SlideShare ist ein Scribd-Unternehmen logo
1 von 68
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lock it Down: How to Secure Your
Organization's AWS Accounts
Sean Donaghy
Senior Cyber Security Advisor
Canadian Centre for Cyber Security
Communications Security Establishment
Government of Canada
Michael Davie
Security Engineer
Canadian Centre for Cyber Security
Communications Security Establishment
Government of Canada
Geordie Anderson
Security Specialist Solutions Architect
Amazon Web Services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shared Responsibility Model
Infrastructure Services
AWS
ENDPOINTS
AWS GLOBAL
INFRASTRUCTURE
REGIONS
AVAILABILITY
ZONES
EDGE
LOCATIONS
FOUNDATION
SERVICES
STORAGE DATABASES NETWORKINGCOMPUTE
AWSIAM
OPTIONAL – OPAQUE DATA: 0s & 1s (In transit / at rest)
CLIENT-SIDE DATA ENCRYPTION
& DATA INTEGRITY
AUTHENTICATION
SERVER-SIDE ENCRYPTION
File System and/or Data
NETWORK TRAFFIC PROTECTION
Encryption / Integrity / Identity
OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION
PLATFORM & APPLICATION MANAGEMENT
CUSTOMER DATA
CUSTOMERIAM
MANAGED BY
CUSTOMERS
MANAGED BY
AMAZON WEB SERVICES
RESPONSIBLE FOR
SECURITY “IN”
THE CLOUD
RESPONSIBLE FOR
SECURITY “OF”
THE CLOUD
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shared Responsibility Model
Container Services
AWS
ENDPOINTS
AWS GLOBAL
INFRASTRUCTURE
REGIONS
AVAILABILITY
ZONES
EDGE
LOCATIONS
FOUNDATION
SERVICES
STORAGE DATABASES NETWORKINGCOMPUTE
AWSIAM
OPTIONAL – OPAQUE DATA: 0s & 1s (In transit / at rest)
CLIENT-SIDE DATA ENCRYPTION
& DATA INTEGRITY
AUTHENTICATION
NETWORK TRAFFIC PROTECTION
Encryption / Integrity / Identity
OPERATING SYSTEM, NETWORK CONFIGURATION
PLATFORM & APPLICATION MANAGEMENT
CUSTOMER DATA
CUSTOMERIAM
MANAGED BY
CUSTOMERS
MANAGED BY
AMAZON WEB
SERVICES
FIREWALL
CONFIGURATION
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS
ENDPOINTS
AWS GLOBAL
INFRASTRUCTURE
REGIONS
AVAILABILITY
ZONES
EDGE
LOCATIONS
FOUNDATION
SERVICES
STORAGE DATABASES NETWORKINGCOMPUTE
AWSIAM
OPTIONAL – OPAQUE DATA:
0s & 1s (In transit / at rest)
CLIENT-SIDE DATA ENCRYPTION
& DATA INTEGRITY AUTHENTICATION
OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION
PLATFORM & APPLICATION MANAGEMENT
CUSTOMER DATA
MANAGED BY
CUSTOMERS
MANAGED BY
AMAZON WEB
SERVICES
NETWORK TRAFFIC PROTECTION PROVIDED BY THE PLATFORM
Protection of data in transit
SERVER SIDE ENCRYPTION PROVIDED BY THE PLATFORM
Protection of data at rest
AWS Shared Responsibility Model
Abstract Services
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudTrail
User Action Time
Tim Created 1:30pm
Sue Deleted 2:40pm
Kat Created 3:30pm
Users are
constantly
making API
calls...
On a growing set of
AWS services
around the world…
AWS CloudTrail
is continuously
recording and
logging the API
calls…
Who made the request?
What was requested?
When and from where?
What was the response?
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon Virtual Private Cloud (VPC) Flow Logs
• Agentless
• Enable per Elastic Network Interface (ENI), per subnet, or per VPC
• Logged to Amazon CloudWatch Logs
• Create CloudWatch metrics from log data
• Alarm on those metrics
AWS
account
Source IP
Destination IP
Source port
Destination port
Interface Protocol Packets
Bytes Start/end time
Accept
or reject
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
$ git clone https://github.com/awslabs/aws-security-benchmark.git
$ cd aws-security-benchmark/aws_cis_foundation_framework
$ python aws-cis-foundation-benchmark-checklist.py
Example: Center for Internet Security (CIS)
Open source software validation for CIS AWS Foundation Framework
Ongoing Benchmark Validation of Infrastructure
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Report This Way…
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Or This Way…
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Or Maybe This Way
{"Failed":["1.3", "1.4", "1.5", "1.6", "1.7", "1.8", "1.9", "1.10", "1.11", "1.14",
"1.16", "1.22", "1.23", "2.2", "2.4", "2.5", "2.6", "2.6", "2.8", "3.1", "3.2", "3.3",
"3.4", "3.5", "3.6", "3.7", "3.8", "3.9", "3.10", "3.11", "3.12", "etc"]}
Control output format based on downstream data consumer
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Other Interesting Open Source Software Options
git-secrets - Prevents you from committing passwords and other sensitive information to a git repository.
aws-security-benchmark - Benchmark scripts mapped against trusted security frameworks.
aws-config-rules - [Node, Python, Java] Repository of sample custom rules for AWS Config
Netflix/security_monkey - Monitors policy changes and alerts on insecure configurations in an AWS account.
Netflix/edda - Edda is a service to track changes in your cloud deployments.
ThreatResponse - Open Source Security Suite for hardening and responding in AWS.
CloudSploit – Capturing things like open security groups, misconfigured VPCs, and more.
Stelligent/Cfn_nag – Looks for patterns in CloudFormation templates that may indicate insecure infrastructure.
Capitalone/cloud-custodian - Rules engine for AWS fleet management.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Systems Manager
RunCommand Session Manager Inventory MaintenanceWindow
Patch Manager Automation Parameter Store Documents
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Identify a subset of EC2
resources, and associate
them to a patch baseline
Returns a list of hosts
that are compliant or non-
compliant, triggering
automated patching
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Systems Manager
RunCommand Session Manager Inventory MaintenanceWindow
Patch Manager Automation Parameter Store Documents
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Systems Manager
RunCommand
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
THIS IS A
VELOCIRAPTOR-FREE
WORKPLACE
IT HAS PROUDLY BEEN
DAYS SINCE THE LAST
INCIDENT
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Traditional Operating System Access (SSH / RDP)
Client
Amazon EC2
Instance
Production Account
Central permissions,
logging, and alerting
of OS commands is
a challenge
SSH / RDP
X
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS
CloudTrail
AWS Systems Manager
Run Command
The Power of Run Command
Client
AWS API
Amazon S3
Bucket
Amazon EC2
Instance
Production Account
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS
CloudTrail
AWS Systems Manager
Run Command
The Power of Run Command –
With a Central Security Account
Client
