SlideShare a Scribd company logo
Incident Response in cloud
~VandanaVerma
About Me
• initiative and passionate about driving more women
participation in overall InfoSec.
• Chapter lead for OWASP Bangalore
• Volunteer Coordinator - Asia Pacific for OWASPWomen
in AppSec (WIA) & Secretary.
• Leading InfosecGirls in India
Agenda
• Cloud Basics
• Shared Responsibility Model
• Incident Response in the Cloud
• Hardening
• Services andTools
• Logging and Monitoring
• Incident Response
• How to prepare for a breach scenario
• Some recent issues
• Resources
Lets Get the Basics Right!
Cloud
Cloud Basics
• In simple terms it is about the delivery of computing services - servers,
storage, databases, networking, software, analytics and more - over the
Internet (“the cloud”).
• Attributes
• Multi-tenancy (shared-resources)
• Massive scalability
• Elasticity
• Pay per use
• Self-provisioning of resources
Service & Deployment Models in Cloud
• Service Models
• IaaS – Infrastructure as a Service
• PaaS – Platform as a Service
• SaaS – Software as a Service
• Deployment Models
• Public
• Private
• Hybrid
• Community
Some Public CloudVendors
Incidence Response in Cloud
Traditional IR vs Cloud IR – Environment
• The cloud is not static
• Systems may start and stop automatically in response to processing
load
• Including systems that were or still are compromised
• Volatile data is gone forever...
• IT staff generally has little control over the architecture and resource
allocation
Build Incident Response Plan
• Plan and Prepare (Who to contact?, How to communicate?,What information to
parse?,Where are backups stored?)
• Establish a joint response plan with the cloud provider.
• Evaluate the monitoring controls and security measures that are in place in the cloud
• Have a Recovery Plan
• Make a decision on ForensicsTools
• Common things to backup
• Mock Drills , Practice
Incident response approach
Preparation
Identification
Containment
Investigation
Eradication
Recovery
Follow -up
How to prepare for a breach scenario
• Protect
• Detect
• Respond
Protection
• Identity and Access Management
• Multi Factor Authentication
• Network Segmentation
• Encryption
• Secret Management
• SecurityTesting / PenTest
Detect
• Monitoring and Alerting
• Log user access
• Changes
• NetworkActivity
• Security events
Respond
• Incident Drills
• Have a plan
• Practice Regularly
• RedTeaming
• Awesome Incident Response
• Ref: https://github.com/meirwah/awesome-incident-response
Hardening (Cloud Security Controls)
• Know what you are responsible for
• Control who has access to the data
• Protect the data
• Secure the credentials
• Security hygiene always matters
Hardening (Cloud Security Controls)
• Don’t use root account (Delete or Disable Access Keys)
• Policy measures should be in place that Admin’s don’t create Access Keys for
root account
• Use Multi Factor Authentication for all IAM accounts
• Google Authenticator,Yubikey, etc.
• Use IAM Policies
• https://threatresponse.cloud/blog/2016/tips_for_least_privilege_iam_policies.html
• Strong Password Policies
Logging & Monitoring
• Use Free and Open Source Logging and Alerting tools such as ELK Stack
• Set up Automated Infrastructure Monitoring and Defense in Cloud
• Ref: https://github.com/appsecco/nullblr-bachaav-aismd
Best Practices for Incident Response in the cloud
• Create playbooks that prescribe standard procedures for responding to incidents.
• Speaking of automation, many tasks can be automated, especially if they are
repetitive and routine.
• Foster situational awareness from both the historical and real-time points of view.
• Analyse incidents and create a database to help determine the types of problems
encountered, the skills needed to address the issue, the frequency of each type of
incident, and other facts.
Some tools and services..
• Auditing for Hardening Best Practices
• Prowler
• Cloud Custodian
• Security Monkey
• IAM User / Policy Auditing
• Access Advisor
• Use CloudTrail Logs
• Digital Forensics Framework
Some Recent Issues
• Accenture Insecure Cloud Storage:
https://www.upguard.com/breaches/cloud-leak-accenture
• TimeWarner Cable Insecure Config:
https://www.theregister.co.uk/2017/09/05/twc_loses_4m_customer_records
/
Conclusions
• Security in the cloud is really not very different from regular security
• Same principles and processes apply
• Same tools and techniques apply
• IT folks need to simply understand what is the best way to get the same thing
done
Resources
• https://downloads.cloudsecurityalliance.org/assets/research/security-
guidance/csaguide.v3.0.pdf
• http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk-
assessment/at_download/fullReport
• https://benchmarks.cisecurity.org/downloads/latest/
• https://www.slideshare.net/akashm/security-in-the-cloud-workshop-hstc-2014
• Video ofVishwa Bandhu https://www.youtube.com/watch?v=ApQlMm39xr0
Contact
Twitter https://twitter.com/InfosecVandana
Linkedin https://www.linkedin.com/in/vandana-verma/
Email Vandana.verma@owasp.org
Thank you!

