Cloud security novice to expert in 10 steps: Actionable CNAPP approach (SEC205)

Here is a detailed summary of the video transcription in markdown format, broken down into sections for better readability:

Introduction

  • The speaker, Leor, is the Director of Cloud Security Advocacy at Tenable.
  • The session is about CNAP (Cloud-Native Application Protection Platform) and how it can help secure cloud environments.
  • The speaker will cover the 10 "steps" (components) of a CNAP approach and how Tenable's Cloud Security solution addresses them.

The Challenges of Securing the Cloud

  • New attack vectors compared to on-premises technology.
  • Lack of a well-established culture and expertise in cloud security.
  • Overwhelming number of available tools, leading to a scattered approach.
  • Increased collaboration and access within the organization, which can be both an opportunity and a threat.

Tenable Cloud Security as a CNAP Solution

  • Integrates with cloud environments, identity providers, CI/CD pipelines, and third-party tools.
  • Provides a single pane of glass to control and manage the risk of the cloud environment.
  • Focuses on three main areas: knowing what you have, exposing risks, and closing problems.

The "10 Steps" of a CNAP Approach

  1. Visibility: Gaining a clear understanding of the resources and their relationships in the cloud environment, including infrastructure-as-code, registries, and identity providers.
  2. Revealing Security Misconfigurations: Analyzing configurations and policies to identify low-hanging fruit and more complex issues, such as public resources and outdated access keys.
  3. Controlling Identities and Their Entitlements: Identifying privileged users, third-party access, and inactive identities. Achieving least-privilege access through policy generation and just-in-time access.
  4. Vulnerabilities: Scanning for vulnerabilities throughout the development and deployment process, across cloud accounts, on-premises, and containerized environments.
  5. Data Classification: Integrating data security posture management to understand the sensitivity of data and the access to it.
  6. Contextualization and Prioritization: Identifying "toxic combinations" of risks and understanding the full context to prioritize remediation efforts. Mapping findings to compliance standards.
  7. Strategizing Remediation: Integrating with infrastructure-as-code to suggest changes with confidence, tracking the use of credentials, and automating remediation where possible.
  8. Shifting Security Left: Scanning infrastructure-as-code, including reusable components, to detect misconfigurations and potential malicious code before deployment.
  9. Automated Remediation: Integrating with ticketing systems, webhooks, and other tools to automate the resolution of identified issues.
  10. Extending Beyond Cloud: Leveraging the broader Tenable One platform to understand attack paths between on-premises and cloud environments, such as from compromised local endpoints to cloud resources.

Conclusion

  • Cloud security presents both significant opportunities and challenges.
  • A CNAP platform like Tenable Cloud Security can help organizations navigate these challenges by providing visibility, risk exposure, and remediation capabilities.
  • The key is to leverage the contextual information and prioritize the most critical risks to the organization.

Your Digital Journey deserves a great story.

Build one with us.

Cookies Icon

These cookies are used to collect information about how you interact with this website and allow us to remember you. We use this information to improve and customize your browsing experience, as well as for analytics.

If you decline, your information won’t be tracked when you visit this website. A single cookie will be used in your browser to remember your preference.

Talk to us