SlideShare ist ein Scribd-Unternehmen logo
1 von 63
Downloaden Sie, um offline zu lesen
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Threat detection and mitigation in
AWS
Nathan Case
Sr. Solutions Architect, Security Specialist
Amazon Web Services
S E C 2 0 1
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS IAM
AWS Organizations
AWS Cognito
AWS Directory Service
AWS Single Sign-On
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
Amazon EC2
Systems Manager
AWS Shield
AWS WAF
Amazon Inspector
Amazon VPC
AWS KMS
AWS CloudHSM
Amazon Macie
AWS Certificate Manager
Server-side encryption
AWS Config rules
AWS Lambda
AWS Enterprise Support
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS security solutions
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
AWS security services overview
Protect Detect Respond
Automate
Investigate
RecoverIdentify
ArchiveSnapshot
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Why is traditional threat detection so hard?
CostSignal to noiseLarge datasets
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Humans and data donʼt mix
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
AWS CloudTrail
Track user activity
and API usage
VPC Flow Logs
IP traffic to/from
network interfaces in
your VPC
Amazon
CloudWatch Logs
Monitor apps using log
data, store, and access log
files
DNS logs
Log of DNS queries in
a VPC when using the
VPC DNS resolver
Threat detection: Log data inputs
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudTrail
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Detect with Amazon VPC Flow Logs
AWS
account
Source IP
Destination IP
Source port
Destination port
Interface Protocol Packets
Bytes Start and end time
Accept or
reject
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Real-time feed of log events
• Delivered to an Lambda function or an
Amazon Kinesis data streams
• Supports custom processing, analysis,
and loading into other systems
• Cross-account data sharing for
centralized log processing
Amazon CloudWatch Logs subscriptions
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
GuardDuty
Intelligent threat detection and continuous
monitoring to protect your AWS accounts
and workloads
AWS Security Hub
Security Hub gives you a comprehensive view
of your high-priority security alerts and
compliance status across AWS accounts.
Threat detection
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty threat detection and notification
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
AWS Security Hub overview
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security Hub benefits
Managed regional AWS service; aggregates findings across AWS
accounts in minutes
Manage security and compliance findings in a single location, increasing
efficiency of locating relevant data
Create custom insights to track issues unique to your environment
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security Hub workflow
Enable Security Hub for
all your accounts
Account 1
Account 2
Account 3
Conduct automated
compliance scans and
checks
Take action based
on findings
Continuously
aggregate and
prioritize findings
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Compliance standards
• Based on CIS AWS Foundations Benchmark
• Findings are displayed on main dashboard for quick
access
• Best-practices information is provided to help mitigate
issues
Compliance
standards
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security Hub insights
Security findings that are correlated and grouped for prioritization
• More than 20 prebuilt insights provided by AWS and AWS Partner Network
members
• Ability to create your own insights
• Dashboard provides visibility into the top security findings
• Additional details for each finding is available for review
EC2 instances that have
missing security patches
S3 buckets with stored
credentials
S3 buckets with public read and
write permissions
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What can you detect using AWS services?
Infrastructure
VPC resources
Connectivity
On-instance
...
Service
IAM
S3 buckets
Billing
...
Application
Patching
Coding hole
...
Other?
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Availability Zone C
Availability Zone B
VPC CIDR: 10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
10.0.48.0/21
Sensitive subnet
Security groups
Route table
NACLs
Internet gateway
Instance
Amazon
S3
Amazon
RDS
AWS IAM
AWS
CloudHSM
AWS
Organizations
AWSKMS
AWS Directory
Service
Infrastructure and application domains
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Services Domain