AWS API
Central Security Account
Amazon S3
Bucket
Amazon S3
Bucket
Amazon EC2
Instance
Production Account
X
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Systems Manager
RunCommand Session Manager Inventory MaintenanceWindow
Patch Manager Automation Parameter Store Documents
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Systems Manager
Session Manager
Interactivity – Commands are
executed synchronously in a full
interactive bash (Linux) or PowerShell
(Windows) environment.
Auditability – Commands and
responses can be logged to Amazon
CloudWatch and to an S3 bucket.
Optionally receive an SNS
notification when a new session is
started.
Access Control – Use IAM policies
and users to control access to your
instances, with no need to distribute
SSH keys. Limit access to a desired
time or maintenance window by using
IAM’s Date Condition Operators.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon GuardDuty
Amazon
GuardDutyAmazon VPC
Flow Logs
Amazon EC2
DNS Logs
AWS CloudTrail
Logs
Amazon
CloudWatch
Events
Multiple AWS
Accounts
SECURITY
Threat Intelligence Feeds
Use machine
learning to
continuously
analyze, and
intelligently
detect malicious
or unauthorized
behaviour
AWS Lambda
A fully managed intelligent threat detection service
Global SOC
Downsteam SIEM
Central SecOps
Workflow
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon GuardDuty Detections
EC2
RECON
IAM
PHISHING
MALWARE
SPAMBOTS
BOTNETS
BITCOIN
BLACKHOLES
DROP POINTS
DRIVE BY DOWNLOADS
DNS DATA EXFILTRATION
DOMAIN GENERATION ALGORITHM DOMAINS
API INVOKED FROM A MALICIOUS IP
API INVOKED FROM A TOR EXIT NODE
SSH / RDP BRUTE FORCE ATTACK
PORT PROBE FROM A MALICIOUS HOST
OUTBOUND PORT SCANS
UNUSUAL NETWORK CHANGES (SGs, ROUTES, ACLs)
CLOUDTRAIL LOGGING MODIFIED
UNUSUAL IAM CHANGES (USERS, POLICIES)
CLOUDTRAIL LOGGING DISABLED
UNUSUAL RESOURCE PERMISSION CHANGES
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon
GuardDuty
Amazon
CloudWatch
Amazon
CloudWatch
Event
AWS
Lambda
Function
Automated Remediation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon CloudWatch Rule
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
import boto3
import json
def lambda_handler(event, context):
try:
if event['detail']['type'] in [‘Backdoor:EC2/C&CActivity.B!DNS’]:
response =‘<do something here>’
except Exception, e:
print e
Example AWS Lambda Function
Particular Amazon
GuardDuty detection
of interest
Action
to take
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon
GuardDuty
Amazon
CloudWatch
Amazon
CloudWatch
Event
AWS
Lambda
Function
Automatic Remediation
Amazon
EC2
Instance
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Automatic Remediation –
Re-Think Incident Response
Production
Security Group
Isolation Security Group for Forensic Investigation
(optionally on a completely isolated subnet)
Isolated
Security
Forensics
Tools
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC Flow Log Monitoring – Automation
Amazon
Simple Notification
Service (SNS)
Amazon
CloudWatch
Logs
Private subnet
Compliance
Application
AWS
Lambda
function
If SSH REJECT > 10,
then…
Custom metric
filter
Filter on all
SSH REJECT
VPC Flow
Log group
Amazon
CloudWatch
Alarm
Identify and block the
Source IP, or even
disconnect source IP
Elastic Network Interface
Auto-cut ticket
with details and
notify admins
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Threat Management Via IP Ranges
Threat Intel
Feeds
IP-threats.json
Amazon
Simple Notification Service
(SNS) Topic
Amazon S3
Bucket
S3 Event
Notification
publish to
SNS Topic
AWS Lambda
function
Application Load
Balancer (ALB)
Security Group
Subscribe to
SNS Topic
Pull
updated file
Update Security
Group IP ranges
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Account A
Central Security Account
Amazon S3
Bucket
1.2.3.4/32
IP-threats.json
UPDATE
Account B
1.2.3.4/32
Account C
1.2.3.4/32
Central IP Threat Management
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Governance With AWS Config Rules
Example rules, available out of the box…
AWS Config Rules
• Powerful configuration rule
system
• Define custom rules that can look
for desirable or undesirable
conditions
• Enforce best practices using
automated compliance checks
• Trigger additional alerts or
workflow
CloudTrail enabled
Desired instance types selected
Security groups have restricted SSH
S3 bucket public read / write prohibited
EC2 OS patch levels in compliance
Amazon RDS DB backup enabled
S3 bucket server side encryption enabled
Root credentials MFA enabled
Lambda functions public access prohibited
Amazon RDS storage encrypted
Amazon RDS multi-AZ support enabled
EC2 instances have the required tags
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config Compliance Dashboard
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon S3
Bucket
Amazon
CloudWatch
AWS Config Rule
AWS Lambda
function
AWS Config – Automated Remediation
Check Amazon S3
bucket compliance –
no public read/write
Set Amazon S3 Bucket
ACL to private
Auto-cut ticket
with details, and
notify admins
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
IAM Access Advisor
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SELECT useridentity.sessioncontext.sessionIssuer.userName
as uid, eventsource, eventname
FROM cloudtrail_logs
WHERE useridentity.sessioncontext.sessionIssuer.userName
= ‘target-name’
GROUP BY
useridentity.sessioncontext.sessionIssuer.userName,
eventsource, eventname
Query CloudTrail Data Using Amazon Athena
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
https://github.com/Netflix-Skunkworks/aardvark
https://github.com/Netflix/Repokid
Interesting Open Source Software Solutions
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Montreal
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Restrict an IAM Role to a Region
{ "Version": "2012-10-17",
"Statement": [
{ "Effect": "Allow",
"Action": [
"ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways",
"ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs",
"ec2:DescribeInstances", "ec2:DescribeImages", "ec2:DescribeKeyPairs", "rds:Describe*", "iam:ListRolePolicies",
"iam:ListRoles", "iam:GetRole", "iam:ListInstanceProfiles", "iam:AttachRolePolicy", "lambda:GetAccountSettings" ],
"Resource": "*" },
{ "Effect": "Allow",
"Action": [ "ec2:RunInstances", "rds:CreateDBInstance", "rds:CreateDBCluster", "lambda:CreateFunction",
"lambda:InvokeFunction" ],
"Resource": "*",
"Condition": {"StringEquals": {"aws:RequestedRegion": ”ca-central-1"}} }, {
"Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "arn:aws:iam::account-id:role/Please-use-a-specific-role" } ]
}
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Master
Account
Member
Account 1
Member
Account 2
Member
Account 3
Member
Account 4
Enterprise
OU
Division 1
OU
Division 2
OU
AWS Organizations – Service Control Policies (SCP)
SCP SCP SCP SCP
SCP SCP
SCP
IAM IAM IAM IAM
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Landing Zone Solution
An easy-to-deploy solution that automates the setup
of new AWS multi-account environments
Based on AWS
best practices and
recommendations
Initial security and
governance
controls
Baseline
accounts and
account vending
machine
Automated
deployment
For more details, visit:
https://aws.amazon.com/answers/aws-landing-zone
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Landing Zone Structure
Amazon S3
Bucket
AWS
Code
Pipeline
AWS
Organizations
AWS SSO
AWS
CloudFormation
AWS Service
Catalog
AWS Systems
Manager
Core
Organizational
Unit
Central Services Account Central Logging Account Central Security Account
AWS Master Account
Account
Baseline
Network
Baseline
Active
Directory
Log
Reporting
Account
Baseline
Central Log
Aggregation
Account
Baseline
Security
Cross-Account
Roles
Central single
sign-on
(SSO)
Active
Directory,
and log
analytics
Central
CloudTrail
and AWS
Config logs
Break-glass
cross-
account
access
Account
vending
machine for
new account
creation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Landing Zone Structure
Amazon S3
Bucket
AWS
Code
Pipeline
AWS
Organizations
AWS SSO
AWS
CloudFormation
AWS Service
Catalog
AWS Systems
Manager
Core
Organizational
Unit
Central Services Account Central Logging Account Central Security Account
AWS Master Account
Account
Baseline
Network
Baseline
Active
Directory
Log
Reporting
Account
Baseline
Central Log
Aggregation
Account
Baseline
Security
Cross-Account
Roles
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Landing Zone Structure
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Landing Zone Structure
Account
Account
Account
Account
Account
Account
Account
Account
Account
Account
Account
Account
Central billing, security,
governance, logging,
authentication, and core
services
Automated account scaling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Supplement
active security
events with
automation
Summary
Implement a
multi-account
strategy, with
guard rails
Autocorrect /
remediate
violations where
possible
Ongoing
benchmark
validation of
infrastructure
CERRID #######
PAGE 57
UNCLASSIFIED
CERRID #######
57
UNCLASSIFIED
AWS Public Sector Conference
29 October 2018
Sean Donaghy – Sr. Cyber Security Advisor
Mike Davie – Cyber Security Engineer
1
CERRID #######
PAGE 58
UNCLASSIFIED
CCCS Role in Government of Canada Cloud Security
Sean Donaghy
2
CERRID #######
PAGE 59
UNCLASSIFIED
What is the Canadian Centre for Cyber Security?
The Cyber Centre is the Government of Canada’s single unified source of expert advice, guidance,
services and support on cyber security for government, critical infrastructure owners and operations, the
private sector and the Canadian public.
3
CERRID #######
PAGE 60
UNCLASSIFIED
Pillars of CCCS Cloud Security Program
Advice and Guidance
• Advice &
Guidance on the
secure use of
cloud
• Examples of
secure
Infrastructure as
Code
• Consultation with
CSP clients
Assessment
• Vendor
Engagement
• Cloud Service
Provider Security
Assessment
• Supply Chain
Integrity (SCI)
• Residual Risks
Cyber Defence
• Develop
capabilities for GC
workloads in
cloud
• Leverage existing
investment in
analytics and
cyber defence
4
CERRID #######
PAGE 61
UNCLASSIFIED
CSP Assessment Program
 Intended to assess each enterprise cloud service provider and their ability
to handle Government of Canada information:
● Unclassified to Protected A Data.
● Protected B Data.
 Program utilizes:
● An Onboarding process for interested CSPs
● Tailored Cloud Security Controls Profiles for Low and Moderate levels of information
sensitivity - can be applied by both government and industry.
● A Cloud Assessment Framework/Methodology (ITSM.50.100)
 Completed Assessments provide information to help departments validate
a CSP’s ability to meet the security control profile for GC information
security requirements as they procure Public cloud services.
5
CERRID #######
PAGE 62
UNCLASSIFIED
Cloud Advice and Guidance Publications
 The CCCS will be publishing various Cloud Security Publications:
● CSP Assessment Process
● Cloud IT Risk Management Process
● Cloud Security Profiles
● Cloud Defence in Depth
● Cloud Encryption Strategies
● Monitoring of Cloud Services
● Business Continuity Planning
● Access Control (Public, Private/Community and Hybrid Cloud)
● Secure Design/Implementation/Hardening of client IaaS/PaaS
Keep an eye on our Publications page: https://www.cyber.gc.ca/en/publications
6
CERRID #######
PAGE 63
UNCLASSIFIED
The Fundamentals of Cloud Security
7
CERRID #######
PAGE 64
UNCLASSIFIED
CSE/CIC/AWS Cybersecurity Research Effort
Mike Davie
8
CERRID #######
PAGE 65
UNCLASSIFIED
CSE-CIC-IDS2018 Dataset
 Collaborative effort between CSE, UNB, and AWS
 Communications Security Establishment
● Noted lack of high-quality, public data for cybersecurity tests (still a lot of KDD 1999…)
● Drafted problem book  A problem that we would like solved
● Contracted work to UNB
 Canadian Institute for Cybersecurity (University of New Brunswick)
● Previous work in dataset generation (2012, 2017)
● Generated new dataset to CSE requirements
● 500 users, realistic attacks, labelled data, feature extraction
 Amazon Web Services
● Provided cloud infrastructure for virtual environment
● $80k USD academic grant of AWS credit
● Free public hosting on Open Data portal
9
CERRID #######
PAGE 66
UNCLASSIFIED
CSE-CIC-IDS2018 Dataset
AWS Open Data Portal
https://registry.opendata.aws/cse-cic-ids2018/
Documentation
https://www.unb.ca/cic/datasets/ids-2018.html
ARN
arn:aws:s3:::cse-cic-ids2018
10
CERRID #######
PAGE 67
UNCLASSIFIED
Questions/More info?
Get in touch with our Contact Centre
Communiquez avec notre centre d’appel
1-833-CYBER-88 or/ou 613-949-7048
contact@cyber.gc.ca
Or check out our web site:
www.cyber.gc.ca
11
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank You
Please rate my session.
https://amzn.to/ottawa-sessions
Track: Technical
Session: 10:00 AM - Lock It Down: How to Secure Your Organization's AWS
Accounts
How did we do?
https://amzn.to/ottawa-summit

