SlideShare ist ein Scribd-Unternehmen logo
1 von 27
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
George John, Product Manager, AWS CloudFront/Lambda@Edge
Cristi Ursachi, Software Development Manager, Amazon.com
March 1st 2018
How to Secure Sensitive Customer
Data Using Amazon CloudFront
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Agenda
• CloudFront Overview
• Secure content with CloudFront
• CloudFront Field Level Encryption
• Demo
• Q & A
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon CloudFront
G l o b a l c o n t e n t d e l i v e r y n e t w o r k ( C D N )
A p p l i c a t i o n a c c e l e r a t i o n a n d o p t i m i z a t i o n
D i s t r i b u t e d s c a l a b l e i n t e g r a t e d s e c u r i t y c o n t r o l s
O p t i m i z e d f o r a l l d e l i v e r y u s e c a s e s
O n - d e m a n d , f u l l u s e r c o n t ro l , c o s t e f fe c t i v e
E s s e n t i a l c l o u d
i n f r a s t r u c t u r e
c o m p o n e n t
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
114 Points of Presence (103 Edge locations + 11 Regional Edge Caches)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Four Major Use Cases
Accelerate websites
Customize user
experience
Stream live and
on-demand media
Secure content
Customer
use cases
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Secure Content
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
1. Protect Application &
Network/Transport layer
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
✓ Only Accepts valid HTTP/TCP Requests
✓ Automatically drop traffic on non HTTP Ports
✓ Protection Against Slow Reads (Slowloris)
✓ Safeguards Against SSL Abuse (E.g. Perfect Forward
Secrecy)
✓ Web Server Offload (E.g., Request Collapsing)
AWS Shield AWS WAFCloudFront Built-in
Security
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
2. Access Control
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
2.1 Securely ser ve private content: Signed URL/Cookie
End viewers CloudFront
distribution
intranet.example.com
Path: Default (*)
Origin: ALB
Forward Cookies: All
Restrict Viewer Access: No
Application Load
Balancer
Application
Path: videos/
Origin: Amazon S3
Forward cookies: No
Restrict viewer access: Yes
Amazon S3
bucket
User’s application credentials
Signed Cookie or URL
GET /videos/annual-meeting.m3u8
Cached response
Cache behaviors✓ Valid
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Create an origin access identity using the
CloudFront console or API.
• Modify your Amazon S3 bucket policy to limit
read access to the origin access identity’s
Restricting origin access: Amazon S3 Origin
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Configure origin custom headers to provide a shared secret in a custom-named header.
Restricting origin access: Custom Origin
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
3. Encryption
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
3.1 End to End HTTPS
CloudFront
distributionEnd viewer
Origin protocol policy
HTTPS only
Origin SSL protocol
TLSv1.2
Viewer protocol policy
Redirect HTTP to HTTPS
Security policy
TLSv1.2_2018
Certificate
Managed by ACM
Origin
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
3.2 CloudFront Field-Level Encryption
Secure and control the access of sensitive customer data while accelerating
your application
• Sensitive data encrypted with RSA key pair
• Reduces attack surface for your sensitive data
• Eliminates risk with accidental (or incidental) data leakage
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Why Amazon consumer needs CloudFront Field Level
Encryption
• Our most valuable asset is customer trust
• We need to handle a lot of sensitive information (credit cards,
addresses, SSN, etc)
• Behind consumer website operate hundreds of teams
maintaining different services
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Architecture
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Benefits of using Field Level Encryption
• Greatly reduces the number of systems we have to audit for PCI
compliance
• A bug in a pass-through system cannot cause sensitive
information leakage
• Greatly reduces the number of people that may have access to
sensitive information (e.g. card numbers)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo – products/concepts used
• Amazon CloudFront (content delivery network)
• HTTP forms
• Public-key cryptography
• AWS API Gateway
• AWS Lambda
• AWS CloudFormation
• AWS KMS
• AWS Systems Manager Parameter Store
• AWS DynamoDB
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo Architecture
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How to configure Field Level Encryption
1. Public Keys: Name , Value
2. Field Level Encryption Profiles: Name , ProviderName, PublicKey.Name,
Pattern
3. Field Level Encryption configuration: ContentType, Pass Profile as query
argument
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo Walkthrough
• Stage the required artifacts (deployed already in US East 1 AWS region)
• Generate an RSA key pair
• Upload the public key to CloudFront and associate it with the
Field Level Encryption configuration
• Launch the CloudFormation stack
• Add the Field Level Encryption configuration to the
CloudFront distribution
• Store the private key in Parameter Store
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Getting Started
• Amazon CloudFront getting started
https://aws.amazon.com/cloudfront/getting-started/
• Introduction to CloudFront and Lambda@Edge (video)
https://www.youtube.com/watch?v=wRaPw1tx6LA
• Slack Uses Amazon CloudFront for Secure API Acceleration (video)
https://www.youtube.com/watch?v=oVaTiRl9-v0
• AWS Shield
https://aws.amazon.com/shield/
• AWS WAF
https://aws.amazon.com/waf/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Questions?
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Mastering Kubernetes on AWS (CON301-R1) - AWS re:Invent 2018
Mastering Kubernetes on AWS (CON301-R1) - AWS re:Invent 2018Mastering Kubernetes on AWS (CON301-R1) - AWS re:Invent 2018
Mastering Kubernetes on AWS (CON301-R1) - AWS re:Invent 2018
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Maximizing Throughput and Performance on Amazon EFS (STG406) - AWS re:Invent ...
Maximizing Throughput and Performance on Amazon EFS (STG406) - AWS re:Invent ...Maximizing Throughput and Performance on Amazon EFS (STG406) - AWS re:Invent ...
Maximizing Throughput and Performance on Amazon EFS (STG406) - AWS re:Invent ...
 
