ÔÆÇå¾²Éú³¤µÄÎå¸ö¶´¼û
2020-03-09
RSAC 2020×¼ÆÚÔھɽðɽ¾ÙÐУ¬´Ë´ÎÓÉÓÚÒßÇéÓ°Ïì¶à¼Òº£ÄÚ³§ÉÌδÄܳÉÐУ¬µ«º£ÐÄÌïϵ¹¤ÒµÉú³¤µÄ¸÷¼Ò³§ÉÌÕÕ¾Éʱʱ¹Ø×¢×ÅRSA´ó»áµÄÏà¹Ø¶¯Ì¬¡£¾ÅÓÎÀÏ¸ç¿Æ¼¼×¨¼ÒÍÅÕÕ¾ÉÔÚ»ñµÃRSA×ÊÁϺóµÚһʱ¼ä¾ÙÐÐÑо¿¼°ÆÊÎö¡£Æ¾Ö¤RSA2020´ó»áʱ´úµÄÔÆÇå¾²á¯ÁëÂÛ̳£¨CSA Summit£©¡¢ÔÆÇå¾²ºÍÐéÄ⻯£¨Cloud Security & Virtualization£©¡¢DevSecOpsºÍÓ¦ÓÃÇå¾²£¨DevSecOps & Application Security£©Õ⼸²¿·ÖÖ÷ÌâÄÚÈÝ£¬Óë¾ý¹²ÏíÒÔϼ¸¸ö¿´·¨£¬Ïê¼ûÏÂÎÄ¡£
¿´·¨1 £ºÔÆÅÌËã³ÉΪ»¥ÁªÒ»ÇеĻù´¡ÉèÊ©£¬ÔÆÇå¾²Ò²³ÉΪÁË´¿Çå¾²ÎÊÌâ
RSA¾Û»áÊ×ÈÕÉÏÎçµÄCSAá¯ÁëÂÛ̳[1]¡¢ÏÂÖçµÄÁ¢ÒìɳºÐ¾ºÈü£¬Ô½ÈÕÉÏÎçµÄKeynoteÕ¹»áÒѾ³ÉΪRSA½ü¼¸ÄêµÄ±êÅ䣬ҲÊÇÿÄêµÄÈý´ó¿´µã¡£CSAá¯ÁëÂÛ̳×÷Ϊ“Ê×·¢ÕóÈÝ”ÖеēÊ×·¢¶ÓÔ±”£¬ÆäÓ°ÏìÁ¦¿É¼ûÒ»°ß¡£²¢ÇÒºÜÓÐÒâ˼µÄÊÇ£¬Ã¿ÄêCSAµÄÓ°ÏìÁ¦Ô½À´Ô½´ó£¬ÖÖÖÖ±ê×¼¡¢ÊÂÇé×éºÍÅàѵ£¬Ó¦¸Ã¶¼ÈÃËüÕõµÃ²§ÂúÅèÂú£¬ÁýÕÖ¹æÄ£Ò²´Ó×î³õµÄÔÆÅÌËãÇå¾²À©Õ¹µ½ÎïÁªÍøÇå¾²¡¢Èí¼þ½ç˵½çÏߵȽ»Ö¯ÁìÓò¡£¿É¼û£¬ÔÆÅÌËãÒѾ³ÉΪ»¥ÁªÒ»ÇеĻù´¡ÉèÊ©£¬ÔÆÇ徲ͬÃ˵Ĵ¥½ÇÒÑÈ»²»Öª×ãÏÁÒåµÄ¹«ÓÐÔÆºÍ˽ÓÐÔÆÅÌËãÇå¾²ÁìÓòÁË¡£
¿ÉÒÔ˵£¬CSAºÍÇå¾²³§ÉÌÒѾ³ÉΪÁËÏàÖúͬ°é¹ØÏµ£¬ÔÚÅäºÏµÄÑо¿µãºÍ²úÆ·Æ«ÏòÉÏ»¥Îª±³Ê飬»¥ÎªÍƹ㡣ÀýÈ磬2019ÄêµÄá¯ÁëÂÛ̳Éϼ¸¼Ò×öSDWANÇå¾²µÄ³§ÉÌÔÚ´ó̸Èí¼þ½ç˵½çÏߣ¬Ò²ÎªÆäÔÚ2013ÄêÌá³öµÄSDPÔÆÏ´åªÅõ³¡¡£½ñÄêOneTrust¹«Ë¾µÄVP Kevin KileyÔÚ½²¹©Ó¦Á´Çå¾²¾ÍÊǶԹ©Ó¦Á´ÖеĵÚÈý·½³§É̾ÙÐÐÇå¾²ÆÀ¹À£¬Ò²¾ÍÊÇGartner½üÁ½ÄêÌá³öµÄIRM£¨Integrated Risk Management£©ÖеÄVRM£¨Vendor Risk Management£©¡£