Weitere ähnliche Inhalte

Was ist angesagt?

Security services mind map
Security services mind mapSecurity services mind map
Security services mind mapDavid Kennedy
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
Asuransi dihindari saat sehat, dicari saat sekarat
Asuransi dihindari saat sehat, dicari saat sekaratAsuransi dihindari saat sehat, dicari saat sekarat
Asuransi dihindari saat sehat, dicari saat sekaratFinansialku.com
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIBM Security
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Veritis Group, Inc
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Convergence of Integration and Application Development
Convergence of Integration and Application DevelopmentConvergence of Integration and Application Development
Convergence of Integration and Application DevelopmentKim Clark
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS OrganizationsAmazon Web Services
 
5 Simple Steps to Migrate to AWS – Zerto
  5 Simple Steps to Migrate to AWS – Zerto  5 Simple Steps to Migrate to AWS – Zerto
5 Simple Steps to Migrate to AWS – ZertoAmazon Web Services
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingIlyas F ☁☁☁
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIBM Sverige
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWSAmazon Web Services
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationFIDO Alliance
 
Best Practices for SecOps on AWS
Best Practices for SecOps on AWSBest Practices for SecOps on AWS
Best Practices for SecOps on AWSAmazon Web Services
 
Preparing for AWS certified solutions architect associate exam (saa-c02)
Preparing for AWS certified solutions architect associate exam (saa-c02)Preparing for AWS certified solutions architect associate exam (saa-c02)
Preparing for AWS certified solutions architect associate exam (saa-c02)Ravi Okade
 

Was ist angesagt? (20)

Security services mind map
Security services mind mapSecurity services mind map
Security services mind map
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
Asuransi dihindari saat sehat, dicari saat sekarat
Asuransi dihindari saat sehat, dicari saat sekaratAsuransi dihindari saat sehat, dicari saat sekarat
Asuransi dihindari saat sehat, dicari saat sekarat
 
Identity Governance: Not Just For Compliance
Identity Governance: Not Just For ComplianceIdentity Governance: Not Just For Compliance
Identity Governance: Not Just For Compliance
 
Life insurance basics
Life insurance basicsLife insurance basics
Life insurance basics
 
Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices Identity and Access Management (IAM): Benefits and Best Practices 
Identity and Access Management (IAM): Benefits and Best Practices 
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Convergence of Integration and Application Development
Convergence of Integration and Application DevelopmentConvergence of Integration and Application Development
Convergence of Integration and Application Development
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS Organizations
 
5 Simple Steps to Migrate to AWS – Zerto
  5 Simple Steps to Migrate to AWS – Zerto  5 Simple Steps to Migrate to AWS – Zerto
5 Simple Steps to Migrate to AWS – Zerto
 
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature MappingMicrosoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
Microsoft Azure vs Amazon Web Services (AWS) Services & Feature Mapping
 
Identity Management
Identity ManagementIdentity Management
Identity Management
 
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen DeloitteIAM Methods 2.0 Presentation Michael Nielsen Deloitte
IAM Methods 2.0 Presentation Michael Nielsen Deloitte
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
Beyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User AuthenticationBeyond Passwords: FIDO and the Future of User Authentication
Beyond Passwords: FIDO and the Future of User Authentication
 
Best Practices for SecOps on AWS
Best Practices for SecOps on AWSBest Practices for SecOps on AWS
Best Practices for SecOps on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Preparing for AWS certified solutions architect associate exam (saa-c02)
Preparing for AWS certified solutions architect associate exam (saa-c02)Preparing for AWS certified solutions architect associate exam (saa-c02)
Preparing for AWS certified solutions architect associate exam (saa-c02)
 

Ähnlich wie AWS Security Best Practices

Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Amazon Web Services
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadAmazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Amazon Web Services
 
Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Amazon Web Services
 
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Amazon Web Services
 
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Amazon Web Services
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAmazon Web Services
 
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...Amazon Web Services
 
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Amazon Web Services
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitAmazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 

Ähnlich wie AWS Security Best Practices (20)

Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2
 
Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS
 
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
 
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...
Build a Hybrid Cloud Architecture Using AWS Landing Zones (ENT304-R1) - AWS r...
 
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
Ensuring Your Windows Server Workloads Are Well-Architected - AWS Online Tech...
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Enterprise Security
Enterprise SecurityEnterprise Security
Enterprise Security
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Security Best Practices

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Lock it Down: How to Secure Your Organization's AWS Accounts Sean Donaghy Senior Cyber Security Advisor Canadian Centre for Cyber Security Communications Security Establishment Government of Canada Michael Davie Security Engineer Canadian Centre for Cyber Security Communications Security Establishment Government of Canada Geordie Anderson Security Specialist Solutions Architect Amazon Web Services
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shared Responsibility Model Infrastructure Services AWS ENDPOINTS AWS GLOBAL INFRASTRUCTURE REGIONS AVAILABILITY ZONES EDGE LOCATIONS FOUNDATION SERVICES STORAGE DATABASES NETWORKINGCOMPUTE AWSIAM OPTIONAL – OPAQUE DATA: 0s & 1s (In transit / at rest) CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION SERVER-SIDE ENCRYPTION File System and/or Data NETWORK TRAFFIC PROTECTION Encryption / Integrity / Identity OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION PLATFORM & APPLICATION MANAGEMENT CUSTOMER DATA CUSTOMERIAM MANAGED BY CUSTOMERS MANAGED BY AMAZON WEB SERVICES RESPONSIBLE FOR SECURITY “IN” THE CLOUD RESPONSIBLE FOR SECURITY “OF” THE CLOUD
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shared Responsibility Model Container Services AWS ENDPOINTS AWS GLOBAL INFRASTRUCTURE REGIONS AVAILABILITY ZONES EDGE LOCATIONS FOUNDATION SERVICES STORAGE DATABASES NETWORKINGCOMPUTE AWSIAM OPTIONAL – OPAQUE DATA: 0s & 1s (In transit / at rest) CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION NETWORK TRAFFIC PROTECTION Encryption / Integrity / Identity OPERATING SYSTEM, NETWORK CONFIGURATION PLATFORM & APPLICATION MANAGEMENT CUSTOMER DATA CUSTOMERIAM MANAGED BY CUSTOMERS MANAGED BY AMAZON WEB SERVICES FIREWALL CONFIGURATION
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS ENDPOINTS AWS GLOBAL INFRASTRUCTURE REGIONS AVAILABILITY ZONES EDGE LOCATIONS FOUNDATION SERVICES STORAGE DATABASES NETWORKINGCOMPUTE AWSIAM OPTIONAL – OPAQUE DATA: 0s & 1s (In transit / at rest) CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION PLATFORM & APPLICATION MANAGEMENT CUSTOMER DATA MANAGED BY CUSTOMERS MANAGED BY AMAZON WEB SERVICES NETWORK TRAFFIC PROTECTION PROVIDED BY THE PLATFORM Protection of data in transit SERVER SIDE ENCRYPTION PROVIDED BY THE PLATFORM Protection of data at rest AWS Shared Responsibility Model Abstract Services
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail User Action Time Tim Created 1:30pm Sue Deleted 2:40pm Kat Created 3:30pm Users are constantly making API calls... On a growing set of AWS services around the world… AWS CloudTrail is continuously recording and logging the API calls… Who made the request? What was requested? When and from where? What was the response?
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Virtual Private Cloud (VPC) Flow Logs • Agentless • Enable per Elastic Network Interface (ENI), per subnet, or per VPC • Logged to Amazon CloudWatch Logs • Create CloudWatch metrics from log data • Alarm on those metrics AWS account Source IP Destination IP Source port Destination port Interface Protocol Packets Bytes Start/end time Accept or reject
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. $ git clone https://github.com/awslabs/aws-security-benchmark.git $ cd aws-security-benchmark/aws_cis_foundation_framework $ python aws-cis-foundation-benchmark-checklist.py Example: Center for Internet Security (CIS) Open source software validation for CIS AWS Foundation Framework Ongoing Benchmark Validation of Infrastructure
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Report This Way…
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Or This Way…
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Or Maybe This Way {"Failed":["1.3", "1.4", "1.5", "1.6", "1.7", "1.8", "1.9", "1.10", "1.11", "1.14", "1.16", "1.22", "1.23", "2.2", "2.4", "2.5", "2.6", "2.6", "2.8", "3.1", "3.2", "3.3", "3.4", "3.5", "3.6", "3.7", "3.8", "3.9", "3.10", "3.11", "3.12", "etc"]} Control output format based on downstream data consumer
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Other Interesting Open Source Software Options git-secrets - Prevents you from committing passwords and other sensitive information to a git repository. aws-security-benchmark - Benchmark scripts mapped against trusted security frameworks. aws-config-rules - [Node, Python, Java] Repository of sample custom rules for AWS Config Netflix/security_monkey - Monitors policy changes and alerts on insecure configurations in an AWS account. Netflix/edda - Edda is a service to track changes in your cloud deployments. ThreatResponse - Open Source Security Suite for hardening and responding in AWS. CloudSploit – Capturing things like open security groups, misconfigured VPCs, and more. Stelligent/Cfn_nag – Looks for patterns in CloudFormation templates that may indicate insecure infrastructure. Capitalone/cloud-custodian - Rules engine for AWS fleet management.
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Systems Manager RunCommand Session Manager Inventory MaintenanceWindow Patch Manager Automation Parameter Store Documents
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Identify a subset of EC2 resources, and associate them to a patch baseline Returns a list of hosts that are compliant or non- compliant, triggering automated patching
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Systems Manager RunCommand Session Manager Inventory MaintenanceWindow Patch Manager Automation Parameter Store Documents
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Systems Manager RunCommand
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. THIS IS A VELOCIRAPTOR-FREE WORKPLACE IT HAS PROUDLY BEEN DAYS SINCE THE LAST INCIDENT
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Traditional Operating System Access (SSH / RDP) Client Amazon EC2 Instance Production Account Central permissions, logging, and alerting of OS commands is a challenge SSH / RDP X
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail AWS Systems Manager Run Command The Power of Run Command Client AWS API Amazon S3 Bucket Amazon EC2 Instance Production Account
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail AWS Systems Manager Run Command The Power of Run Command – With a Central Security Account Client AWS API Central Security Account Amazon S3 Bucket Amazon S3 Bucket Amazon EC2 Instance Production Account X
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Systems Manager RunCommand Session Manager Inventory MaintenanceWindow Patch Manager Automation Parameter Store Documents
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Systems Manager Session Manager Interactivity – Commands are executed synchronously in a full interactive bash (Linux) or PowerShell (Windows) environment. Auditability – Commands and responses can be logged to Amazon CloudWatch and to an S3 bucket. Optionally receive an SNS notification when a new session is started. Access Control – Use IAM policies and users to control access to your instances, with no need to distribute SSH keys. Limit access to a desired time or maintenance window by using IAM’s Date Condition Operators.
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon GuardDuty Amazon GuardDutyAmazon VPC Flow Logs Amazon EC2 DNS Logs AWS CloudTrail Logs Amazon CloudWatch Events Multiple AWS Accounts SECURITY Threat Intelligence Feeds Use machine learning to continuously analyze, and intelligently detect malicious or unauthorized behaviour AWS Lambda A fully managed intelligent threat detection service Global SOC Downsteam SIEM Central SecOps Workflow
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon GuardDuty Detections EC2 RECON IAM PHISHING MALWARE SPAMBOTS BOTNETS BITCOIN BLACKHOLES DROP POINTS DRIVE BY DOWNLOADS DNS DATA EXFILTRATION DOMAIN GENERATION ALGORITHM DOMAINS API INVOKED FROM A MALICIOUS IP API INVOKED FROM A TOR EXIT NODE SSH / RDP BRUTE FORCE ATTACK PORT PROBE FROM A MALICIOUS HOST OUTBOUND PORT SCANS UNUSUAL NETWORK CHANGES (SGs, ROUTES, ACLs) CLOUDTRAIL LOGGING MODIFIED UNUSUAL IAM CHANGES (USERS, POLICIES) CLOUDTRAIL LOGGING DISABLED UNUSUAL RESOURCE PERMISSION CHANGES
  • 29. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon GuardDuty Amazon CloudWatch Amazon CloudWatch Event AWS Lambda Function Automated Remediation
  • 30. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudWatch Rule
  • 31. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. import boto3 import json def lambda_handler(event, context): try: if event['detail']['type'] in [‘Backdoor:EC2/C&CActivity.B!DNS’]: response =‘<do something here>’ except Exception, e: print e Example AWS Lambda Function Particular Amazon GuardDuty detection of interest Action to take
  • 32. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon GuardDuty Amazon CloudWatch Amazon CloudWatch Event AWS Lambda Function Automatic Remediation Amazon EC2 Instance
  • 33. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Automatic Remediation – Re-Think Incident Response Production Security Group Isolation Security Group for Forensic Investigation (optionally on a completely isolated subnet) Isolated Security Forensics Tools
  • 34. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 35. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 36. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC Flow Log Monitoring – Automation Amazon Simple Notification Service (SNS) Amazon CloudWatch Logs Private subnet Compliance Application AWS Lambda function If SSH REJECT > 10, then… Custom metric filter Filter on all SSH REJECT VPC Flow Log group Amazon CloudWatch Alarm Identify and block the Source IP, or even disconnect source IP Elastic Network Interface Auto-cut ticket with details and notify admins
  • 37. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Threat Management Via IP Ranges Threat Intel Feeds IP-threats.json Amazon Simple Notification Service (SNS) Topic Amazon S3 Bucket S3 Event Notification publish to SNS Topic AWS Lambda function Application Load Balancer (ALB) Security Group Subscribe to SNS Topic Pull updated file Update Security Group IP ranges
  • 38. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Account A Central Security Account Amazon S3 Bucket 1.2.3.4/32 IP-threats.json UPDATE Account B 1.2.3.4/32 Account C 1.2.3.4/32 Central IP Threat Management
  • 39. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 40. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Governance With AWS Config Rules Example rules, available out of the box… AWS Config Rules • Powerful configuration rule system • Define custom rules that can look for desirable or undesirable conditions • Enforce best practices using automated compliance checks • Trigger additional alerts or workflow CloudTrail enabled Desired instance types selected Security groups have restricted SSH S3 bucket public read / write prohibited EC2 OS patch levels in compliance Amazon RDS DB backup enabled S3 bucket server side encryption enabled Root credentials MFA enabled Lambda functions public access prohibited Amazon RDS storage encrypted Amazon RDS multi-AZ support enabled EC2 instances have the required tags
  • 41. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Compliance Dashboard
  • 42. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon S3 Bucket Amazon CloudWatch AWS Config Rule AWS Lambda function AWS Config – Automated Remediation Check Amazon S3 bucket compliance – no public read/write Set Amazon S3 Bucket ACL to private Auto-cut ticket with details, and notify admins
  • 43. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 44. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. IAM Access Advisor
  • 45. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. SELECT useridentity.sessioncontext.sessionIssuer.userName as uid, eventsource, eventname FROM cloudtrail_logs WHERE useridentity.sessioncontext.sessionIssuer.userName = ‘target-name’ GROUP BY useridentity.sessioncontext.sessionIssuer.userName, eventsource, eventname Query CloudTrail Data Using Amazon Athena
  • 46. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. https://github.com/Netflix-Skunkworks/aardvark https://github.com/Netflix/Repokid Interesting Open Source Software Solutions
  • 47. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Montreal
  • 48. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Restrict an IAM Role to a Region { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": [ "ec2:DescribeAccountAttributes", "ec2:DescribeAvailabilityZones", "ec2:DescribeInternetGateways", "ec2:DescribeSecurityGroups", "ec2:DescribeSubnets", "ec2:DescribeVpcAttribute", "ec2:DescribeVpcs", "ec2:DescribeInstances", "ec2:DescribeImages", "ec2:DescribeKeyPairs", "rds:Describe*", "iam:ListRolePolicies", "iam:ListRoles", "iam:GetRole", "iam:ListInstanceProfiles", "iam:AttachRolePolicy", "lambda:GetAccountSettings" ], "Resource": "*" }, { "Effect": "Allow", "Action": [ "ec2:RunInstances", "rds:CreateDBInstance", "rds:CreateDBCluster", "lambda:CreateFunction", "lambda:InvokeFunction" ], "Resource": "*", "Condition": {"StringEquals": {"aws:RequestedRegion": ”ca-central-1"}} }, { "Effect": "Allow", "Action": [ "iam:PassRole" ], "Resource": "arn:aws:iam::account-id:role/Please-use-a-specific-role" } ] }
