SlideShare ist ein Scribd-Unternehmen logo
1 von 30
TOP 10 AWS
SECURITY & COMPLIANCE
BEST PRACTICES
• Faisal Jawaid
Dir of Product Management
Security & Compliance
• Ahmed Khan
AWS Partner Manager – Strategic Sales
Meet Our Speakers
Agenda
 How we selected TOP 10?
 Recent AWS breaches – Lesson learned
 TOP 10 AWS BEST PRACTICES
 Cloudnosys Security Platform for AWS
 Q& A
How we choose Top 10 Best Practice?
© 2017 - Cloudnosys | Security, Compliance, Cost.
• The Center for Internet Security is a non-profit entity that harnesses the power
of a global IT community to safeguard private and public organizations against
cyber threats.
• CIS AWS Benchmarks – 44 AWS Controls
• CIS provides prescriptive guidance for configuring security options for a subset
of Amazon Web Services with an emphasis on foundational, testable, and
architecture agnostic settings.
• CIS - OS hardening & AWS Configurations
Center for Internet Security – CIS Controls
© 2017 - Cloudnosys | Security, Compliance, Cost.
© 2017 - Cloudnosys | Security, Compliance, Cost.
AWS Misconfigurations = Breach!
Company AWS
Service @
Fault
Breach Details
S3 –Public,
IAM
4 Million exposed. SQL database dumps, code, access logs,
customer billings address and phone numbers by BroadSoft. (TPRM)
IAM, SG,
MFA
Administrative consoles of AWS were not password protected, for
Aviva and Gemalto, leading hackers to mine Bit Coin on their EC2
instances.
S3 -Public,
IAM
Viacom AWS Misconfiguration exposes Entire IT Infrastructure,
including passwords, access and secret keys for their corporate AWS
account.
S3, MFA,
IAM
Dow Jones AWS misconfigurations left sensitive customer financial
data exposed.
S3 –Public,
IAM
Accenture AWS misconfiguration exposes 40,000 plaintext
passwords. Verizon AWS exposed via Third Party (TPRM)
● Cannot humanly scan thousands of
Configurations
● Need Automation & New tooling
● Implement a Third Party Risk Management
program for the cloud that includes contract
language for 44 CIS Controls.
Missing Link in AWS Cloud Security
© 2017 - Cloudnosys | Security, Compliance, Cost.
Cloud Security *IS* now a
Shared Responsibility
• Developers now have the Power to
create and change infrastructure
• Cloud Security does not stop at Log analysis
OWASP (Pen Testing), nor OS Hardening
• Compliance is very costly - Need automation
© 2017 - Cloudnosys | Security, Compliance, Cost.
Security is Shared Responsibility
YOU
© 2017 - Cloudnosys | Security, Compliance, Cost.
Sacred Top 10 AWS Best Practices
• Faisal Jawaid
Dir of Product Management
Security & Compliance
© 2017 - Cloudnosys | Security, Compliance, Cost.
#1 Enable CloudTrail
AWS CloudTrail is a service that enables governance,
compliance, operational auditing, and risk auditing of your
AWS account.
CloudTrail provides event history of your AWS account
activity, including actions taken through the AWS
Management Console, AWS SDKs, command line tools, and
other AWS services.
• Enable and log to one region.
• Enable Encryption.
5% of Customers know and have enabled CloudTrail.
© 2017 - Cloudnosys | Security, Compliance, Cost.
#2 Disable Root API Access and Secret Keys
An API key are credentials passed in by computer programs
calling an application programming interface (API) to identify the
calling program, its developer, or its user to the Web site.
• The “Root” account has access to everything! Not
restricted.
• For Administrative Tasks, create users with Admin rights.
• Update billing and contact information
that would be required to recover the account.
1 in 3 customers have root API access keys enabled!
© 2017 - Cloudnosys | Security, Compliance, Cost.
#3 Enable Multi Factor Authentication
MFA is an extra layer of security that requires not only a
password and username but also something that only, and only,
that user has on them.
• MFA is available to all IAM users,
including the root account.
• MFA options are Token Based and Text
Message – SMS based.
• Token based options include hardware
Devices, and virtual software options,
such as Google Authenticator, etc.
© 2017 - Cloudnosys | Security, Compliance, Cost.
#4 Review permissions, strengthen access.
AWS Identity and Access Management (IAM) enables you
to securely control access to AWS services and resources
for your users. Using IAM, you can create and manage AWS
users and groups, and use permissions to allow and deny
their access to AWS resources.
• Review IAM policies on Users, Groups and Roles.
Does your user really need access to all of these services?
• Do your Third Party Applications need all of these
permissions?
• How many people have unrestricted access?
• Use the IAM policy generator and policy simulator for assistance.
© 2017 - Cloudnosys | Security, Compliance, Cost.
#5 Use IAM Roles
An IAM Role is an IAM entity that defines a set of permissions
for making AWS service requests. IAM roles are not associated
with a specific user or group. Instead, trusted entities assume
roles, such as IAM users, applications, or AWS services such as
EC2.
• Diminished attack surface area
• A Role does not have credentials
(password or keys) associated with it.
