SlideShare ist ein Scribd-Unternehmen logo
1 von 32
Downloaden Sie, um offline zu lesen
Hart Rossman—AWS Principal Security Consultant 
Bill Shinn—AWS Principal Security Solutions Architect 
Brent Funk—Boeing, Chief Architect, Commercial Digital Aviation PaaS 
November 13, 2014 | Las Vegas, NV
Organizes and describes the perspectives in planning, creating, managing, and supporting a modern IT service. 
Offers practical guidance and comprehensive guidelines for establishing, developing and running AWS cloud-enabled environments. 
It provides a structure where business and IT can work together towards common strategy and vision, supported by modern IT automation and process optimization. 
People 
Perspective 
Process 
Perspective 
Security 
Perspective 
Maturity 
Perspective 
Platform 
Perspective 
Operating 
Perspective 
Business 
Perspective
0 
13 
16 
23 
51 
70 
167 
24 
48 
61 
82 
159 
280 
454 
0% 
5% 
10% 
15% 
20% 
25% 
30% 
35% 
40% 
0 
50 
100 
150 
200 
250 
300 
350 
400 
450 
500 
2008 
2009 
2010 
2011 
2012 
2013 
2014 
Security Features 
All Significant Features and Services 
Percent
Enterprise
Security Program 
Reference Architectures 
Asset Management 
Identity Lifecycle Management 
Ubiquitous Logging 
Security Management Layer 
DevSecOps 
Security Services & API 
Just In Time Access 
The Basics
AWS Foundation Services 
Compute Storage Database Networking 
AWS Global 
Infrastructure Regions 
Availability Zones 
Edge Locations 
Client-side Data 
Encryption 
Server-side Data 
Encryption 
Network Traffic 
Protection 
Platform, Applications, Identity & Access Management 
Operating System, Network & Firewall Configuration 
Customer content 
Customers 
Customers are 
responsible for 
their security IN 
the Cloud 
AWS is 
responsible for 
the security OF 
the Cloud
Foundation Services 
Compute Storage Database Networking 
AWS Global 
Infrastructure Regions 
Availability Zones 
Edge Locations 
Governance & 
Risk 
Business 
• Culture of security and continual 
improvement 
• Ongoing audits and assurance 
• Protection of large-scale service 
endpoints 
Enterprise 
Security 
Operations 
Compliance 
• Lead change 
• Audits & assurance 
• Protection of workloads, shared 
services, interconnects 
• MSB definition 
• Cloud security operations 
Product & Platform Teams • MSB customization 
• Application/Platform infrastructure 
• Security development lifecycle 
Enterprise 
Security 
Extending
Foundation Services 
Compute Storage Database Networking 
AWS Global 
Infrastructure Regions 
Availability Zones 
Edge Locations 
Governance & 
Risk 
Business 
Partners 
Security 
Operations 
Compliance 
Product & Platform Teams 
Enterprise 
Security 
Extending 
Partner Ecosystem
Capability 
Principle 
Action 
Anticipate 
Infrastructure as code 
Skill up security team in code & automation. DevSecOps. 
Design guard rails not gates 
Architectto drive towards good behavior 
Deter 
Use the cloudto protect the cloud 
Build, operate, and manage security tools in the cloud. 
Stay current, run secure 
Consume new security features. Patch and replace frequently. 
Reduce reliance on persistentaccess 
Establishrole catalog;automate KMI via secrets service 
Detect 
Total visibility 
Aggregate AWS logs and metadata with OS & App logs 
Deep insights 
Security data warehouse with BI & analytics 
Respond 
Scalable incident response 
Update IR SOP for shared responsibility framework 
Forensic readiness 
Updateworkloads to support forensic readiness and containment 
Recover 
Automate 
Continuous Integration & Continuous Deployment
E 
C 
2 
E 
C 
2 
Amazon S3 
Customers 
Distributed 
attackers 
Distributed 
attackers 
Amazon 
Route 53 
Region
Central Account 
(Trusted) 
SecUser 
IAM User 
IAM IAM IAM IAM IAM IAM 
BU Accounts (Trusting) 
SecRole SecRole SecRole SecRole SecRole SecRole 
IAM 
Centralized Governance w/ IAM Role Catalog
Proprietary: 
The information contained herein is proprietary to The Boeing Company and shall not be reproduced or disclosed in whole or in part or used for any reason except when such user possesses direct, written authorization from The Boeing Company. 
The statements contained herein are based on good faith assumptions and provided for general information purposes only. Thesestatements do not constitute an offer, promise, warranty orguarantee of performance. Actual results may vary depending on certainevents or conditions. This document should not be used or relied upon for any purpose other than that intended by Boeing. 
BOEING is a trademark of Boeing Management Company.
•SOA 
–Publish/subscribe model 
–Data/Functions/Visualization 
–Internal/External services models 
•Secure 
–VPC Perimeter security 
–VPC to VPC Peering 
–Intra-VPC security 
–Logging and Auditing 
•Message Oriented Middleware 
–Enterprise Service Bus 
–Global Registry 
–Global Security 
–Load balanced
•Logstash 
–Filtering 
•Kibana 
–Visualization 
•ElasticSearch 
–Indexing
SQS Queue 
Auto Scaling Group 
ElasticSearch 
Auto Scaling Group 
Kibana 
Internal Elastic Load Balancing 
Internal Elastic Load Balancing 
Auto Scaling Group 
Reverse Proxy 
Auto Scaling Group 
Logstash Indexer 
HTTP Traffic 
HTTPS Traffic 
Log Shipping 
via Amazon SQS 
CloudWatch Alarm 
CloudWatch Alarm 
Scale Down 
Alarm 
Scale Up 
Alarm
•Expedited Root Cause Analysis Activities 
–Streaming ingest of log data –every 5 seconds. 
–Security tie-ins from application to networking to infrastructure. 
–Dynamic correlation of data within a single location resulting in quicker RCA activities. 
•Immediate Validation of Security Incident Remediation 
•Allows for Segregation of Duties for Threat Analysis vs. Operational Configuration/Support
Peer Review 
•Shared Infrastructure Security Services moved to VPC 
•1 to 1 Peering = App Isolation 
•Security Groups and NACLs still apply 
AWS region 
Public-facing 
web app 
Internal 
company 
app #1 
HA pair VPN endpoints 
company data center 
Internal 
company 
app #2 
Internal 
company 
app #3 
Internal 
company 
app #4 
Services 
VPC 
Internal 
company 
Dev 
Internal 
company 
QA 
AD, DNS 
Monitoring 
Logging 
•Security Groups still bound to single VPC
Version 
Control 
CI 
Server 
Package 
Builder 
Deploy 
Commit to Server 
Dev Git/master 
Pull 
Code 
AMIs 
Send Build Report to Dev 
Stop everything if build failed 
Staging Env 
Test Env 
Code 
Config 
Tests 
Prod Env 
Push 
Config Install 
Create 
Repo 
AWS CloudFormation 
Templates for Env 
Generate 
Security 
Repository 
Vulnerability 
and pen 
testing 
•Security Infrastructure 
tests 
•Security unit tests in 
app
Pull Push 
Source Code 
Repository 
Baseline 
IAM Catalog 
Trusting BU Accounts 
SecRole 
IAM Role 
Develop 
Review 
Test 
Approve 
Commit 
Ruby 
AKID/SAK 
1 2 
Admin 
3 
5 
STS 
Creds 
4
Security Program 
Reference Architectures 
Asset Management 
Identity Lifecycle Management 
Ubiquitous Logging 
Security Management Layer 
DevSecOps 
Security Services & API 
Just In Time Access 
The Basics
http://bit.ly/awsevals

