¾ÅÓÎÀϸç

¾ÅÓÎÀϸç

¾ÅÓÎÀÏ¸ç¿Æ¼¼

  • »ù´¡ÉèÊ©Çå¾²

    »ù´¡ÉèÊ©Çå¾²
  • Êý¾ÝÇå¾²

    Êý¾ÝÇå¾²
  • ÔÆÅÌËãÇå¾²

    ÔÆÅÌËãÇå¾²
  • ¹¤Òµ»¥ÁªÍøÇå¾²

    ¹¤Òµ»¥ÁªÍøÇå¾²
  • ÎïÁªÍøÇå¾²

    ÎïÁªÍøÇå¾²
  • ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì

    ÐÅÏ¢ÊÖÒÕÓ¦ÓÃÁ¢Òì
  • ËùÓвúÆ·

    ËùÓвúÆ·
  • ËùÓнâ¾ö¼Æ»®

    ËùÓнâ¾ö¼Æ»®

»ù´¡ÉèÊ©Çå¾²


  • Õþ¸®

    Õþ¸®
  • ÔËÓªÉÌ

    ÔËÓªÉÌ
  • ½ðÈÚ

    ½ðÈÚ
  • ÄÜÔ´

    ÄÜÔ´
  • ½»Í¨

    ½»Í¨
  • ÆóÒµ

    ÆóÒµ
  • ¿Æ½ÌÎÄÎÀ

    ¿Æ½ÌÎÄÎÀ

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÏàÖúͬ°éÉó²é¸ü¶à >

ÏàÖúͬ°é¶¯Ì¬

³ÉΪÏàÖúͬ°é

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

ÊÖÒÕÖ§³ÖÉó²é¸ü¶à >

²úÆ·Ö§³Ö

  • ¾ÅÓÎÀϸçÔÆ ¾ÅÓÎÀϸçÔÆ
  • ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI ¾ÅÓÎÀϸçÍþвÇ鱨ÖÐÐÄNTI
  • TechWorldÊÖÒÕ¼ÎÄ껪 TechWorldÊÖÒÕ¼ÎÄ껪
  • ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á ±±¾©¾ÅÓÎÀÏ¸ç¹«Òæ»ù½ð»á
  • ÊÖÒÕ²©¿Í ÊÖÒÕ²©¿Í
  • Àֳɰ¸Àý Àֳɰ¸Àý

·µ»ØÁбí

ÔÆÇå¾²Éú³¤µÄÎå¸ö¶´¼û

2020-03-09

RSAC 2020×¼ÆÚÔھɽðɽ¾ÙÐУ¬´Ë´ÎÓÉÓÚÒßÇéÓ°Ïì¶à¼Òº£ÄÚ³§ÉÌδÄܳÉÐУ¬µ«º£ÐÄÌïϵ¹¤ÒµÉú³¤µÄ¸÷¼Ò³§ÉÌÕÕ¾Éʱʱ¹Ø×¢×ÅRSA´ó»áµÄÏà¹Ø¶¯Ì¬ ¡£¾ÅÓÎÀÏ¸ç¿Æ¼¼×¨¼ÒÍÅÕÕ¾ÉÔÚ»ñµÃRSA×ÊÁϺóµÚһʱ¼ä¾ÙÐÐÑо¿¼°ÆÊÎö ¡£Æ¾Ö¤RSA2020´ó»áʱ´úµÄÔÆÇå¾²á¯ÁëÂÛ̳£¨CSA Summit£©¡¢ÔÆÇå¾²ºÍÐéÄ⻯£¨Cloud Security & Virtualization£©¡¢DevSecOpsºÍÓ¦ÓÃÇå¾²£¨DevSecOps & Application Security£©Õ⼸²¿·ÖÖ÷ÌâÄÚÈÝ£¬Óë¾ý¹²ÏíÒÔϼ¸¸ö¿´·¨£¬Ïê¼ûÏÂÎÄ ¡£