  • 49. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 50. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Master Account Member Account 1 Member Account 2 Member Account 3 Member Account 4 Enterprise OU Division 1 OU Division 2 OU AWS Organizations – Service Control Policies (SCP) SCP SCP SCP SCP SCP SCP SCP IAM IAM IAM IAM
  • 51. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Landing Zone Solution An easy-to-deploy solution that automates the setup of new AWS multi-account environments Based on AWS best practices and recommendations Initial security and governance controls Baseline accounts and account vending machine Automated deployment For more details, visit: https://aws.amazon.com/answers/aws-landing-zone
  • 52. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Landing Zone Structure Amazon S3 Bucket AWS Code Pipeline AWS Organizations AWS SSO AWS CloudFormation AWS Service Catalog AWS Systems Manager Core Organizational Unit Central Services Account Central Logging Account Central Security Account AWS Master Account Account Baseline Network Baseline Active Directory Log Reporting Account Baseline Central Log Aggregation Account Baseline Security Cross-Account Roles Central single sign-on (SSO) Active Directory, and log analytics Central CloudTrail and AWS Config logs Break-glass cross- account access Account vending machine for new account creation
  • 53. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Landing Zone Structure Amazon S3 Bucket AWS Code Pipeline AWS Organizations AWS SSO AWS CloudFormation AWS Service Catalog AWS Systems Manager Core Organizational Unit Central Services Account Central Logging Account Central Security Account AWS Master Account Account Baseline Network Baseline Active Directory Log Reporting Account Baseline Central Log Aggregation Account Baseline Security Cross-Account Roles
  • 54. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Landing Zone Structure
  • 55. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Landing Zone Structure Account Account Account Account Account Account Account Account Account Account Account Account Central billing, security, governance, logging, authentication, and core services Automated account scaling
  • 56. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Supplement active security events with automation Summary Implement a multi-account strategy, with guard rails Autocorrect / remediate violations where possible Ongoing benchmark validation of infrastructure
  • 57. CERRID ####### PAGE 57 UNCLASSIFIED CERRID ####### 57 UNCLASSIFIED AWS Public Sector Conference 29 October 2018 Sean Donaghy – Sr. Cyber Security Advisor Mike Davie – Cyber Security Engineer 1
  • 58. CERRID ####### PAGE 58 UNCLASSIFIED CCCS Role in Government of Canada Cloud Security Sean Donaghy 2
  • 59. CERRID ####### PAGE 59 UNCLASSIFIED What is the Canadian Centre for Cyber Security? The Cyber Centre is the Government of Canada’s single unified source of expert advice, guidance, services and support on cyber security for government, critical infrastructure owners and operations, the private sector and the Canadian public. 3
  • 60. CERRID ####### PAGE 60 UNCLASSIFIED Pillars of CCCS Cloud Security Program Advice and Guidance • Advice & Guidance on the secure use of cloud • Examples of secure Infrastructure as Code • Consultation with CSP clients Assessment • Vendor Engagement • Cloud Service Provider Security Assessment • Supply Chain Integrity (SCI) • Residual Risks Cyber Defence • Develop capabilities for GC workloads in cloud • Leverage existing investment in analytics and cyber defence 4
  • 61. CERRID ####### PAGE 61 UNCLASSIFIED CSP Assessment Program  Intended to assess each enterprise cloud service provider and their ability to handle Government of Canada information: ● Unclassified to Protected A Data. ● Protected B Data.  Program utilizes: ● An Onboarding process for interested CSPs ● Tailored Cloud Security Controls Profiles for Low and Moderate levels of information sensitivity - can be applied by both government and industry. ● A Cloud Assessment Framework/Methodology (ITSM.50.100)  Completed Assessments provide information to help departments validate a CSP’s ability to meet the security control profile for GC information security requirements as they procure Public cloud services. 5
  • 62. CERRID ####### PAGE 62 UNCLASSIFIED Cloud Advice and Guidance Publications  The CCCS will be publishing various Cloud Security Publications: ● CSP Assessment Process ● Cloud IT Risk Management Process ● Cloud Security Profiles ● Cloud Defence in Depth ● Cloud Encryption Strategies ● Monitoring of Cloud Services ● Business Continuity Planning ● Access Control (Public, Private/Community and Hybrid Cloud) ● Secure Design/Implementation/Hardening of client IaaS/PaaS Keep an eye on our Publications page: https://www.cyber.gc.ca/en/publications 6
  • 63. CERRID ####### PAGE 63 UNCLASSIFIED The Fundamentals of Cloud Security 7
  • 64. CERRID ####### PAGE 64 UNCLASSIFIED CSE/CIC/AWS Cybersecurity Research Effort Mike Davie 8
  • 65. CERRID ####### PAGE 65 UNCLASSIFIED CSE-CIC-IDS2018 Dataset  Collaborative effort between CSE, UNB, and AWS  Communications Security Establishment ● Noted lack of high-quality, public data for cybersecurity tests (still a lot of KDD 1999…) ● Drafted problem book  A problem that we would like solved ● Contracted work to UNB  Canadian Institute for Cybersecurity (University of New Brunswick) ● Previous work in dataset generation (2012, 2017) ● Generated new dataset to CSE requirements ● 500 users, realistic attacks, labelled data, feature extraction  Amazon Web Services ● Provided cloud infrastructure for virtual environment ● $80k USD academic grant of AWS credit ● Free public hosting on Open Data portal 9
  • 66. CERRID ####### PAGE 66 UNCLASSIFIED CSE-CIC-IDS2018 Dataset AWS Open Data Portal https://registry.opendata.aws/cse-cic-ids2018/ Documentation https://www.unb.ca/cic/datasets/ids-2018.html ARN arn:aws:s3:::cse-cic-ids2018 10
  • 67. CERRID ####### PAGE 67 UNCLASSIFIED Questions/More info? Get in touch with our Contact Centre Communiquez avec notre centre d’appel 1-833-CYBER-88 or/ou 613-949-7048 contact@cyber.gc.ca Or check out our web site: www.cyber.gc.ca 11
  • 68. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank You Please rate my session. https://amzn.to/ottawa-sessions Track: Technical Session: 10:00 AM - Lock It Down: How to Secure Your Organization's AWS Accounts How did we do? https://amzn.to/ottawa-summit