Availability Zone C
Availability Zone B
VPC CIDR: 10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
10.0.48.0/21
Sensitive subnet
Security groups
Route table
NACLs
Internet gateway
Instance
Amazon
S3
Amazon
RDS
AWS IAM
AWS
CloudHSM
AWS
Organizations
AWSKMS
AWS Directory
Service
Services domains
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
All Domains
Availability Zone C
Availability Zone B
VPC CIDR: 10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
10.0.48.0/21
Sensitive subnet
Security groups
Route table
NACLs
Internet gateway
Instance
Amazon
S3
Amazon
RDS
AWS IAM
AWS
CloudHSM
AWS
Organizations
AWSKMS
AWS Directory
Service
What can you detect using AWS services?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Visibility to answer the tough questions
• What data do I have in the cloud?
• Where is it located?
• Where does my sensitive data exist?
• What’s sensitive about the data?
• What PII/PHI is possibly exposed?
• How is data being shared and stored?
• How and where is my data accessed?
• How can I classify data in near-real time?
• How do I build workflow remediation for my security and compliance needs?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Visibility to answer the tough questions
Amazon Web Services has opened case ******** on your behalf.
The details of the case are as follows:
Case ID: ********
Subject: Your AWS account ******** is compromised
Severity: Urgent
Correspondence: Dear AWS Customer,
Your AWS Account is compromised! Please review the following notice and take
immediate action to secure your account.
Your security is important to us. We have become aware that the AWS Access Key
******** along with the corresponding Secret Key is publicly available online at
********…
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Amazon CloudWatch Events
Delivers a near-real-time stream of system
events that describe changes in AWS resources
AWS Config rules
Continuously tracks your resource
configuration changes and if they violate
any of the conditions in your rules
Threat detection: Triggers
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
AWS Config rules
A continuous recording and assessment service
Changing resources
AWS Config
AWS Config rules
History
snapshot
Notifications
API access
Normalized
• How are my resources configured over time?
• Is a change that just occurred to a resource compliant?
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudWatch Events
{
"source": [
"aws.guardduty"
]
}
CloudWatch Event
GuardDuty
findings
Lambda
function
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
AWS Systems
Manager
Automate patching and
proactively mitigate threats at
the instance level
AWS Lambda
Capture info about the IP traffic
going to and from network
interfaces in your VPC
Threat remediation: Automation
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
High-level playbook
Adversary or intern Your
environment
Lambda
responder
CloudWatch
Events
AWS Step
Functions
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudWatch
CloudTrail
AWS Config
Lambda
function
AWS APIs
AWS WAF
AWS Shield
Detection
Alerting
Remediation
Countermeasures
Forensics
Team
collaboration
(Slack, etc.)
GuardDuty
VPC Flow Logs
Step Functions
Systems Manager Amazon EC2
Responding to findings: Remediation
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Hopefully, you've seen this already
Developer
sandbox
Dev Pre-prod
Team/group accounts
Security
Core accounts
AWS Organizations
Shared
services
Network
Log archive Prod
Team shared
services
Network path
Developer accounts Data center
Orgs: Account management
Log archive: Security logs
Security: Security tools, AWS Config rules
Shared services: Directory, limit monitoring
Network: AWS Direct Connect
Dev sandbox: Experiments, learning
Dev: Development
Pre-prod: Staging
Prod: Production
Team SS: Team shared services, data lake
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Services
Security
Core accounts
AWS Organizations
Shared
services
Network
Log archive
Network path
Data center
Orgs: Account management
Log archive: Security logs
Security: Security tools, AWS Config rules
Shared services: Directory, limit monitoring
Network: DX
Dev sandbox: Experiments, learning
Dev: Development
Pre-prod: Staging
Prod: Production
Team SS: Team shared services, data lake
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Developers
Developer
sandbox
Team/group accounts
AWS Organizations
Network path
Developer accounts Data center
Orgs: Account management
Log archive: Security logs
Security: Security tools, AWS Config rules