¿´·¨1 £ºÔÆÅÌËã³ÉΪ»¥ÁªÒ»ÇеĻù´¡ÉèÊ©£¬ÔÆÇå¾²Ò²³ÉΪÁË´¿Çå¾²ÎÊÌâ

RSA¾Û»áÊ×ÈÕÉÏÎçµÄCSAá¯ÁëÂÛ̳[1]¡¢ÏÂÖçµÄÁ¢ÒìɳºÐ¾ºÈü£¬Ô½ÈÕÉÏÎçµÄKeynoteÕ¹»áÒѾ­³ÉΪRSA½ü¼¸ÄêµÄ±êÅ䣬ҲÊÇÿÄêµÄÈý´ó¿´µã ¡£CSAá¯ÁëÂÛ̳×÷Ϊ“Ê×·¢ÕóÈÝ”ÖеēÊ×·¢¶ÓÔ±”£¬ÆäÓ°ÏìÁ¦¿É¼ûÒ»°ß ¡£²¢ÇÒºÜÓÐÒâ˼µÄÊÇ£¬Ã¿ÄêCSAµÄÓ°ÏìÁ¦Ô½À´Ô½´ó£¬ÖÖÖÖ±ê×¼¡¢ÊÂÇé×éºÍÅàѵ£¬Ó¦¸Ã¶¼ÈÃËüÕõµÃ²§ÂúÅèÂú£¬ÁýÕÖ¹æÄ£Ò²´Ó×î³õµÄÔÆÅÌËãÇå¾²À©Õ¹µ½ÎïÁªÍøÇå¾²¡¢Èí¼þ½ç˵½çÏߵȽ»Ö¯ÁìÓò ¡£¿É¼û£¬ÔÆÅÌËãÒѾ­³ÉΪ»¥ÁªÒ»ÇеĻù´¡ÉèÊ©£¬ÔÆÇ徲ͬÃ˵Ĵ¥½ÇÒÑÈ»²»Öª×ãÏÁÒåµÄ¹«ÓÐÔÆºÍ˽ÓÐÔÆÅÌËãÇå¾²ÁìÓòÁË ¡£

¿ÉÒÔ˵£¬CSAºÍÇå¾²³§ÉÌÒѾ­³ÉΪÁËÏàÖúͬ°é¹ØÏµ£¬ÔÚÅäºÏµÄÑо¿µãºÍ²úÆ·Æ«ÏòÉÏ»¥Îª±³Ê飬»¥ÎªÍƹã ¡£ÀýÈ磬2019ÄêµÄá¯ÁëÂÛ̳Éϼ¸¼Ò×öSDWANÇå¾²µÄ³§ÉÌÔÚ´ó̸Èí¼þ½ç˵½çÏߣ¬Ò²ÎªÆäÔÚ2013ÄêÌá³öµÄSDPÔÆÏ´åªÅõ³¡ ¡£½ñÄêOneTrust¹«Ë¾µÄVP Kevin KileyÔÚ½²¹©Ó¦Á´Çå¾²¾ÍÊǶԹ©Ó¦Á´ÖеĵÚÈý·½³§É̾ÙÐÐÇå¾²ÆÀ¹À£¬Ò²¾ÍÊÇGartner½üÁ½ÄêÌá³öµÄIRM£¨Integrated Risk Management£©ÖеÄVRM£¨Vendor Risk Management£© ¡£

ΪʲôOneTrust»áÔÚÔÆÇå¾²µÄ»á³¡Ì¸Õâ¸ö»°ÌâÄØ£¿ÓÉÓÚÔÆÅÌËãÁìÓòÓÐÒ»¸öºÜ´óµÄÌôÕ½ÊÇ£¬Óû§¶ÔÔÆ·þÎñÉ̵ÄÐÅÍУ¬CSAÔÚǰ¼¸ÄêÌá³öÁËConsensus Assessments Initiative (CAI)[2]£¬¼´¶ÔÓû§ÈÃÔÆ·þÎñÉ̾ÍCloud Controls Matrix (CCM)±ê×¼ÌîдÆÀ¹À£¬´Ó¶ø»ñµÃµÚÈý·½ÔÆ»ù´¡ÉèÊ©µÄ¿É¿¿¶È ¡£ÏÔÈ»OneTrustµÄ¼Æ»®Ò²ÊÇÆõºÏ¸ÃÆ«ÏòµÄ ¡£¿ÉÒÔËµÔÆÇ徲ͬÃËÔÚÉÌÒµÔË×÷ÉϺÜÊÇÀֳɣ¬Í¨¹ýÓë³§É̵ÄÏàÖúºÍ¿Í»§µÄÅàѵ£¬ÐγÉÁËÔÆÇå¾²ÁìÓòºÜºÃµÄÉú̬ϵͳ£¬ÅäºÏÍÆ½øÔÆÅÌËãÇå¾²µÄÉú³¤ ¡£

