SlideShare ist ein Scribd-Unternehmen logo
1 von 20
Downloaden Sie, um offline zu lesen
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Hybrid Identity Management and
Security for Large Enterprises
Eric Moore
Chief Technologist, AWS
Integrated Practice
DXC Technology
E N T - 3 0 7
Tom Laszewski
Enterprise Technologist
Amazon Web Services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
AWS and Hybrid / Multi Cloud
Identity across environments
Visibility, encryption, and access
Audit and compliance
Q&A / Discussion
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Session repeats
Thursday, Month Day
Session Title
1:15 – 2:15 | Aria
Wednesday, Month Day
Session Title
1:45 – 2:45 | Venetian
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Hybrid and Multi Cloud
Hybrid Cloud refers to a combination of public cloud and on-premises systems, which in turn
could be a private cloud.
Hybrid Cloud as a complement to on-premises
Complements on-prem with functionality, scalability, global presence, and more.
Core data synchronized / replicated / joined between the two.
Hybrid Cloud as an extension of on-premises
Apps roughly the same between the two.
All data synchronized / replicated / joined between the two.
Multi Cloud
Refers to the use of multiple public clouds
Becoming the default stance for many large enterprises
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Hybrid Cloud on AWS
Security
(Network, Data, Compute, Identity & Access)
Capabilities: Transport encryption, key/cert
management/control/rotation, high performance,
strong protocols, robust perimeter, DDoS mitigation
tools, mature RBAC, Secret management, intrusion
detection and protection, RBAC, Transport encryption,
encryption at rest, Secret management, directory
integration, roles, permission, logging and monitoring,
penetration testing
AWS Services: Security Groups and NACLs, AWS
Certificate Manager, AWS Shield, AWS Firewall
Manager, AWS WAF, AWS Certificate Manager, AWS
Secrets Manager, AWS Key Management Service, AWS
CloudHSM, Amazon Macie, Amazon GuardDuty, AWS
Organizations, AWS IAM, AWS Directory Service,
Amazon Cloud Directory, Amazon CloudWatch, AWS
CloudTrail
Operations, Management and Monitoring
Data Integration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Minimize your identity complexity
• Privileged access is the answer to sensitive access
• Temporarily grant additional access to an identity based on approved change or need
• Beware identity sprawl
• It may be appropriate to have a separate identity domain and provider for infrastructure /
production access, but THAT IS IT
• Where you manage identities (authentication) is different than where
you might manage what people can do (authorization)
• Tracking the location of where authorization may be granted is critical to ensuring
compliance with standards. Ideally, all authorization would be based on some form of
membership (RBAC) or metadata (ABAC) stored in the identity provider, but in reality this
rarely happens consistently, and can hurt your agility if updating the provider is overly
onerous
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Identity lifecycle management is the biggest gap in
many enterprises cloud identity model
• Learning from the past
• Despite the fact that most legacy identity systems had some form of identity lifecycle
integration, many modern implementations seem to be missing this
• User changed roles? Moved on? Review the authorizations!
• This is where the rubber meets the road on lifecycle. When a user changes roles, you need to
be comfortable your team knows how to review and update all the places that user might
have been granted access
• More than just hired, moved, or left
• People will find issues with permissions in all sorts of context, working an incident,
performing an update or deployment, no matter where or by whom an issue with a
permission set is discovered, it needs to be populated to a central identity team to evaluate
impact to any other users with permissions in the affected system.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Multi-Federated Master Identity Model
• Problem: provide a master identity that privileged users have to access
to cloud resources, both web (AWS Management Console, CLI) and
instances (Windows and Linux VMs) that is cloud-based but cloud-
agnostic.
• Solution: use tried-and-true technologies. Microsoft Active Directory /
AD FS hosted in multiple clouds selective cross-forest domain trusts to
resource domains for instance access.
• Use resource domains that contain the computer objects. This domain
then has trusts to multiple domains that provide the user objects and
groups granting permissions. This allows two (or more) user object
stores that can be managed by different organizations (e.g. MSP vs
Client) to provide authentication and authorization from multiple
sources to a single instance.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Multi-
Federated
Identity
Model with
Microsoft
Active
Directory
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Visibility, Encryption, and Access
• Visibility is the key to security
• Encryption is essential, but can conflict with visibility, so needs to be
managed appropriately (Centrally managed encryption keys integrated
with appropriate security appliances that support SSL inspection)
• Access across environments requires a mature network model, avoid
many VPNs (MPLS (or rather why to avoid MPLS), and alternatives)
• Challenge is not dissimilar from balancing the agility provided by cloud
(or easy access) and the governance required to have a secure
performant service
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Multi-Cloud Networking and Multi-Cloud Key
Management
• Keeping track of CIDR allocations per cloud and environment allows for
central tools to access resources in different environments
(CMDB/IPAM)
• Key management across clouds is a requirement to maintain
encryption for data crossing environmental boundaries and for traffic
inspection via technologies like transit VPCs
• Set of master keys per cloud backed up outside of said cloud for use
with data at rest is one good approach. TLS/SSL private keys also
backed up outside of the cloud depending on risk approach. Has
implications for traffic inspection.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Audit and Compliance
• Visibility leads to Audit, trust but verify
• Compliance means setting meaningful standards, and providing the
right tools to make compliance transparent without sacrificing agility
• Standards allow everyone to speak the same language, and have a
common starting point for discussion
• Security wants control for good reason, product owners and developers
want agility for good reason, must find middle ground – clear
consistent standards that are more easily followed and provide
benefits when followed make everyone a lot happier 
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Eric Moore
emoore@dxc.com
Tom Laszewski
tomlasz@amazon.com
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
 