Shared services: Directory, limit monitoring
Network: DX
Dev sandbox: Experiments, learning
Dev: Development
Pre-prod: Staging
Prod: Production
Team SS: Team shared services, data lake
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Connections to team accounts
Developer
sandbox
Team/group accounts
AWS Organizations
Network path
Developer accounts Data center
Orgs: Account management
Log archive: Security logs
Security: Security tools, AWS Config rules
Shared services: Directory, limit monitoring
Network: DX
Dev sandbox: Experiments, learning
Dev: Development
Pre-prod: Staging
Prod: Production
Team SS: Team shared services, data lake
Core accounts
Dev Pre-prod
Team/group accounts
Prod
Team shared
services
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Team versus production accounts
Dev
Prod green
Team/group accounts
Prod blue
Dev pipeline account
Network path
Data center
Orgs: Account management
Log archive: Security logs
Security: Security tools, AWS Config rules
Shared services: Directory, limit monitoring
Network: DX
Dev sandbox: Experiments, learning
Dev: Development
Pre-prod: Staging
Prod: Production
Team SS: Team shared services, data lake
Testing account
Prod pipeline account
Network
Prod/group accounts
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Lambda + Systems Manager + CloudWatch
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
Amazon GuardDuty
AWS Security Hub
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
GUARD DUTY FINDINGS
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
COMMUNICATIONS
MANUAL ACTION
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
COMMUNICATIONS
MANUAL ACTION
Via Amazon API Gateway*
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
elastic network
interface
Security Group
EBS Volume
IAM Profile
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
elastic network
interface
Security Group
EBS Volume
IAM Profile
EBS
Snapshot
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
elastic network
interface
Security Group
EBS Volume
IAM Profile
Amazon S3
bucket
AWS
CloudTrail
EBS
Snapshot
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
elastic network
interface
Security Group
EBS Volume
IAM Profile
EBS
Snapshot
AWS
CloudTrail
Amazon S3
bucket
Forensics Account
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
Instance:~ ec2-user$ top
Instance:~ ec2-user$ pcap
Instance:~ ec2-user$ lime
Instance:~ ec2-user$ dd
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
EBS Volume
IAM Profile
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
EC2 instance contents
Instance:~ ec2-user$
Instance:~ ec2-user$ top
Instance:~ ec2-user$ pcap
Instance:~ ec2-user$ lime
Instance:~ ec2-user$ dd
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
EBS Volume Forensics
EBS IAM Profile
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Forensics
EBS
EBS
Snapshot
Amazon S3
bucket
Forensics Account
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Forensics
EBS
EBS
Snapshot
Amazon S3
bucket
Forensics Account
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Systems
Manager
documents
Amazon
CloudWatch
rule
AWS
Lambda
Lambda
function
AWS Step Functions
BACKDOOR:EC2/XORDDOS
Forensics
EBS
EBS
Snapshot
Amazon S3
bucket
Forensics Account
EASIER DONE THAN SAID.
Amazon GuardDuty
AWS Security Hub
Lambda + Systems Manager + CloudWatch
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
CloudWatch
CloudTrail
AWS Config
Lambda
function
APIs
AWS WAF
AWS Shield
Detection
Alerting
Remediation
Countermeasures
Forensics
Team
collaboration
(Slack, etc.)
GuardDuty
VPC Flow Logs
AWS Step Functions
Systems Manager Amazon EC2
Responding to findings: Remediation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Remediating threats on EC2 instances
• Asynchronously execute
commands
• No need to SSH/RDP
• Commands and output logged
Systems Manager – Run command
EC2 instances
Lambda
function
Systems Manager
Amazon
EC2
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Open-source resources
Prowler
https://github.com/toniblyx/prowler
Cloud Custodian
https://github.com/capitalone/cloud-custodian
Security Monkey
https://github.com/Netflix/security_monkey
Scout2
https://github.com/nccgroup/Scout2
StreamAlert
https://github.com/airbnb/streamalert
CIS AWS Foundations Framework
https://github.com/awslabs/aws-security-benchmark
MozDef
https://github.com/mozilla/MozDef
Thank you!
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Nathan Case
Sr. Solutions Architect, Security Specialist
Amazon Web Services
https://www.linkedin.com/in/nathancase/