ΪʲôOneTrust»áÔÚÔÆÇå¾²µÄ»á³¡Ì¸Õâ¸ö»°ÌâÄØ£¿ÓÉÓÚÔÆÅÌËãÁìÓòÓÐÒ»¸öºÜ´óµÄÌôÕ½ÊÇ£¬Óû§¶ÔÔÆ·þÎñÉ̵ÄÐÅÍУ¬CSAÔÚǰ¼¸ÄêÌá³öÁËConsensus Assessments Initiative (CAI)[2]£¬¼´¶ÔÓû§ÈÃÔÆ·þÎñÉ̾ÍCloud Controls Matrix (CCM)±ê×¼ÌîдÆÀ¹À£¬´Ó¶ø»ñµÃµÚÈý·½ÔÆ»ù´¡ÉèÊ©µÄ¿É¿¿¶È¡£ÏÔÈ»OneTrustµÄ¼Æ»®Ò²ÊÇÆõºÏ¸ÃÆ«ÏòµÄ¡£¿ÉÒÔËµÔÆÇ徲ͬÃËÔÚÉÌÒµÔË×÷ÉϺÜÊÇÀֳɣ¬Í¨¹ýÓë³§É̵ÄÏàÖúºÍ¿Í»§µÄÅàѵ£¬ÐγÉÁËÔÆÇå¾²ÁìÓòºÜºÃµÄÉú̬ϵͳ£¬ÅäºÏÍÆ½øÔÆÅÌËãÇå¾²µÄÉú³¤¡£
ÁíÒ»·½Ãæ£¬ÔÆÅÌËã¼ÈÈ»³ÉΪÁËÆÕÊʵĻù´¡ÉèÊ©£¬ÌṩÁËÅÌËã¡¢´æ´¢¡¢ÍøÂç¡¢º¯ÊýµÈ·þÎñ£¬ÄÇô¿Í»§¾Í»á½«ÔÆÅÌËã×÷ΪһÖÖÄÚÉú×ÊÔ´£¬Ç¶ÈëÔÚËûµÄ»ù´¡ÉèÊ©ÖУ¬×îÖÕÐγÉͳһµÄIT¼Ü¹¹¡£½üÁ½Ä꣬¶àÔÆ£¨Multi-Cloud£©¡¢»ìÏýÔÆ£¨Hybrid Cloud£©¡¢SDWAN¾Í½ÏÁ¿ÈÈ£¬ÔÚÕâÑùµÄITÇéÐÎÖÐÌṩÇå¾²²úÆ·¡¢Çå¾²·þÎñ£¬¾ÍÒ»¶¨ÒªÈÃǰ¼¸ÄêµÄÔÆÇå¾²²úÆ·»ò¼Æ»®ÈÚÈë¹Å°åÇéÐΣ¬ÌṩͳһµÄ¹¦Ð§¡£¿ÉÒÔÔ¤¼û£¬ÔÚδÀ´¼¸Ä꣬Çå¾²³§É̵ÄÇå¾²¼Æ»®²»»áÔÙÏÔʾ´øÓÐ“ÔÆÇå¾²”µÄ¶¨ÓÓÉÓÚÕâ¾ÍÊÇĬÈÏÑ¡Ï¼´ÔÆÇå¾²ÒѾ³ÉΪ´¿Çå¾²ÎÊÌâ¡£
Ò»¸ö·¢Ã÷ÊǽñÄêCSAá¯ÁëÂÛ̳µÄ»°ÌâÒÑÁýÕÖÁËÍøÂç¼ì²âÏìÓ¦£¨NDR£©¡¢¹©Ó¦Á´Çå¾²¡¢Êý¾Ýй¶ÏìÓ¦¡¢CISOÊӽǵȸ÷Ç徲ϸ·ÖÁìÓòµÄ»°Ì⣬µ«ÉÏÎçµÄÒé³ÌÎÊÌâÖж¼Ã»ÓзºÆðCloudÒ»´Ê¡£ËäȻϸ¿´ÄÚÈÝ£¬×ÅÊµÔÆÇå¾²µÄÀíÄîÒѾÈÚÈëÆäÖУ¬ÉõÖÁ¿ÉÒÔ˵£¬¸÷ÈËÎÞÂÛ̸Çå¾²ÀíÄî»òÊÇÇå¾²ÊÖÒÕ¡¢Çå¾²¼Æ»®£¬¶¼ÊÇÃæÏòÔÆÅÌËãÇéÐΡ£ÀýÈçExtrahop NetworksµÄCOO Raja MukerjiÔÚ̸¼ì²âÏìÓ¦£¬Ö÷ÕŽ«NDR¡¢EDR¡¢SIEM×éºÏ£¬¹¹½¨ÃæÏò¹«ÓÐÔÆµÄ¼ì²âÏìÓ¦»úÖÆ£¬ÊµÏÖÔÆÔÉúµÄÇå¾²¡£
