SLIDE 1
cybersecurity & compliance automation platform delivered in - - PowerPoint PPT Presentation
cybersecurity & compliance automation platform delivered in - - PowerPoint PPT Presentation
cybersecurity & compliance automation platform delivered in software as a service model plug&play cybersecurity plug&play compliance Defenselayers company purpose Defenselayers is an innovative, global cybersecurity startup. We
SLIDE 2
SLIDE 3
Defenselayers’ response to market trends
Business is moving to a cloud. With growing cloud adoption new software development ways appeared: microservices and application containers. Advantages of cloud computing, however, come with a cost – cybersecurity challenges. At the same time it is more difficult to find experienced cybersecurity experts and they are more and more expensive. In 2020 cybersecurity talent gap is expected to reach 3,5 mln positions globally. This is where Defenselayers comes to the stage. By providing a platform which automates cybersecurity of microservices encapsulated in application containers we allow to solve problem of cybersecurity talent gap and reduce software development costs at the same time. Application containers market is quite young, but it grows rapidly and is expected to grow further. There are very few truly application containers native cybersecurity tools. Cybersecurity of application containers is recognized as one the most necessary solutions these days.
SLIDE 4
Source: CBInsights
Container security is recognized by CB Insights as the most necessary out of all cybersecurity industry trends.
Container security
SLIDE 5
Defenselayers secure container vision
Cybersecurity standards & best practices automatically implemented Compliance regulations automatically implemented Cybersecurity and compliance layers constantly kept updated
PLUG&PLAY CYBERSECURITY PLUG&PLAY COMPLIANCE
Increased level of security Shorter time-to-market Lower software development costs Faster software development cycle Savings on cybersecurity and compliance resources Savings on cybersecurity tools plug&play cybersecurity plug&play compliance
To reduce complex and expensive cybersecurity services to plug&play commodity….
SLIDE 6
How we do it?
Defenselayers produce OCI compliant application containers with pre-encapsulated and pre-hardened standard technologies (operating systems, databases, application servers, interpreters etc.). We plan to develop containers with hundreds of different technologies. Developer encapsulates his microservice into Defenselayers container (note that no change to microservice is required). Central Defenselayers Platform monitors such container and constantly updates it when new vulnerabilities appear. Customers pay periodic fee for application container monitoring and updating security layers of the container.
SLIDE 7
Defenselayers provides your microservices with out-of-the-box secure containerized technology stack just by one click.
Secure Technology Stack
SLIDE 8
Defenselayers – General Roadmap
Stage 1
- hardening and settings done to meet compliance regulations
- assure that all components put into container image before it leaves
- ur “factory” could be trusted
- 17 technologies pre-encapsulated in Defenselayers Secure Containers
Stage 2
- more security tests
- n-line container monitoring
- Further technologies encapsulated
- Defenselayers e-store
plug&play cybersecurity plug&play compliance
SLIDE 9
Stage 1 - Defenselayers Secure Container preparation process
Executable binaries hardening Recompilation of main components Removal of insecure modules Removal of insecure functionality Removal of insecure components Removal of unused components Secure configuration of included components Shell Network services Daemons Other component Secure configuration Removal of default accounts Secure application accounts Secure environment variables settings File system access rights hardening More strict access rights UMASK Vulnerability scanning Malware scanning Integrity protection of every binary and configuration component Complete manifest of all components inside container image
plug&play cybersecurity plug&play compliance
SLIDE 10
Stage 1 – How Defenselayers Secure Container addresses compliance
GDPR Secure by default, out-of-the-box = privacy by default privacy by design (Art. 25) Security testing and vulnerability management (Art 32 1 c-d) Incident management requires integrity control (Art. 33, 34) NIS Directive Incident management and reporting requires integrity control (Art. 14) Vulnerability & patch management (Art. 14, Art. 16) PCI DSS Security/hardening requirements for CardHolder Data Environment (CDE) (Req 3, 4) Integrity control (Req 6) Vulnerability scanning (Req 5, Req 6, Req 11) Malware scanning (Req 5) Patch management (Req 11) Secure TLS and other encryption protocols/algorithms (Req 3, Req 4) System hardening / development of secure networks, systems and applications (Req 2, Req 6) Financial sector regulations Risk based hardening approach Operation Risk value reduction Vulnerability scanning Malware scanning Patch management
SLIDE 11
Defenselayers Secure Containers – technology encapsulation roadmap Ready To Use Ready by the end of 2020
- Alpine
- Nginx
- Apache
- SFTP/SSH
- Python
- Go
- Redis
- Django
- Flask
- Postgress
- Nodejs
- PHP
- Java
- MongoDB
- MySQL
- Pytest
- Gunicorn
- RabbitMQ
SLIDE 12
Stage 1 – Scope of Defenselayers Services
Unlimited license for Defenselayers Secure Containers Scope of services Constant monitoring of Defenselayers Secure Containers cybersecurity status Providing customers with information about new vulnerabilities Providing customers with new versions of Defenselayers Secure Containers free from vulnerabilities
plug&play cybersecurity plug&play compliance
SLIDE 13