{"id":102138,"date":"2019-09-27T06:00:01","date_gmt":"2019-09-27T13:00:01","guid":{"rendered":"https:\/\/www.paloaltonetworks.com\/blog\/?p=102138"},"modified":"2024-08-04T22:56:59","modified_gmt":"2024-08-05T05:56:59","slug":"cloud-default-aggressive-cloud-security","status":"publish","type":"post","link":"https:\/\/www2.paloaltonetworks.com\/blog\/2019\/09\/cloud-default-aggressive-cloud-security\/","title":{"rendered":"Default: Aggressive \u2013 Navy SEAL Principles for Cloud Security"},"content":{"rendered":"<p>By Matthew Chiodi, Chief Security Officer, Public Cloud<\/p>\n<p><span style=\"font-weight: 400;\">It\u2019s time for organizations to face the challenges of cloud security with the mindset of a U.S. Navy SEAL special operations force. The majority of cloud breaches are the result of misconfigurations, not due to elite hackers identifying sophisticated ways of evading carefully constructed protections.<\/span><span style=\"font-weight: 400;\"> Applying a disciplined and proactive military-style approach can help identify and eliminate such gaping security holes, stopping attacks before they happen.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Former U.S. Navy SEAL officers Jocko Willink and Leif Babin describe a principle they call <\/span><a href=\"https:\/\/www.businessinsider.com\/navy-seals-jocko-willink-leif-babin-be-aggressive-not-reckless-2018-10\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">Default: Aggressive<\/span><\/a><span style=\"font-weight: 400;\">, a \u201cconfident, independent and proactive default approach to real-time challenges.\u201d Unit 42, the Palo Alto Networks global threat intelligence team, recently reported that 65% of publicly disclosed cloud security incidents are the result of misconfigurations. Here\u2019s how organizations can address these issues by taking a Default: Aggressive stance with their cloud configurations.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Plan Like a SEAL and Expect the Worst\u00a0<\/b><\/p>\n<p><span style=\"font-weight: 400;\">Earlier this year we released our <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/05\/cloud-big-cloud-5-holistic-cloud-security-strategy\/\"><span style=\"font-weight: 400;\">Big Cloud 5<\/span><\/a><span style=\"font-weight: 400;\"> security framework, which includes five practical steps for getting <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/cyberpedia\/cloud-security-is-a-shared-responsibility\"><span style=\"font-weight: 400;\">cloud security<\/span><\/a><span style=\"font-weight: 400;\"> right. The second step in the process is to automatically prevent the most serious cloud misconfigurations. Just as guardrails along a highway prevent vehicles from running off the road into dangerous territory, proactive security measures can discourage users from straying into misconfigurations that expose an organization to unnecessary risk. This step is significant because it encourages security teams to transform their thought processes from defensive to proactive.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Organizations can avoid opening themselves up to cloud security incidents by automatically identifying \u201canti-patterns\u201d \u2013 negative, preventable situations \u2013 and then remediating them automatically as well. Through the Default: Aggressive approach to cloud security, organizations can protect themselves responsibly, and dramatically decrease the share of cloud security incidents that can be attributed to misconfigurations. But what does this actually look like in practice?<\/span><\/p>\n<p><div style=\"max-width:100%\" data-width=\"974\"><span class=\"ar-custom\" style=\"padding-bottom:63.66%;\"><img loading=\"lazy\" decoding=\"async\"  class=\"aligncenter size-full wp-image-98906 lozad\"  data-src=\"https:\/\/www.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5.png\" alt=\"The Big Cloud 5 security framework includes five practical steps for getting cloud security right. \" width=\"974\" height=\"620\" srcset=\"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5.png 974w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5-230x146.png 230w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5-768x489.png 768w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5-500x318.png 500w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5-471x300.png 471w, https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/05\/The-Big-Cloud-5-63x40.png 63w\" sizes=\"auto, (max-width: 974px) 100vw, 974px\" \/><\/span><\/div><\/p>\n<p><b>Proactive = Doing the Small Things Right<\/b><\/p>\n<p><span style=\"font-weight: 400;\">One way to accomplish Default: Aggressive cloud security is through <\/span><a href=\"https:\/\/docs.microsoft.com\/en-us\/azure\/devops\/learn\/what-is-infrastructure-as-code\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">infrastructure as code<\/span><\/a><span style=\"font-weight: 400;\"> (IaC), automating the process of managing an application\u2019s underlying tech stack rather than approaching the same task through often error-prone, manual configuration. If your organization is using cloud, IaC is a must. IaC may be trending as a buzzword, but that\u2019s for good reason. It offers powerful security and quality benefits.