Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform

  Рет қаралды 159

SANS Cloud Security

SANS Cloud Security

Күн бұрын

In this talk, we will discuss the numerous ways attackers can steal data from Google Cloud Platform (GCP) resources with minimal chance of detection. It explores five different methods an attacker can use to exfiltrate data in the popular services: Google Cloud Storage, Cloud SQL and BigQuery. For each method we will describe the generated log events and what to look for to detect malicious behavior. We will finish with a summary of the key takeaways and next steps for attendees:
Data exfiltration from Google Cloud Platform (GCP) resources is a serious threat that can result in significant data breaches and other security incidents. Understanding the various methods of exfiltration and how to detect them is critical for effective incident response and security management.
GCP audit logs are an essential tool for detecting data exfiltration and other security incidents in the cloud environment. By analyzing the audit logs, security professionals can identify suspicious activities, detect potential breaches, and take appropriate action to prevent further damage.
To prevent data exfiltration in GCP resources, organizations must take a proactive approach to security. This includes implementing access controls, monitoring the audit logs for suspicious activities, and configuring alerts for potential security incidents. By following these best practices, organizations can reduce the risks of data exfiltration and better protect their sensitive data in the cloud.
SANS CloudSecNext Summit 2023
Beyond the Perimeter: Uncovering the Hidden Threat of Data Exfiltration in Google Cloud Platform
Speaker: Or Aspir
View upcoming Summits: www.sans.org/u/DuS

Пікірлер
Practical Security Monitoring and Response in Microsoft Azure
33:40
SANS Cloud Security
Рет қаралды 496
Detection and remediation playbook in GCP
32:34
SANS Cloud Security
Рет қаралды 150
отомстил?
00:56
История одного вокалиста
Рет қаралды 2,5 МЛН
An Unknown Ending💪
00:49
ISSEI / いっせい
Рет қаралды 19 МЛН
The Joker wanted to stand at the front, but unexpectedly was beaten up by Officer Rabbit
00:12
Google Data Center 360° Tour
8:29
Google Cloud Tech
Рет қаралды 5 МЛН
NEW Tesla Prototype LEAKED at WB Studios | This Design Is Weird
20:34
JWTs The Good, the Bad, and the Ugly Security Edition
46:25
SANS Cloud Security
Рет қаралды 375
Prevent Cloud Incidents from Becoming Cloud Breaches
1:00:28
SANS Cloud Security
Рет қаралды 555
Data Pipelines Explained
8:29
IBM Technology
Рет қаралды 152 М.
2024 Cloud Security Trends and Predictions
53:17
SANS Cloud Security
Рет қаралды 587
Fred Bret-Mounet: Eating Pasta and Not Building Fort Knox | Season 2 Ep9
58:18
отомстил?
00:56
История одного вокалиста
Рет қаралды 2,5 МЛН