More Related Content

PPTX
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
Armor
 
PPTX
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Armor
 
PDF
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale
 
PDF
Logz.io Jenkins Meetup
GrigoryAvsyuk
 
PDF
End-to-End Security Analytics with the Elastic Stack
Elasticsearch
 
PDF
Automate threat detections and avoid false positives
Elasticsearch
 
PDF
Latency Control And Supervision In Resilience Design Patterns
Tu Pham
 
PDF
Automatize a detecção de ameaças e evite falsos positivos
Elasticsearch
 
FireHost Webinar: How a Secure High Performance Cloud Powers Critical Applica...
Armor
 
Firehost Webinar: How a Secure High Performance Cloud Powers Applications
Armor
 
RightScale Webinar - Coping With Cloud Migration Challenges: Best Practices a...
RightScale
 
Logz.io Jenkins Meetup
GrigoryAvsyuk
 
End-to-End Security Analytics with the Elastic Stack
Elasticsearch
 
Automate threat detections and avoid false positives
Elasticsearch
 
Latency Control And Supervision In Resilience Design Patterns
Tu Pham
 
Automatize a detecção de ameaças e evite falsos positivos
Elasticsearch
 

What's hot (20)

PPTX
Production Challenges for Container Networking
Vipin Jain
 
PPTX
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
PDF
Pariveda Solutions - Thawing the Frozen Middle
Alert Logic
 
PPTX
Science DMZ security
Jisc
 
PDF
How to Migrate to Cloud with Complete Confidence and Trust
Apcera
 
PDF
Reinventing enterprise defense with the Elastic Stack
Elasticsearch
 
PPTX
Rackspace: Unlock Your Cloud - RightScale Compute 2013
RightScale
 
PPTX
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
PPTX
Nairobi OpenStack Meetup - July 2013
adamnelson
 
PDF
Combining Logs, Metrics, and Traces for Unified Observability
Elasticsearch
 
PDF
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Elasticsearch
 
PDF
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elasticsearch
 
PPTX
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Tripwire
 
PDF
Palestra de abertura: Evolução e visão do Elastic Observability
Elasticsearch
 
PPTX
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24
 
PDF
History of data centric transformation preso
Darren Pulsipher
 
PDF
Automate Your Container Deployments Securely
DevOps.com
 
PDF
O monitoramento da infraestrutura facilitado, da ingestão ao insight
Elasticsearch
 
PDF
History of Data-Centric Transformation
scoopnewsgroup
 
PDF
Reducing Mean Time to Know
Sqrrl
 
Production Challenges for Container Networking
Vipin Jain
 
Datacenter 2014: Trend Micro - Bill MCGee
Mediehuset Ingeniøren Live
 
Pariveda Solutions - Thawing the Frozen Middle
Alert Logic
 
Science DMZ security
Jisc
 
How to Migrate to Cloud with Complete Confidence and Trust
Apcera
 
Reinventing enterprise defense with the Elastic Stack
Elasticsearch
 
Rackspace: Unlock Your Cloud - RightScale Compute 2013
RightScale
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24
 
Nairobi OpenStack Meetup - July 2013
adamnelson
 
Combining Logs, Metrics, and Traces for Unified Observability
Elasticsearch
 
Siscale Lightning Talk: Automated Root Cause Analysis with Elastic Stack
Elasticsearch
 