Weitere ähnliche Inhalte

Was ist angesagt?

Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Amazon Web Services
 
Accelerate database development and testing with Amazon Aurora - ADB208 - New...
Accelerate database development and testing with Amazon Aurora - ADB208 - New...Accelerate database development and testing with Amazon Aurora - ADB208 - New...
Accelerate database development and testing with Amazon Aurora - ADB208 - New...Amazon Web Services
 
Build sophisticated forecasting and recommendation models - AIM202 - New York...
Build sophisticated forecasting and recommendation models - AIM202 - New York...Build sophisticated forecasting and recommendation models - AIM202 - New York...
Build sophisticated forecasting and recommendation models - AIM202 - New York...Amazon Web Services
 
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Amazon Web Services
 
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Amazon Web Services
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
 
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...Making CI/CD pipelines safer with application monitoring and tracing - MAD202...
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...Amazon Web Services
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the CloudAmazon Web Services
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Amazon Web Services
 
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...Amazon Web Services
 
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Amazon Web Services
 
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitData protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitAmazon Web Services
 
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Amazon Web Services
 
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Amazon Web Services
 
Unified monitoring of the container environment, containers, and applications...
Unified monitoring of the container environment, containers, and applications...Unified monitoring of the container environment, containers, and applications...
Unified monitoring of the container environment, containers, and applications...Amazon Web Services
 
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Amazon Web Services
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Amazon Web Services
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Amazon Web Services
 

Was ist angesagt? (20)

Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
Fraud detection using machine learning with Amazon SageMaker - AIM306 - New Y...
 
Accelerate database development and testing with Amazon Aurora - ADB208 - New...
Accelerate database development and testing with Amazon Aurora - ADB208 - New...Accelerate database development and testing with Amazon Aurora - ADB208 - New...
Accelerate database development and testing with Amazon Aurora - ADB208 - New...
 
Build sophisticated forecasting and recommendation models - AIM202 - New York...
Build sophisticated forecasting and recommendation models - AIM202 - New York...Build sophisticated forecasting and recommendation models - AIM202 - New York...
Build sophisticated forecasting and recommendation models - AIM202 - New York...
 
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
 
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...Making CI/CD pipelines safer with application monitoring and tracing - MAD202...
Making CI/CD pipelines safer with application monitoring and tracing - MAD202...
 
Developing Modern Applications in the Cloud
Developing Modern Applications in the CloudDeveloping Modern Applications in the Cloud
Developing Modern Applications in the Cloud
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
 
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...
Simplify compliance & improve operational efficiency with AWS - SVC302 - Sant...
 
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
 
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS SummitData protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
Data protection using encryption in AWS - SEC201 - Santa Clara AWS Summit
 
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...
Detecting and responding to critical events with AWS IoT Events - SVC205 - Ch...
 
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019 Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
Technology as a means for compliance - GRC206 - AWS re:Inforce 2019
 
Unified monitoring of the container environment, containers, and applications...
Unified monitoring of the container environment, containers, and applications...Unified monitoring of the container environment, containers, and applications...
Unified monitoring of the container environment, containers, and applications...
 
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
 
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
Top five security errors and how to avoid them - DEM09 - Santa Clara AWS Summ...
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 

Ähnlich wie Threat detection and mitigation at AWS - SEC201 - New York AWS Summit

Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWSNathan Case
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitAmazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Amazon Web Services
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Amazon Web Services
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Amazon Web Services
 
So You've Got ATO - Are You Sure You are Secure?
So You've Got ATO - Are You Sure You are Secure?So You've Got ATO - Are You Sure You are Secure?
So You've Got ATO - Are You Sure You are Secure?Amazon Web Services
 
AWS SSA Webinar 11 - Getting started on AWS: Security
AWS SSA Webinar 11 - Getting started on AWS: SecurityAWS SSA Webinar 11 - Getting started on AWS: Security
AWS SSA Webinar 11 - Getting started on AWS: SecurityCobus Bernard
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAmazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & LearnAmazon Web Services
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWSAmazon Web Services
 