ÁíÒ»·½Ãæ£¬ÔÆÅÌËã¼ÈÈ»³ÉΪÁËÆÕÊʵĻù´¡ÉèÊ©£¬ÌṩÁËÅÌËã¡¢´æ´¢¡¢ÍøÂç¡¢º¯ÊýµÈ·þÎñ£¬ÄÇô¿Í»§¾Í»á½«ÔÆÅÌËã×÷ΪһÖÖÄÚÉú×ÊÔ´£¬Ç¶ÈëÔÚËûµÄ»ù´¡ÉèÊ©ÖУ¬×îÖÕÐγÉͳһµÄIT¼Ü¹¹ ¡£½üÁ½Ä꣬¶àÔÆ£¨Multi-Cloud£©¡¢»ìÏýÔÆ£¨Hybrid Cloud£©¡¢SDWAN¾Í½ÏÁ¿ÈÈ£¬ÔÚÕâÑùµÄITÇéÐÎÖÐÌṩÇå¾²²úÆ·¡¢Çå¾²·þÎñ£¬¾ÍÒ»¶¨ÒªÈÃǰ¼¸ÄêµÄÔÆÇå¾²²úÆ·»ò¼Æ»®ÈÚÈë¹Å°åÇéÐΣ¬ÌṩͳһµÄ¹¦Ð§ ¡£¿ÉÒÔÔ¤¼û£¬ÔÚδÀ´¼¸Ä꣬Çå¾²³§É̵ÄÇå¾²¼Æ»®²»»áÔÙÏÔʾ´øÓÐ“ÔÆÇå¾²”µÄ¶¨ÓÓÉÓÚÕâ¾ÍÊÇĬÈÏÑ¡Ï¼´ÔÆÇå¾²ÒѾ­³ÉΪ´¿Çå¾²ÎÊÌâ ¡£

Ò»¸ö·¢Ã÷ÊǽñÄêCSAá¯ÁëÂÛ̳µÄ»°ÌâÒÑÁýÕÖÁËÍøÂç¼ì²âÏìÓ¦£¨NDR£©¡¢¹©Ó¦Á´Çå¾²¡¢Êý¾Ýй¶ÏìÓ¦¡¢CISOÊӽǵȸ÷Ç徲ϸ·ÖÁìÓòµÄ»°Ì⣬µ«ÉÏÎçµÄÒé³ÌÎÊÌâÖж¼Ã»ÓзºÆðCloudÒ»´Ê ¡£ËäȻϸ¿´ÄÚÈÝ£¬×ÅÊµÔÆÇå¾²µÄÀíÄîÒѾ­ÈÚÈëÆäÖУ¬ÉõÖÁ¿ÉÒÔ˵£¬¸÷ÈËÎÞÂÛ̸Çå¾²ÀíÄî»òÊÇÇå¾²ÊÖÒÕ¡¢Çå¾²¼Æ»®£¬¶¼ÊÇÃæÏòÔÆÅÌËãÇéÐÎ ¡£ÀýÈçExtrahop NetworksµÄCOO Raja MukerjiÔÚ̸¼ì²âÏìÓ¦£¬Ö÷ÕŽ«NDR¡¢EDR¡¢SIEM×éºÏ£¬¹¹½¨ÃæÏò¹«ÓÐÔÆµÄ¼ì²âÏìÓ¦»úÖÆ£¬ÊµÏÖÔÆÔ­ÉúµÄÇå¾² ¡£