Elastic Security : Protéger son entreprise avec la Suite Elastic
Elasticsearch
 
Herding Pets and Cattle: Extending Foundational Controls Into the Cloud
Tripwire
 
Palestra de abertura: Evolução e visão do Elastic Observability
Elasticsearch
 
Outpost24 webinar : how to secure your data in the cloud - 06-2018
Outpost24
 
History of data centric transformation preso
Darren Pulsipher
 
Automate Your Container Deployments Securely
DevOps.com
 
O monitoramento da infraestrutura facilitado, da ingestão ao insight
Elasticsearch
 
History of Data-Centric Transformation
scoopnewsgroup
 
Reducing Mean Time to Know
Sqrrl
 
Ad

Similar to Incident response in Cloud (20)

PPTX
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
PPTX
Security on AWS, 2021 Edition Meetup
CloudHesive
 
PPTX
Security on AWS, 2021 Edition Meetup
CloudHesive
 
PPTX
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
PPTX
Cloud computing and Cloud security fundamentals
Viresh Suri
 
PPTX
Security on AWS
CloudHesive
 
PPTX
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
 
PPTX
Improving Application Security With Azure
Softchoice Corporation
 
PDF
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
PPTX
Winning Governance Strategies for the Technology Disruptions of our Time
CloudHesive
 
PPTX
Cloud computing and data security
Mohammed Fazuluddin
 
PPTX
NetBackup Story Customer Presentation.pptx
dismantlinghue7028
 
PPTX
AWS Cloud Security
AWS Riyadh User Group
 
PPTX
Shared responsibility - a model for good cloud security
Andy Powell
 
PDF
System Security on Cloud
Tu Pham
 
PPTX
Planning for the Cloud
Hostway|HOSTING
 
PPTX
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
PPTX
Shared responsibility - a model for good cloud security
Jisc
 
PPTX
Past, Present and Future of DevOps Infrastructure
Synergetics Learning and Cloud Consulting
 
PPTX
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
CloudHesive
 
Security on AWS, 2021 Edition Meetup
CloudHesive
 
Security on AWS, 2021 Edition Meetup
CloudHesive
 
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Security on AWS
CloudHesive
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Himani Singh
 
Improving Application Security With Azure
Softchoice Corporation
 
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
Winning Governance Strategies for the Technology Disruptions of our Time
CloudHesive
 
Cloud computing and data security
Mohammed Fazuluddin
 
NetBackup Story Customer Presentation.pptx
dismantlinghue7028
 
AWS Cloud Security
AWS Riyadh User Group
 
Shared responsibility - a model for good cloud security
Andy Powell
 
System Security on Cloud
Tu Pham
 
Planning for the Cloud
Hostway|HOSTING
 
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Shared responsibility - a model for good cloud security
Jisc
 
Past, Present and Future of DevOps Infrastructure
Synergetics Learning and Cloud Consulting
 
Presentacion de solucion cloud de navegacion segura
RogerChaucaZea
 
Ad

More from Vandana Verma (18)

PDF
Building security into the pipelines
Vandana Verma
 
PPTX
Applying OWASP web security testing guide (OWSTG)
Vandana Verma
 
PDF
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
PDF
SARCON Talk - Vandana Verma Sehgal
Vandana Verma
 
PDF
Sacon 2020 living in the world of zero trust v1.0
Vandana Verma
 
PDF
Addo 2019 vandana_dev_secops_culturalchange
Vandana Verma
 
PDF
App Sec village DevSecOps as a culture
Vandana Verma
 
PPTX
Oscp - Journey
Vandana Verma
 
PPTX
Web sockets - Pentesting
Vandana Verma
 
PPTX
Story of http headers
Vandana Verma
 
PPTX
Security audits & compliance
Vandana Verma
 
PPTX
Basics of Server Side Template Injection
Vandana Verma
 
PPTX
SIEM Vendor Neutrality
Vandana Verma
 
PPTX
Getting started with android
Vandana Verma
 
PPTX
Importance of Penetration Testing
Vandana Verma
 
PPTX
Identity & access management
Vandana Verma
 
PPTX
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
PDF
OWASP - Dependency Check
Vandana Verma
 