Hinweis der Redaktion

  1. Intro We will also have Sean Donaghy and Michael Davie From the Canadian Centre for Cyber Security who will present as well.
  2. You are in the technical track. Just want to make sure people are in the right room. We are going to talk about awesome stuff like this. The Management track and the Spotlight track are in other rooms. This is an exploded view of a Nikon F3P Camera. (CC Image) - https://www.japancamerahunter.com/2014/11/nikon-f3-p-parts-diagram/
  3. Let’s cover a few of the AWS security basics first. (CC image) - https://www.flickr.com/photos/vanf/5210360116
  4. No AWS security presentation would be complete without showing the Shared Responsibility Model. Line is the hypervisor. Customers can choose their OS. AWS provides the tools for customers to secure their workloads. The line can move up.
  5. Examples: - Amazon Relational Database Service - AWS Elastic Beanstalk
  6. Examples: - Simple Storage Service (S3). - Lambda – customer is responsible for code sanitization.
  7. GUI, REST API, Command Line Interface (CLI), SDK. Stored in Simple Storage Service (S3).
  8. No Agents. Just Turn it on. Like Netflow. Stored in S3.
  9. Let’s start looking at some automation. Center for Internet Security. Open source package available on AWS labs. Does a CIS Benchmark check against a specific AWS account. Straightforward to run, command line or in a Lambda function.
  10. Reporting options based on use case. This is an HTML document. Green light / red light type dashboard that could be provided to leadership.
  11. Raw JSON format. Could be used in a Lambda function for some automated remediation. Or sent to a downstream SIEM server for processing.
  12. Or a filter of only those that failed. Can be customized depending on the needs of the downstream processor.
  13. Everyone should be able to download the slides after.
  14. This picture is a training exercise that the US Navy performs on ships. They run a competition to test who can implement the most effective “soft patch”. Using rope, gum, band-aids, and duct tape. So let’s talk about how to deal with automated patching at scale. (CC Image) - https://www.defense.gov/observe/photo-gallery/igphoto/2002039597/
  15. No charge for AWS Systems Manager, you only pay for the resources you manage (eg. EC2 instances). AWS Systems Manager works via a lightweight agent that runs on the EC2 instances, across diverse OSes.
  16. First step is to define a patch baseline. This can align to whatever your organization’s security posture is. This could be everything patched up to the moment, or a specific package at a specific version. You get a list of hosts and whether they are compliant or non-compliant to the baseline. This is how you can perform automated patching.
  17. Now let’s look at Run Command. Subtle feature. But very powerful from a security perspective.
  18. For an analogy here, I will take you back to the 90s. There was a movie with some dinosaurs, in some kind of park. It was a Jurassic type of park. (CC Image) - https://www.livescience.com/16521-image-gallery-tyrannosaurus-rex-dinosaurs.html
  19. One of the characters in the movie basically gives a perfect example of an insider threat. He shows how a disgruntled employee can execute some malicious code. And then cover his tracks. In the movie, he types a command called “White rabbit”. (CC Image) - https://www.maxpixel.net/Freedom-White-Rabbit-Bunny-Grass-Animal-Cute-3267568
  20. Then suddenly every gate in the park opens up and chaos ensues. Velociraptors are terrorizing people everywhere. (CC Image) - https://pxhere.com/en/photo/851957
  21. This later leads to workplace safety posters like this. Likely pinned up in the lunchroom. (CC Image) - https://www.amazon.com/Raptor-Dinosaur-Velociraptor-Vinyl-Sticker/dp/B073ZGVTWR
  22. Back to the real world. Insider threat can be a problem when you have no view into what people are doing at the operating system level. It’s a challenge to track OS commands issued, across various OSes. Need to think about moving away from giving developers and staff direct OS access for high security environments.
  23. If you are a security practitioner, this should interest you. Because everything is API-based, all OS commands issued get logged by CloudTrail. Who/what/when/from where/what was the response. Across diverse OSes.
  24. Now let’s take this further. An even better option is to store CloudTrail logs in a separate central security account, limited to the security team. Developers and administrators cannot access or alter the CloudTrail logs.
  25. Session Manager
  26. Session Manager Bash shell or PowerShell All commands logged to CloudTrail. Access control via IAM.
  27. This is a GuardDuty kill chain.
  28. First create the CloudWatch rule that defines the event source. GuardDuty detections in this case.
  29. Then build a Lambda responder. This is a simple 8 line Lambda function. Drop in a specific action.
  30. Back to the GuardDuty kill chain. In this case, we could shut down the compromised instance. Or disconnect it’s Elastic Network Interface.
  31. Back in the on-premises world, the BC-era (‘before cloud’) --> host compromised --> pull RJ-45. Move server to isolated lab. Even use CloudFormation for tools servers. Cloud is API-based --> Automated incident response.
  32. Let’s talk about networking. I’m sure we’ve all seen a data center like this. (CC Image) - https://peterskastner.wordpress.com/2011/02/23/cisco-the-lion-king-fights-for-data-center-fabric-leadership/
  33. Or like this. Check out the mat over the cables. In a traditional data center, visibility and accountability can be problematic. There are always some unknown servers in the corner Or network cables going somewhere unknown. (CC Image) - https://dcbureau.files.wordpress.com/2008/08/cable-mess.jpg
  34. VPC Flow Logs give visibility and traceability. Lambda doesn’t have to do just one thing. If you use a ticketing service that supports and API, have Lambda open a ticket that indicates: - What the actor was doing - What the resource was - What the automated action was - Whether the action was successful or not All documented inside the ticket.
  35. Threat intel feeds – could be 3rd party or based on your telemetry from security edge monitoring. Possible to do directly from S3 to Lambda, but showing SNS for a reason, which you’ll see on the next slide. Option would be pushing IP blacklist ranges to a WAF.
  36. Solution can be used generically to push from a central account to multiple member accounts.
  37. How do we make sure that people only do things that we want them to do? (CC Image) - https://commons.wikimedia.org/wiki/File:Denver_boot.jpg
  38. AWS Config also supports centralized multi-account management. You can have an enterprise-wide view of your compliance status.
  39. Even better, how can we automate remediation based on what AWS Config rules discover?
  40. Lets talk about access control. (CC image) - https://commons.wikimedia.org/wiki/File:Nuclear_Plant_Security-_Access_Control_Gates_(9680484758).jpg
  41. IAM Access Advisor shows - Service permissions granted to users and roles - When those services were last accessed
  42. Athena is a serverless SQL service.
  43. Solutions from Netflix: Aardvark - PhantomJS to login to the console and scrape Access Advisor information. Database --> REST-based API. Repokid (repossess), uses the data from Aardvark to analyze operations vs permissions needed over time. It will then repossess permissions and bring roles down to least privilege. Monitoring | testing | tuning – can significantly improve security posture if used carefully.
  44. AWS has a global network of regions. Your workloads can run anywhere. A common guardrail (especially for Protected B) would be to limit workloads only to run in Canada. How do we do this?
  45. IAM policy. Wall of text.
  46. Lets talk about when you have to manage a whole bunch of AWS accounts. (CC Image) - https://www.flickr.com/photos/aquamech-utah/24778841180
  47. SCPs – blacklist or whitelist at the service level SCPs cannot be overridden by the local account Analogy – similar to the concept in Windows of the Domain Admin vs Local Admin, and Group Policy Objects
  48. No cost to the Landing Zone Solution itself. Pay for the resources you launch and use.
  49. Member accounts are tied in to the management structure above. Centralized logging, security access, and authentication.
  50. Summary --> ideas covered. Repeated theme = automation. People --> mistakes | good intentions | credentials-locations-mfa | repeatability-high stress Leverage automation as much as possible. Automation --> waking up | sleep-eat-coffee Leverage automation --> things get done consistently. One final thought --> thinking more broadly beyond just the security benefits of automation. By-product of automation --> becomes an Employee Retention Investment. Think --> No longer doing --> undifferentiated heavy lifting | repetitive tasks Opportunity to --> learn new things | innovate | experiment. Hopefully means --> work becomes more interesting | varied | meaningful.