Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Cloud

6/25/2019
06:00 PM
Connect Directly
Twitter
LinkedIn
Google+
RSS
E-Mail
50%
50%

AWS CISO Talks Risk Reduction, Development, Recruitment

Steve Schmidt says limiting access to data has dramatically changed the security posture across Amazon Web Services.

AWS re:Inforce – BOSTON – Enterprise cloud adoption has ramped up in the 12 years Steve Schmidt has worked with Amazon Web Services (AWS), but he says the threat landscape hasn't changed much. Businesses have simply become more aware of the many risks they face.

"The biggest risk to most organizations, large or small, still tends to be people," he said in an interview at AWS re:Inforce, its inaugural cloud security conference, held this week in Boston.

To mitigate this risk, Schmidt launched an initiative within AWS to radically reduce employees' access to data by 80%. This was a large number, he noted, and one he partly chose to raise eyebrows – and partly because of its effectiveness. Reducing data access by 10 or 20 percent wouldn't have had the same effect; an 80% cut forced investment in security tools.

"Reduction in human access to data is probably the single biggest lever we have as a company to reducing overall risk profile," he said. This "dramatically changed" its security posture and had the unexpected benefit of improving job satisfaction for engineers who disliked maintaining machines and doing the same daily tasks. Less data access prompted a shift to automation, which freed time to build projects they cared about and boosted recruitment and retention.

Employees' level of data access should be a key security concern for any company, but Schmidt also pointed out how cloud concerns often vary depending on the size and age of an organization. Startups, for example, are most interested in fast and secure growth. They want to know, "how do I build this quickly, inexpensively, and securely from the beginning?" he said. They're more willing to rapidly adopt new things than larger firms, with less retrofitting later.

Larger enterprises are different in the sense they can afford security teams and are more willing to customize, he explained. There's an acceleration curve here: The first system they deploy to the cloud may take a while, but from there they can quickly pick up the pace of adoption.

Middle-tier companies need the most direction to effectively achieve their cloud security goals, Schmidt continued. While they want to securely transition from on-prem systems to the cloud, they often lack resources and security engineers. "There's not a lot of IT staff, but they want to get rid of on-prem," he said. "They need prescriptive guidance on how to implement security."

On Building Secure Code
Schmidt's team does an application security review on every service AWS launches – no small feat considering new projects roll out daily. Application security is the place to enforce good security practices in alignment with service and design, he explained. The industry needs it.

Security pros who understand the problem of secure development realize it's better to get dev teams thinking about security and preventing crummy code than trying to unravel the mess they made afterward, he explained. AWS uses an internal automated code analysis platform in lieu of peer-to-peer code reviews, which involve security teams hunting code errors after the engineers had developed it. The code reviews were a frustrating process, he explained, as they required the engineers to learn all the errors at the same time, and then go back and correct them.

AWS' tool builds "natural peer feedback processes" into the software development life cycle, Schmidt said. It provides a code review while engineers are developing, so they view mistakes as they happen and receive immediate feedback. The result is a smoother dev process.

Security: Not Just for the CISO
As Schmidt put it in his morning keynote: "Security is everyone's job. It's not just the job of every security pro in this room today." At the end of each week, a group of AWS executives, including CEO Andy Jassy, sit down and review the week's security issues.

"That's his opportunity to reinforce to everyone that security is job zero," Schmidt said. What's more, the heads of each individual AWS service are responsible for that service's security. The AWS board is also involved in security, he added, with conversations at least every quarter.

But finding people to staff the security team is tough. Recruitment is the most challenging part of the CISO role for Schmidt, who joined AWS from the FBI in 2008. Right now, referrals are the most efficient means of recruitment. AWS employees are often the first-level filter for candidates. "They know if this person will fit in the team," he said. AWS has also been successful with military recruiting, which has brought skilled pros into its environment.

"There are not enough qualified security engineers out there," he said, pointing to a lack of university graduates. Modern curricula are outdated and needs to be updated with current technologies and methodologies, Schmidt added, and people should have the opportunity to learn security in the way they learn best if cybersecurity is going to fill the talent gap.

"People have different learning styles," he said. "Some excel in a university environment; some people improve by hands-on doing."

Related Content:

 

Kelly Sheridan is the Staff Editor at Dark Reading, where she focuses on cybersecurity news and analysis. She is a business technology journalist who previously reported for InformationWeek, where she covered Microsoft, and Insurance & Technology, where she covered financial ... View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
tdsan
50%
50%
tdsan,
User Rank: Ninja
6/30/2019 | 6:57:16 PM
AWS Code Scrubbing
AWS uses an internal automated code analysis platform in lieu of peer-to-peer code reviews, which involve security teams hunting code errors after the engineers had developed it. The code reviews were a frustrating process, he explained, as they required the engineers to learn all the errors at the same time, and then go back and correct them. AWS' tool builds "natural peer feedback processes" into the software development life cycle, Schmidt said. It provides a code review while engineers are developing, so they view mistakes as they happen and receive immediate feedback. The result is a smoother dev process.

This Agile scrum process is what organizations need (validate proper coding procedures), I wish there was an application that could check issues with improper code, syntax, logical design and layout.

Todd
peypochrj
50%
50%
peypochrj,
User Rank: Author
6/25/2019 | 6:39:36 PM
AWS CISO Talk
I agree that security is everyone's responsibility (not just the CISO) andthat humans remain the weakest link but i'm not sure I agree that the threat landscape has changed much in the past decade...that's a head scratcher
The Problem with Proprietary Testing: NSS Labs vs. CrowdStrike
Brian Monkman, Executive Director at NetSecOPEN,  7/19/2019
RDP Bug Takes New Approach to Host Compromise
Kelly Sheridan, Staff Editor, Dark Reading,  7/18/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
Building and Managing an IT Security Operations Program
As cyber threats grow, many organizations are building security operations centers (SOCs) to improve their defenses. In this Tech Digest you will learn tips on how to get the most out of a SOC in your organization - and what to do if you can't afford to build one.
Flash Poll
The State of IT Operations and Cybersecurity Operations
The State of IT Operations and Cybersecurity Operations
Your enterprise's cyber risk may depend upon the relationship between the IT team and the security team. Heres some insight on what's working and what isn't in the data center.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-2873
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...
CVE-2019-2874
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...
CVE-2019-2875
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...
CVE-2019-2876
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...
CVE-2019-2877
PUBLISHED: 2019-07-23
Vulnerability in the Oracle VM VirtualBox component of Oracle Virtualization (subcomponent: Core). Supported versions that are affected are Prior to 5.2.32 and prior to 6.0.10. Easily exploitable vulnerability allows low privileged attacker with logon to the infrastructure where Oracle VM VirtualBox...