NewSecurity Challenges Juan Miguel Velasco

31
New Security Challenges Facing Cloud and Mobile Expansion Juan M. Velasco, CEO, Aiuken Solu6ons.Spain Company logos may appear on this title page

Transcript of NewSecurity Challenges Juan Miguel Velasco

Page 1: NewSecurity Challenges Juan Miguel Velasco

New  Security  Challenges  Facing  Cloud  and  Mobile  Expansion  

Juan  M.  Velasco,    CEO,  Aiuken  Solu6ons.Spain    

Company logos may appear on this title page

Page 2: NewSecurity Challenges Juan Miguel Velasco

01 The War of Currents: AC / DC Cloud Electricity from 1900 to 1930

Nicola Tesla

Topsy 1903

2 20th Century

19th Century

Page 3: NewSecurity Challenges Juan Miguel Velasco

01 Cloud Introduction– Electricity Cloud Electricity revolution vs Cloud Revolution

1890 – Anonymous Enterprise: “Our Business doesn’t need any external current at all, we are autonomous”

FROM •  No multi-client •  Limited Generation •  No standardization •  High investment required •  Dedicated technical team required •  Local scope

http://www.ree.es/operacion/curvas_demanda.asp

TO •  Multi-Client •  Standard API (AC/DC – Voltage 110V-220V) •  Pay – per – Use •  24x7 always on •  Remote management & support •  Unlimited service •  Worldwide service

Page 4: NewSecurity Challenges Juan Miguel Velasco

How to find eficency with IT infrastructures? IT evolution Cloud as IaaS / SaaS

IT Infrastructures

Aplications

SW Base & Middleware

IT Equipment

DataCenter Infrastructures

First Approach to Cloud

Transformation

Manteinance consolidation Operations consolidation

Support Considation Standarazation Software free

HW Consolidation Virtualization

Cooling Consolidation Free Cooling Cold / Warm corridor

SaaS IaaS Services Centers

Private Cloud (Sharing for Gov only)

DataCenter Consolidation

Page 5: NewSecurity Challenges Juan Miguel Velasco

Cloud answer for: Efficiency?

Standards? Interoperativity? roll back? Pricing?

Answers? Security?

SLAs? KPI?

Page 6: NewSecurity Challenges Juan Miguel Velasco

Cloud is NOT a technology is a market transformation

In 2020, people will interact each day with more than 70 devices connected to Internet. Nowadays we interact with less than 10 devices connected. The M2M phenomenom will boots Cloud and Internet users and bandwidth use. From 1 billion users today to 3 billion devices connected in 5 years

Cloud Computing Market transformation

Page 7: NewSecurity Challenges Juan Miguel Velasco

By 2014 will be more connected devices to Internet than people on Earth

x5

Page 8: NewSecurity Challenges Juan Miguel Velasco

10/28/13 8

x26

Page 9: NewSecurity Challenges Juan Miguel Velasco

Mobility as an answer for : Availability

Platforms? Security?

Standards?

Applications? BYOD? Backup?

Page 10: NewSecurity Challenges Juan Miguel Velasco

www.globalt4e.com www.isoluxcorsan.com © 2012 GT4E

Mobile Risk

Fuente: http://searchmobilecomputing.techtarget.com/ (2011)

Page 11: NewSecurity Challenges Juan Miguel Velasco

www.globalt4e.com www.isoluxcorsan.com © 2012 GT4E

BYOD `Bring Your Own Device´

BYOD and consumerization, is one based on the desire of employees to use their own mobile devices (phones, smartphones, tablets, laptops ...) in the workplace and access to information from this company, such as the corporate email, DB or file servers. It is a reality accepted by IT departments, in the post-pc According to a survey of CISCO over 90% of CIOs surveyed said they permit, even doing the "blind eye," the use of mobile devices owned by employees to access their data. Of the principals surveyed more than two thirds have overcome fears this trend and see it as something positive for the organization. Yet another study, this time from the company BT, puts out the lack of vision of the potential risks of this practice on the part of employees, as only one in four sees risk in using their own devices, when almost 40% of companies have experienced security incidents related to this issue.

Page 12: NewSecurity Challenges Juan Miguel Velasco

www.globalt4e.com www.isoluxcorsan.com © 2012 GT4E

BYOD `Bring Your Own Device´

BYOD the New Threat door

Page 13: NewSecurity Challenges Juan Miguel Velasco

ncreased Mobile+

Cloud

More Users + More Devices + More Services

Reduced Stress = More Capacity + More Control + More Visibility

DDos

¿Donde se para un DDoS?