ËäÈ»£¬ËäÈ»¹Å°åÇå¾²ÎÊÌâ»á±¬·¢ÔÚÔÆÅÌË㳡¾°ÖУ¬µ«ÔÆÇéÐÎÒ²ÓÐÆäÆæÒìµÄµØ·½ ¡£ÒÔÊÇÔÚÔÆÇå¾²ºÍÐéÄ⻯£¨Cloud Security & Virtualization£©ÒéÌâÖУ¬Èç×ÓÓòÃû½ÓÊÜ[3]µÄÔµ¹ÊÔ­ÓÉÔÚÓÚһЩ×ÓÓòÃûÊÇ×âÓõÄ£¬ÖÎÀí²»µ±ÈÝÒ×±»¶ñÒâ×â»§·¢Ã÷²¢½ÓÊÜ £»ÓÖÈçºÃ¼¸¸ö½ºÆ¬Ì¸µ½Ì»Â¶Ãæ¼ì²é£¬¾ÍÊÇGartner˵µÄCSPM£¨Cloud Security Posture Management£©£¬ÊµÖÊÀ´¿´¾ÍÊǹŰåµÄ·þÎñ£¨¶Ë¿Ú£©Ì»Â¶ºÍÈõ¿ÚÁÕýÈçÏÖÔÚÐí¶à»¥ÁªÍøÉÏųÈõµÄÎïÁªÍø×°±¸Ò»Ñù£©£¬×ªÄð³ÉÁ˹«ÓÐÔÆÉϵĴ洢×ÊԴ̻¶ºÍÈõ¿ÚÁî ¡£ÒÔÊÇÕâЩʵÖÊÀ´ËµÊǹŰåÇå¾²ÎÊÌ⣬µ«¹«ÓÐÔÆÅÌËãÇéÐÎÏÂÓÐеÄÌØµã£¬ÖµµÄÎÒÃÇÖØÊÓ ¡£

¿´·¨2£º ´Ó´¿ºÏ¹æÐÔÒªÇóתÏò¹¥·ÀÒªÇó£¬ÔÆÇ徲תÏòʵս³¡¾°

ǰ¼¸Ä꣬AWSÔÚ¸÷¸ö´ó»áÉÏÓÐ×ÔÁ¦Òé³Ì×öAWSÇå¾²ÈëÃÅÅàѵ£¬±Ëʱ´ó²¿·ÖµÄ¿Í»§¶Ô¹«ÓÐÔÆ»¹²»Ì«ÊìϤ£¬Ò»²¿·ÖÊÇÓÉÓÚ¹«ÓÐÔÆ·þÎñÌ«¶à¡¢ÉèÖÃÌ«ÖØ´ó£¬ÁíÒ»²¿·ÖÔµ¹ÊÔ­ÓÉÊǹØÓÚ¹¥»÷Õß¶øÑÔÒ²½ÏÁ¿Ð£¬Ïà¶Ô¶øÑÔ£¬IaaSºÍPaaSµÄÔÆÇå¾²ÕÕ¾ÉÒԺϹæÐÔÒªÇó¾Ó¶à ¡£

ÏÖÔÚ£¬ÔÆÅÌËã¹ØÓÚ¹¥»÷Õß¶øÑÔ£¬¿ª·ÅAPI¡¢ÎÞаµÄ×ÊÔ´±àÅÅ£¬Ä³ÖֽǶÈÀ´ËµÙ²È»³ÉΪÁ˺ÃÓõĹ¥»÷×ÊÔ´ £»ÁíÍâ£¬ÔÆÓû§¹ýʧÉèÖã¬Ò²¸øêéêìÔÆÉÏÃô¸ÐÊý¾ÝµÄ¹¥»÷ÕßÌṩÁ˿ɳËÖ®»ú ¡£ÒÔÊÇÎÞÂÛÊÇÊý¾ÝÃæÇå¾²CWPP£¨Cloud Workload Protection Platform£©£¬ÕÕ¾ÉÖÎÀíÃæÇå¾²CSPM£¬ÖÖÖÖÔÆÇå¾²³§ÉÌÒ²Öð²½ÐËÆð ¡£´Ó±¾½ìRSACÔÆ°²Òé³ÌÖеÄÄÚÈÝÀ´¿´£¬¸úÍù½ìÏà±ÈÔ½·¢Æ«ÏòÓÚʵս ¡£

ÀýÈçÇ°ÃæÌáµ½µÄ×ÓÓòÃû½ÓÊܹ¥»÷ÊÂÎñ£¬ÔÚ¡¶Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains¡· ¼°¡¶Break the Top 10 Cloud Attack Killchains¡·Á½ÕŽºÆ¬[3,4]ÖÐÌáµ½£¬ÆäÖС¶Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains¡·ÊÇÐǰͿËÇå¾²ÍŶÓ×÷ΪÊܺ¦ÕߵĽǶÈÐðÊö£¬¸üÁîÈËÐÅ·þ ¡£¶ø¡¶Break the Top 10 Cloud Attack Killchains¡·Ôò¸üÖÜÈ«£¬ÏÈÈÝÁËÊ®ÖÖÃæÏòÔÆÆ½Ì¨µÄ¹¥»÷Á´£¬ÆäÖÐÕì²é½×¶Î´ó²¿·ÖÊÇCSPM¹Ø×¢µÄ̻¶Token¡¢BucketµÈ£¬ÁíÒ»²¿·ÖÔòÊǶñÒâÄÚ²¿¹¥»÷Õߣ¬¼´Ç°ÃæÌáµÄ¹©Ó¦Á´ÁýÕÖµÄÄÚÈÝ ¡£