Weitere ähnliche Inhalte

Was ist angesagt?

Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Amazon Web Services
 

Was ist angesagt? (20)

Getting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute ServicesGetting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute Services
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The Cloud(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The Cloud
 
網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間網路安全自動化 - 縮短應用維安的作業時間
網路安全自動化 - 縮短應用維安的作業時間
 
(WEB302) Best Practices for Running WordPress on AWS | AWS re:Invent 2014
(WEB302) Best Practices for Running WordPress on AWS | AWS re:Invent 2014(WEB302) Best Practices for Running WordPress on AWS | AWS re:Invent 2014
(WEB302) Best Practices for Running WordPress on AWS | AWS re:Invent 2014
 
Getting Started with Amazon Inspector
Getting Started with Amazon InspectorGetting Started with Amazon Inspector
Getting Started with Amazon Inspector
 
(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud(SEC202) Best Practices for Securely Leveraging the Cloud
(SEC202) Best Practices for Securely Leveraging the Cloud
 
AWS APAC Webinar Week - Understanding AWS Storage Options
AWS APAC Webinar Week - Understanding AWS Storage OptionsAWS APAC Webinar Week - Understanding AWS Storage Options
AWS APAC Webinar Week - Understanding AWS Storage Options
 
February 2016 Webinar Series - Introducing VPC Support for AWS Lambda
February 2016 Webinar Series - Introducing VPC Support for AWS LambdaFebruary 2016 Webinar Series - Introducing VPC Support for AWS Lambda
February 2016 Webinar Series - Introducing VPC Support for AWS Lambda
 
