logo

Attacking and Defending the Microsoft Cloud (Office 365 & Azure AD) 

Conference:  BlackHat USA 2019

2019-08-07

Summary

The presentation focuses on attacking and defending the Microsoft Cloud (Office 365 & Azure AD) and explores the most common attacks against the Cloud and describes effective defenses and mitigation.
  • The allure of the Cloud is indisputable and organizations are moving into the cloud at a rapid pace.
  • The presentation focuses on the Microsoft Cloud (Office 365 & Azure AD) and explores the most common attacks against the Cloud and describes effective defenses and mitigation.
  • Key items covered include attacks against the Cloud, account compromise and token theft, methods to detect attack activity, cloud identity firewall, securing cloud infrastructure against attacks, and secure cloud administration.
  • An anecdote is given about a fictional company, Acme, and how they moved to the cloud and the potential security risks they face.
The presentation introduces a fictional company, Acme, which is the largest manufacturer and distributor of anvils in the world. Acme is considering moving their business to the cloud, but they are unsure if it is the right thing to do or how to get started. The presentation discusses the potential security risks that Acme and other companies face when moving to the cloud.

Abstract

The allure of the "Cloud" is indisputable. Organizations are moving into the cloud at a rapid pace. Even companies that have said no to the Cloud in the past have started migrating services and resources. The Cloud is a new paradigm and the rapid update pace makes it difficult to keep up, especially when it comes to security. This presentation focuses on the Microsoft Cloud (Office 365 & Azure AD) and explores the most common attacks against the Cloud and describes effective defenses and mitigation. While the content is focused on the Microsoft Cloud, some of the attack and defense topics are applicable to other cloud providers and are noted where applicable. Key items covered: Attacks against the Cloud Account compromise and token theft Methods to detect attack activity Cloud identity firewall Securing cloud infrastructure against attacks Secure cloud administration

Materials:

Tags: