Using Behavior to Protect Cloud Servers - Anirban Banerjee BSides San Francisco 2016 (Hacking Illustrated Series InfoSec Tutorial Videos)
Using Behavior to Protect Cloud Servers
Anirban Banerjee
BSides San Francisco 2016

Cloud server adoption has exploded in the last 5 years. Nearly every business is using some kind of IaaS, PaaS platform. Securing these cloud servers is challenging. The ease of access by developers, contractors, web admins and more needs to be balanced with security. Using rule based access security can only go so far. Once SSH keys and tokens are compromised, an attacker can wreak havoc.Behavior based real time analytics can help create a dynamic fingerprint of an automated service like Jenkins or of an employee. We will show an example of dynamic privilege management to identify and stop insider threats and privilege escalation attacks in real time. See how you can apply next generation privilege management principles to secure your assets.

Back to BSides San Francisco 2016 video list



If you would like to republish one of the articles from this site on your webpage or print journal please contact IronGeek.

Copyright 2020, IronGeek