SlideShare ist ein Scribd-Unternehmen logo
1 von 37
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Will St. Clair
Sr. Solutions Architect, Amazon Web Services
194360
Security Automation using AWS
Management Tools
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Confidentiality
Availability
Workloads
Classify workloads based on impact
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Availability
Confidentiality
Individual dev/test
Web/digital Critical external apps
Sensitive internal apps
Team dev/test
Low-risk apps
Exploratory research/analytics
Data science dev/test
Classify workloads based on impact
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Availability
Confidentiality
Classify workloads based on impact
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Confidentiality
Risk of
change
Classify workloads based on impact
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Impact levelLESS IMPACT MORE IMPACT
Controls
Low
Medium
Medium
Medium-High
High
Controls are additive
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use AWS accounts as impact and workload
boundaries
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Organizations
• Policy-based management for multiple AWS accounts
• Create new AWS accounts using the organization’s API
• Organize accounts into groups and then apply policies to those
groups
• Consolidate bills for all accounts in your organization and use a
single payment method
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Account Lifecycle
Identify need Determine
classification
Provision
AWS account
Apply security
baseline
Monitor and
respond
Periodically
review
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatchAWS ConfigAWS CloudTrail
CloudWatch
Events
AWS Config
Rules
IAM
Managed
Policies
Roles
Amazon VPC
Flow logs
What’s in a baseline?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudFormation
AWS CloudFormation is a service that provides a common language for you to
describe and provision all your infrastructure resources for your AWS
environment.
Template
JSON or YAML document
Infrastructure as code
Comprehensive service
support
Change Sets
Computes changes to the
environment
Allows for review and
approval
Stack
Configured AWS services
Nested stacks
Cross-stack references
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Distributing standardized configurations
AWS Service Catalog
Create self-service portfolios of
IT products and services
Define products using
CloudFormation templates
AWS CloudFormation
Stack Sets
Easily manage common
stacks across accounts
and regions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Demo: Baseline account configurations
using AWS CloudFormation StackSets
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudTrail
AWS CloudTrail provides a history of your AWS account activity, including actions
taken through the AWS Management Console, AWS SDKs, command-line tools,
and other AWS services.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudTrail use cases
• Meet compliance controls by having durable and auditable
activity logs
• Gain visibility into IAM user activity
• Detect access to sensitive data from unauthorized
networks or IP addresses
• Troubleshoot misconfigured permissions for applications
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Best Practices for Amazon CloudTrail
• As part of your security baseline, create a trail within all
accounts which aggregates events from all regions
• Log to a single S3 bucket in a central account
• Use AWS KMS encryption
• Has log file validation enabled
• Logs both management and data events for all resources
• Integrate with CloudWatch Logs to create derived metrics
• Use CloudWatch Events to report high-value events to
ticketing or chat systems
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config
• Continuous recording and continuous assessment
service
• Tracks configuration changes to AWS resources
• Records snapshots of resource configuration state
• See and alert on whether an environment is in or out of
compliance
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config
Resource state
changes
AWS Config Configuration
snapshots
AWS Config Rules Compliance
state
Amazon S3 Aggregation and
analysis
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config Rules
Create rules which reflect your desired state for the environment and alert when
the environment is non-compliant. Choose from built-in rules or write your own
using AWS Lambda.
Are my EBS volumes encrypted?
Do I have S3 buckets open to the public?
Is there outdated software running on my instances?
Are my RDS instances being backed up?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config Dashboard
Aggregate rule compliance information across accounts and regions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Best Practices for AWS Config
• Deliver configuration snapshots to a single central S3
bucket
• Parse out key information, such as resource IP
addresses, hostnames, and AMI IDs for analysis
alongside your logs
• Use AWS CloudFormation and StackSets to deploy rules
into AWS accounts
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Demo: Monitoring compliance
using AWS Config
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Systems Manager
AWS Systems Manager allows you to centralize operational data from multiple
AWS services and automate tasks across your AWS resources.
State Manager
Define and maintain
consistent configuration of
operating systems and
resources running in your
data center or in AWS
Inventory
Collect system and
application configuration
information from your
instances
Patch Manager
Select and deploy operating
system and software
patches automatically
across your instances
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Systems Manager Demo
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Secrets Manager
AWS Secrets Manager helps you manage, rotate, and retrieve database
credentials, API keys, and other secrets throughout their lifecycle. Applications
securely retrieve credentials on-demand, eliminating hardcoded or plaintext
storage of sensitive information.
Fine-grained
access controls
Managed credential
rotation
Integration with
Amazon RDS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Secrets Manager Demo
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Classify workloads and define controls
Provision and baseline your environments
Secure and monitor AWS configuration
Secure and monitor your workloads
Respond and remediate
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Events
Amazon
CloudWatch
Service Events
Scheduled Events
{
"source": ...,
"detail-type": ...,
"detail": ...
}
Event Pattern Event Target
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Events Targets
EC2
(Snapshot, stop,
reboot, terminate)
AWS Batch
Amazon Elastic
Container Service
AWS CodeBuild
AWS CodePipeline
AWS Systems Manager Amazon Inspector
Amazon KinesisAmazon SQS
Amazon SNS AWS Lambda
AWS Step
Functions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Events Sources
API Calls
Scheduled events
Amazon EBS
Amazon EC2
Amazon ECS
Amazon EMR
Amazon GameLift
Amazon GuardDuty
Amazon Macie
EC2 Auto Scaling
AWS Batch
AWS CodeBuild
AWS CodeCommit
AWS CodeDeploy
AWS CodePipeline
AWS Glue
Service events
AWS Health
AWS Key Management Service
AWS OpsWorks Stacks
AWS Server Migration Service
AWS Systems Manager
AWS Trusted Advisor
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Demo: Automatically remediate using
CloudWatch Events
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!

