Week 2 Session 1
Week 2 Session 1
2. Controls (technical, physical, procedural) based on policies are there to keep stupid/bad people
from doing stupid/bad things.
3. Security (cyber, physical, etc.) tells you whether you are successful (or not) in implementing 1 or
2.
The Rise of Packet Rate Attacks: When Core Routers Turn Evil
POLICY CONTROL SECURITY
• Competitive advantage
• Rapid innovation: bringing products to markets quickly
• Customer satisfaction and loyalty
• Rapid trouble resolution and responsiveness to input
• Capture market demand
• On-demand capacity to scale
POLICY CONTROL SECURITY
Problem
• Responsible for code scans, • Responsible for cloud-native • Overall responsibility for security
packaging building, image, and security controls, sometimes split
container scans. across IAM and network areas. • Direct responsibility for security
• Dev environments are usually the • Focus on application and account • Under pressure to provide access
most permissive so that they can security, using automation and without slowing down
focus on building code. infrastructure as code. operations.
• Visibility needs to extend beyond the firewalls inside the cloud to avoid
misconfigurations and reduce risks