• Give access, revoke access, when done.
• Delegate access to users, applications or services.
© 2017 - Cloudnosys | Security, Compliance, Cost.
#6 Mitigate DDOS on your Assets
AWS Shield is a managed Distributed Denial of Service (DDoS)
protection service that safeguards web applications running on
AWS. AWS Shield provides always-on detection and automatic
inline mitigations that minimize application downtime and latency,
so there is no need to engage AWS Support to benefit from DDoS
protection.
Leverage Services for Advanced Protection:
• Elastic Load Balancer (ELB)
• AutoScaling
• Amazon CloudFront
• Amazon Route 53
© 2017 - Cloudnosys | Security, Compliance, Cost.
#7 Rotate Keys Regularly (API and Encryption)
Cryptographic best practices discourage extensive reuse of encryption
keys.
API Access Keys are regularly uploaded to Code versioning systems
such as Github.
• Anyone who has your access key has the same level
of access to your AWS resources that you do.
• IAM users should have keys rotated
every 90 days minimum.
• Enable automatic key rotation for an existing
Customer Master Key (CMK).
© 2017 - Cloudnosys | Security, Compliance, Cost.
#8 Use the Simple Token Service for Vendors
The AWS Security Token Service (STS) is a web service that
enables you to request temporary, limited-privilege credentials for
AWS Identity and Access Management (IAM) users or for users
that you authenticate (federated users).
• Can be used in place of privileged
IAM user Access Keys
• Temporary credentials
• Allows for 3rd parties such as
Cloudnosys to access your
AWS accounts more securely (TPRM!)
© 2017 - Cloudnosys | Security, Compliance, Cost.
#9 Secure your S3 buckets.
Amazon S3 is object storage built to store and retrieve any amount of data
from anywhere – web sites and mobile apps, corporate applications, and
data from IoT sensors or devices.
• Check your Bucket Access Control Lists regularly
• Watch for all grantees, including Authenticated Users
• Open S3 buckets a favorite for trolling for API Access Keys
© 2017 - Cloudnosys | Security, Compliance, Cost.
#10 Don’t leave the front door open
A Security Group acts as a virtual firewall for your instance
to control inbound and outbound traffic. Each instance in
a subnet in your VPC could be assigned to a different set
of security groups.
• Open VPC’s affects:
Amazon Elastic Load Balancing
Amazon RDS
Amazon ElastiCache
Amazon RedShift
• Monitor Security Groups regularly
© 2017 - Cloudnosys | Security, Compliance, Cost.
What Next?
• Knowing Top 10 or CIS-44, or 150 control is
not enough
• Writing SOPs and Policies are not enough
• Automation is the new “norm” which drives
enforcement and accountability.
© 2017 - Cloudnosys | Security, Compliance, Cost.
Introducing…
CLOUDNOSYS
AWS SECURITY & COMPLIANCE
PLATFORM
Cloudnosys Security Platform
CloudEye Continuously Secure your cloud services and automate
compliance. Over 150+ Cloudnosys best practice rules track and monitor
your AWS services for security and compliance violations. Dashboard and
reports keep you fully informed of any Risks. – Agentless!
• Continuous Security & Compliance Scanning
• Alert on Vulnerabilities
• Audit Reports on Security and Compliance
• Fast Remediation
• Supports PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA
mandates
© 2017 - Cloudnosys | Security, Compliance, Cost.
Security and Compliance
Dashboards shows, alerts,
violations and how to remediate
these quickly to mitigate risks.
This is generated on the fly after
scanning for all Cloud Services and
Availability Zones.
© 2017 - Cloudnosys | Security, Compliance, Cost.
Dashboards:
Compliance and Security
Reporting: Compliance and Security
Security and Compliance reports shows, alerts, violations and how to
remediate these quickly to avoid any Cyber attacks. This is generated on the
fly after scanning all Cloud Services
© 2017 - Cloudnosys | Security, Compliance, Cost.
How It Works
An AWS native cloud solution that automates key cloud security processes and enables consistent
enforcement of security policies, best practices and compliance requirements across an
organization’s AWS cloud infrastructure.
© 2017 - Cloudnosys | Security, Compliance, Cost.
© 2017 - Cloudnosys | Security, Compliance, Cost.
Sample Cost Savings Report
© 2017 - Cloudnosys | Enterprise Cloud Diagnostics and Remediation.
Cost savings reports
are calculated in
seconds after user
set some schedules
to turn off some
machines on a
schedule.
Summary: What we learned today?
• Cloud Security has Shared Responsibility.
• Automation is key to your enterprise success
• Third Party Risk Management – AWS CIS 44 Rule Enforcement
• Make DevOps accountable for security through automation – CI/CD
• Measure your progress through KPIs via Automation
• Learn and enforce AWS CIS-44 Controls for starters
© 2017 - Cloudnosys | Security, Compliance, Cost.
Q & A - ANY QUESTIONS?
Type in your questions in chat box now…
Try Cloudnosys
For 14 Days Free
Start monitoring,
optimizing and securing
your AWS.
No Limits evaluation.
© 2017 - Cloudnosys | Security, Compliance, Cost.
Meet us at AWS Invent: info@Cloudnosys.com

