Capital One Breach—Its Cloudier than you Think
Looks like another breach—but this one continues a recent trend we’ve been seeing on the rise. Namely, the attacker took advantage of poorly or mis-configured firewall to access cloud-based data. Some claim it was a web application firewall, other reports aren’t clear. Regardless, as we move into multi cloud, this problem is becoming more and more pervasive.
Capital One was, like many companies, is stuck in a time warp. Historically security was done mostly by fortifying the perimeter of the network, assuming that the adversaries could be kept out by locking a single gate or chokepoint. More and more, we learn that this architecture is no longer effective, as there is an incongruity between the physical data center boundary and virtual perimeters. Those new perimeters can take up any size and shape and change at cloud speeds making it impossible for traditional security to follow—especially traditional firewalls. Worse, the security controls offered by cloud vendors are weaker than traditional options and are often no match against sophisticated attacks. In this case, the attacker was a former AWS employee who likely knew the ins and outs of the fragmented, cloud-based network.
What are the lessons?
- Without auto-generation of policies, those dynamic environments will always have sub optimal configurations on the firewalls. Today, many enterprises employ people whose sole function is to update firewalls policies. Spending hours every day—often a full time role!—security teams have people who constantly update firewall policies. When you move the cloud, this isn’t scalable, its impossible for humans to keep up.
- Its not just the automated security policy generation—you also need automated control deployment. Policies are only as good as the controls that drive them. Even if you get policies under control, the dynamic nature of the cloud still means the controls must adapt at the same, instant speed.
- Intention, intention and intention. Automation isn’t enough if you can’t tell your system what you want it to do. When you input a destination into Waze, hiccups happen. Does Waze say, “sorry, you can’t go there anymore.”? No, it adjusts, The same flexibility is required in security: continues and automated transformation of the security intent into security controls eliminating configuration errors over time.
- East West is the new North South. Tracking lateral movement in a fragmented cloud environment is more critical than ever.
You’ve moved to the multi cloud—welcome to the new reality. One of the biggest questions facing every senior security professional is figuring out how to secure enterprise networks as they fundamentally and constantly change over time. This requires a level of flexibility and scale heretofore unknown in the security industry. Traditional appliance-based solutions were built monolithically and are not well suited to cloud architectures. And new cloud friendly products do not provide the depth of security to protect environments from the variety of attacks typically faced.
So what can you do? Check out our CISO’s Guide to Multi Cloud Security which provides more than a few clues.