Image Title

Search Results for Avi Boru:

Sandy Bird, Sonrai Security & Avi Boru, World Fuel Services | AWS Startup Showcase


 

(upbeat music) >> Welcome to today's session of theCUBE's presentation of the AWS Startup Showcase, The Next Big Thing in AI, Security, & Life Sciences, and in this segment, we feature Sonrai security, of course for the security track I'm your host, Dave Vellante, and today we're joined by Sandy Bird, who's the co-founder and chief technology officer of Sonrai, and Avi Boru, who's the director of cloud engineering at World Fuel Services, and in this discussion, we're going to talk about 22 to two data centers, how World Fuel Services and Sonrai Security actually made it happen securely. Folks, welcome to theCUBE, come on in. >> Thank you. >> So we hear consistent themes from chief information security officers, that many if not most enterprises they struggle today with cloud security, there's confusion with various tools and depressing lack of available talent to attack this problem. So Sandy, I want to start with you, we always love to ask co-founders, why did you start your company? Take us back to that decision. >> Yeah, I think looking at Sonrai Security was interesting in that, it was a time to start over, it was a time to build a native in the cloud, as opposed to having a data center, and be able to use, you know, a vendor of infrastructure, be able to use the latest and greatest technology and really change the way people secure their workloads, what was interesting, you know, when we started the company, I believe that the world was in a more mature space probably in cloud than they were at the time when we were starting it, in that we were really focused around, if we could understand all of the rights and entitlements to data, we could understand data movement, we'd had hope in protecting the data and arriving in cloud, we realized that the maturity of the companies building in cloud, we're not quite there yet, they were really struggling with, you know, the identities models in the cloud, how to actually secure, you know, workloads, server less functions that are ephemeral these types of things, and even just sometimes basic governance problems, and the technology we had built was great at understanding all of the ways that data could be accessed, and we were able to expand that into all the resources of the cloud and it's an exciting space to be in, and it's also, I truly believe we'll be able to actually make cloud environments more secure than what we were doing in enterprise, because again for the first time ever you have full inventory, you have the ability to make controls that apply to the entire infrastructure, it's really an exciting time. >> I mean, I've said many times I feel like security is a do over and the fact that you're coming at it as a data problem and bringing in the cloud that intersection, I think is actually quite exciting. So Avi let's bring you into the conversation, you know, obviously we've seen cloud exploding it's continuing to be a staple of digital business transformations and acceleration especially around identity, so what's your point of view on cloud security, what's different and how does your company approach it? >> Sure, thank you for having me Dave, and just to give you a bit of World Fuel Services, World Fuel Services is a public company, and it's based out of Miami, and we are ranked 91 in the fortune 500 list, so we are spread all across the globe, and as part of our transformation to distress our business, we took over a big challenge to migrate all our global infrastructure from 22 data centers to AWS, that was a massive challenge for us, and we are downright now to 20 data centers, we only have two more to go, and we did this in the last two years, and that was really good for us, but as we've been doing this migration, there was also a strong need for us to build a strong security foundation, because going into the cloud as much as capabilities it gives us to innovate, it also gives us a lot of challenges to deal with from security standpoint, and as part of building the security foundation, we had to tackle some key challenges, one was how do we build our cloud security operating model and how do we up skill our people, the talent that you've been binding it out, and how do we make security a way of working in this new world, and more than choosing a solution we needed a really strong security partner who can help us guide in this journey, help us build the foundations and take us further and mature us in this, and that's where it was really interesting for us to partner with Sonrai, who helped us along the way, develop a foundation and now helping us mature our security platform. >> Avi, what were the technology underpinnings, that enticed you to work with Sonrai? >> Sonrai has lot of unique capabilities but I'll take it out on two key points, right? One, Sonrai has a cloud security posture management which is different from other platforms that are out there because they give you capability for a lot of out of the box frameworks and controls, but in addition to that, every organization has need to build unique specific frameworks, specific controls, they give you that capability, which is massive for enterprises, and the second key thing is, if you look at AWS, it has more than 200 services and every service has its unique capability but one key component they use across all the services, is Identity and Access Management, IAM and Sonrai has a unique perspective of using IAM to track risks and identify the interactions between user and machine identities which was really exciting and new for us, and we felt that was a really good foundation and stepping point to use Sonrai. >> All right, Sandy, we definitely saw the need for a better identity explode, in conjunction with the cloud migrations during the pandemic, it was sort of building and building and then it was accelerated, maybe talk a little bit about how you approach this, and specifically talk about your identity analytics and the graph solution that you guys talk about. >> Yeah, I've been a fan of graph solutions for many years, one of the great benefits in this particular space with identity is that, the cloud models for identity are fairly complex and quite different between AWS, Azure and GCP, however, the way that entitlements work, some identity is granted in entitlement, and that entitlement gives them access to do something, sometimes that's something is to assume another identity, and then do something on that identities behalf, and when you're actually trying to secure these clouds this jumping of identities, which happens a lot in the AWS model, or inheritance which happens a lot in the Azure model where you're given access at one level of the tree and you automatically gain access to things below that if you have that entitlement, those models inside of graph allow us to understand exactly how any given identity when we talk about identity we always think of people, but it's not, of course as you said, sometimes it's a machine, sometimes it's a cloud service, it could be many different things, how does every single one of those identities