Weitere ähnliche Inhalte

Was ist angesagt?

Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Amazon Web Services
 
Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change: Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change: Amazon Web Services
 
AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models Amazon Web Services
 
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_Singapore
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_SingaporeAWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_Singapore
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_SingaporeAmazon Web Services
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...Amazon Web Services
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Amazon Web Services
 
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...Amazon Web Services
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Amazon Web Services
 
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018Amazon Web Services
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Amazon Web Services
 
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Amazon Web Services
 
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...Amazon Web Services
 
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...Amazon Web Services
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...Amazon Web Services
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Amazon Web Services
 
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignAmazon Web Services
 
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...Amazon Web Services
 

Was ist angesagt? (20)

Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS
 
Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change: Detective Controls: Gain Visibility and Record Change:
Detective Controls: Gain Visibility and Record Change:
 
AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models
 
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_Singapore
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_SingaporeAWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_Singapore
AWS Accounts@Scale Using AWS Landing Zone_AWSPSSummit_Singapore
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
 
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...
Optimize Performance and Reduce Risk Using AWS Support Tools (ENT316-R1) - AW...
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
 
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
 
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
 
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...
How Zocdoc Achieves Automatic Threat Detection & Remediation with Security as...
 
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
IAM for Enterprises: How Vanguard Matured IAM Controls to Support Micro Accou...
 
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
Using AWS to Ingest, Store, Archive, Share and carry out Analysis of Video Co...
 
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...
Unleash the Power of Temporary AWS Credentials (a.k.a. IAM roles) (SEC390-R1)...
 

Ähnlich wie Security Automation using AWS Management Tools

Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...
Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...
Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...Amazon Web Services
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Amazon Web Services
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfAmazon Web Services
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Deep dive - AWS security by design
Deep dive - AWS security by designDeep dive - AWS security by design
Deep dive - AWS security by designRichard Harvey
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitAmazon Web Services
 
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Amazon Web Services
 
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018Amazon Web Services
 
Identity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftIdentity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftAmazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfSecuring Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfAmazon Web Services
 
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech TalksLaunch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech TalksAmazon Web Services
 
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018Amazon Web Services
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAmazon Web Services
 
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Amazon Web Services
 

Ähnlich wie Security Automation using AWS Management Tools (20)

Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...
Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...
Control for Your Cloud Environment Using AWS Management Tools (ENT226-R1) - A...
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Deep dive - AWS security by design
Deep dive - AWS security by designDeep dive - AWS security by design
Deep dive - AWS security by design
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
 
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018
Operationalizing Microsoft Workloads (WIN320) - AWS re:Invent 2018
 
Identity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftIdentity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdfSecuring Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
Securing Customer Data from Day 1 - AWS Startup Day Boston 2018.pdf
 
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech TalksLaunch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
 
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018
Crash Course in Security Best Practices, AWS Startup Day Cape Town 2018
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
 
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security Automation using AWS Management Tools

