routers source: Blue Coat
  • 17. Data Breach Study: Phase 2 Command & Control CLOUD APP USED FOR C&C SERVER • Initial Infection vector – spear phishing • Malware component – crafted RTF files – Exploits vulnerability CVE-2014-1761 (Microsoft Word RTF Object Confusion) • Command & Control Server – CloudMe.com (100 accts) – Data ex-filtrated to cloud storage app CloudMe.com – New payloads & instructions downloaded • Data Retrieval – network of compromised home routers source: Blue Coat
  • 18. Data Breach Study: Phase 3 Data Exfiltration CLOUD USED FOR DATA EXFILTRATION Exfiltration of Data via Personal Cloud Storage Employee Credentials Compromised 80 million records compromised
  • 20. Allow is the new block (allow is new block green light slide) 20
  • 21. 6 Steps to Mitigating Cloud Usage Risk (without blocking everything)
  • 22. STEP 1: Discover the cloud apps running in your enterprise and assess risk
  • 23.
  • 24. STEP 2: Understand cloud usage details v v Bob in accounting From his mobile phone v Uploading customer data to Dropbox v Bob’s credentials have been compromised
  • 25. Traditional perimeter security is blind to cloud activity Perimeter Security Cloud Security 2.0 Number of cloud apps Hundreds Thousands Bytes ✔️ ✔️ Basic session Info ✔️ ✔️ Cloud app enterprise-readiness score ✔️ Activity-level details for all cloud apps ✔️ Content-level details for files tied to an activity or for files stored in a cloud app ✔️ © 2015 Netskope. All Rights Reserved.
  • 26. © 2015 Netskope. All Rights Reserved. Perimeter security lacks activity and content visibility 26 Web session start Login as: mary@acme Browser/OS From: IP address To: IP address www.box.com URL Category: File Sharing/ Storage HTTP GET/POST/ DELETE/CONNECT HTTP headers GET and POST Body Identity App Activity Data Summary Perimeter Security Cloud Security 2.0 Web session end Login: mary@acme.com URL: Box Category: File Sharing Using: Macbook, Safari 6.0 From: IP address To: IP address Login as: mary@acme Box ID: mary@gmail Using: Macbook/Safari From: Mtn View, CA Destination: App located in Germany To user: sharing a doc with “John@Newco” App: Box Category: Cloud Storage App Instance: Corporate CCL: High Risk: High Login Upload Download Share Logout Invite Edit View… PII/PCI/PHI data Other sensitive classifications Login: mary@acme.com Box: ID mary@gmail.com App: Box Instance: Corporate Using: Macbook, Safari 6.0 From: Mountain View, CA Activities: Create Folder, Move Files (4), Share Folder w/ John@NewCo Anomalies: Downloaded a PII doc from SFDC, uploaded to box
  • 28.
  • 29. STEP 4: Find sensitive data tied to an activity or stored in a cloud app
  • 30.
  • 31. STEP 5:Use surgical precision in your policies, leveraging contextual data
  • 32. © 2015 Netskope. All Rights Reserved. Examples of using context in your policies 32 Quarantine PII data uploaded to risky cloud storage apps Allow marketing and support teams to post to social media, but block finance team Don’t allow data marked “confidential” to be shared outside of our company Alert users using their personal Dropbox to use a sanctioned cloud app instead
  • 33. STEP 6:Don’t leave users in the dark. Coach them on safe usage.
  • 34. 5: Use surgical precision in your policies, leveraging contextual data 3: Monitor activities, detect anomalies, conduct forensics, and find sensitive data 2: Understand cloud usage details 4: Find sensitive data part associated with an activity or stored in a cloud app 1: Discover the cloud apps running in your enterprise and assess risk 6: Don’t leave users in the dark. Coach them on safe usage.