Transforming Data Lakes with Amazon S3 Select & Amazon Glacier Select - AWS O...
Transforming Data Lakes with Amazon S3 Select & Amazon Glacier Select - AWS O...Transforming Data Lakes with Amazon S3 Select & Amazon Glacier Select - AWS O...
Transforming Data Lakes with Amazon S3 Select & Amazon Glacier Select - AWS O...
 
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
Keeping Secrets: Securing Your Data with AWS Cryptography (SEC353-R1) - AWS r...
 
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
 
Secure Your Site: Use CDN Security Features to Protect Your Content & Infrast...
Secure Your Site: Use CDN Security Features to Protect Your Content & Infrast...Secure Your Site: Use CDN Security Features to Protect Your Content & Infrast...
Secure Your Site: Use CDN Security Features to Protect Your Content & Infrast...
 
[NEW LAUNCH!] Optimize file system costs using Amazon EFS Infrequent Access (...
[NEW LAUNCH!] Optimize file system costs using Amazon EFS Infrequent Access (...[NEW LAUNCH!] Optimize file system costs using Amazon EFS Infrequent Access (...
[NEW LAUNCH!] Optimize file system costs using Amazon EFS Infrequent Access (...
 
Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration Containerize Legacy .NET Framework Web Apps for Cloud Migration
Containerize Legacy .NET Framework Web Apps for Cloud Migration
 
AWS Services for Data Migration - AWS Online Tech Talks
AWS Services for Data Migration - AWS Online Tech TalksAWS Services for Data Migration - AWS Online Tech Talks
AWS Services for Data Migration - AWS Online Tech Talks
 
Adding a Sumerian Host to Your Scene
Adding a Sumerian Host to Your SceneAdding a Sumerian Host to Your Scene
Adding a Sumerian Host to Your Scene
 
Beyond the Basics: Advanced Infrastructure as Code Programming on AWS (DEV327...
Beyond the Basics: Advanced Infrastructure as Code Programming on AWS (DEV327...Beyond the Basics: Advanced Infrastructure as Code Programming on AWS (DEV327...
Beyond the Basics: Advanced Infrastructure as Code Programming on AWS (DEV327...
 
AWS Data Transfer Services Deep Dive
AWS Data Transfer Services Deep Dive AWS Data Transfer Services Deep Dive
AWS Data Transfer Services Deep Dive
 
Deep Dive on AWS PrivateLink - AWS Online Tech Talks
Deep Dive on AWS PrivateLink - AWS Online Tech TalksDeep Dive on AWS PrivateLink - AWS Online Tech Talks
Deep Dive on AWS PrivateLink - AWS Online Tech Talks
 
Kickstart Your All-In Move to the AWS Cloud Using AWS Storage Gateway and Ama...
Kickstart Your All-In Move to the AWS Cloud Using AWS Storage Gateway and Ama...Kickstart Your All-In Move to the AWS Cloud Using AWS Storage Gateway and Ama...
Kickstart Your All-In Move to the AWS Cloud Using AWS Storage Gateway and Ama...
 
Bridge the Storage Gap: Hybrid Media Workflows with AWS Storage Gateway (STG3...
Bridge the Storage Gap: Hybrid Media Workflows with AWS Storage Gateway (STG3...Bridge the Storage Gap: Hybrid Media Workflows with AWS Storage Gateway (STG3...
Bridge the Storage Gap: Hybrid Media Workflows with AWS Storage Gateway (STG3...
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
 
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
 
SRV315 Building Enterprise-Grade Serverless Apps
 SRV315 Building Enterprise-Grade Serverless Apps SRV315 Building Enterprise-Grade Serverless Apps
SRV315 Building Enterprise-Grade Serverless Apps
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
 

Ähnlich wie How to Secure Sensitive Customer Data Using Amazon CloudFront - AWS Online Tech Talks

New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
Amazon Web Services
 

Ähnlich wie How to Secure Sensitive Customer Data Using Amazon CloudFront - AWS Online Tech Talks (20)

Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
Scaling up to and beyond 10M users
Scaling up to and beyond 10M usersScaling up to and beyond 10M users
Scaling up to and beyond 10M users
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Chicago AWS Summit
 
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day OneAWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDay
 
A Few Milliseconds in the Life of an HTTP Request (CTD416) - AWS re:Invent 2018
A Few Milliseconds in the Life of an HTTP Request (CTD416) - AWS re:Invent 2018A Few Milliseconds in the Life of an HTTP Request (CTD416) - AWS re:Invent 2018
A Few Milliseconds in the Life of an HTTP Request (CTD416) - AWS re:Invent 2018
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Anaheim AWS Summit
 
SID301 Threat Detection and Mitigation
 SID301 Threat Detection and Mitigation SID301 Threat Detection and Mitigation
SID301 Threat Detection and Mitigation
 
Making Headless Drupal Serverless
Making Headless Drupal ServerlessMaking Headless Drupal Serverless
Making Headless Drupal Serverless
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
Lock It Down: Configure End-to-End Security & Access Control on Amazon EMR (A...
Lock It Down: Configure End-to-End Security & Access Control on Amazon EMR (A...Lock It Down: Configure End-to-End Security & Access Control on Amazon EMR (A...
Lock It Down: Configure End-to-End Security & Access Control on Amazon EMR (A...
 
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
 
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
 

Mehr von Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

How to Secure Sensitive Customer Data Using Amazon CloudFront - AWS Online Tech Talks

