know your enemy know yourself - where the · pdf filesession id: spo session classification:...

14
Session ID: Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES SPO-W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Upload: nguyenkhanh

Post on 29-Mar-2018

229 views

Category:

Documents


6 download

TRANSCRIPT

Page 1: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Session ID:

Session Classification:

JOHN ELLIS AKAMAI TECHNOLOGIES

SPO-W02A

Intermediate

KNOW YOUR ENEMY

KNOW YOURSELF

知彼知己,孙子兵法

Page 2: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

► Attackers are moving to the cloud

► Increasingly malware is becoming FUD

► DDoS attacks increasing – just ask the US FSI

► Attacks are increasing in sophistication and automation

► Warfare is no longer symmetrical, it is now asymmetrical

► Your adversaries know your Achilles heel, do you?

Know your enemy 知彼

Page 3: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

► What is my Achilles heel?

► Trends are eroding the effectiveness of the perimeter and other

security solutions

► What does normal look like for me?

► How do you make sense of all of this data? Do you have security

intelligence?

► How do I control access to my data and services?

► Do you federate with the CSP, do you encrypt, what do you

encrypt, how do you encrypt?

► How do I respond to a security breach in the cloud?

► Do you have a plan?

Know yourself 知己

Page 4: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Your CSP

Your CSP

Is the perimeter dead?

Your data center

Page 5: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Meet the enemy at ‘their’ front door

►Where’s the trouble maker?

Page 6: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

DIY Cloud Security

Page 7: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Your CSP

Your CSP

DIY cloud security – legacy thinking

Your data center

►Challenge to manage policy

►Scalability and capacity issues

►Poor solution for DDoS attacks

Page 8: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Mega POP

Page 9: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Mega POP – struggle for scale

Your CSP

Your CSP Your data center

Page 10: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Cloud Security Network

Page 11: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Your CSP

Your CSP

Cloud Security Network Evaluate Denied Evaluate Allowed

Your data center

? ?

?

? ?

► 10,000s of servers

in 1000s of networks

► Integrated WAF

► Inherent DDoS

protection

►Centralized management of policy

►Scalability and capacity

►Performance not sacrificed

►Ability to block at the edge and

route around congestion

Page 12: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Cloud Security Network – DMZ Zero

Cloud Security Network

DMZ

Two

DMZ

Three

DMZ

One

DMZ

Zero

Web Tier App

Tier

Data

Tier

Page 13: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

► There is no end-state with security, just milestones,

phases and stages

► Your adversaries have access to the same tools, same

information as you do….what is the differentiator?

► A fixed perimeter is increasing your security risk, not

reducing it!

The mythical silver bullet

Page 14: KNOW YOUR ENEMY KNOW YOURSELF - Where The · PDF fileSession ID: SPO Session Classification: JOHN ELLIS AKAMAI TECHNOLOGIES -W02A Intermediate KNOW YOUR ENEMY KNOW YOURSELF 知彼知己,孙子兵法

Thank you