ËäÈ»£¬ËäÈ»¹Å°åÇå¾²ÎÊÌâ»á±¬·¢ÔÚÔÆÅÌË㳡¾°ÖУ¬µ«ÔÆÇéÐÎÒ²ÓÐÆäÆæÒìµÄµØ·½¡£ÒÔÊÇÔÚÔÆÇå¾²ºÍÐéÄ⻯£¨Cloud Security & Virtualization£©ÒéÌâÖУ¬Èç×ÓÓòÃû½ÓÊÜ[3]µÄÔµ¹ÊÔÓÉÔÚÓÚһЩ×ÓÓòÃûÊÇ×âÓõģ¬ÖÎÀí²»µ±ÈÝÒ×±»¶ñÒâ×â»§·¢Ã÷²¢½ÓÊÜ£»ÓÖÈçºÃ¼¸¸ö½ºÆ¬Ì¸µ½Ì»Â¶Ãæ¼ì²é£¬¾ÍÊÇGartner˵µÄCSPM£¨Cloud Security Posture Management£©£¬ÊµÖÊÀ´¿´¾ÍÊǹŰåµÄ·þÎñ£¨¶Ë¿Ú£©Ì»Â¶ºÍÈõ¿ÚÁÕýÈçÏÖÔÚÐí¶à»¥ÁªÍøÉÏųÈõµÄÎïÁªÍø×°±¸Ò»Ñù£©£¬×ªÄð³ÉÁ˹«ÓÐÔÆÉϵĴ洢×ÊԴ̻¶ºÍÈõ¿ÚÁî¡£ÒÔÊÇÕâЩʵÖÊÀ´ËµÊǹŰåÇå¾²ÎÊÌ⣬µ«¹«ÓÐÔÆÅÌËãÇéÐÎÏÂÓÐеÄÌØµã£¬ÖµµÄÎÒÃÇÖØÊÓ¡£
¿´·¨2£º ´Ó´¿ºÏ¹æÐÔÒªÇóתÏò¹¥·ÀÒªÇó£¬ÔÆÇ徲תÏòʵս³¡¾°
ǰ¼¸Ä꣬AWSÔÚ¸÷¸ö´ó»áÉÏÓÐ×ÔÁ¦Òé³Ì×öAWSÇå¾²ÈëÃÅÅàѵ£¬±Ëʱ´ó²¿·ÖµÄ¿Í»§¶Ô¹«ÓÐÔÆ»¹²»Ì«ÊìϤ£¬Ò»²¿·ÖÊÇÓÉÓÚ¹«ÓÐÔÆ·þÎñÌ«¶à¡¢ÉèÖÃÌ«ÖØ´ó£¬ÁíÒ»²¿·ÖÔµ¹ÊÔÓÉÊǹØÓÚ¹¥»÷Õß¶øÑÔÒ²½ÏÁ¿Ð£¬Ïà¶Ô¶øÑÔ£¬IaaSºÍPaaSµÄÔÆÇå¾²ÕÕ¾ÉÒԺϹæÐÔÒªÇó¾Ó¶à¡£
ÏÖÔÚ£¬ÔÆÅÌËã¹ØÓÚ¹¥»÷Õß¶øÑÔ£¬¿ª·ÅAPI¡¢ÎÞаµÄ×ÊÔ´±àÅÅ£¬Ä³ÖֽǶÈÀ´ËµÙ²È»³ÉΪÁ˺ÃÓõĹ¥»÷×ÊÔ´£»ÁíÍâ£¬ÔÆÓû§¹ýʧÉèÖã¬Ò²¸øêéêìÔÆÉÏÃô¸ÐÊý¾ÝµÄ¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú¡£ÒÔÊÇÎÞÂÛÊÇÊý¾ÝÃæÇå¾²CWPP£¨Cloud Workload Protection Platform£©£¬ÕÕ¾ÉÖÎÀíÃæÇå¾²CSPM£¬ÖÖÖÖÔÆÇå¾²³§ÉÌÒ²Öð²½ÐËÆð¡£´Ó±¾½ìRSACÔÆ°²Òé³ÌÖеÄÄÚÈÝÀ´¿´£¬¸úÍù½ìÏà±ÈÔ½·¢Æ«ÏòÓÚʵս¡£