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. George John, Product Manager, AWS CloudFront/Lambda@Edge Cristi Ursachi, Software Development Manager, Amazon.com March 1st 2018 How to Secure Sensitive Customer Data Using Amazon CloudFront
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda • CloudFront Overview • Secure content with CloudFront • CloudFront Field Level Encryption • Demo • Q & A
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudFront G l o b a l c o n t e n t d e l i v e r y n e t w o r k ( C D N ) A p p l i c a t i o n a c c e l e r a t i o n a n d o p t i m i z a t i o n D i s t r i b u t e d s c a l a b l e i n t e g r a t e d s e c u r i t y c o n t r o l s O p t i m i z e d f o r a l l d e l i v e r y u s e c a s e s O n - d e m a n d , f u l l u s e r c o n t ro l , c o s t e f fe c t i v e E s s e n t i a l c l o u d i n f r a s t r u c t u r e c o m p o n e n t
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 114 Points of Presence (103 Edge locations + 11 Regional Edge Caches)
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Four Major Use Cases Accelerate websites Customize user experience Stream live and on-demand media Secure content Customer use cases
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Secure Content
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 1. Protect Application & Network/Transport layer
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. ✓ Only Accepts valid HTTP/TCP Requests ✓ Automatically drop traffic on non HTTP Ports ✓ Protection Against Slow Reads (Slowloris) ✓ Safeguards Against SSL Abuse (E.g. Perfect Forward Secrecy) ✓ Web Server Offload (E.g., Request Collapsing) AWS Shield AWS WAFCloudFront Built-in Security
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2. Access Control
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2.1 Securely ser ve private content: Signed URL/Cookie End viewers CloudFront distribution intranet.example.com Path: Default (*) Origin: ALB Forward Cookies: All Restrict Viewer Access: No Application Load Balancer Application Path: videos/ Origin: Amazon S3 Forward cookies: No Restrict viewer access: Yes Amazon S3 bucket User’s application credentials Signed Cookie or URL GET /videos/annual-meeting.m3u8 Cached response Cache behaviors✓ Valid
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Create an origin access identity using the CloudFront console or API. • Modify your Amazon S3 bucket policy to limit read access to the origin access identity’s Restricting origin access: Amazon S3 Origin
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Configure origin custom headers to provide a shared secret in a custom-named header. Restricting origin access: Custom Origin
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3. Encryption
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3.1 End to End HTTPS CloudFront distributionEnd viewer Origin protocol policy HTTPS only Origin SSL protocol TLSv1.2 Viewer protocol policy Redirect HTTP to HTTPS Security policy TLSv1.2_2018 Certificate Managed by ACM Origin
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3.2 CloudFront Field-Level Encryption Secure and control the access of sensitive customer data while accelerating your application • Sensitive data encrypted with RSA key pair • Reduces attack surface for your sensitive data • Eliminates risk with accidental (or incidental) data leakage
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Why Amazon consumer needs CloudFront Field Level Encryption • Our most valuable asset is customer trust • We need to handle a lot of sensitive information (credit cards, addresses, SSN, etc) • Behind consumer website operate hundreds of teams maintaining different services
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Architecture
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Benefits of using Field Level Encryption • Greatly reduces the number of systems we have to audit for PCI compliance • A bug in a pass-through system cannot cause sensitive information leakage • Greatly reduces the number of people that may have access to sensitive information (e.g. card numbers)
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo – products/concepts used • Amazon CloudFront (content delivery network) • HTTP forms • Public-key cryptography • AWS API Gateway • AWS Lambda • AWS CloudFormation • AWS KMS • AWS Systems Manager Parameter Store • AWS DynamoDB
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo Architecture
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How to configure Field Level Encryption 1. Public Keys: Name , Value 2. Field Level Encryption Profiles: Name , ProviderName, PublicKey.Name, Pattern 3. Field Level Encryption configuration: ContentType, Pass Profile as query argument
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo Walkthrough • Stage the required artifacts (deployed already in US East 1 AWS region) • Generate an RSA key pair • Upload the public key to CloudFront and associate it with the Field Level Encryption configuration • Launch the CloudFormation stack • Add the Field Level Encryption configuration to the CloudFront distribution • Store the private key in Parameter Store
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Getting Started • Amazon CloudFront getting started https://aws.amazon.com/cloudfront/getting-started/ • Introduction to CloudFront and Lambda@Edge (video) https://www.youtube.com/watch?v=wRaPw1tx6LA • Slack Uses Amazon CloudFront for Secure API Acceleration (video) https://www.youtube.com/watch?v=oVaTiRl9-v0 • AWS Shield https://aws.amazon.com/shield/ • AWS WAF https://aws.amazon.com/waf/
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Questions?
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!