Building security into the pipelines
Vandana Verma
 
Applying OWASP web security testing guide (OWSTG)
Vandana Verma
 
Running an app sec program with OWASP projects_ Defcon AppSec Village
Vandana Verma
 
SARCON Talk - Vandana Verma Sehgal
Vandana Verma
 
Sacon 2020 living in the world of zero trust v1.0
Vandana Verma
 
Addo 2019 vandana_dev_secops_culturalchange
Vandana Verma
 
App Sec village DevSecOps as a culture
Vandana Verma
 
Oscp - Journey
Vandana Verma
 
Web sockets - Pentesting
Vandana Verma
 
Story of http headers
Vandana Verma
 
Security audits & compliance
Vandana Verma
 
Basics of Server Side Template Injection
Vandana Verma
 
SIEM Vendor Neutrality
Vandana Verma
 
Getting started with android
Vandana Verma
 
Importance of Penetration Testing
Vandana Verma
 
Identity & access management
Vandana Verma
 
Chariot generic presentation owaspwia_Infosecgirls
Vandana Verma
 
OWASP - Dependency Check
Vandana Verma
 

Recently uploaded (20)

PPTX
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
PPT
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
PDF
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
PDF
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
PPTX
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
PDF
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
PDF
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
PPTX
Parallel & Concurrent ...
yashpavasiya892
 
PPTX
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
PPTX
How tech helps people in the modern era.
upadhyayaryan154
 
PDF
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
PDF
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
PDF
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
PPTX
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
PDF
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
PPTX
Crypto Recovery California Services.pptx
lionsgate network
 
PDF
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
PPTX
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
PPTX
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
PPTX
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 
Pengenalan perangkat Jaringan komputer pada teknik jaringan komputer dan tele...
Prayudha3
 
Introduction to dns domain name syst.ppt
MUHAMMADKAVISHSHABAN
 
LOGENVIDAD DANNYFGRETRRTTRRRTRRRRRRRRR.pdf
juan456ytpro
 
Data Protection & Resilience in Focus.pdf
AmyPoblete3
 
原版北不列颠哥伦比亚大学毕业证文凭UNBC成绩单2025年新版在线制作学位证书
e7nw4o4
 
KIPER4D situs Exclusive Game dari server Star Gaming Asia
hokimamad0
 
Cybersecurity Awareness Presentation ppt.
banodhaharshita
 
Parallel & Concurrent ...
yashpavasiya892
 
LESSON-2-Roles-of-ICT-in-Teaching-for-learning_123922 (1).pptx
renavieramopiquero
 
How tech helps people in the modern era.
upadhyayaryan154
 
Slides: PDF Eco Economic Epochs for World Game (s) pdf
Steven McGee
 
LB# 820-1889_051-7370_C000.schematic.pdf
matheusalbuquerqueco3
 
The Internet of Things (IoT) refers to a vast network of interconnected devic...
chethana8182
 
办理方法西班牙假毕业证蒙德拉贡大学成绩单MULetter文凭样本
xxxihn4u
 
Latest Scam Shocking the USA in 2025.pdf
onlinescamreport4
 
Crypto Recovery California Services.pptx
lionsgate network
 
DNSSEC Made Easy, presented at PHNOG 2025
APNIC
 
Blue and Dark Blue Modern Technology Presentation.pptx
ap177979
 
Slides Powerpoint: Eco Economic Epochs.pptx
Steven McGee
 
Unlocking Hope : How Crypto Recovery Services Can Reclaim Your Lost Funds
lionsgate network
 