ÀýÈçÇ°ÃæÌáµ½µÄ×ÓÓòÃû½ÓÊܹ¥»÷ÊÂÎñ£¬ÔÚ¡¶Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains¡· ¼°¡¶Break the Top 10 Cloud Attack Killchains¡·Á½ÕŽºÆ¬[3,4]ÖÐÌáµ½£¬ÆäÖС¶Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains¡·ÊÇÐǰͿËÇå¾²ÍŶÓ×÷ΪÊܺ¦ÕߵĽǶÈÐðÊö£¬¸üÁîÈËÐÅ·þ¡£¶ø¡¶Break the Top 10 Cloud Attack Killchains¡·Ôò¸üÖÜÈ«£¬ÏÈÈÝÁËÊ®ÖÖÃæÏòÔÆÆ½Ì¨µÄ¹¥»÷Á´£¬ÆäÖÐÕì²é½×¶Î´ó²¿·ÖÊÇCSPM¹Ø×¢µÄ̻¶Token¡¢BucketµÈ£¬ÁíÒ»²¿·ÖÔòÊǶñÒâÄÚ²¿¹¥»÷Õߣ¬¼´Ç°ÃæÌáµÄ¹©Ó¦Á´ÁýÕÖµÄÄÚÈÝ¡£
ËäȻֻÓÐÓû§ºÍÇå¾²³§ÉÌÏÔÈ»²»·óÖÜÈ«£¬Òé³ÌÖÐÉÐÓÐһλÊÇÀ´×ÔAWSµÄBen Potter£¬Ö°Î»ÊÇThe security leader for Well-Architected,ÊôÓڼܹ¹Ê¦¡£ËûÔÚ¾Û»áÖÐÏÈÈÝÁËAWS¼Ü¹¹£¨Well-Architected£©ÖеÄÇå¾²Éè¼Æ£¬´ÓÖпÉÒÔ¿´³ö£¬AWSµÄÇ徲ϵͳÒѾÁýÕÖÁËÊÂǰÖÎÀí¡¢×¼±¸£¬ÊÂÖмì²âºÍÏìÓ¦£¬Êºó»Ö¸´µÄ±Õ»·£¬ÆäÖÐËû»¹ÌᵽʹÓÃÁ˽ð˿ȸÕË»§£¬°²ÅÅÁËһЩÓÕ¶ü¡£Õâ˵Ã÷ÔÆ³§É̵ÄÇå¾²ÍŶÓÒѾ²»Ö¹¹Ø×¢¹Å°åµÄÕûÀí£¨hygiene£©ºÍ±»¶¯·À»¤µÄÊÂÇ飬Ҳ×îÏÈ×öһЩ×Ô¶¯·ÀÓùµÄÊÂÇé¡£
×ÜÌå¶øÑÔ£¬¼ì²âÏìÓ¦ÒѾ´Ó¹Å°åÆóÒµÇéÐÎתÏòÔÆÅÌËãÇéÐΣ¬Èç¡¶Using Automation for Proactive Cloud Incident Response¡·¼°¡¶Untangling SaaS Security in the Enterprise¡·[5,6]¶¼ÏÈÈÝÁËÔÆ·þÎñÉ̺ÍÓû§ÔõÑù×ö¼ì²âÏìÓ¦µÄÂÄÀú£¬¡¶Untangling SaaS Security in the Enterprise¡·[6]ÔòÊÇÏÈÈÝÁËÔÚÏßÉúÒâµÄÁìÓòÔõÑùʵÏÖÉí·ÝºÍ»á¼û¿ØÖÆ£¨SSO¡¢MFA£¬RBAC£©£¬Êý¾ÝÇå¾²£¨¼ÓÃÜ¡¢ÃÜÔ¿ÖÎÀí£©£¬Ó¦ÓÃÇå¾²£¨APIÇå¾²£¬sessionÖÎÀí£©£¬ÈÕÖ¾ºÍ¼à¿Ø£¨ÆÊÎö£¬ÈÕÖ¾¼¯ÖУ©£¬ÊÂÎñÏìÓ¦£¨¸æ¾¯¡¢IR¾ç±¾£©£¬ÔÚÔÆÅÌËãÇéÐÎÖбØÐèÒªÒýÈë×Ô¶¯»¯ºÍxDR²Å»ªÖª×ã¹æÄ£»¯µÄÒªÇó¡£