Ähnlich wie Threat detection and mitigation at AWS - SEC201 - New York AWS Summit (20)

Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS SummitThreat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
Threat detection and mitigation at AWS - SEC301 - Santa Clara AWS Summit
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
So You've Got ATO - Are You Sure You are Secure?
So You've Got ATO - Are You Sure You are Secure?So You've Got ATO - Are You Sure You are Secure?
So You've Got ATO - Are You Sure You are Secure?
 
AWS SSA Webinar 11 - Getting started on AWS: Security
AWS SSA Webinar 11 - Getting started on AWS: SecurityAWS SSA Webinar 11 - Getting started on AWS: Security
AWS SSA Webinar 11 - Getting started on AWS: Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & Learn
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWS
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Threat detection and mitigation at AWS - SEC201 - New York AWS Summit

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Threat detection and mitigation in AWS Nathan Case Sr. Solutions Architect, Security Specialist Amazon Web Services S E C 2 0 1
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS IAM AWS Organizations AWS Cognito AWS Directory Service AWS Single Sign-On AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs Amazon EC2 Systems Manager AWS Shield AWS WAF Amazon Inspector Amazon VPC AWS KMS AWS CloudHSM Amazon Macie AWS Certificate Manager Server-side encryption AWS Config rules AWS Lambda AWS Enterprise Support Identity Detective control Infrastructure security Incident response Data protection AWS security solutions
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T AWS security services overview Protect Detect Respond Automate Investigate RecoverIdentify ArchiveSnapshot
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Why is traditional threat detection so hard? CostSignal to noiseLarge datasets
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Humans and data donʼt mix
  • 6. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T AWS CloudTrail Track user activity and API usage VPC Flow Logs IP traffic to/from network interfaces in your VPC Amazon CloudWatch Logs Monitor apps using log data, store, and access log files DNS logs Log of DNS queries in a VPC when using the VPC DNS resolver Threat detection: Log data inputs
  • 8. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail
  • 9. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Detect with Amazon VPC Flow Logs AWS account Source IP Destination IP Source port Destination port Interface Protocol Packets Bytes Start and end time Accept or reject
  • 10. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Real-time feed of log events • Delivered to an Lambda function or an Amazon Kinesis data streams • Supports custom processing, analysis, and loading into other systems • Cross-account data sharing for centralized log processing Amazon CloudWatch Logs subscriptions
  • 11. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T GuardDuty Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads AWS Security Hub Security Hub gives you a comprehensive view of your high-priority security alerts and compliance status across AWS accounts. Threat detection
  • 13. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty threat detection and notification
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T AWS Security Hub overview
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security Hub benefits Managed regional AWS service; aggregates findings across AWS accounts in minutes Manage security and compliance findings in a single location, increasing efficiency of locating relevant data Create custom insights to track issues unique to your environment
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security Hub workflow Enable Security Hub for all your accounts Account 1 Account 2 Account 3 Conduct automated compliance scans and checks Take action based on findings Continuously aggregate and prioritize findings
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Compliance standards • Based on CIS AWS Foundations Benchmark • Findings are displayed on main dashboard for quick access • Best-practices information is provided to help mitigate issues Compliance standards
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security Hub insights Security findings that are correlated and grouped for prioritization • More than 20 prebuilt insights provided by AWS and AWS Partner Network members • Ability to create your own insights • Dashboard provides visibility into the top security findings • Additional details for each finding is available for review EC2 instances that have missing security patches S3 buckets with stored credentials S3 buckets with public read and write permissions
  • 19. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. What can you detect using AWS services? Infrastructure VPC resources Connectivity On-instance ... Service IAM S3 buckets Billing ... Application Patching Coding hole ... Other?