Page 14: NewSecurity Challenges Juan Miguel Velasco

CLOUD  Security  concerns  

Concerns about Public Cloud (not private Cloud?)

Page 15: NewSecurity Challenges Juan Miguel Velasco

15

Page 16: NewSecurity Challenges Juan Miguel Velasco

July,5th 1993.THE NEWYORKER

IDENTITY?

Page 17: NewSecurity Challenges Juan Miguel Velasco
Page 18: NewSecurity Challenges Juan Miguel Velasco

Why  is  this  happening?  IPv4  

Session / Paper Title 18 15-16 Oct 2013

Page 19: NewSecurity Challenges Juan Miguel Velasco

Why  is  this  happening?  IPv4  

Session / Paper Title 19 15-16 Oct 2013

Page 20: NewSecurity Challenges Juan Miguel Velasco

Growing  of  new  aAacks  and  APTs    

•  Number  of  threaths  x5  in  4  years  •  Nature  of  threats  and  aHacks  change:  

–  From  general  and  diverse  to  persistent,  avanced  and  oriented  

•  Avanced  aHacks  grow  –  High  vic6ms  level  profile  (i.e,  RSA;  

Symantec,  Google)  –  Great  variety  of  new  APTs  like  Aurora  

Opera6on,  Shady  RAT,  GhostNet,  Night  Dragon,  Nitro  

“Organizations face an evolving threat scenario that they are ill-prepared to deal with….advanced threats that have bypassed their traditional security protection techniques and reside undetected on their systems.”

Gartner, 2012

2004 2006 2008 2010 2012

Advanced Persistent Threats

Zero-day Targeted Attacks Dynamic Trojans

Stealth Bots

Worms Viruses

Disruption Spyware/ Bots

Cybercrime

Cyber-espionage and Cybercrime

Dam

age

of A

ttack

s

Source

Page 21: NewSecurity Challenges Juan Miguel Velasco

APT  AAacks.  AAacks  profile  has  increased  

source

Page 22: NewSecurity Challenges Juan Miguel Velasco

APTs,  new  tools  for  DDoS  /  TDoS

Advanced Persistent Threats (APTs) are created by different organizations from hackers like Lulzsec, Anonymous,etc. Also by Federeal Goverments like CIA, Mossad, etc.Their main motivation are:

1.  Goverment 2.  Economical 3.  Technical 4.  Military

Page 23: NewSecurity Challenges Juan Miguel Velasco

23

Botnets  Botnet  Ecosystem  

Page 24: NewSecurity Challenges Juan Miguel Velasco

24

Botnets  The  Criminal  Opera6ons  Team  

Page 25: NewSecurity Challenges Juan Miguel Velasco

DDoS  the  increasing  threat,  for  all  Internet  Services  

Reason  1   • Universal  

Reason  2   • Cheap  

Reason  3   • Eficiency  

Reason  4   • No  pushment  

Reason  5   • Big  Impact  

Reason  6   • Easy  to  replicate  

Reason  7   • Underes6mate  

Page 26: NewSecurity Challenges Juan Miguel Velasco
Page 27: NewSecurity Challenges Juan Miguel Velasco
Page 28: NewSecurity Challenges Juan Miguel Velasco

28

The New Perimeter. Security for and from Cloud.

•  Cloud  must  play  an  ac6ve  defense  role  

•  Cloud  must  be  an  ac6ve  player  for  the  perimeter  defense  

•  Cloud  can  be  use  nowadays  as  an  ac6ve  extension  of  our  security  perimeter  

•  Cloud  nowadays  is  able  to  provide  at  least  secure  email  and  internet  access  

•  Cloud  must  provide  ac6ve  defense  

ACT don’t REACT

Page 29: NewSecurity Challenges Juan Miguel Velasco

29

Email Security Security  Challenges  of  Email  in  the  Cloud  

Page 30: NewSecurity Challenges Juan Miguel Velasco

Conclusion:  Secure  Cloud+  Mobile  

Session / Paper Title 30 15-16 Oct 2013

Clean Pipes AntiDDoS

SOC DataCentre

AntiAPTs ID Mgmt

DNS NAT

IPv6 LTE

WAF DPI

Page 31: NewSecurity Challenges Juan Miguel Velasco

31

Juan Miguel Velasco López-Urda [email protected] CEO Aiuken Solutions