×÷Ϊ·ÀÊØ·½£¬Ò»¼ÒС¹«Ë¾IMG SecurityµÄ×Éѯʦ£¬¡¶Cloud Threat Hunting¡·[9]ÏÈÈÝÁËÔÆÇéÐÎϵÄÍþвá÷ÁÔ£¬°¸ÀýºÜÊÇÏêϸ£¬Éæ¼°µ½ÉøÍ¸²âÊÔºÍÊÂÎñÏìÓ¦
¿´·¨3£º´Ó̸ֻÈÝÆ÷Çå¾²¡¢KubernetesÇå¾²µ½ÔÆÔÉúÇå¾²£¬ÔÆÔÉú½øÈëÖ÷Á÷
ÔÚ2019ÄêRSACµÄÔçÆÚ³§ÉÌÕ¹ÀÀÖУ¬ÒѾÓÐÒ»Á½¼Ò¹«Ë¾ÔÚ×öKubernetesºÍÈÝÆ÷Çå¾²£¬ÏÖÔÚÄêµÄÔÆÇå¾²ºÍDevSecOpsÒé³ÌÖУ¬ÓÐÁ½ÆªKubernetes¹¥·ÀµÄ½ºÆ¬£¬ÉÐÓÐһƪÏÈÈÝÔÆÔÉúÇå¾²ºÍServerlessÇå¾²£¬ËµÃ÷Õâ»°ÌâÒѾ±»Ö÷Á÷¹ÛÖÚËù¹Ø×¢£¬²¢ÇÒ¹Ø×¢ÈȶÈÒ»Ö±ÏòÉÏ£¬´ÓÈÝÆ÷µ½±àÅÅ£¬ÔÙµ½ÎÞ·þÎñºÍÔÆÔÉúÇå¾²¡£
ÀýÈ磬SANSµÄÅàѵʦÔÚ¡¶Defending Serverless Infrastructure in the Cloud¡·Ñݽ²ÖÐÌáµ½[7]¹¥»÷ÕßÈëÇÖÁËAWSµÄLamdaº¯Êý£¬Í¨¹ý·´ÏòÊðÀí»ñµÃÎÞ·þÎñµÄ²Ù×÷ϵͳϸ½Ú£¬¼ûÏÂͼ¡£
È»ºóÆÊÎöÁËÔõÑù´ÓÍⲿ»ñȡƾ֤½øÈëÈÝÆ÷£¬½ø¶øÍøÂçÈÝÆ÷ÄÚ²¿¸ü¶àƾ֤£¬ºáÏòÒÆ¶¯£¬½¨Ò齫º¯Êý·ÅÔÚVPCÄÚÀïÔÌÌ»Â¶Ãæ¡£


ÔÚ¡¶Kubernetes Practical Attack and Defense¡·[8]ÖУ¬½²ÕßÊÇÒ»¼ÒÇå¾²×ÊѶ¹«Ë¾InguardiansµÄCTO£¬ÏÈÏÈÈÝÁËKubernetesÏµĹ¥»÷˼Ð÷£¬ÔÚMaster½Úµã¹¥»÷API serverµÈ¼¸¸ö½¹µã×é¼þ£¬ÔÚSlave¹¥»÷KubeletºÍÔËÐÐʱÈÝÆ÷£¬ÌṩÁËÒ»¸ö×Ô¼º¿ªÔ´KubernetesµÄÉøÍ¸²âÊÔ¹¤¾ß£¨https://github.com/inguardians/peirates£©£¬¸Ã¹¤¾ßÖ÷Ò³DemoÏÈÈÝÁË»ñµÃ̻¶µÄÉñÃØ£¬È»ºó´ÓAPI-server½¨ÉèÕ˺ţ¬Ð½¨ÈÝÆ÷£¬²¢»ñµÃ·´Á¬Shell¡£ÁíÍ⻹ÌṩÁËÒ»¸ö²âÊÔѵÁ·ÇéÐΣ¬¹©Ñ§Ï° £¨https://www.bustakube.com/£©¡£
