{"id":21667,"date":"2019-11-05T19:44:29","date_gmt":"2019-11-05T19:44:29","guid":{"rendered":"https:\/\/aidanfinn.com\/?p=21667"},"modified":"2019-11-05T19:44:29","modified_gmt":"2019-11-05T19:44:29","slug":"microsoft-ignite-2019-end-to-end-security-for-all-your-xaas-resources","status":"publish","type":"post","link":"https:\/\/aidanfinn.com\/?p=21667","title":{"rendered":"Microsoft Ignite 2019 \u2013 End-to-End Security for All Your XaaS Resources"},"content":{"rendered":"<p>Speaker: Yinon Costica<\/p>\n<h2>Intelligent Security<\/h2>\n<ul>\n<li>Identity and access management<\/li>\n<li>Threat protection<\/li>\n<li>Information protection<\/li>\n<li>Cloud security<\/li>\n<\/ul>\n<h2>Threat Actors<\/h2>\n<p>Exposure -&gt; Access -&gt; Lateral Movements -&gt; Actions<\/p>\n<h2>How Your Teams and Users Work With The Cloud<\/h2>\n<ul>\n<li>Users use SaaS (sanctioned), apps you build.<\/li>\n<li>Developers code apps you build, deploy to IaaS\/PaaS (sanctioned).<\/li>\n<li>DevOps operate apps you build and IaaS\/PaaS (sanctioned).<\/li>\n<\/ul>\n<p>Plus there is un-sanctioned SaaS\/IaaS\/PaaS<\/p>\n<h2>Where Do Problems Occur?<\/h2>\n<p>DevOps:<\/p>\n<ul>\n<li>Misconfigured resources<\/li>\n<li>Infrastructure vulnerabilities<\/li>\n<li>Open network ports<\/li>\n<\/ul>\n<p>Developers<\/p>\n<ul>\n<li>Secret leakage in code<\/li>\n<li>App vulnerabilities<\/li>\n<li>Open source vulnerabilities<\/li>\n<\/ul>\n<p>Users:<\/p>\n<ul>\n<li>Passwords<\/li>\n<li>More<\/li>\n<\/ul>\n<h2>Protect the Infrastructure<\/h2>\n<p>Not just VMs. Visibility and protection across all resources and cloud with Azure Security Center.<\/p>\n<ul>\n<li>Visibility with Secure Score<\/li>\n<li>Avoid misconfigurations with control plane recommendations<\/li>\n<li>Patch infrastructure vulnerabilities<\/li>\n<li>Close open endpoints using AI powered attack surface reduction controls<\/li>\n<\/ul>\n<h2>Driving Secure Score Through the Organization<\/h2>\n<p>AF: I don\u2019t use Secure Score because too many recommendations are <em>wrong<\/em> and Secure Score changes without infrastructure changes, so a hammer is swung without mistakes.<\/p>\n<p>ASC uses Azure Policy to run an assessment. Driving secure score using governance.<\/p>\n<h2>More workloads added to ASC<\/h2>\n<p>Didn\u2019t have a chance to note them, but I saw AKS and Key Vault in there.<\/p>\n<h2>AKS<\/h2>\n<ul>\n<li>Protecting the IaaS hosts<\/li>\n<li>Protecting the containers<\/li>\n<\/ul>\n<h2>DevOps Good Practices<\/h2>\n<ol>\n<li>Good hygiene<\/li>\n<li>Turn on threat protection<\/li>\n<li>Reduce your attack surface<\/li>\n<li>Integrate alerts into your SIEM.<\/li>\n<li>Identify root cause<\/li>\n<\/ol>\n<h2>Shipping Secure Applications<\/h2>\n<ol>\n<li>Build secure applications \u2013 security is in the pipeline<\/li>\n<li>Protect every layer of the application<\/li>\n<li>Use guidance \u2013 best practices, Secure DevOps toolkit.<\/li>\n<\/ol>\n<h2>Securing Your Codebase with GitHub<\/h2>\n<p>Understand and secure your software supply chain \u2013 very important with opensource. See dependency insights and dependabot. Get automated security alerts and version patches.<\/p>\n<p>And more.<\/p>\n<h2>Protect the Usage<\/h2>\n<p>Average app uses 1,000 apps.<\/p>\n<p>Cloud App Security. I lost interest here \u2013 sorry!<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Speaker: Yinon Costica Intelligent Security Identity and access management Threat protection Information protection Cloud security Threat Actors Exposure -&gt; Access -&gt; Lateral Movements -&gt; Actions How Your Teams and Users Work With The Cloud Users use SaaS (sanctioned), apps you build. Developers code apps you build, deploy to IaaS\/PaaS (sanctioned). DevOps operate apps you build &hellip; <a href=\"https:\/\/aidanfinn.com\/?p=21667\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Microsoft Ignite 2019 \u2013 End-to-End Security for All Your XaaS Resources&#8221;<\/span><\/a><\/p>\n","protected":false},"author":1,"featured_media":18456,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"_uf_show_specific_survey":0,"_uf_disable_surveys":false,"footnotes":""},"categories":[5],"tags":[170,346],"class_list":["post-21667","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-azure","tag-azure","tag-azure-security-center"],"aioseo_notices":[],"jetpack_featured_media_url":"https:\/\/aidanfinn.com\/wp-content\/uploads\/2015\/06\/11406985424_457c44045f_z.jpg","amp_enabled":true,"_links":{"self":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/21667","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=21667"}],"version-history":[{"count":2,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/21667\/revisions"}],"predecessor-version":[{"id":21669,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/posts\/21667\/revisions\/21669"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=\/wp\/v2\/media\/18456"}],"wp:attachment":[{"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=21667"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=21667"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/aidanfinn.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=21667"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}