ËäȻֻÓÐÓû§ºÍÇå¾²³§ÉÌÏÔÈ»²»·óÖÜÈ«£¬Òé³ÌÖÐÉÐÓÐһλÊÇÀ´×ÔAWSµÄBen Potter£¬Ö°Î»ÊÇThe security leader for Well-Architected,ÊôÓڼܹ¹Ê¦ ¡£ËûÔÚ¾Û»áÖÐÏÈÈÝÁËAWS¼Ü¹¹£¨Well-Architected£©ÖеÄÇå¾²Éè¼Æ£¬´ÓÖпÉÒÔ¿´³ö£¬AWSµÄÇ徲ϵͳÒѾ­ÁýÕÖÁËÊÂǰÖÎÀí¡¢×¼±¸£¬ÊÂÖмì²âºÍÏìÓ¦£¬Êºó»Ö¸´µÄ±Õ»·£¬ÆäÖÐËû»¹ÌᵽʹÓÃÁ˽ð˿ȸÕË»§£¬°²ÅÅÁËһЩÓÕ¶ü ¡£Õâ˵Ã÷ÔÆ³§É̵ÄÇå¾²ÍŶÓÒѾ­²»Ö¹¹Ø×¢¹Å°åµÄÕûÀí£¨hygiene£©ºÍ±»¶¯·À»¤µÄÊÂÇ飬Ҳ×îÏÈ×öһЩ×Ô¶¯·ÀÓùµÄÊÂÇé ¡£

×ÜÌå¶øÑÔ£¬¼ì²âÏìÓ¦ÒѾ­´Ó¹Å°åÆóÒµÇéÐÎתÏòÔÆÅÌËãÇéÐΣ¬Èç¡¶Using Automation for Proactive Cloud Incident Response¡·¼°¡¶Untangling SaaS Security in the Enterprise¡·[5,6]¶¼ÏÈÈÝÁËÔÆ·þÎñÉ̺ÍÓû§ÔõÑù×ö¼ì²âÏìÓ¦µÄÂÄÀú£¬¡¶Untangling SaaS Security in the Enterprise¡·[6]ÔòÊÇÏÈÈÝÁËÔÚÏßÉúÒâµÄÁìÓòÔõÑùʵÏÖÉí·ÝºÍ»á¼û¿ØÖÆ£¨SSO¡¢MFA£¬RBAC£©£¬Êý¾ÝÇå¾²£¨¼ÓÃÜ¡¢ÃÜÔ¿ÖÎÀí£©£¬Ó¦ÓÃÇå¾²£¨APIÇå¾²£¬sessionÖÎÀí£©£¬ÈÕÖ¾ºÍ¼à¿Ø£¨ÆÊÎö£¬ÈÕÖ¾¼¯ÖУ©£¬ÊÂÎñÏìÓ¦£¨¸æ¾¯¡¢IR¾ç±¾£©£¬ÔÚÔÆÅÌËãÇéÐÎÖбØÐèÒªÒýÈë×Ô¶¯»¯ºÍxDR²Å»ªÖª×ã¹æÄ £»¯µÄÒªÇó ¡£

×÷Ϊ·ÀÊØ·½£¬Ò»¼ÒС¹«Ë¾IMG SecurityµÄ×Éѯʦ£¬¡¶Cloud Threat Hunting¡·[9]ÏÈÈÝÁËÔÆÇéÐÎϵÄÍþвá÷ÁÔ£¬°¸ÀýºÜÊÇÏêϸ£¬Éæ¼°µ½ÉøÍ¸²âÊÔºÍÊÂÎñÏìÓ¦