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
 
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
 
Private Network Connectivity: Connecting AWS into Public Sector Networks (WPS...
Private Network Connectivity: Connecting AWS into Public Sector Networks (WPS...Private Network Connectivity: Connecting AWS into Public Sector Networks (WPS...
Private Network Connectivity: Connecting AWS into Public Sector Networks (WPS...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
 
VPC Design Scenarios for Real-Life Use Cases (NET320) - AWS re:Invent 2018
VPC Design Scenarios for Real-Life Use Cases (NET320) - AWS re:Invent 2018VPC Design Scenarios for Real-Life Use Cases (NET320) - AWS re:Invent 2018
VPC Design Scenarios for Real-Life Use Cases (NET320) - AWS re:Invent 2018
 
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
 
Five New Security Automations Using AWS Security Services & Open Source (SEC4...
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Five New Security Automations Using AWS Security Services & Open Source (SEC4...
Five New Security Automations Using AWS Security Services & Open Source (SEC4...
 
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
How Vanguard and Bloomberg Use AWS PrivateLink (NET323) - AWS re:Invent 2018
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your Firewall
 
DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
A New Approach to Continuous Monitoring in the Cloud: Migrate to AWS with NET...
A New Approach to Continuous Monitoring in the Cloud: Migrate to AWS with NET...A New Approach to Continuous Monitoring in the Cloud: Migrate to AWS with NET...
A New Approach to Continuous Monitoring in the Cloud: Migrate to AWS with NET...
 
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
 
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 

Ähnlich wie Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - AWS re:Invent 2018

Ähnlich wie Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - AWS re:Invent 2018 (20)

PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with Altus
 
PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with Altus
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
 
Oas un llamado a la accion
Oas   un llamado a la accionOas   un llamado a la accion
Oas un llamado a la accion
 
Cloud monitoring overview
Cloud monitoring overviewCloud monitoring overview
Cloud monitoring overview
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
 
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring
Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring
Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 