Weitere ähnliche Inhalte

Was ist angesagt?

63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
Kyle Watson
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
Bryan Len
 

Was ist angesagt? (19)

Guide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in ChinaGuide to Cybersecurity Compliance in China
Guide to Cybersecurity Compliance in China
 
Guide to CASB Use Cases
Guide to CASB Use CasesGuide to CASB Use Cases
Guide to CASB Use Cases
 
Managing Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your OrganizationManaging Cloud Security Risks in Your Organization
Managing Cloud Security Risks in Your Organization
 
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment modeCloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
Cloud security, Cloud security Access broker, CSAB's 4 pillar, deployment mode
 
63 Requirements for CASB
63 Requirements for CASB63 Requirements for CASB
63 Requirements for CASB
 
Cloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls SecurityCloud Computing Security - Cloud Controls Security
Cloud Computing Security - Cloud Controls Security
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
Cloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and FrontiersCloud Security - Emerging Facets and Frontiers
Cloud Security - Emerging Facets and Frontiers
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Cloud Security Guide - Ref Architecture and Gov. Model
Cloud Security Guide -  Ref Architecture and Gov. ModelCloud Security Guide -  Ref Architecture and Gov. Model
Cloud Security Guide - Ref Architecture and Gov. Model
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKETCLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
CLOUD SECURITY IN INSURANCE INDUSTRY WITH RESPECT TO INDIAN MARKET
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
Maintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the CloudMaintaining Trust & Control of your Data in the Cloud
Maintaining Trust & Control of your Data in the Cloud
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
 
CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption? CASB — Your new best friend for safe cloud adoption?
CASB — Your new best friend for safe cloud adoption?
 
Cloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud SecurityCloud Security: What you need to know about IBM SmartCloud Security
Cloud Security: What you need to know about IBM SmartCloud Security
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 

Ähnlich wie Top 10 AWS Security and Compliance best practices

Ähnlich wie Top 10 AWS Security and Compliance best practices (20)

AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS
 
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentationJustin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 

Kürzlich hochgeladen

%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
masabamasaba
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
shinachiaurasa2
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Medical / Health Care (+971588192166) Mifepristone and Misoprostol tablets 200mg
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
masabamasaba
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
Health
 

Kürzlich hochgeladen (20)

%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa%in tembisa+277-882-255-28 abortion pills for sale in tembisa
%in tembisa+277-882-255-28 abortion pills for sale in tembisa
 
WSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go PlatformlessWSO2CON2024 - It's time to go Platformless
WSO2CON2024 - It's time to go Platformless
 
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
%+27788225528 love spells in Colorado Springs Psychic Readings, Attraction sp...
 
tonesoftg
tonesoftgtonesoftg
tonesoftg
 
VTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learnVTU technical seminar 8Th Sem on Scikit-learn
VTU technical seminar 8Th Sem on Scikit-learn
 
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
WSO2Con2024 - From Code To Cloud: Fast Track Your Cloud Native Journey with C...
 
The title is not connected to what is inside
The title is not connected to what is insideThe title is not connected to what is inside
The title is not connected to what is inside
 
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
Abortion Pill Prices Tembisa [(+27832195400*)] 🏥 Women's Abortion Clinic in T...
 
