Using security patterns for securing cloud environments

Wednesday
 
19
 
March
, 
11:20 am
 - 
12:00 pm

Speakers

Ken Fitzpatrick

Ken Fitzpatrick

Director
Patterned Security Consulting
Deepayan Chanda

Deepayan Chanda

Board of Advisor
Patterned Security Consulting

Synopsis

Ever wondered how to write a security pattern for cloud?

We'll begin by exploring the concept and purpose of security patterns. While there are different definitions exist in the industry and from cloud providers (AWS, Azure, GCP) we'll focus on how to navigate and identify the most practical and meaningful ones.

Next, we'll delve into techniques for writing and using effective security patterns, highlighting best practices and common pitfalls to avoid.

To illustrate these concepts, we'll present a real-world example of security by design using patterns in the context of protecting workloads hosted in AWS (as the example cloud provider).

We’ll showcase an example security pattern for a specific AWS service, which can be adaptable to any cloud provider.

We'll then examine how security patterns can enhance overall security and why they offer a more practical approach compared to relying solely on security standards.

You'll discover how security patterns are integrated into "security by design" for both architecture and assurance, and how they enable more efficient risk assessment. We'll contrast this with the challenges of risk assessment using standards alone, demonstrating why patterns offer a more effective measure.

Acknowledgement of Country

We acknowledge the traditional owners and custodians of country throughout Australia and acknowledge their continuing connection to land, waters and community. We pay our respects to the people, the cultures and the elders past, present and emerging.