Mehr von Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Hybrid Identity Management and Security for Large Enterprises (ENT307-R2) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Hybrid Identity Management and Security for Large Enterprises Eric Moore Chief Technologist, AWS Integrated Practice DXC Technology E N T - 3 0 7 Tom Laszewski Enterprise Technologist Amazon Web Services
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda AWS and Hybrid / Multi Cloud Identity across environments Visibility, encryption, and access Audit and compliance Q&A / Discussion
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Session repeats Thursday, Month Day Session Title 1:15 – 2:15 | Aria Wednesday, Month Day Session Title 1:45 – 2:45 | Venetian
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Hybrid and Multi Cloud Hybrid Cloud refers to a combination of public cloud and on-premises systems, which in turn could be a private cloud. Hybrid Cloud as a complement to on-premises Complements on-prem with functionality, scalability, global presence, and more. Core data synchronized / replicated / joined between the two. Hybrid Cloud as an extension of on-premises Apps roughly the same between the two. All data synchronized / replicated / joined between the two. Multi Cloud Refers to the use of multiple public clouds Becoming the default stance for many large enterprises
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Hybrid Cloud on AWS Security (Network, Data, Compute, Identity & Access) Capabilities: Transport encryption, key/cert management/control/rotation, high performance, strong protocols, robust perimeter, DDoS mitigation tools, mature RBAC, Secret management, intrusion detection and protection, RBAC, Transport encryption, encryption at rest, Secret management, directory integration, roles, permission, logging and monitoring, penetration testing AWS Services: Security Groups and NACLs, AWS Certificate Manager, AWS Shield, AWS Firewall Manager, AWS WAF, AWS Certificate Manager, AWS Secrets Manager, AWS Key Management Service, AWS CloudHSM, Amazon Macie, Amazon GuardDuty, AWS Organizations, AWS IAM, AWS Directory Service, Amazon Cloud Directory, Amazon CloudWatch, AWS CloudTrail Operations, Management and Monitoring Data Integration
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Minimize your identity complexity • Privileged access is the answer to sensitive access • Temporarily grant additional access to an identity based on approved change or need • Beware identity sprawl • It may be appropriate to have a separate identity domain and provider for infrastructure / production access, but THAT IS IT • Where you manage identities (authentication) is different than where you might manage what people can do (authorization) • Tracking the location of where authorization may be granted is critical to ensuring compliance with standards. Ideally, all authorization would be based on some form of membership (RBAC) or metadata (ABAC) stored in the identity provider, but in reality this rarely happens consistently, and can hurt your agility if updating the provider is overly onerous
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Identity lifecycle management is the biggest gap in many enterprises cloud identity model • Learning from the past • Despite the fact that most legacy identity systems had some form of identity lifecycle integration, many modern implementations seem to be missing this • User changed roles? Moved on? Review the authorizations! • This is where the rubber meets the road on lifecycle. When a user changes roles, you need to be comfortable your team knows how to review and update all the places that user might have been granted access • More than just hired, moved, or left • People will find issues with permissions in all sorts of context, working an incident, performing an update or deployment, no matter where or by whom an issue with a permission set is discovered, it needs to be populated to a central identity team to evaluate impact to any other users with permissions in the affected system.
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Multi-Federated Master Identity Model • Problem: provide a master identity that privileged users have to access to cloud resources, both web (AWS Management Console, CLI) and instances (Windows and Linux VMs) that is cloud-based but cloud- agnostic. • Solution: use tried-and-true technologies. Microsoft Active Directory / AD FS hosted in multiple clouds selective cross-forest domain trusts to resource domains for instance access. • Use resource domains that contain the computer objects. This domain then has trusts to multiple domains that provide the user objects and groups granting permissions. This allows two (or more) user object stores that can be managed by different organizations (e.g. MSP vs Client) to provide authentication and authorization from multiple sources to a single instance.
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Multi- Federated Identity Model with Microsoft Active Directory
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Visibility, Encryption, and Access • Visibility is the key to security • Encryption is essential, but can conflict with visibility, so needs to be managed appropriately (Centrally managed encryption keys integrated with appropriate security appliances that support SSL inspection) • Access across environments requires a mature network model, avoid many VPNs (MPLS (or rather why to avoid MPLS), and alternatives) • Challenge is not dissimilar from balancing the agility provided by cloud (or easy access) and the governance required to have a secure performant service
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Multi-Cloud Networking and Multi-Cloud Key Management • Keeping track of CIDR allocations per cloud and environment allows for central tools to access resources in different environments (CMDB/IPAM) • Key management across clouds is a requirement to maintain encryption for data crossing environmental boundaries and for traffic inspection via technologies like transit VPCs • Set of master keys per cloud backed up outside of said cloud for use with data at rest is one good approach. TLS/SSL private keys also backed up outside of the cloud depending on risk approach. Has implications for traffic inspection.
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Audit and Compliance • Visibility leads to Audit, trust but verify • Compliance means setting meaningful standards, and providing the right tools to make compliance transparent without sacrificing agility • Standards allow everyone to speak the same language, and have a common starting point for discussion • Security wants control for good reason, product owners and developers want agility for good reason, must find middle ground – clear consistent standards that are more easily followed and provide benefits when followed make everyone a lot happier 
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 19. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Eric Moore emoore@dxc.com Tom Laszewski tomlasz@amazon.com
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.