\u00a0<\/span><\/p>\n<p><span style=\"font-weight: 400;\">First, it forces organizations to document, in code, what a cloud environment will look like and minimizes how many human hands are manually clicking around creating new systems and networks. Second, it allows cloud configurations to be <\/span><a href=\"https:\/\/scanapidoc.redlock.io\/\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">scanned for security issues<\/span><\/a><span style=\"font-weight: 400;\"> prior to deployment. While an organizational move to IaC can\u2019t be achieved overnight, its benefits far outweigh the risks of manually operating cloud environments.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">The Default: Aggressive mindset means not waiting for threats before taking action. Organizations can make the decision to move away from reactive production security scanning to building security quality into the entire software development lifecycle. In his 1986 book, \u201cOut of the Crisis,\u201d <\/span><a href=\"https:\/\/en.wikipedia.org\/wiki\/W._Edwards_Deming\" rel=\"nofollow,noopener\" ><span style=\"font-weight: 400;\">W. Edwards Deming<\/span><\/a><span style=\"font-weight: 400;\">, the godfather of total quality management, wrote, \u201cCease dependence on inspection to achieve quality. Eliminate the need for massive inspection by building quality into the product in the first place.\u201d This attitude embodies the core of Default: Aggressive security. By moving security to the earliest possible point in the development process, an organization also fulfills another modern principle: <\/span><a href=\"https:\/\/www.paloaltonetworks.com\/blog\/2019\/07\/4-practical-steps-shift-left-security\/\"><span style=\"font-weight: 400;\">shift-left security<\/span><\/a><span style=\"font-weight: 400;\">.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">Default: Aggressive cloud security also calls for strenuously enforcing automated software quality guardrails. Practically speaking, this means starting with a minimum viable product (MVP) shortlist of misconfigurations to eliminate. Examples include configurations such as firewall rules that allow traffic from the entire internet (0.0.0.0\/0) on FTP, MongoDB, MySQL, Oracle, Postgres, RDP and SSH ports. Also include in your initial list things like databases not being encrypted, storage buckets being open to the public, or identity and access management policies that allow assuming role permissions across all services. Configurations like this should likely never exist in your cloud environments.\u00a0<\/span><\/p>\n<p>&nbsp;<\/p>\n<p><b>Default: Aggressive Security Wins<\/b><\/p>\n<p>Navy SEALs methodically plan out missions, attempting to account for as many variables as possible. How we approach cloud security should be no different. Default: Aggressive security allows us to automate away problems that trip up many cloud consumers. A great place to start implementing the mindset is Unit 42\u2019s recent <a href=\"https:\/\/unit42.paloaltonetworks.com\/cloudy-with-a-chance-of-entropy\/\">cloud risk report<\/a>. Use this research to help form the basis of anti-patterns to proactively defend against. Doing so will put you ahead of the vast majority of your peers, demonstrably reduce your organization's share of cloud incidents, and place you in an elite category \u2013 just like a SEAL.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>It\u2019s time for organizations to face the challenges of cloud security with the mindset of a U.S. Navy SEAL special operations force.<\/p>\n","protected":false},"author":623,"featured_media":102142,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[6768],"tags":[3967,1166],"coauthors":[6679],"class_list":["post-102138","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-secure-the-cloud","tag-best-practices","tag-cloud-security"],"jetpack_featured_media_url":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-content\/uploads\/2019\/09\/boat-647049_1920.jpg","jetpack_sharing_enabled":true,"_links":{"self":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102138","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/users\/623"}],"replies":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/comments?post=102138"}],"version-history":[{"count":13,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102138\/revisions"}],"predecessor-version":[{"id":326329,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/posts\/102138\/revisions\/326329"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media\/102142"}],"wp:attachment":[{"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/media?parent=102138"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/categories?post=102138"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/tags?post=102138"},{"taxonomy":"author","embeddable":true,"href":"https:\/\/www2.paloaltonetworks.com\/blog\/wp-json\/wp\/v2\/coauthors?post=102138"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}