Incident response in Cloud

  • 1. Incident Response in cloud ~VandanaVerma
  • 2. About Me • initiative and passionate about driving more women participation in overall InfoSec. • Chapter lead for OWASP Bangalore • Volunteer Coordinator - Asia Pacific for OWASPWomen in AppSec (WIA) & Secretary. • Leading InfosecGirls in India
  • 3. Agenda • Cloud Basics • Shared Responsibility Model • Incident Response in the Cloud • Hardening • Services andTools • Logging and Monitoring • Incident Response • How to prepare for a breach scenario • Some recent issues • Resources
  • 4. Lets Get the Basics Right!
  • 6. Cloud Basics • In simple terms it is about the delivery of computing services - servers, storage, databases, networking, software, analytics and more - over the Internet (“the cloud”). • Attributes • Multi-tenancy (shared-resources) • Massive scalability • Elasticity • Pay per use • Self-provisioning of resources
  • 7. Service & Deployment Models in Cloud • Service Models • IaaS – Infrastructure as a Service • PaaS – Platform as a Service • SaaS – Software as a Service • Deployment Models • Public • Private • Hybrid • Community
  • 10. Traditional IR vs Cloud IR – Environment • The cloud is not static • Systems may start and stop automatically in response to processing load • Including systems that were or still are compromised • Volatile data is gone forever... • IT staff generally has little control over the architecture and resource allocation
  • 11. Build Incident Response Plan • Plan and Prepare (Who to contact?, How to communicate?,What information to parse?,Where are backups stored?) • Establish a joint response plan with the cloud provider. • Evaluate the monitoring controls and security measures that are in place in the cloud • Have a Recovery Plan • Make a decision on ForensicsTools • Common things to backup • Mock Drills , Practice
  • 13. How to prepare for a breach scenario • Protect • Detect • Respond
  • 14. Protection • Identity and Access Management • Multi Factor Authentication • Network Segmentation • Encryption • Secret Management • SecurityTesting / PenTest
  • 15. Detect • Monitoring and Alerting • Log user access • Changes • NetworkActivity • Security events
  • 16. Respond • Incident Drills • Have a plan • Practice Regularly • RedTeaming • Awesome Incident Response • Ref: https://github.com/meirwah/awesome-incident-response
  • 17. Hardening (Cloud Security Controls) • Know what you are responsible for • Control who has access to the data • Protect the data • Secure the credentials • Security hygiene always matters
  • 18. Hardening (Cloud Security Controls) • Don’t use root account (Delete or Disable Access Keys) • Policy measures should be in place that Admin’s don’t create Access Keys for root account • Use Multi Factor Authentication for all IAM accounts • Google Authenticator,Yubikey, etc. • Use IAM Policies • https://threatresponse.cloud/blog/2016/tips_for_least_privilege_iam_policies.html • Strong Password Policies
  • 19. Logging & Monitoring • Use Free and Open Source Logging and Alerting tools such as ELK Stack • Set up Automated Infrastructure Monitoring and Defense in Cloud • Ref: https://github.com/appsecco/nullblr-bachaav-aismd
  • 20. Best Practices for Incident Response in the cloud • Create playbooks that prescribe standard procedures for responding to incidents. • Speaking of automation, many tasks can be automated, especially if they are repetitive and routine. • Foster situational awareness from both the historical and real-time points of view. • Analyse incidents and create a database to help determine the types of problems encountered, the skills needed to address the issue, the frequency of each type of incident, and other facts.
  • 21. Some tools and services.. • Auditing for Hardening Best Practices • Prowler • Cloud Custodian • Security Monkey • IAM User / Policy Auditing • Access Advisor • Use CloudTrail Logs • Digital Forensics Framework
  • 22. Some Recent Issues • Accenture Insecure Cloud Storage: https://www.upguard.com/breaches/cloud-leak-accenture • TimeWarner Cable Insecure Config: https://www.theregister.co.uk/2017/09/05/twc_loses_4m_customer_records /
  • 23. Conclusions • Security in the cloud is really not very different from regular security • Same principles and processes apply • Same tools and techniques apply • IT folks need to simply understand what is the best way to get the same thing done
  • 24. Resources • https://downloads.cloudsecurityalliance.org/assets/research/security- guidance/csaguide.v3.0.pdf • http://www.enisa.europa.eu/act/rm/files/deliverables/cloud-computing-risk- assessment/at_download/fullReport • https://benchmarks.cisecurity.org/downloads/latest/ • https://www.slideshare.net/akashm/security-in-the-cloud-workshop-hstc-2014 • Video ofVishwa Bandhu https://www.youtube.com/watch?v=ApQlMm39xr0