´ÓÒÔÉϼ¸¸ö½ºÆ¬µÄÄÚÈÝ¿ÉÒÔ¿´³ö£¬½ñÄêÔÆÅÌËãÇå¾²ºÜÏÔ×ŵÄת±ä£¬Çå¾²ÇãÏòÓÚ¹¥·Àϸ½Ú£¬ÇéÐÎÔò×ÅÖØÓÚ±àÅÅϵͳ֮ÉϵIJ¿·Ö¡£
¿´·¨4£ºDevSecOps³ÉΪÈÈÃÅ£¬DevSecOpsºÍÔÆÔÉúÇå¾²Ò»Ö±Èںϣ¬´´Á¢ÅäºÏ»°Ìâ
ѸËÙ¿ª·¢DevOpsËÆºõÓëÔÆÅÌËãÊÇÁ½¸öά¶È£¬µ«“ÈÝÆ÷-±àÅÅ”¿ÉÒÔÖ§³ÖѸËÙCI/CDµÄ¿ª·¢Ä£Ê½£¬¶ø“±àÅÅ-ÎÞ·þÎñ”µÄÔÆÔÉúÔËӪģʽ¿ÉÒÔÖ§³Ö´ó¹æÄ£µ¯ÐÔµÄÓ¦Óó¡¾°¡£ÕâÌ×ÊÖÒÕÕ»ËÆºõΪȫÌìϾø´ó´ó¶¼µÄ¿ª·¢ÕßËùÇàíù£¬¶øÈÝÆ÷Kubernetes-ServerlessÓÖÊÇÔÆÔÉúµÄµ×²ãÊÖÒÕ£¬ÒÔÊÇËæ×ÅѸËÙ¿ª·¢×Ô¼ºµÄÇå¾²»úÖÆ£¨DevSecOps£©Ò»Ö±Éú³¤£¬Á½ÖÖÇå¾²ÊӽǵÄÈÚºÏÒ»Ö±¼ÓÉî¡£
½ñÄêµÄÔÆÇå¾²Òé³ÌÖÐÓÐһЩÎÊÌâµÄÆðÔ´£¬Èç´úÂëÖеÄÓ²±àÂëToken¡¢´úÂë¿ÍÕ»µÄ̻¶ƾ֤£¬¶¼ÊÇÇ徲ѸËÙ¿ª·¢ÐèÒªÌåÌùµÄÄÚÈÝ£¬ÏÖÔÚÄêµÄDevSecOps ºÍÓ¦ÓÃÇå¾²£¨DevSecOps & Application Security£©Òé³ÌÖУ¬ÔòÓÐһƪ¡¶Compromising Kubernetes Cluster by Exploiting RBAC Permissions¡·[10]ÊÇרÃÅÏÈÈÝKubernetesµÄ»á¼û¿ØÖÆÇå¾²µÄ¡£
¿´·¨5£ºÈËÊǶԿ¹ÓÀÔ¶µÄÖ÷Ì⣬È˵ÄÒòËØ²»¿ÉºöÊÓ
½ñÄê´ó»áµÄÖ÷ÌåÊÇHuman Element£¬²»¿É×èÖ¹µÄÐí¶à½ºÆ¬ÖÐÒ²·ºÆðÁËÕâ¸öÔªËØ£¬´ó²¿·Ö¶¼ÊǼòÆÓÉæ¼°£¬ÓÐÁ½ÆªÔòÊÇרÃŶÔÈ˵ÄÒòËØ¾ÙÐÐ̽ÌÖ¡£
Èç¡¶Hacking Your Security Culture for the Cloud¡·[11]ÏÈÈÝÁËÔڹŰåÇéÐκÍÔÆÇéÐÎÖвî±ðµÄ˼Ð÷£¬ÔÚÔÆÇéÐÎÖÐ×öÇå¾²Ó¦¸ÃÓëÔÆÅÌËãµÄ˼Ð÷Æ¥Å䣬ÈçÇå¾²¼´´úÂ룬ӵ±§×Ô¶¯»¯£¬±ðµÄÒª×èÖ¹ÈËΪ¹ýʧËùÔì³ÉµÄÓ°Ï죬×éÖ¯ºìÀ¶¶Ô¿¹¡£¶ø[12]ÊÇ·ºÆðÔÚѸËÙ¿ª·¢µÄsessionÖеģ¬ÌÖÂÛÁËÊÂÇéʱ¼ä¡¢ÍŶӹæÄ£ºÍÐÞ¸ÄËûÈË´úÂëÆµÈԶȵÈÒòËØ¶Ô´úÂëÇå¾²ÐÔ±¬·¢µÄÓ°Ïì¡£×ÜÖ®£¬ÊÖÒÕ¡¢Á÷³ÌºÍÈËÊÇÐÅÏ¢Çå¾²µÄÈý¸ö×é³É²¿·Ö£¬ÆäÖÐÈ˵ÄÒòËØÔÚÒ»Ö±µÄÌáÉý¡£ÔõÑùʩչÈ˵ÄÖ÷¹ÛÄܶ¯ÐÔ£¬¹ØÓÚÌáÉýÇå¾²·À»¤Ð§ÂÊÖÁ¹ØÖ÷Òª¡£