get access to that given resource? And it's not always as clear as, okay, well, here are the direct identities that can access this resource, it may only be able to be accessed with a single key, but who has access to the key, and what has access to the key, and what's the policy on that key, and if that's set too widely can other maybe nefarious actors get access to that key, and by using the graph, we can tie that whole model together to understand the entire list, of what gets access, I think that's actually what surprises a lot of the identity governance and data governance teams that are not in cloud, you know, when enterprise was very intentional, you configured the database to use the identity provider and the rules that you wanted it to use, and that's all that ever got access to that database. In cloud, there are a lot of configuration knobs and things and depending on how you turn them, you could open up a lot of identities to get access to whatever that resource is, often it's data, but it could be a network, it could be many things. So, the graph allows us to tie all that together, the second part of it is, it really allows us to see, we call them effective permissions, what the effective permission of that identity is, the clouds have done this phenomenal thing in using identities as a control mechanism just like in firewall, like an identity firewall, where they can take permissions away from things based on sets of conditions, so one of the great ways, let's say you didn't want to have any data stored deployed without encryption, you could write a policy at the top of your cloud, that says, anytime a data stores is deployed, if encryption is not there, deny that function. And so what happens is, is you can create this very protective environment using identity controls, but the problem is when you actually go to evaluate your cloud for risk, you may find a scenario where an identity has access as an example, to do something like create an internet gateway, or create a public endpoint, but there's this policy somewhere else, that's taking that away, and you don't want thousands of alerts because of that, you want to actually understand the model and say, look if we understand that this policy is mitigating your risk, then don't show the alert in the first place. And it really helps by putting it in a graph, because we can actually see all of these interconnections, we can see how they're interrelated, and determine the exact effective permissions of any identity and what risks that may have. >> So Avi, I mean, Sandy is really getting to the heart of sort of operationalizing you security in the cloud, and we looked at the compelling aspect of the cloud, and one of them anyway is scale, but people tell us to really take advantage of the cloud, they have to evolve that operating model maybe completely change the operating model, to really take advantage of scale, so my question is how do you operationalize your security practices, what should people think about, in terms of the time it takes to build in automations and bots for things like continuous compliance what can you share in terms of best practice? >> So traditional ways of operating if you look at it is, you identify a security risk, and a ticket is created and teams starts mitigating them. But with so many cloud services and with many solutions, the team start building in the cloud, it becomes too much of an overhead for teams to mitigate all these security risks that keep coming into the backlog, so as we partner with Sonrai in building a foundation, the way we tried to approach it is differently, we said why don't we build this using automatic recommendations, if we know what are the security risks, that we should not be creating in our environment and be noncompliant, how can we mitigate them? And with Sonrai and AWS API capabilities, it's not that hard for us to be a lot of intimidation buds because I didn't find risks, 'cause they have been taken care by Sonrai, the only aspect we need to take care is, how do we mitigate that? So that's the part we chose in building, cloud security operating model, is modeling more than an automated imitations, but as part building that there is always, where everything cannot be remediated automatically, and for these kinds of scenarios, we built a workflow where it still gets funneled to teams, so they can prioritize in their backlog, but other key thing that we did as part of operationalizing is, teams need to use Sonrai as their way of working, teams need to know what and why they should be using Sonrai. So we conduct a lot of training and onboarding and working sessions for teams, so they understand how we use Sonrai, how to consume the data coming out of Sonrai, so they can proactively start acting on how to stay compliant, but yeah, it's been an amazing experience building our foundation though. >> Sandy, I wonder if we can come back to, talking about comparisons with the traditional prevailing security models, I mean, we entering this API economy, as I said before, cloud is a staple of digital business, but you know people have been doing on-prem security for decades, you know, data loss prevention is an entire sub-industry, so what's different about doing it in the cloud, how should we think about that, in terms of whether you know, what responsibilities we have, the technology, what's your perspective on that? >> There's at least five questions in there Dave, so we'll. >> Pick your favorite. >> Yeah, you know, to feed off of what Avi was talking about, you know, he said many times, you know, teams need to solve these issues, teams need to see the issues they're creating, and it's interesting as we move to cloud, we decentralize some of these security functions, and that's actually an important part of the Sonrai solution and how you build a cloud security operating model, there's a set of findings, we'll call them, maybe there are security findings, maybe they're informational findings, that are a fairly low risk, and should be dealt with by the individual teams themselves, but that same team, you know, maybe isn't the person that can sign off on the risk if it's high enough, and if it's not then it needs to be escalated to the next level up to have that risk signed off on. A lot of times in large enterprise for workloads, that was done using unfortunately, you know tickets and systems and, you know, humans actually, you know, filling out some form of a checklist, saying, yes I met this, no I didn't, and we can automate huge numbers of those tests, including distributing them to the teams for the teams to solve themselves, and if they do their job right, there's not even the need for the central security body necessarily to know about the issues because they got solved, but when they don't get solved, that's when rather, you know, escalation to Boston automation or escalating to a centralized team starts to make sense, you kind of said a lot about DLP there as you were doing in cloud and just data security in general, and I do think, you know, cloud has given us this interesting opportunity, that's really upset data security in the old way on its head, you know, we used