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park %in kempton park+277-882-255-28 abortion pills for sale in kempton park
%in kempton park+277-882-255-28 abortion pills for sale in kempton park
 
Define the academic and professional writing..pdf
Define the academic and professional writing..pdfDefine the academic and professional writing..pdf
Define the academic and professional writing..pdf
 
8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students8257 interfacing 2 in microprocessor for btech students
8257 interfacing 2 in microprocessor for btech students
 
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
%+27788225528 love spells in new york Psychic Readings, Attraction spells,Bri...
 
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
Crypto Cloud Review - How To Earn Up To $500 Per DAY Of Bitcoin 100% On AutoP...
 
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
Devoxx UK 2024 - Going serverless with Quarkus, GraalVM native images and AWS...
 
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
OpenChain - The Ramifications of ISO/IEC 5230 and ISO/IEC 18974 for Legal Pro...
 
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
%in Hazyview+277-882-255-28 abortion pills for sale in Hazyview
 
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
+971565801893>>SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHAB...
 
%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare%in Harare+277-882-255-28 abortion pills for sale in Harare
%in Harare+277-882-255-28 abortion pills for sale in Harare
 
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
Shapes for Sharing between Graph Data Spaces - and Epistemic Querying of RDF-...
 
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) SolutionIntroducing Microsoft’s new Enterprise Work Management (EWM) Solution
Introducing Microsoft’s new Enterprise Work Management (EWM) Solution
 