¿´·¨3£º´Ó̸ֻÈÝÆ÷Çå¾²¡¢KubernetesÇå¾²µ½ÔÆÔ­ÉúÇå¾²£¬ÔÆÔ­Éú½øÈëÖ÷Á÷

ÔÚ2019ÄêRSACµÄÔçÆÚ³§ÉÌÕ¹ÀÀÖУ¬ÒѾ­ÓÐÒ»Á½¼Ò¹«Ë¾ÔÚ×öKubernetesºÍÈÝÆ÷Çå¾²£¬ÏÖÔÚÄêµÄÔÆÇå¾²ºÍDevSecOpsÒé³ÌÖУ¬ÓÐÁ½ÆªKubernetes¹¥·ÀµÄ½ºÆ¬£¬ÉÐÓÐһƪÏÈÈÝÔÆÔ­ÉúÇå¾²ºÍServerlessÇå¾²£¬ËµÃ÷Õâ»°ÌâÒѾ­±»Ö÷Á÷¹ÛÖÚËù¹Ø×¢£¬²¢ÇÒ¹Ø×¢ÈȶÈÒ»Ö±ÏòÉÏ£¬´ÓÈÝÆ÷µ½±àÅÅ£¬ÔÙµ½ÎÞ·þÎñºÍÔÆÔ­ÉúÇå¾² ¡£

ÀýÈ磬SANSµÄÅàѵʦÔÚ¡¶Defending Serverless Infrastructure in the Cloud¡·Ñݽ²ÖÐÌáµ½[7]¹¥»÷ÕßÈëÇÖÁËAWSµÄLamdaº¯Êý£¬Í¨¹ý·´ÏòÊðÀí»ñµÃÎÞ·þÎñµÄ²Ù×÷ϵͳϸ½Ú£¬¼ûÏÂͼ ¡£

È»ºóÆÊÎöÁËÔõÑù´ÓÍⲿ»ñȡƾ֤½øÈëÈÝÆ÷£¬½ø¶øÍøÂçÈÝÆ÷ÄÚ²¿¸ü¶àƾ֤£¬ºáÏòÒÆ¶¯£¬½¨Ò齫º¯Êý·ÅÔÚVPCÄÚÀïÔÌ­Ì»Â¶Ãæ ¡£

¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾

ÔÚ¡¶Kubernetes Practical Attack and Defense¡·[8]ÖУ¬½²ÕßÊÇÒ»¼ÒÇå¾²×ÊѶ¹«Ë¾InguardiansµÄCTO£¬ÏÈÏÈÈÝÁËKubernetesÏµĹ¥»÷˼Ð÷£¬ÔÚMaster½Úµã¹¥»÷API serverµÈ¼¸¸ö½¹µã×é¼þ£¬ÔÚSlave¹¥»÷KubeletºÍÔËÐÐʱÈÝÆ÷£¬ÌṩÁËÒ»¸ö×Ô¼º¿ªÔ´KubernetesµÄÉøÍ¸²âÊÔ¹¤¾ß£¨https://github.com/inguardians/peirates£©£¬¸Ã¹¤¾ßÖ÷Ò³DemoÏÈÈÝÁË»ñµÃ̻¶µÄÉñÃØ£¬È»ºó´ÓAPI-server½¨ÉèÕ˺Å£¬Ð½¨ÈÝÆ÷£¬²¢»ñµÃ·´Á¬Shell ¡£ÁíÍ⻹ÌṩÁËÒ»¸ö²âÊÔѵÁ·ÇéÐΣ¬¹©Ñ§Ï° £¨https://www.bustakube.com/£© ¡£

´ÓÒÔÉϼ¸¸ö½ºÆ¬µÄÄÚÈÝ¿ÉÒÔ¿´³ö£¬½ñÄêÔÆÅÌËãÇå¾²ºÜÏÔ×ŵÄת±ä£¬Çå¾²ÇãÏòÓÚ¹¥·Àϸ½Ú£¬ÇéÐÎÔò×ÅÖØÓÚ±àÅÅϵͳ֮ÉϵIJ¿·Ö ¡£

