Top Banner
Making Security a Priority How Ed Tech Security Bridges the Gap with Cloud Security November 1, 2017 | Educause Annual Conference 2017
46

EDUCAUSE 2017: Making Security A Priority

Jan 21, 2018

Download

Documents

Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: EDUCAUSE 2017: Making Security A Priority

Making Security a

PriorityHow Ed Tech Security Bridges the Gap with Cloud Security

November 1, 2017 | Educause Annual Conference 2017

Page 2: EDUCAUSE 2017: Making Security A Priority

Key Takeaways

• Set your goals

• Have a documented, well-understood security strategy for

consuming cloud applications

• Prioritize the most critical assets based on risk

• Evaluate products to find solutions that work best in your

environment

• Work with peers who have completed similar strategies

2

Page 3: EDUCAUSE 2017: Making Security A Priority

Kristyanne Patullo

Present: Consulting Systems

Engineer, Cisco Umbrella

Past: OpenDNS, Cloudflare, Rutgers

[email protected]

Brian Markham

Present: AVP, Infosec @ GWU

Past: PwC, KPMG, UMD

[email protected]

@maru37

3

Page 4: EDUCAUSE 2017: Making Security A Priority

4

Page 5: EDUCAUSE 2017: Making Security A Priority

Source: https://www.cloudlock.com/blog/the-oauth-attack-goes-mainstream/5

Page 6: EDUCAUSE 2017: Making Security A Priority

Source: https://www.cloudlock.com/blog/the-oauth-attack-goes-mainstream/6

Page 7: EDUCAUSE 2017: Making Security A Priority

Source: https://www.cloudlock.com/wp-content/uploads/2017/05/Hackers-Have-Moved-onto-the-Cloud-Exploiting-OAuth.pdf

Page 8: EDUCAUSE 2017: Making Security A Priority

8

Page 9: EDUCAUSE 2017: Making Security A Priority

IT in Higher Education

• Why do we do what we do?

• We seek to enable learning and research;

• We seek to create an environment where creativity and

intellectual pursuits can be pursued; and

• We seek to create distinctive experiences for our

students, parents, faculty, staff, and alumni.

9

Page 10: EDUCAUSE 2017: Making Security A Priority

IT in Higher Education

• Technology can enhance learning

• Technology can help to improve graduation rates

• Technology can enable better student experiences

• Technology can lead to more sustainable business models

for institutions of higher education

10

Page 11: EDUCAUSE 2017: Making Security A Priority

IT in Higher Education

• The result? We invest in technology:

• Expansion of data across more platforms

• Meanwhile:

• Computing is more mobile and personal than ever

• Cloud technology is ubiquitous and the new normal

11

Page 12: EDUCAUSE 2017: Making Security A Priority

IT in Higher Education

• Centralized/decentralized IT

service models

• Mixed-use networks

• Academic freedom

• Personally-owned devices

(BYOD)

• Internet of (all the) Things

• Compliance (DMCA, FERPA,

GLB, HIPAA, PCI-DSS, etc.)

12

Page 13: EDUCAUSE 2017: Making Security A Priority

IT in Higher Education

• No longer just a buzzword: it’s

reality.

• E-mail, ERPs, file storage,

applications - all cloud apps

• Traditional security model +

new security models to

counter the risks (third-party

assurance)

• Not necessarily more risks but

different risks

13

Page 14: EDUCAUSE 2017: Making Security A Priority

14

Page 15: EDUCAUSE 2017: Making Security A Priority

• Your users are using more

devices than ever before,

that they own and configure

• Your users are everywhere,

specifically on networks that

you do not manage or have

visibility into

• Your network perimeter is

still important but less

relevant

• Your enterprise apps are

Internet-facing and not in

your data center

15

Page 16: EDUCAUSE 2017: Making Security A Priority

Ubiquity of Cloud Apps

16

Page 17: EDUCAUSE 2017: Making Security A Priority

17

Page 18: EDUCAUSE 2017: Making Security A Priority

– Gartner

“CIOs and CISOs need to stop obsessing over

unsubstantiated cloud security worries; instead, they

need to apply their imaginations and energy to

developing new approaches to cloud control. This will

enable them to securely, compliantly and reliably

leverage the benefits of this increasingly ubiquitous

computing model.”

