Copyright 2008 - Trend Micro Inc. Trend Micro Thread Discovery Suites.
Trend Micro - aws-de-media.s3.amazonaws.comaws-de-media.s3.amazonaws.com/images/Enterprise...
Transcript of Trend Micro - aws-de-media.s3.amazonaws.comaws-de-media.s3.amazonaws.com/images/Enterprise...
© 2015, Trend Micro Inc.
Sicherheitskontrollen stärken und den Betrieb der Cloud vereinfachen
Alexander Bloech, Business Development Manager Trend Micro
24.3.2015
© 2015, Trend Micro Inc.
Today’s Topics
Strategy
Tactics
© 2015, Trend Micro Inc.
* http://aws.amazon.com/about-aws/
About Trend Micro
Trend Micro on AWS
IR in the Cloud
Auditing Support
Agenda
© 2015, Trend Micro Inc.
100% of the top 10 automotive
companies.
96% of the top 50 global
corporations.
100% of the top 10 telecom
companies.
80% of the top10 banks.
90% of the top10 oil companies.
Global Threat Intelligence- 1,200+ experts worldwide
New malware every ½ secondCEO
FoundedHeadquarters
EmployeesOffices
2013 Sales
Eva Chen1988, United States
Tokyo, Japan5,217
36$1.1B USD
A world safe for exchanging digital information
© 2015, Trend Micro Inc.
63%
Trend Micro on AWS
15+
20 million
© 2015, Trend Micro Inc.
4 pillars of practice
Incident Response
Monitoring
Forensics
Audit
© 2015, Trend Micro Inc. 7
Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Client-side Data Encryption
Server-side Data Encryption
Network Traffic Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Cu
sto
mer
s
Shared Responsibility Model
© 2015, Trend Micro Inc.
About Trend Micro
Trend Micro on AWS
IR in the Cloud
Auditing Support
Agenda
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
SANS incident response process
Preparation
Identification
Containment
Eradication
Recovery
Lessons Learned
© 2015, Trend Micro Inc.
SANS incident response process
© 2015, Trend Micro Inc.
Business point of view
Quickly identify affected area
Minimize impact
Recover quickly
© 2015, Trend Micro Inc.
Incident response before
Server
Analyze Repair Improve
Replacement
© 2015, Trend Micro Inc.
Incident response after
Instance
Analyze Repair Improve
Replacement
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
Optimized response
© 2015, Trend Micro Inc.
Optimized response
Instance
Script
Analyze
Improve
API
Replacement
© 2015, Trend Micro Inc.
Advantages
Faster return to production
More time for analysis
Less error prone
© 2015, Trend Micro Inc.
4 pillars of practice
Incident Response
Monitoring
Forensics
Audit
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
Business point of view
Encrypt data at rest (3.4.1)
Address new threats & vulnerabilities (6.6)
Log external facing services (10.2, 10.5.4)
Protect systems against malware (5.1)
*PCI has many, many, many more requirements. This is just a sample
© 2015, Trend Micro Inc.
Creating an audit trail before
Servers
Change
RecordStorage Logs
Firewall / IPS
© 2015, Trend Micro Inc.
Creating an audit trail before
Instances
Change
Record
Central
ManagementLogs
AWS Services
© 2015, Trend Micro Inc.
Security Trail
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.
© 2015, Trend Micro Inc.