to do data security by putting agents on systems, or sometimes it was a proxy in front of it but either way that doesn't work well in cloud, when you're consuming platform as a service, you know, Amazon is not going to let you put an agent on their database that they're provisioning for you, and, you know, if you put in your own proxy in front of it you probably just messed up the elastic scalability that was built into the whole thing to begin with. So we needed a different way to look at this, however, we also took away a couple of things, in cloud the application teams themselves generally use fit for purpose data stores, they use the data store that's the best for the workload they're doing, our own workload has many data stores under the covers, it's not one data store, and so because of that, this kind of, you know, the old world of there being a data security team or you know, database optimization team, that you know optimize the database workloads, actually gets distributed as well all back to those teams, and so, we've gained kind of this, you know, fit for purpose smaller sets of data stores that are being used all over, and on top of that, the cloud vendors in many cases have done great things to enable monitoring, you know, part of the reason we were putting agents on database servers, is because the Oracle admin said I can't turn logging on, I don't have a big enough system to do it, it's going to crash the system, well in cloud parts of that go away, you can scale the systems up, you can enable loggings, now you can get that rich data that you wanted when you were an enterprise, and so, you know Sonrai is really kind of taken that model and said, look we can give you the visibility around data movement, we can give you the visibility around all of the entitlements to that data, we can understand, is your data at risk? And then we can profile all that for anomalies, and say, you know, it's kind of odd that the workload that normally connects into this through this automated fashion is now using its access key from a different location, that doesn't make any sense, why is that happening? And so you get kind of strong anomaly detection as well as the governance. So, you know, data security and cloud, if we kind of fast forward a few years, will look very different than it does today, I still believe some of the teams are not quite there yet in cloud, you know, they're still struggling with some of these identity problems we talked about, they still struggle some of them with CSBM problems, and so we have to solve those first obviously before we get to the true data security. But it's interesting that cloud has enabled us with such rich tooling and APIs to actually do it better than what we've done on enterprise. >> A lot of really powerful concepts in there, thank you Sandy. I mean, this notion of decentralizing security functions reminds me when Vogels describes this hyper decentralized distributed system that Amazon is building, and it is clearly a theme, you know, maybe it's bromide, but people talk about shifting left, designing security in, and it's important, not just bolting it on as an afterthought, and so, maybe this next question sort of really relates to the theme of this event, which is all about scale, here's the question Sandy, thinking about your contribution to the future of cloud, obviously you start a company, you want to grow that company, you want to serve customers and grow your revenues et cetera. But what's your defining contribution to the future of cloud scale? >> Look, we want to enable companies to scale faster, we want them to be able to put more workloads in cloud using, you know, the right set of security controls to keep those workloads safe, I know we can actually do this in a way where, you know, we talk about defense in depth for years, right? And usually in enterprise that meant many levels of networks before you got access, now we need to do defense in depth in terms of, you know, actually variety of controls, we can't throw the network control away, it still has to be there, we need an identity control, and it will be the primary control for what we do in cloud, we need a data lock, you know, rather that's through an encryption key policy or whatever it is, so we have multiple different layers of defense in depth, we can use in cloud today, and so it will be a much more secure environment than it was in the future, but we have to, again, so my contribution is hopefully I can help everybody get to that level, because right now we still see way too many breaches with very simple configuration problems that ended up exposing data unintentionally, and that's worrisome. >> You know, it's funny, a lot of people maybe can't relate to that defense in depth, I mean, obviously security people can, but we as individuals who now rely so much on our mobile phones, and things like SMS, and then you start to build in, non SMS, you know, base two factor authentication and you start to build your own personal layers, it's sort of a microcosm of the complexity that you have to think about in the enterprise, but in having tools to automate is critical, and expertise obviously, so let's wrap. Avi give us your final thoughts and key takeaways on building a world-class cloud security. >> I guess the key take of this would be, you know, to choose the right partner, it's not just the solution, another key takeaway is automate your way, because with security in the cloud is different than traditionally how do you do it, and the only fastest way to move is automate yourself away out of it and rely on talent, rely on a lot of young talent that's coming in and all the tools like Sonrai AWS are making it easier to operate in the cloud, so bring up the young talent and up skill the talent and leverage on these tools to be more secure on the cloud. >> Yeah, use automation to solve the big problem of, you know, that talent gap, there is not enough of it out there, and the adversaries they're well-equipped and quite capable. Okay Sandy, please give us your last word. >> Look again, I think a cloud is going to get us to a point where we are more secure than we were on enterprise, we have all of the right tools and controls to do it, we can decentralize the security and make it better, again, I think if anything just to encourage people to really look at a cloud security governance model, right? You can't do this ad hoc, trying to whack-a-mole small issues as they come up, you build it in as an operating model, you automate it and you deal with the exceptions. >> Yeah, I mean, you're very optimistic and I think is for good reason, I just remembered listening to Steven Schmidt a couple of years ago at reinforce, basically saying, look, we feel pretty optimistic about solving this problem, whereas, I have to say every year I look back in the enterprise and on-prem and I know it's getting worse, and so, keep up the good work gents, I really appreciate the time on theCUBE today, thank you. >> Thank you. >> Thank you. >> And thank you for watching theCUBE presentation of the AWS Startup Showcase, The Next Big Thing in AI, Security & Life Sciences. I'm Dave Vellante. (upbeat music)

