Title
AWS re:Invent 2023 - Real-life automation and security best practices from the field (COP228)
Summary
- Aidan Walden from Fortinet leads a session on cloud migration and security best practices, drawing on experiences with numerous customers.
- The session includes insights from Roger Cressey, a partner at Mount Wave Ventures with cybersecurity policy expertise; Vince Wang, responsible for Fortinet Cloud Product Marketing and Cloud Partner Alliances; and Ali Bidabadi, worldwide director for Fortinet's cloud consulting practice.
- Key themes discussed include organizational change for cloud migration, skill set assessments, workflow assessments, DevOps, DevSecOps, AI, ML, and security blueprints.
- The importance of starting security early in the cloud migration process and developing security blueprints from day one is emphasized.
- The conversation covers the convergence of network and security operations, the importance of visibility and observability, and the challenges of alert volumes and signals from various services.
- AI and ML's role in security is discussed, with a focus on their benefits and the need for proper training and data integrity.
- The shared responsibility model in cloud security is highlighted, stressing that customers must understand their part in securing applications.
- Best practices include managing change, early security considerations, visibility, observability, and the entire software development lifecycle security.
Insights
- Organizational Change and Skills: Cloud migration requires a reassessment of organizational structures and skills, with a focus on adopting DevOps and DevSecOps practices.
- Security Blueprint: Developing a security blueprint from the outset is crucial to avoid costly redesigns and to optimize security in the cloud.
- Automation and Observability: Automation is key to agility in security practices, and observability is foundational for identifying and remediating issues quickly.
- Convergence of Network and Security: The consolidation of network and security operations is becoming more common in the cloud, and solutions should promote automation and simplicity.
- AI and ML in Security: AI and ML are increasingly used in security, but their effectiveness depends on the quality of the data and the training they receive. They are tools to reduce the time to detect and remediate threats.
- Shared Responsibility Model: Customers must understand their responsibilities in securing their cloud applications, as cloud service providers (CSPs) only secure the infrastructure.
- Data Volume Challenges: Customers are seeking ways to manage the volume of security data and alerts, with a focus on actionable insights and prioritization.
- Flexibility and Adaptability: Security solutions must be flexible and adaptable to changing business needs and cloud environments.
- Vendor Selection: Choosing vendors that can provide consistent security policies and practices across on-premises and cloud environments is important for simplifying security management.
- Security Throughout Development Lifecycle: Security should be integrated throughout the software development lifecycle, not just at runtime, to reduce the attack surface and address vulnerabilities early.