  • 20. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet 10.0.48.0/21 Sensitive subnet Security groups Route table NACLs Internet gateway Instance Amazon S3 Amazon RDS AWS IAM AWS CloudHSM AWS Organizations AWSKMS AWS Directory Service Infrastructure and application domains
  • 21. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Services Domain Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet 10.0.48.0/21 Sensitive subnet Security groups Route table NACLs Internet gateway Instance Amazon S3 Amazon RDS AWS IAM AWS CloudHSM AWS Organizations AWSKMS AWS Directory Service Services domains
  • 22. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. All Domains Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet 10.0.48.0/21 Sensitive subnet Security groups Route table NACLs Internet gateway Instance Amazon S3 Amazon RDS AWS IAM AWS CloudHSM AWS Organizations AWSKMS AWS Directory Service What can you detect using AWS services?
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Visibility to answer the tough questions • What data do I have in the cloud? • Where is it located? • Where does my sensitive data exist? • What’s sensitive about the data? • What PII/PHI is possibly exposed? • How is data being shared and stored? • How and where is my data accessed? • How can I classify data in near-real time? • How do I build workflow remediation for my security and compliance needs?
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Visibility to answer the tough questions Amazon Web Services has opened case ******** on your behalf. The details of the case are as follows: Case ID: ******** Subject: Your AWS account ******** is compromised Severity: Urgent Correspondence: Dear AWS Customer, Your AWS Account is compromised! Please review the following notice and take immediate action to secure your account. Your security is important to us. We have become aware that the AWS Access Key ******** along with the corresponding Secret Key is publicly available online at ********…
  • 25. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Amazon CloudWatch Events Delivers a near-real-time stream of system events that describe changes in AWS resources AWS Config rules Continuously tracks your resource configuration changes and if they violate any of the conditions in your rules Threat detection: Triggers
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T AWS Config rules A continuous recording and assessment service Changing resources AWS Config AWS Config rules History snapshot Notifications API access Normalized • How are my resources configured over time? • Is a change that just occurred to a resource compliant?
  • 28. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudWatch Events { "source": [ "aws.guardduty" ] } CloudWatch Event GuardDuty findings Lambda function
  • 29. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T AWS Systems Manager Automate patching and proactively mitigate threats at the instance level AWS Lambda Capture info about the IP traffic going to and from network interfaces in your VPC Threat remediation: Automation
  • 31. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. High-level playbook Adversary or intern Your environment Lambda responder CloudWatch Events AWS Step Functions
  • 32. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. CloudWatch CloudTrail AWS Config Lambda function AWS APIs AWS WAF AWS Shield Detection Alerting Remediation Countermeasures Forensics Team collaboration (Slack, etc.) GuardDuty VPC Flow Logs Step Functions Systems Manager Amazon EC2 Responding to findings: Remediation
  • 33. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Hopefully, you've seen this already Developer sandbox Dev Pre-prod Team/group accounts Security Core accounts AWS Organizations Shared services Network Log archive Prod Team shared services Network path Developer accounts Data center Orgs: Account management Log archive: Security logs Security: Security tools, AWS Config rules Shared services: Directory, limit monitoring Network: AWS Direct Connect Dev sandbox: Experiments, learning Dev: Development Pre-prod: Staging Prod: Production Team SS: Team shared services, data lake
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Services Security Core accounts AWS Organizations Shared services Network Log archive Network path Data center Orgs: Account management Log archive: Security logs Security: Security tools, AWS Config rules Shared services: Directory, limit monitoring Network: DX Dev sandbox: Experiments, learning Dev: Development Pre-prod: Staging Prod: Production Team SS: Team shared services, data lake
  • 36. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Developers Developer sandbox Team/group accounts AWS Organizations Network path Developer accounts Data center Orgs: Account management Log archive: Security logs Security: Security tools, AWS Config rules Shared services: Directory, limit monitoring Network: DX Dev sandbox: Experiments, learning Dev: Development Pre-prod: Staging Prod: Production Team SS: Team shared services, data lake
