Difference between revisions of "ASWEpisode92"

From Security Weekly Wiki
Jump to navigationJump to search
Line 22: Line 22:
 
<br>
 
<br>
  
= Interview: =
+
= Topic: Protecting Data in Apps and Protecting Apps from Data =
<!-- [[File:HillelSolow.jpg|right|250px|thumb|<center>'''[https://twitter.com/hsolow Hillel Solow]'''is the CTO of [https://www.checkpoint.com/ Check Point]</center>]] -->
+
Apps must protect the data they collect. How can DevOps teams apply effective controls like strong authentication and authorization? How do cloud services help or hinder encrypting data?
 +
* Envelope encryption uses multiple keys to protect data. It's a scalable pattern for protecting data and is nicely documented for [https://docs.aws.amazon.com/kms/latest/developerguide/concepts.html AWS], [https://docs.microsoft.com/en-us/azure/storage/blobs/storage-encrypt-decrypt-blobs-key-vault Azure], and [https://cloud.google.com/kms/docs/envelope-encryption GCP]. Be warned that each provider uses slightly different terminology for the same principle components. Kubernetes [https://kubernetes.io/docs/tasks/administer-cluster/encrypt-data/ also supports] this pattern.
 +
 
 +
Data is also an attack vector that apps must protect themselves against. How relevant is the security recommendation of "use input validation" for modern apps? How can apps that rely on user-generated content or microservice architectures handle data securely?
 
<br><br>
 
<br><br>
 
==News==
 
==News==

Revision as of 06:56, 20 January 2020

Recorded January 20, 202 at G-Unit Studios in Rhode Island!

Episode Audio

Hosts

  • Mike Shema
    is the Product Security Lead of Square.
  • John Kinsella
    is the Vice President of Container Security for Qualys.
  • Matt Alderman
    CEO at Security Weekly, Strategic Advisor, and Wizard of Entrepreneurship
  • Announcements

    • Join us at InfoSecWorld 2020 - March 30 - April 1, 2020 at the Disney Contemporary Resort! Security Weekly listeners save 15% off the InfoSec World Main Conference or World Pass! Visit securityweekly.com/ISW2020, click the register button to register with our discount code or the schedule button to sponsor a micro-interview!
    • OSHEAN and the Pell Center are partnering together to present Cybersecurity Exchange Day on Wednesday, March 18th from 9am-3pm at Salve Regina University in the beautiful Newport, RI! Visit securityweekly.com/OSHEAN2020 to register for free and come join in the fun!
    • We have officially migrated our mailing list to a new platform! Sign up for the list to receive invites to our virtual trainings, webcasts, and other content relative to your interests by visiting securityweekly.com/subscribe and clicking the button to join the list! You can also submit your suggestions for guests by going to securityweekly.com/guests and submitting the form! We'll review them monthly and reach out if they are a good fit!
    • Our first-ever virtual training is happening on March 19th @11:00am ET, with Adam Kehler & Rob Harvey from Online Business Systems Risk, Security & Privacy Team. In this training you will learn how to generate a complex SHA-256 hashed password and then use password cracking tools to break it. Register for our upcoming trainings by visiting securityweekly.com, selecting the webcast/training drop down from the top menu bar and clicking registration.


    Topic: Protecting Data in Apps and Protecting Apps from Data

    Apps must protect the data they collect. How can DevOps teams apply effective controls like strong authentication and authorization? How do cloud services help or hinder encrypting data?

    • Envelope encryption uses multiple keys to protect data. It's a scalable pattern for protecting data and is nicely documented for AWS, Azure, and GCP. Be warned that each provider uses slightly different terminology for the same principle components. Kubernetes also supports this pattern.

    Data is also an attack vector that apps must protect themselves against. How relevant is the security recommendation of "use input validation" for modern apps? How can apps that rely on user-generated content or microservice architectures handle data securely?

    News

    Featured Flaws & Big Breaches
    Cloud, Code & Controls
    Learning & Tools
    Food for Thought


    Follow us on Twitter Watch Security Weekly videos Listen to Security Weekly Security Weekly fan page Connect with Paul Google+