Title
AWS re:Invent 2023 - Unify cloud security from code to runtime with CrowdStrike and Bionic (SEC212)
Summary
- Rob Solomon, a Solution Architect at CrowdStrike, discusses cloud security challenges and solutions.
- CrowdStrike's annual cloud threat report indicates a 95% year-over-year increase in cloud threats and a 288% increase in specific attacks.
- The average time for lateral movement by attackers post-breach is 79 minutes, down from 95 minutes the previous year.
- Many organizations have siloed security solutions, leading to gaps that adversaries exploit.
- CrowdStrike focuses on adversary behavior rather than just malware signatures, analyzing trillions of events daily.
- Attackers often use stolen credentials, with 60% of cloud workloads improperly configured and 28% operating as root.
- Common cloud attack tactics include phishing, MFA fatigue, brute force attacks, and disabling logging.
- Challenges include a lack of cloud security expertise, inadequate MFA and access policies, and insufficient security logging.
- CrowdStrike's Falcon platform offers automated detection and proactive security improvement.
- The demo showcases an attack on a vulnerable cloud resource and how Falcon responds and improves security.
- CrowdStrike's cloud security is comprehensive, including agent-based protection, agentless cloud security posture management, and cloud infrastructure entitlement management.
- Bionic, recently acquired by CrowdStrike, provides application security posture management by reverse-engineering compiled code to map application dependencies.
- Key recommendations for cloud defense include basic cloud hygiene, prioritizing identity, and endpoint-to-cloud protection.
- CrowdStrike's Falcon Cloud Security has been recognized for its effectiveness in accelerating cloud detection and response, saving time and costs.
- Attendees are encouraged to learn more about Falcon Cloud Security, participate in the cloud security challenge, and attend hands-on labs.
Insights
- The reduction in time for lateral movement from 95 to 79 minutes indicates that attackers are becoming more efficient, and organizations must respond faster to breaches.
- The prevalence of improperly configured cloud workloads and the operation of many as root highlight a significant need for better cloud security practices and education.
- The use of generative AI by adversaries to create attack scripts suggests that AI technologies can be a double-edged sword, aiding both security and cybercrime.
- CrowdStrike's focus on adversary behavior and integration of machine learning models for detection suggests a shift from traditional signature-based security approaches to more dynamic and predictive methods.
- The demonstration of the Falcon platform's capabilities in real-time attack scenarios emphasizes the importance of automated and proactive security measures in cloud environments.
- The acquisition of Bionic by CrowdStrike and its integration into the Falcon platform indicates a trend towards consolidation in the cybersecurity industry, aiming to provide more comprehensive security solutions.
- The emphasis on cloud security posture management and application security posture management underscores the need for continuous monitoring and assessment of cloud environments to prevent misconfigurations and vulnerabilities.
- CrowdStrike's offering of AWS service credits for participating in the cloud security challenge is a strategic move to encourage potential customers to experience their platform's capabilities.