Breach Prevention Prep (Part 2): Accelerating Multi-Cloud Deployments

By Mim Luangraj


Palo Alto Networks will be kicking off another Breach Prevention week July 24-28th and we are recapping the last round of topics to help you prep for what’s to come. In case you missed it, Breach Prevention Week is a weeklong webinar series where Palo Alto Networks provides insights on how to prevent successful cyberattacks and achieve high performance across your network, endpoint, and cloud environments. Here we continue our summary series with Part 2: Accelerating Multi-Cloud Deployments.

Part 2: Accelerating Multi-Cloud Deployments

Matt Keil, Palo Alto Networks’ Director of Product Marketing, kicks off Part 2 of the the weeklong discussion with current cloud and virtualization adoption trends which they considered for the latest PAN OS 8.0 Release. Notable enterprise trends include significant public cloud adoption for production on workload deployments, continued expansion in private cloud and virtualization initiatives, and Network Functions Virtualization (NFV) deployments increasing across the organization – from data centers to branch offices. Regardless of which deployment model organizations adopt, applications, data and compute resources remain the target for cyber attackers.

The attack life cycle happens on both physical and virtualized cloud environments and occurs in these three phases:

  1. Illegally gaining access by exploiting compromised users and stealing credentials
  2. Moving laterally to seek out data and compute resources
  3. And finally stealing the data and/or utilize and monetize the organization’s compute resources

An end goal, for example, is when compute resources are illegally accessed and used to process Bitcoin cryptocurrency for the attacker.

So what are your options?

Since public cloud providers emphasize their security model, organizations often lose sight of cyber security as a shared responsibility. While cloud providers have the responsibility of making sure services are up-to-date and always running, the organization’s internal teams must continue to meet the responsibility of securing their platform applications, operating systems, and networking applications.

Cloud security is currently available to organizations in three ways:

  • Native Security:
    • Functionality: Port/IP filtering and access control
    • Pros: Basic filtering/access control, zero/low friction deployment, easy to use, low cost
    • Cons: Cannot control apps, unable to prevent threats, no control over file movement
  • Cloud Centric Security:
    • Functionality: Point products for IPS, IDS, typically host based
    • Pros: IDs/prevents known threats, low friction deployment, low administrative impact
    • Cons: Limited to known threats, may require manual remediation
  • NGFW Security (Next Generation Firewall):
    • Functionality: Filtering, access control based on apps and users, threat prevention
    • Pros: Visibility, control, segmentation base on app, prevents known/unknown threats
    • Cons: Requires configuration and policy setting, perceived, to be non-DevOps friendly

Along with complete visibility, reducing the attack surface area, detecting and preventing known and unknown threats, Palo Alto Networks’ newest release of their VM-Series’ NGFW provides a wide-ranging approach to cloud security:

Teneo’s Allen Wilkes gives a comprehensive review of PAN OS 8.0 here:
BREAKTHROUGH PERFORMANCE HARDWARE – PAN-OS 8.0

This series of cyber security information is intended to help you prep for Palo Alto Networks’ upcoming Breach Prevention Week on July 24-28th which will focus on Credential-Based Attacks and Phishing. Please register by using the link below:

REGISTER HERE

 

Part 1: Preventing Credential-Based Attacks:
www.teneo.net/blog/palo-alto-networks-breach-prevention-prep-part-1-preventing-credential-base-attacks

 

Contact us – We’d love to help you

Teneo collects your personal data when you complete our online forms. We will use this information to provide an accurate response to your questions or requests and we will keep a record of your form completion in our CRM system. By submitting this form, you agree to us contacting you for the purpose of our response. For more information explaining how we use your personal data, please see our Privacy Policy.