Главная
Study mode:
on
1
Introduction
2
Welcome
3
Agenda
4
Cloud Servers
5
User Behavior
6
Directory Services
7
Challenges Threats
8
Challenges
9
How do we protect ourselves
10
Profiling Cloud Servers
11
Compliance
12
Behavior
13
Example
14
Commands
15
Feature sets
16
Classification
17
Making it actionable
18
Keeping learning
19
Tools
20
SSH Proxy
21
Profile Cloud Apps
22
The Good
23
Pointers
Description:
Explore cloud server security challenges and innovative solutions in this 43-minute conference talk from BSidesSF 2016. Delve into the complexities of securing cloud servers in the face of widespread IaaS and PaaS adoption. Learn how behavior-based real-time analytics can create dynamic fingerprints of automated services and employees, enabling more effective security measures. Discover the limitations of rule-based access security and the potential risks of compromised SSH keys and tokens. Examine dynamic privilege management techniques for identifying and preventing insider threats and privilege escalation attacks in real-time. Gain insights into next-generation privilege management principles and their application in securing cloud assets. The talk covers topics such as user behavior analysis, directory services, compliance, profiling cloud servers and applications, classification methods, and actionable security measures. Acquire practical knowledge about SSH proxies, cloud app profiling, and essential tools for implementing robust cloud security strategies. Read more

Using Behavior to Protect Cloud Servers

Security BSides San Francisco
Add to list
0:00 / 0:00