Lars and Kabir Mathur, CEO of Leen, discuss the concept of unified APIs for security data, emphasizing the need for normalization and integration of various security tools.
Kabir explains how Leen differentiates itself by not only providing data connectors but also delivering data over an API, making it accessible for developers.
They explore the challenges of maintaining integrations in a rapidly changing security landscape, the importance of a security data fabric, and the evolving skill sets of security engineers.
Also touches on practical use cases for unified APIs and the technical stack behind Leen solutions.
Takeaways
In this conversation, Rotem Levi, a Cloud Security Architect, discusses the importance of proactive cloud security. He emphasizes the need for a balance between cost optimization and security, as well as the significance of good security practices in reducing cloud spend. Rotem also highlights the importance of having order in infrastructure and the role of tagging in achieving this. He recommends three key actions for improving cloud security: setting up budget alerts, implementing governance measures, and actively analyzing and responding to logs.
In this episode, Lars Kamp interviews Jonathan Rau, a distinguished engineer at Query, about Electric Eye, an open-source CSPM (cloud security posture management) tool.
Jonathan Rau, VP/Distinguished Engineer at Query, explains the process of normalizing security data and the challenges of working with different security tools and APIs. He also simplifies the concept of security data into three categories: structured, semi-structured, and unstructured.
Finally, he discusses benefits of unifying security data, and the Open Cyber Security Schema Framework (OCSF) which Query uses as their data model. OCSF provides a standardized data model for cybersecurity events and objects, allowing for easier integration and interoperability between different security tools. The conversation also touches on the use of graphs in security data analysis, based on Jonathan's previous experience at Lightspin.
Takeaways
Daniel Spangenberg, Staff Cloud Security Engineer at Lyft, is building an internal cloud security posture management (CSPM) service.
Daniel has developed a mental model that looks at cloud security in three components:
Daniel explains how he uses tools like Cloudquery and AWS Trusted Advisor to gather data and identify security issues. He also discusses the importance of resource coverage and how he leverages existing tools to extract data into a centralized view.
Daniel prioritizes issues based on their severity and assigns them to the respective service teams for resolution. Daniel highlights the importance of having a comprehensive asset inventory and using tools like Lyft's Cartography for graph traversal.
Daniel shares insights on tracking success, visualizing data, and the shortcomings of existing CSPM solutions. He advises approaching cloud security thinking like a developer, and fostering collaboration between security and engineering teams.
Takeaways
Mirco Kater, Information Security Officer at Gitpod, has taken a few startups from 0 to 1 when it comes to compliance and information security. Mirco has developed a five-step framework:
For start-ups, security and compliance programs provide access to markets. Mirco highlights the need for collaboration and communication with various departments within the organization.
He also discusses the selection of frameworks and tools based on the company's risk level and regulatory requirements. The goal is to enable the business while ensuring security and compliance.
Implementing a security compliance program requires budget allocation for salaries, tooling, auditors, and cyber insurance. Mirko also explains the difference between security and compliance, highlighting that compliance is about meeting specific requirements, while security focuses on protecting data and assets.
Takeaways
Pramod Gosavi is a former VMWare corporate development executive turned venture investor at 11.2 Capital. Pramod and Lars talk about the current state of cybersecurity and the hurdles for Chief Information Security Officers (CISOs) across the four main areas of cybersecurity: network, endpoint, cloud, and identity security.
Pramod makes the case for how CISOs need to think about digital transformation of their legacy toolchains, and how there is a need for a cybersecurity data platform (“data fabric”) to connect various security tools and facilitate the integration and analysis of data. It would help security engineers work more efficiently and improve their security posture.
At present, security vendors often have separate dashboards and don't share data, making it hard for organizations to get a full understanding of their security situation. A data platform would solve this problem by offering a centralized, automated solution.
Pramod also talks about platforms in cybersecurity. Many companies claim to be platforms when they are actually suites of features. A true platform supports third-party businesses and lets them build on top of it.
Pramod gives examples of true platforms like Salesforce, which supported various vendors and allowed third-party businesses to thrive. He also talks about the importance of "platformization" in the industry and how companies like Palo Alto Networks and CrowdStrike are adopting this strategy.
CloudQuery is a high-performance open-source ELT framework built for developers. CloudQuery extracts data from cloud APIs and loads it into databases, data lakes, or streaming platforms for further analysis.
With raw infrastructure data, CloudQuery users are building solutions for security, cost, and governance use cases by writing SQL queries. Querying raw infrastructure SQL provides more flexibility and coverage than an opinionated DevOps tool could provide.
In this episode, I chat with Yevgeny Pats, CEO and co-founder at CloudQuery. We cover the "why now?" for infrastructure data, and the change in mindset observed among infrastructure and security engineers and their shift to using data lakes.
Alex Chantavy is a Senior Software Engineer at Lyft and one of the maintainers of Cartography. Cartography is a Python-based tool that collects infrastructure assets and their relationships into a graph view.
Cartography is open-source and was developed in-house at Lyft to solve offensive security scenarios. Today, Cartography is also used at Lyft to solve other InfoSec use cases, like container vulnerability management.
Cartography is built on top of the Neo4j graph data platform. The power of the graph is that it facilitates the exploration of many-to-many relationships.
In this episode, Alex and I discuss the origins of Cartography, how the engineering team at Lyft uses Cartography data for remediation of security issues, and how the graph powers an automated issue management system.