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Will St. Clair Sr. Solutions Architect, Amazon Web Services 194360 Security Automation using AWS Management Tools
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Confidentiality Availability Workloads Classify workloads based on impact
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Availability Confidentiality Individual dev/test Web/digital Critical external apps Sensitive internal apps Team dev/test Low-risk apps Exploratory research/analytics Data science dev/test Classify workloads based on impact
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Availability Confidentiality Classify workloads based on impact
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Confidentiality Risk of change Classify workloads based on impact
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Impact levelLESS IMPACT MORE IMPACT Controls Low Medium Medium Medium-High High Controls are additive
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use AWS accounts as impact and workload boundaries
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Organizations • Policy-based management for multiple AWS accounts • Create new AWS accounts using the organization’s API • Organize accounts into groups and then apply policies to those groups • Consolidate bills for all accounts in your organization and use a single payment method
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Account Lifecycle Identify need Determine classification Provision AWS account Apply security baseline Monitor and respond Periodically review
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatchAWS ConfigAWS CloudTrail CloudWatch Events AWS Config Rules IAM Managed Policies Roles Amazon VPC Flow logs What’s in a baseline?
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudFormation AWS CloudFormation is a service that provides a common language for you to describe and provision all your infrastructure resources for your AWS environment. Template JSON or YAML document Infrastructure as code Comprehensive service support Change Sets Computes changes to the environment Allows for review and approval Stack Configured AWS services Nested stacks Cross-stack references
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Distributing standardized configurations AWS Service Catalog Create self-service portfolios of IT products and services Define products using CloudFormation templates AWS CloudFormation Stack Sets Easily manage common stacks across accounts and regions
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Demo: Baseline account configurations using AWS CloudFormation StackSets
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail AWS CloudTrail provides a history of your AWS account activity, including actions taken through the AWS Management Console, AWS SDKs, command-line tools, and other AWS services.
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail use cases • Meet compliance controls by having durable and auditable activity logs • Gain visibility into IAM user activity • Detect access to sensitive data from unauthorized networks or IP addresses • Troubleshoot misconfigured permissions for applications
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Best Practices for Amazon CloudTrail • As part of your security baseline, create a trail within all accounts which aggregates events from all regions • Log to a single S3 bucket in a central account • Use AWS KMS encryption • Has log file validation enabled • Logs both management and data events for all resources • Integrate with CloudWatch Logs to create derived metrics • Use CloudWatch Events to report high-value events to ticketing or chat systems
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config • Continuous recording and continuous assessment service • Tracks configuration changes to AWS resources • Records snapshots of resource configuration state • See and alert on whether an environment is in or out of compliance
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config Resource state changes AWS Config Configuration snapshots AWS Config Rules Compliance state Amazon S3 Aggregation and analysis
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config Rules Create rules which reflect your desired state for the environment and alert when the environment is non-compliant. Choose from built-in rules or write your own using AWS Lambda. Are my EBS volumes encrypted? Do I have S3 buckets open to the public? Is there outdated software running on my instances? Are my RDS instances being backed up?
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config Dashboard Aggregate rule compliance information across accounts and regions
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Best Practices for AWS Config • Deliver configuration snapshots to a single central S3 bucket • Parse out key information, such as resource IP addresses, hostnames, and AMI IDs for analysis alongside your logs • Use AWS CloudFormation and StackSets to deploy rules into AWS accounts
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Demo: Monitoring compliance using AWS Config
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Systems Manager AWS Systems Manager allows you to centralize operational data from multiple AWS services and automate tasks across your AWS resources. State Manager Define and maintain consistent configuration of operating systems and resources running in your data center or in AWS Inventory Collect system and application configuration information from your instances Patch Manager Select and deploy operating system and software patches automatically across your instances
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Systems Manager Demo
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Secrets Manager AWS Secrets Manager helps you manage, rotate, and retrieve database credentials, API keys, and other secrets throughout their lifecycle. Applications securely retrieve credentials on-demand, eliminating hardcoded or plaintext storage of sensitive information. Fine-grained access controls Managed credential rotation Integration with Amazon RDS
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Secrets Manager Demo
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Classify workloads and define controls Provision and baseline your environments Secure and monitor AWS configuration Secure and monitor your workloads Respond and remediate
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Events Amazon CloudWatch Service Events Scheduled Events { "source": ..., "detail-type": ..., "detail": ... } Event Pattern Event Target
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Events Targets EC2 (Snapshot, stop, reboot, terminate) AWS Batch Amazon Elastic Container Service AWS CodeBuild AWS CodePipeline AWS Systems Manager Amazon Inspector Amazon KinesisAmazon SQS Amazon SNS AWS Lambda AWS Step Functions
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Events Sources API Calls Scheduled events Amazon EBS Amazon EC2 Amazon ECS Amazon EMR Amazon GameLift Amazon GuardDuty Amazon Macie EC2 Auto Scaling AWS Batch AWS CodeBuild AWS CodeCommit AWS CodeDeploy AWS CodePipeline AWS Glue Service events AWS Health AWS Key Management Service AWS OpsWorks Stacks AWS Server Migration Service AWS Systems Manager AWS Trusted Advisor
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Demo: Automatically remediate using CloudWatch Events
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank you!