×ÜÖ®£¬ÔÆÅÌËãÒѾ³ÉΪÁËÅþÁ¬ÍòÎïµÄÆÕÊʵĻù´¡ÉèÊ©£¬ÔÆÅÌËãÇå¾²ÒѾ½øÈëÁËϰ볡£¬ÔõÑùÐγÉͳһµÄÇ徲ϵͳ£¬ÔõÑùÌáÉýÔÆÅÌËãµÄÕæÊµÇ徲ˮƽ£¬ÔõÑùÌáÉýʹÓÃÔÆÅÌËãÖÖÖÖÍŶӵÄÇå¾²ÄÜÁ¦£¬½«ÊǽÓÏÂÀ´ÔÆÇå¾²µÄÉú³¤Æ«Ïò¡£
²Î¿¼Á´½Ó
[1] https://www.rsaconference.com/usa/agenda/csa-summit-privacy-and-security-in-the-cloud
[2] https://cloudsecurityalliance.org/research/working-groups/consensus-assessments/
[3] Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains ,RSAC 2020
[4] Break the Top 10 Cloud Attack Killchains, RSAC 2020
[5] Using Automation for Proactive Cloud Incident Response,RSAC 2020
[6] Untangling SaaS Security in the Enterprise, RSAC 2020
[7] Defending Serverless Infrastructure in the Cloud, RSAC 2020
[8] Kubernetes Practical Attack and Defense, RSAC 2020
[9] Cloud Threat Hunting, RSAC 2020
[10] Compromising Kubernetes Cluster by Exploiting RBAC Permissions, RSAC 2020
[11] Hacking Your Security Culture for the Cloud£¬RSAC 2020
[12] Which Developers and Teams Are More Likely to Write Vulnerable Software,RSAC 2020

¾ÅÓÎÀϸçÔÆ







