AWS safety exec: You do not wish to win this database reputation contest

Interview If there was ever an space the place default passwords reign and fundamental safety hygiene is horrible, it is databases.
“Databases are onerous to handle, and folks have taken the straightforward path: given numerous folks admin privileges and hardcoded database credentials into their software program,” says Mark Ryland, a director in Amazon Internet Companies’ Workplace of the CISO.
Complexity is the enemy of safety, and, let’s face it, databases aren’t easy. It is an space that requires higher “training, higher expertise, and higher automation,” he advised The Register, in a dialog about database safety, which you’ll watch beneath.
Database directors aren’t the one ones in search of the straightforward button, nonetheless. Crooks seeking to break into databases are, too, and with regards to selecting a goal, they need the very best return on funding, so they are going to assault the vault with probably the most customers that is most probably to be poorly protected.
“Attackers are pragmatists,” Ryland mentioned. “The recognition of the database has extra to do with it than the database itself. It is virtually a reputation contest, on this case not a superb one, for many who need to do malicious exercise.”
There is no inherently insecure possibility, he added. Widespread open supply and business databases are protected — “if they’re correctly put in and configured and managed.” That is an enormous if, and one which organizations in all probability will not wish to take an opportunity with.
The underside line, for each managed databases and DIY choices, is protection in depth, in accordance with Ryland. “You actually wish to have a number of ranges of controls in case one degree fails.” ®