Published Date : Jun 24 2021

SUMMARY :

and in this segment, we and depressing lack of available talent and be able to use, you know, and bringing in the and just to give you a bit and the second key thing is, and the graph solution and the rules that you wanted it to use, So that's the part we chose in building, so we'll. and said, look we can give you you know, maybe it's bromide, we need a data lock, you know, and then you start to build in, and the only fastest way to and the adversaries they're to get us to a point and so, keep up the good work gents, of the AWS Startup Showcase,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

Steven SchmidtPERSON

0.99+

World Fuel ServicesORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

22 data centersQUANTITY

0.99+

Sandy BirdPERSON

0.99+

SandyPERSON

0.99+

20 data centersQUANTITY

0.99+

MiamiLOCATION

0.99+

SonraiORGANIZATION

0.99+

AWSORGANIZATION

0.99+

second partQUANTITY

0.99+

more than 200 servicesQUANTITY

0.99+

twoQUANTITY

0.99+

Avi BoruPERSON

0.99+

OracleORGANIZATION

0.99+

two key pointsQUANTITY

0.99+

oneQUANTITY

0.98+

one key componentQUANTITY

0.98+

todayDATE

0.98+

single keyQUANTITY

0.98+

first timeQUANTITY

0.97+

two data centersQUANTITY

0.97+

AviORGANIZATION

0.97+

Sonrai SecurityORGANIZATION

0.97+

decadesQUANTITY

0.97+

OneQUANTITY

0.97+

theCUBEORGANIZATION

0.96+

pandemicEVENT

0.95+

91QUANTITY

0.94+

firstQUANTITY

0.93+

SonraiTITLE

0.92+

Sonrai securityTITLE

0.92+

IAMTITLE

0.92+

one levelQUANTITY

0.91+

22QUANTITY

0.91+

every serviceQUANTITY

0.9+

Sonrai AWSORGANIZATION

0.89+

second key thingQUANTITY

0.88+

BostonLOCATION

0.88+

AviPERSON

0.87+

many yearsQUANTITY

0.85+

first placeQUANTITY

0.84+

a couple of years agoDATE

0.83+

last two yearsDATE

0.83+

AWS Startup ShowcaseEVENT

0.82+

two factorQUANTITY

0.82+

Startup ShowcaseEVENT

0.82+

AzureTITLE

0.78+

thousands ofQUANTITY

0.76+

SciencesEVENT

0.74+

every organizationQUANTITY

0.73+

fortuneQUANTITY

0.72+