¿´·¨4£ºDevSecOps³ÉΪÈÈÃÅ£¬DevSecOpsºÍÔÆÔ­ÉúÇå¾²Ò»Ö±Èںϣ¬´´Á¢ÅäºÏ»°Ìâ

ѸËÙ¿ª·¢DevOpsËÆºõÓëÔÆÅÌËãÊÇÁ½¸öά¶È£¬µ«“ÈÝÆ÷-±àÅÅ”¿ÉÒÔÖ§³ÖѸËÙCI/CDµÄ¿ª·¢Ä£Ê½£¬¶ø“±àÅÅ-ÎÞ·þÎñ”µÄÔÆÔ­ÉúÔËӪģʽ¿ÉÒÔÖ§³Ö´ó¹æÄ£µ¯ÐÔµÄÓ¦Óó¡¾° ¡£ÕâÌ×ÊÖÒÕÕ»ËÆºõΪȫÌìϾø´ó´ó¶¼µÄ¿ª·¢ÕßËùÇàíù£¬¶øÈÝÆ÷Kubernetes-ServerlessÓÖÊÇÔÆÔ­ÉúµÄµ×²ãÊÖÒÕ£¬ÒÔÊÇËæ×ÅѸËÙ¿ª·¢×Ô¼ºµÄÇå¾²»úÖÆ£¨DevSecOps£©Ò»Ö±Éú³¤£¬Á½ÖÖÇå¾²ÊӽǵÄÈÚºÏÒ»Ö±¼ÓÉî ¡£

½ñÄêµÄÔÆÇå¾²Òé³ÌÖÐÓÐһЩÎÊÌâµÄÆðÔ´£¬Èç´úÂëÖеÄÓ²±àÂëToken¡¢´úÂë¿ÍÕ»µÄ̻¶ƾ֤£¬¶¼ÊÇÇ徲ѸËÙ¿ª·¢ÐèÒªÌåÌùµÄÄÚÈÝ£¬ÏÖÔÚÄêµÄDevSecOps ºÍÓ¦ÓÃÇå¾²£¨DevSecOps & Application Security£©Òé³ÌÖУ¬ÔòÓÐһƪ¡¶Compromising Kubernetes Cluster by Exploiting RBAC Permissions¡·[10]ÊÇרÃÅÏÈÈÝKubernetesµÄ»á¼û¿ØÖÆÇå¾²µÄ ¡£

¿´·¨5£ºÈËÊǶԿ¹ÓÀÔ¶µÄÖ÷Ì⣬È˵ÄÒòËØ²»¿ÉºöÊÓ

½ñÄê´ó»áµÄÖ÷ÌåÊÇHuman Element£¬²»¿É×èÖ¹µÄÐí¶à½ºÆ¬ÖÐÒ²·ºÆðÁËÕâ¸öÔªËØ£¬´ó²¿·Ö¶¼ÊǼòÆÓÉæ¼°£¬ÓÐÁ½ÆªÔòÊÇרÃŶÔÈ˵ÄÒòËØ¾ÙÐÐ̽ÌÖ ¡£

Èç¡¶Hacking Your Security Culture for the Cloud¡·[11]ÏÈÈÝÁËÔڹŰåÇéÐκÍÔÆÇéÐÎÖвî±ðµÄ˼Ð÷£¬ÔÚÔÆÇéÐÎÖÐ×öÇå¾²Ó¦¸ÃÓëÔÆÅÌËãµÄ˼Ð÷Æ¥Å䣬ÈçÇå¾²¼´´úÂ룬ӵ±§×Ô¶¯»¯£¬±ðµÄÒª×èÖ¹ÈËΪ¹ýʧËùÔì³ÉµÄÓ°Ï죬×éÖ¯ºìÀ¶¶Ô¿¹ ¡£¶ø[12]ÊÇ·ºÆðÔÚѸËÙ¿ª·¢µÄsessionÖеÄ£¬ÌÖÂÛÁËÊÂÇéʱ¼ä¡¢ÍŶӹæÄ£ºÍÐÞ¸ÄËûÈË´úÂëÆµÈԶȵÈÒòËØ¶Ô´úÂëÇå¾²ÐÔ±¬·¢µÄÓ°Ïì ¡£×ÜÖ®£¬ÊÖÒÕ¡¢Á÷³ÌºÍÈËÊÇÐÅÏ¢Çå¾²µÄÈý¸ö×é³É²¿·Ö£¬ÆäÖÐÈ˵ÄÒòËØÔÚÒ»Ö±µÄÌáÉý ¡£ÔõÑùʩչÈ˵ÄÖ÷¹ÛÄܶ¯ÐÔ£¬¹ØÓÚÌáÉýÇå¾²·À»¤Ð§ÂÊÖÁ¹ØÖ÷Òª ¡£