  • 37. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Connections to team accounts Developer sandbox Team/group accounts AWS Organizations Network path Developer accounts Data center Orgs: Account management Log archive: Security logs Security: Security tools, AWS Config rules Shared services: Directory, limit monitoring Network: DX Dev sandbox: Experiments, learning Dev: Development Pre-prod: Staging Prod: Production Team SS: Team shared services, data lake Core accounts Dev Pre-prod Team/group accounts Prod Team shared services
  • 38. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Team versus production accounts Dev Prod green Team/group accounts Prod blue Dev pipeline account Network path Data center Orgs: Account management Log archive: Security logs Security: Security tools, AWS Config rules Shared services: Directory, limit monitoring Network: DX Dev sandbox: Experiments, learning Dev: Development Pre-prod: Staging Prod: Production Team SS: Team shared services, data lake Testing account Prod pipeline account Network Prod/group accounts
  • 39. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 40.
  • 41. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 42. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Lambda + Systems Manager + CloudWatch AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions Amazon GuardDuty AWS Security Hub
  • 43. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 44. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions GUARD DUTY FINDINGS Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 45. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 46. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS COMMUNICATIONS MANUAL ACTION Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 47. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS COMMUNICATIONS MANUAL ACTION Via Amazon API Gateway* Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 48. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS elastic network interface Security Group EBS Volume IAM Profile Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 49. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 50. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS elastic network interface Security Group EBS Volume IAM Profile EBS Snapshot Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 51. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS elastic network interface Security Group EBS Volume IAM Profile Amazon S3 bucket AWS CloudTrail EBS Snapshot Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 52. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS elastic network interface Security Group EBS Volume IAM Profile EBS Snapshot AWS CloudTrail Amazon S3 bucket Forensics Account Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 53. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 54. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ Instance:~ ec2-user$ top Instance:~ ec2-user$ pcap Instance:~ ec2-user$ lime Instance:~ ec2-user$ dd AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS EBS Volume IAM Profile Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 55. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule EC2 instance contents Instance:~ ec2-user$ Instance:~ ec2-user$ top Instance:~ ec2-user$ pcap Instance:~ ec2-user$ lime Instance:~ ec2-user$ dd AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS EBS Volume Forensics EBS IAM Profile Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 56. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Forensics EBS EBS Snapshot Amazon S3 bucket Forensics Account Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 57. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Forensics EBS EBS Snapshot Amazon S3 bucket Forensics Account Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 58. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Systems Manager documents Amazon CloudWatch rule AWS Lambda Lambda function AWS Step Functions BACKDOOR:EC2/XORDDOS Forensics EBS EBS Snapshot Amazon S3 bucket Forensics Account EASIER DONE THAN SAID. Amazon GuardDuty AWS Security Hub Lambda + Systems Manager + CloudWatch
  • 59. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 60. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T CloudWatch CloudTrail AWS Config Lambda function APIs AWS WAF AWS Shield Detection Alerting Remediation Countermeasures Forensics Team collaboration (Slack, etc.) GuardDuty VPC Flow Logs AWS Step Functions Systems Manager Amazon EC2 Responding to findings: Remediation
  • 61. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Remediating threats on EC2 instances • Asynchronously execute commands • No need to SSH/RDP • Commands and output logged Systems Manager – Run command EC2 instances Lambda function Systems Manager Amazon EC2
  • 62. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Open-source resources Prowler https://github.com/toniblyx/prowler Cloud Custodian https://github.com/capitalone/cloud-custodian Security Monkey https://github.com/Netflix/security_monkey Scout2 https://github.com/nccgroup/Scout2 StreamAlert https://github.com/airbnb/streamalert CIS AWS Foundations Framework https://github.com/awslabs/aws-security-benchmark MozDef https://github.com/mozilla/MozDef
  • 63. Thank you! S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Nathan Case Sr. Solutions Architect, Security Specialist Amazon Web Services https://www.linkedin.com/in/nathancase/