Source: G00315580 18

Page 19: EDUCAUSE 2017: Making Security A Priority

Source: https://twitter.com/playing_dad/status/69052711635452313619

Page 20: EDUCAUSE 2017: Making Security A Priority

Security Goals

• Understand the institution, its goals, and key processes to

prioritize security activities/initiatives

• Defend users, data, and the network

• Understand risk and manage it to an acceptable level

• Implement processes and technology to meet security objectives

• Train people to be an effective first line of defense

• Gain reasonable assurance that security controls have been

designed and are operating effectively

20

Page 21: EDUCAUSE 2017: Making Security A Priority

– Cisco 2017 Midyear Cybersecurity Report

“Cloud service providers are responsible for the

physical, legal, operational, and infrastructure security

of the technology they sell. However, businesses are

responsible for securing the use of underlying cloud

services. Applying the same best practices that they

use to ensure security in on-premises environments ”

21

Page 22: EDUCAUSE 2017: Making Security A Priority

Cloud Security

Responsibilities

Source: Cisco eBook, Security’s New Frontier: The Cloud (2017) 22

Page 23: EDUCAUSE 2017: Making Security A Priority

23

Page 24: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

Pre-work: Basic equipment

• Skilled security/IT personnel who understand and

embrace cloud technologies

• Strong, effective governance and support from faculty,

business, and IT

• A risk management framework and associated

governance

• A vendor security methodology

24

Page 25: EDUCAUSE 2017: Making Security A Priority

25

Page 26: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

Step #1: Set your goals

• What do you wish to achieve from a cloud security

program?

• What is the governance model?

• How does a cloud product go from idea to procurement to

production use?

• Baseline current capabilities: where are the gaps?

26

Page 27: EDUCAUSE 2017: Making Security A Priority

27

Page 28: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

Step #2: Take an inventory

• What services are currently running outside your data

center?

• What is the data classification (high water mark) for data

being processes/stored/transacted by that service?

• What is worth investing in vs. what risks are acceptable?

28

Page 29: EDUCAUSE 2017: Making Security A Priority

29

Page 30: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

Step #3: Control what you can control

• What can you control? Endpoints? Identity? Data flow?

Start here.

• Implement controls (administrative & technical) to reduce

risks to accidental or intentional (malicious) data exposure

• Implement tools that provide visibility and assurance for

stated outcomes

30

Page 31: EDUCAUSE 2017: Making Security A Priority
Page 32: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

Step #4: Continuous monitoring

• What does good look like? Measure and report.

• Continuous improvement: how are you using data to

improve outcomes over time?

• How does policy, procedure, standards and guidance have

to change as we learn more about user behavior and

risks/threats evolve?

32

Page 33: EDUCAUSE 2017: Making Security A Priority

33

Page 34: EDUCAUSE 2017: Making Security A Priority

Cloud + Security

• A capable toolset is necessary to augment your

administrative and technical controls

• Security information and event management (SIEM)

• Identity management (SSO + 2FA)

• Network visibility

• Application visibility (DLP, CASB)

34

Page 35: EDUCAUSE 2017: Making Security A Priority

Traits of a Cloud Security

Vendor

35

Page 36: EDUCAUSE 2017: Making Security A Priority

Cisco Umbrella

36

Page 37: EDUCAUSE 2017: Making Security A Priority

View of the Internet

37

Page 38: EDUCAUSE 2017: Making Security A Priority

Classifiers

38

Page 39: EDUCAUSE 2017: Making Security A Priority

Cisco Cloudlock

39

Cloud Access Security Broker (CASB)

Page 40: EDUCAUSE 2017: Making Security A Priority

Evolving Perimeter

40

Page 41: EDUCAUSE 2017: Making Security A Priority

Evolving Risk

41

Page 42: EDUCAUSE 2017: Making Security A Priority

GW + Cloudlock

• Used for Box (new service) and Google (5+ years in

service)

• Covers faculty and staff

• Supports policy enforcement

• Visibility!

42

Page 43: EDUCAUSE 2017: Making Security A Priority

GW + Cloudlock

• Mo’ visibility, mo’ problems:

• Take a structured approach

• Develop policies, standards, criteria

• Test!

• Don’t try to do everything at once

• Partner with user support

43

Page 44: EDUCAUSE 2017: Making Security A Priority

44

Page 45: EDUCAUSE 2017: Making Security A Priority

Key Takeaways

• Set your goals

• Have a documented, well-understood security strategy for

consuming cloud applications

• Prioritize the most critical assets based on risk

• Evaluate products to find solutions that work best in your

environment

• Work with peers who have completed similar strategies

45

Page 46: EDUCAUSE 2017: Making Security A Priority

Questions/Discussion

46