Title
AWS re:Invent 2022 - 3 steps to help mitigate cloud risks with CrowdStrike and AWS (PRT328)
Summary
- Challenges in Cloud Security: Security teams face challenges in cloud environments, particularly with cloud-native applications that differ from traditional applications. Security cannot be an afterthought and must be integrated into the fast-paced development cycle.
 - Visibility and Continuous Protection: Organizations require visibility into their entire cloud infrastructure and continuous protection of their deployed infrastructure, ensuring it remains immutable and protected against threats.
 - Automation and Collaboration: Security teams need to automate remediation and collaborate with cloud and DevOps teams to filter out noisy detections and scale their security efforts.
 - Cloud-Native Applications: These applications are characterized by microservices, multiple development teams, and infrastructure as code, requiring a paradigm shift in security tooling.
 - Build, Release, and Run Phases: Security must be implemented at each phase of development, from pre-build (scanning code and dependencies) to post-build (auditing and promoting secure code bases) and runtime (monitoring and protecting running applications).
 - Best Practices and Frameworks: Security teams should establish best practices and frameworks for securing cloud-native applications, including understanding shared responsibility models and implementing preventive and detective controls.
 - CrowdStrike's Approach: CrowdStrike emphasizes shifting security left, analyzing container images, securing infrastructure, and providing runtime protection. They offer tools like Horizon (CSPM) and integrations with AWS services to enhance security measures.
 
Insights
- Shift Left Security: Emphasizing the importance of integrating security early in the development process, CrowdStrike advocates for scanning code repositories and dependencies before deployment to identify and mitigate risks.
 - Infrastructure as Code (IaC): The use of IaC in cloud-native applications allows for better visibility and control over the security posture, as it is declarative and version-controlled.
 - Event-Based Security: Cloud-native applications often rely on event-based mechanisms, which necessitates security tools that can monitor and respond to events in real-time.
 - Collaboration Between Teams: The security of cloud-native applications requires close collaboration between security, cloud, and DevOps teams to ensure that security measures do not impede development speed.
 - Adversary-Focused Security: CrowdStrike's approach to security is adversary-focused, providing insights into the tools and techniques used by attackers, which helps in building effective defenses.
 - Automation and Integration: CrowdStrike leverages automation and integrates with AWS services like EventBridge, Security Hub, and Network Firewall to provide real-time threat detection and response, demonstrating the importance of leveraging cloud-native features for security.
 - Container Security: The distinction between daemon set and sidecar container sensors highlights the need for tailored security approaches depending on whether the environment is managed or unmanaged.
 - Threat Intelligence and Threat Hunting: CrowdStrike's integration with AWS Network Firewall for threat hunting using threat intelligence feeds illustrates the proactive approach to identifying and mitigating potential threats before they impact the environment.