Top 10 AWS Security and Compliance best practices

  • 1. TOP 10 AWS SECURITY & COMPLIANCE BEST PRACTICES
  • 2. • Faisal Jawaid Dir of Product Management Security & Compliance • Ahmed Khan AWS Partner Manager – Strategic Sales Meet Our Speakers
  • 3. Agenda  How we selected TOP 10?  Recent AWS breaches – Lesson learned  TOP 10 AWS BEST PRACTICES  Cloudnosys Security Platform for AWS  Q& A
  • 4. How we choose Top 10 Best Practice? © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 5. • The Center for Internet Security is a non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. • CIS AWS Benchmarks – 44 AWS Controls • CIS provides prescriptive guidance for configuring security options for a subset of Amazon Web Services with an emphasis on foundational, testable, and architecture agnostic settings. • CIS - OS hardening & AWS Configurations Center for Internet Security – CIS Controls © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 6. © 2017 - Cloudnosys | Security, Compliance, Cost. AWS Misconfigurations = Breach! Company AWS Service @ Fault Breach Details S3 –Public, IAM 4 Million exposed. SQL database dumps, code, access logs, customer billings address and phone numbers by BroadSoft. (TPRM) IAM, SG, MFA Administrative consoles of AWS were not password protected, for Aviva and Gemalto, leading hackers to mine Bit Coin on their EC2 instances. S3 -Public, IAM Viacom AWS Misconfiguration exposes Entire IT Infrastructure, including passwords, access and secret keys for their corporate AWS account. S3, MFA, IAM Dow Jones AWS misconfigurations left sensitive customer financial data exposed. S3 –Public, IAM Accenture AWS misconfiguration exposes 40,000 plaintext passwords. Verizon AWS exposed via Third Party (TPRM)
  • 7. ● Cannot humanly scan thousands of Configurations ● Need Automation & New tooling ● Implement a Third Party Risk Management program for the cloud that includes contract language for 44 CIS Controls. Missing Link in AWS Cloud Security © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 8. Cloud Security *IS* now a Shared Responsibility • Developers now have the Power to create and change infrastructure • Cloud Security does not stop at Log analysis OWASP (Pen Testing), nor OS Hardening • Compliance is very costly - Need automation © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 9. Security is Shared Responsibility YOU © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 10. Sacred Top 10 AWS Best Practices • Faisal Jawaid Dir of Product Management Security & Compliance © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 11. #1 Enable CloudTrail AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. CloudTrail provides event history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command line tools, and other AWS services. • Enable and log to one region. • Enable Encryption. 5% of Customers know and have enabled CloudTrail. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 12. #2 Disable Root API Access and Secret Keys An API key are credentials passed in by computer programs calling an application programming interface (API) to identify the calling program, its developer, or its user to the Web site. • The “Root” account has access to everything! Not restricted. • For Administrative Tasks, create users with Admin rights. • Update billing and contact information that would be required to recover the account. 1 in 3 customers have root API access keys enabled! © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 13. #3 Enable Multi Factor Authentication MFA is an extra layer of security that requires not only a password and username but also something that only, and only, that user has on them. • MFA is available to all IAM users, including the root account. • MFA options are Token Based and Text Message – SMS based. • Token based options include hardware Devices, and virtual software options, such as Google Authenticator, etc. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 14. #4 Review permissions, strengthen access. AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. • Review IAM policies on Users, Groups and Roles. Does your user really need access to all of these services? • Do your Third Party Applications need all of these permissions? • How many people have unrestricted access? • Use the IAM policy generator and policy simulator for assistance. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 15. #5 Use IAM Roles An IAM Role is an IAM entity that defines a set of permissions for making AWS service requests. IAM roles are not associated with a specific user or group. Instead, trusted entities assume roles, such as IAM users, applications, or AWS services such as EC2. • Diminished attack surface area • A Role does not have credentials (password or keys) associated with it. • Give access, revoke access, when done. • Delegate access to users, applications or services. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 16. #6 Mitigate DDOS on your Assets AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is no need to engage AWS Support to benefit from DDoS protection. Leverage Services for Advanced Protection: • Elastic Load Balancer (ELB) • AutoScaling • Amazon CloudFront • Amazon Route 53 © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 17. #7 Rotate Keys Regularly (API and Encryption) Cryptographic best practices discourage extensive reuse of encryption keys. API Access Keys are regularly uploaded to Code versioning systems such as Github. • Anyone who has your access key has the same level of access to your AWS resources that you do. • IAM users should have keys rotated every 90 days minimum. • Enable automatic key rotation for an existing Customer Master Key (CMK). © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 18. #8 Use the Simple Token Service for Vendors The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users). • Can be used in place of privileged IAM user Access Keys • Temporary credentials • Allows for 3rd parties such as Cloudnosys to access your AWS accounts more securely (TPRM!) © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 19. #9 Secure your S3 buckets. Amazon S3 is object storage built to store and retrieve any amount of data from anywhere – web sites and mobile apps, corporate applications, and data from IoT sensors or devices. • Check your Bucket Access Control Lists regularly • Watch for all grantees, including Authenticated Users • Open S3 buckets a favorite for trolling for API Access Keys © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 20. #10 Don’t leave the front door open A Security Group acts as a virtual firewall for your instance to control inbound and outbound traffic. Each instance in a subnet in your VPC could be assigned to a different set of security groups. • Open VPC’s affects: Amazon Elastic Load Balancing Amazon RDS Amazon ElastiCache Amazon RedShift • Monitor Security Groups regularly © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 21. What Next? • Knowing Top 10 or CIS-44, or 150 control is not enough • Writing SOPs and Policies are not enough • Automation is the new “norm” which drives enforcement and accountability. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 23. Cloudnosys Security Platform CloudEye Continuously Secure your cloud services and automate compliance. Over 150+ Cloudnosys best practice rules track and monitor your AWS services for security and compliance violations. Dashboard and reports keep you fully informed of any Risks. – Agentless! • Continuous Security & Compliance Scanning • Alert on Vulnerabilities • Audit Reports on Security and Compliance • Fast Remediation • Supports PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA mandates © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 24. Security and Compliance Dashboards shows, alerts, violations and how to remediate these quickly to mitigate risks. This is generated on the fly after scanning for all Cloud Services and Availability Zones. © 2017 - Cloudnosys | Security, Compliance, Cost. Dashboards: Compliance and Security
  • 25. Reporting: Compliance and Security Security and Compliance reports shows, alerts, violations and how to remediate these quickly to avoid any Cyber attacks. This is generated on the fly after scanning all Cloud Services © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 26. How It Works An AWS native cloud solution that automates key cloud security processes and enables consistent enforcement of security policies, best practices and compliance requirements across an organization’s AWS cloud infrastructure. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 27. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 28. Sample Cost Savings Report © 2017 - Cloudnosys | Enterprise Cloud Diagnostics and Remediation. Cost savings reports are calculated in seconds after user set some schedules to turn off some machines on a schedule.
  • 29. Summary: What we learned today? • Cloud Security has Shared Responsibility. • Automation is key to your enterprise success • Third Party Risk Management – AWS CIS 44 Rule Enforcement • Make DevOps accountable for security through automation – CI/CD • Measure your progress through KPIs via Automation • Learn and enforce AWS CIS-44 Controls for starters © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 30. Q & A - ANY QUESTIONS? Type in your questions in chat box now… Try Cloudnosys For 14 Days Free Start monitoring, optimizing and securing your AWS. No Limits evaluation. © 2017 - Cloudnosys | Security, Compliance, Cost. Meet us at AWS Invent: info@Cloudnosys.com