×ÜÖ®£¬ÔÆÅÌËãÒѾ­³ÉΪÁËÅþÁ¬ÍòÎïµÄÆÕÊʵĻù´¡ÉèÊ©£¬ÔÆÅÌËãÇå¾²ÒѾ­½øÈëÁËϰ볡£¬ÔõÑùÐγÉͳһµÄÇ徲ϵͳ£¬ÔõÑùÌáÉýÔÆÅÌËãµÄÕæÊµÇ徲ˮƽ£¬ÔõÑùÌáÉýʹÓÃÔÆÅÌËãÖÖÖÖÍŶӵÄÇå¾²ÄÜÁ¦£¬½«ÊǽÓÏÂÀ´ÔÆÇå¾²µÄÉú³¤Æ«Ïò ¡£

²Î¿¼Á´½Ó

[1]  https://www.rsaconference.com/usa/agenda/csa-summit-privacy-and-security-in-the-cloud

[2]  https://cloudsecurityalliance.org/research/working-groups/consensus-assessments/

[3] Same Thing We Do Every Few Minutes, Pinky – Try to Take Over All Your Subdomains ,RSAC 2020

[4] Break the Top 10 Cloud Attack Killchains, RSAC 2020

[5] Using Automation for Proactive Cloud Incident Response,RSAC 2020

[6] Untangling SaaS Security in the Enterprise, RSAC 2020

[7] Defending Serverless Infrastructure in the Cloud, RSAC 2020

 [8] Kubernetes Practical Attack and Defense, RSAC 2020

[9] Cloud Threat Hunting, RSAC 2020

[10] Compromising Kubernetes Cluster by Exploiting RBAC Permissions, RSAC 2020

[11] Hacking Your Security Culture for the Cloud£¬RSAC 2020

[12] Which Developers and Teams Are More Likely to Write Vulnerable Software,RSAC 2020

?

ÄúµÄÁªÏµ·½·¨

*ÐÕÃû
*µ¥Î»Ãû³Æ
*ÁªÏµ·½·¨
*ÑéÖ¤Âë ¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
Ìá½»µ½ÓÊÏä

¹ºÖÃÈÈÏß

  • ¹ºÖÃ×Éѯ:

    400-818-6868-1

Ìá½»ÏîÄ¿ÐèÇó

½Ó´ý¼ÓÈë¾ÅÓÎÀÏ¸ç¿Æ¼¼£¬³ÉΪÎÒÃǵÄÏàÖúͬ°é£¡
  • *ÇëÐÎòÄúµÄÐèÇó
  • *×îÖÕ¿Í»§Ãû³Æ
  • *ÏîÄ¿Ãû³Æ
  • Äú¸ÐÐËȤµÄ²úÆ·
  • ÏîĿԤËã
ÄúµÄÁªÏµ·½·¨
  • *ÐÕÃû
  • *ÁªÏµµç»°
  • *ÓÊÏä
  • *Ö°Îñ
  • *¹«Ë¾
  • *¶¼»á
  • *ÐÐÒµ
  • *ÑéÖ¤Âë ¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
  • Ìá½»µ½ÓÊÏä
¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾
¾ÅÓÎÀϸ硤(Öйú)¾ãÀÖ²¿¹Ù·½ÍøÕ¾

·þÎñÖ§³Ö

ÖÇÄܿͷþ
ÖÇÄܿͷþ
¹ºÖÃ/ÊÛºóÊÖÒÕÎÊÌâ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
Ã˹ܼÒ-ÊÛºó·þÎñϵͳ
ÔÚÏßÌáµ¥|ÖÇÄÜÎÊ´ð|֪ʶ¿â
Ö§³ÖÈÈÏß
Ö§³ÖÈÈÏß
400-818-6868
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÉçÇø
¾ÅÓÎÀÏ¸ç¿Æ¼¼ÉçÇø
×ÊÁÏÏÂÔØ|ÔÚÏßÎÊ´ð|ÊÖÒÕ½»Á÷

? 2025 NSFOCUS ¾ÅÓÎÀÏ¸ç¿Æ¼¼ www.nsfocus.com All Rights Reserved . ¾©¹«Íø°²±¸ 11010802021605ºÅ ¾©ICP±¸14004349ºÅ ¾©ICPÖ¤110355ºÅ

ÍøÕ¾µØÍ¼