Managing your identities in the cloud with AWS and Microsoft Active Directory...
Managing your identities in the cloud with AWS and Microsoft Active Directory...Managing your identities in the cloud with AWS and Microsoft Active Directory...
Managing your identities in the cloud with AWS and Microsoft Active Directory...
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS APAC Webinar Week - Getting The Most From EC2
AWS APAC Webinar Week - Getting The Most From EC2AWS APAC Webinar Week - Getting The Most From EC2
AWS APAC Webinar Week - Getting The Most From EC2
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel AvivIAM Best Practices to Live By - Pop-up Loft Tel Aviv
IAM Best Practices to Live By - Pop-up Loft Tel Aviv
 
Secure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAFSecure Content Delivery Using Amazon CloudFront and AWS WAF
Secure Content Delivery Using Amazon CloudFront and AWS WAF
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
(SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less
 
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
 
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
 

Andere mochten auch

Andere mochten auch (15)

(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
(GAM302) EA's Real-World Hurdles with Millions of Players in the Simpsons: Ta...
(GAM302) EA's Real-World Hurdles with Millions of Players in the Simpsons: Ta...(GAM302) EA's Real-World Hurdles with Millions of Players in the Simpsons: Ta...
(GAM302) EA's Real-World Hurdles with Millions of Players in the Simpsons: Ta...
 
Journey Through the AWS Cloud: Cost Optimisation
Journey Through the AWS Cloud: Cost OptimisationJourney Through the AWS Cloud: Cost Optimisation
Journey Through the AWS Cloud: Cost Optimisation
 
(PFC308) How Dropbox Scales Massive Workloads Using Amazon SQS | AWS re:Inven...
(PFC308) How Dropbox Scales Massive Workloads Using Amazon SQS | AWS re:Inven...(PFC308) How Dropbox Scales Massive Workloads Using Amazon SQS | AWS re:Inven...
(PFC308) How Dropbox Scales Massive Workloads Using Amazon SQS | AWS re:Inven...
 
Spark Summit EU talk by Berni Schiefer
Spark Summit EU talk by Berni SchieferSpark Summit EU talk by Berni Schiefer
Spark Summit EU talk by Berni Schiefer
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
AWS re:Invent 2016: 5 Security Automation Improvements You Can Make by Using ...
 
(SEC201) How Should We All Think About Security?
(SEC201) How Should We All Think About Security?(SEC201) How Should We All Think About Security?
(SEC201) How Should We All Think About Security?
 
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
AWS re:Invent 2016: Encryption: It Was the Best of Controls, It Was the Worst...
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best Practices
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 

Ähnlich wie (SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Invent 2014

Ähnlich wie (SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Invent 2014 (20)

(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
An Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the CloudAn Evolving Security Landscape – Security Patterns in the Cloud
An Evolving Security Landscape – Security Patterns in the Cloud
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
How We Should Think About Security
How We Should Think  About SecurityHow We Should Think  About Security
How We Should Think About Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Application Migrations
Application MigrationsApplication Migrations
Application Migrations
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
Running Regulated Workloads on Azure PaaS services (DogFoodCon 2018)
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rs
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

Mehr von Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Kürzlich hochgeladen

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Kürzlich hochgeladen (20)

[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Invent 2014

  • 1. Hart Rossman—AWS Principal Security Consultant Bill Shinn—AWS Principal Security Solutions Architect Brent Funk—Boeing, Chief Architect, Commercial Digital Aviation PaaS November 13, 2014 | Las Vegas, NV
  • 2. Organizes and describes the perspectives in planning, creating, managing, and supporting a modern IT service. Offers practical guidance and comprehensive guidelines for establishing, developing and running AWS cloud-enabled environments. It provides a structure where business and IT can work together towards common strategy and vision, supported by modern IT automation and process optimization. People Perspective Process Perspective Security Perspective Maturity Perspective Platform Perspective Operating Perspective Business Perspective
  • 3. 0 13 16 23 51 70 167 24 48 61 82 159 280 454 0% 5% 10% 15% 20% 25% 30% 35% 40% 0 50 100 150 200 250 300 350 400 450 500 2008 2009 2010 2011 2012 2013 2014 Security Features All Significant Features and Services Percent
  • 5. Security Program Reference Architectures Asset Management Identity Lifecycle Management Ubiquitous Logging Security Management Layer DevSecOps Security Services & API Just In Time Access The Basics
  • 6.
  • 7. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers Customers are responsible for their security IN the Cloud AWS is responsible for the security OF the Cloud
  • 8. Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Governance & Risk Business • Culture of security and continual improvement • Ongoing audits and assurance • Protection of large-scale service endpoints Enterprise Security Operations Compliance • Lead change • Audits & assurance • Protection of workloads, shared services, interconnects • MSB definition • Cloud security operations Product & Platform Teams • MSB customization • Application/Platform infrastructure • Security development lifecycle Enterprise Security Extending
  • 9. Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Governance & Risk Business Partners Security Operations Compliance Product & Platform Teams Enterprise Security Extending Partner Ecosystem
  • 10. Capability Principle Action Anticipate Infrastructure as code Skill up security team in code & automation. DevSecOps. Design guard rails not gates Architectto drive towards good behavior Deter Use the cloudto protect the cloud Build, operate, and manage security tools in the cloud. Stay current, run secure Consume new security features. Patch and replace frequently. Reduce reliance on persistentaccess Establishrole catalog;automate KMI via secrets service Detect Total visibility Aggregate AWS logs and metadata with OS & App logs Deep insights Security data warehouse with BI & analytics Respond Scalable incident response Update IR SOP for shared responsibility framework Forensic readiness Updateworkloads to support forensic readiness and containment Recover Automate Continuous Integration & Continuous Deployment
  • 11.
  • 12.
  • 13. E C 2 E C 2 Amazon S3 Customers Distributed attackers Distributed attackers Amazon Route 53 Region
  • 14.
  • 15. Central Account (Trusted) SecUser IAM User IAM IAM IAM IAM IAM IAM BU Accounts (Trusting) SecRole SecRole SecRole SecRole SecRole SecRole IAM Centralized Governance w/ IAM Role Catalog
  • 16. Proprietary: The information contained herein is proprietary to The Boeing Company and shall not be reproduced or disclosed in whole or in part or used for any reason except when such user possesses direct, written authorization from The Boeing Company. The statements contained herein are based on good faith assumptions and provided for general information purposes only. Thesestatements do not constitute an offer, promise, warranty orguarantee of performance. Actual results may vary depending on certainevents or conditions. This document should not be used or relied upon for any purpose other than that intended by Boeing. BOEING is a trademark of Boeing Management Company.
  • 17. •SOA –Publish/subscribe model –Data/Functions/Visualization –Internal/External services models •Secure –VPC Perimeter security –VPC to VPC Peering –Intra-VPC security –Logging and Auditing •Message Oriented Middleware –Enterprise Service Bus –Global Registry –Global Security –Load balanced
  • 18.
  • 19. •Logstash –Filtering •Kibana –Visualization •ElasticSearch –Indexing
  • 20.
  • 21. SQS Queue Auto Scaling Group ElasticSearch Auto Scaling Group Kibana Internal Elastic Load Balancing Internal Elastic Load Balancing Auto Scaling Group Reverse Proxy Auto Scaling Group Logstash Indexer HTTP Traffic HTTPS Traffic Log Shipping via Amazon SQS CloudWatch Alarm CloudWatch Alarm Scale Down Alarm Scale Up Alarm
  • 22. •Expedited Root Cause Analysis Activities –Streaming ingest of log data –every 5 seconds. –Security tie-ins from application to networking to infrastructure. –Dynamic correlation of data within a single location resulting in quicker RCA activities. •Immediate Validation of Security Incident Remediation •Allows for Segregation of Duties for Threat Analysis vs. Operational Configuration/Support
  • 23.
  • 24.
  • 25. Peer Review •Shared Infrastructure Security Services moved to VPC •1 to 1 Peering = App Isolation •Security Groups and NACLs still apply AWS region Public-facing web app Internal company app #1 HA pair VPN endpoints company data center Internal company app #2 Internal company app #3 Internal company app #4 Services VPC Internal company Dev Internal company QA AD, DNS Monitoring Logging •Security Groups still bound to single VPC
  • 26.
  • 27.
  • 28. Version Control CI Server Package Builder Deploy Commit to Server Dev Git/master Pull Code AMIs Send Build Report to Dev Stop everything if build failed Staging Env Test Env Code Config Tests Prod Env Push Config Install Create Repo AWS CloudFormation Templates for Env Generate Security Repository Vulnerability and pen testing •Security Infrastructure tests •Security unit tests in app
  • 29.
  • 30. Pull Push Source Code Repository Baseline IAM Catalog Trusting BU Accounts SecRole IAM Role Develop Review Test Approve Commit Ruby AKID/SAK 1 2 Admin 3 5 STS Creds 4
  • 31. Security Program Reference Architectures Asset Management Identity Lifecycle Management Ubiquitous Logging Security Management Layer DevSecOps Security Services & API Just In Time Access The Basics