SlideShare ist ein Scribd-Unternehmen logo
1 von 29
Cloudifying your Security Operations on AWS
Presented by Patrick Hannah
VP of Engineering, CloudHesive
Introduction
• Who am I?
• What’s my background?
• What do I hope to get out of the
presentation?
• How am I using cloud services?
• Why did I pick the cloud services that I am
using?
What are we going to talk about?
• Overview
• Shared Responsibility Model
• Getting Started
• Securely Operating in AWS
• Continuous Monitoring
• Conclusion
Overview of AWS
• Regional footprints, some with special use cases (GovCloud,
China)
• Access to services via a Web Based Console (customizable via
AWS Service Catalog) or Programmatically (CLI/API/SDK) using
credentials with granular role assignment (Identity & Access
Management)
• Access to E-Mail, Chat and Phone support via AWS Support and
proactive recommendations via Trusted Advisor
• Access to third party products and services via AWS Marketplace
• Access to itemized billing via AWS Billing and Cost Management
• Access to infrastructure monitoring via Amazon CloudWatch
• Access to an audit trail via AWS CloudTrail and configuration
change history via AWS Config
Overview of AWS Infrastructure Services
• Networking
– Amazon VPC – Software Defined Network
– AWS Direct Connect – Dedicated WAN Connectivity
– Elastic Load Balancing – Load Balancing
– Amazon Route 53 – DNS
– Amazon CloudFront – Content Delivery Network
• Compute
– Amazon EC2 – Virtualized Servers
• Storage & Content Delivery
– Amazon S3 – Object Storage
– Amazon EBS – Block Storage
– Amazon EFS – NFS Storage
– Amazon Glacier – Long Term Object Storage
– AWS Import/Export/Snowball – Bulk Import/Export of data to disk
• Database
– Amazon RDS – Managed RDBMS
– Amazon DynamoDB – Managed NoSQL
– Amazon ElastiCache – Managed In Memory Cache
– Amazon Redshift – Managed Data Warehouse
– Amazon Elasticsearch Service – Managed ElasticSearch
– Amazon EMR – Managed Big Data platform
– Amazon CloudSearch – Managed Indexer
Overview of AWS Enterprise, Security and Automation Services
• Enterprise Applications
– Amazon AppStream – Managed Application Publishing
– Amazon WorkSpaces – Managed Desktop Publishing
– Amazon WorkDocs – Managed Document Sharing
– Amazon WorkMail – Managed Enterprise E-Mail
– Amazon SES – Managed SMTP Gateway
– AWS Directory Service – Managed Directory Service (Active Directory
Compatible)
• Security & Identity
– AWS CloudHSM – Dedicated HSM Appliances
– AWS KMS – Managed Data-At-Rest Encryption
– Amazon Inspector – Managed Application Security Scanner
– AWS WAF – Managed Web Application Firewall
– AWS IAM – User Credential Management
• Automation
– Auto Scaling – Managed Infrastructure Scaling
– AWS Elastic Beanstalk – Managed Application Deployment
– AWS CloudFormation – Infrastructure Configuration Management
– AWS CodeCommit – Managed Repository
– AWS CodeDeploy – Managed Software Deployment
– AWS CodePipeline – Managed Continuous Delivery Service
– AWS OpsWorks – Infrastructure + Software Configuration
Management
Overview of AWS Managed (Abstracted) Services
• Amazon EC2 Container Service – Managed
Docker Container Deployment
• Amazon API Gateway – Managed API Gateway
• AWS Lambda – Managed Application Container
• Amazon Cognito – Data Persistence for Mobile
Devices
• Amazon SNS – Managed Notification Service
• Amazon Elastic Transcoder – Managed
Transcoding Service
• Amazon SQS – Managed Queue Service
• Amazon SWF – Managed Workflow Service
• Amazon Kinesis – Managed Data Pipeline
(Streaming)
• AWS Data Pipeline – Managed Data Pipeline
(Bulk)
AWS Shared Responsibility Model
AWS Account
• Setup AWS Accounts
• Balance the number of AWS Accounts with actual need
• Setup General Distribution Lists and Register your AWS Accounts with
them
• Setup more specific distribution lists for Billing, Security and Support on
each account
• These distribution lists shouldn’t be on a domain hosted on AWS
• Keep them generic enough to prevent guessing
• Limit usefulness of Root Account
IAM
• Customize the IAM users sign-in link but don’t use something
predictable
• Create Users in Main Account/Leverage roles to manage other
Accounts
• Follow Standard Best Practices
• Manage user policies at group level (where it makes sense)
• Use managed policies as a starting point but evaluate them for fit
• Utilize conditions for more granular control
• Validate Roles and Policies
Asset Management
• Enable Billing Alerts
• Enable Billing Reports
• Implement a Tagging Policy
– name: Matches Hostname
– env: Matches Environment
– role: Matches Role
– owner: The name of the resource (typically an instance) that
utilizes other resources (such as EBS Volumes)
– managed: Who manages the asset
• Enable Billing Tags
VPC and Subnets
• How many VPCs?
– All Environments or one per Environment
– Shared Services
– Management Services
• How many Subnets?
– Public Subnets for Internet Routable Services
– Private Subnets for Non-Internet Routable Services
– Subnets for Abstracted/Managed Services (ELB, etc.)
– Subnets for consistent IP Addressing
– Ensure you take into account how an instance with multiple ENIs
may behave
ACLs and Security Groups
• Follow best practices
– Be Smart
– Controlling outbound traffic is just as important as controlling inbound traffic
– Don’t forget about RDS DB Security Groups
– Watch out for /0
• Use Security Groups and ACLs where they make sense
– ACLs and Security Groups (along with IAM) can help incorporate policies
requiring separation of duties
– Security Groups are stateful, have a default deny and no processing order
– ACLs are stateless, have multiple denies (or no denies at all) and have a
processing order
• Devise a Security Group Scheme
– Environment?
– Role?
– ENIs?
VPC Logs, CloudTrail, Config, CloudWatch Logs
• VPC Logs
– Enable VPC logs on critical ENIs or Subnets
• Public Facing
• NAT Instance ENI
– Enable on the entire VPC if needed
• CloudTrail
– Don’t forget to enable in each account and each region
– Use an S3 bucket in the Main account
– Use SSE-KMS to encrypt logs (logs are generally redacted)
• Config
– Don’t forget to enable in each account and each region
– Use an S3 bucket in the Main account
• CloudWatch Logs
– Batch export to S3 bucket in the Main account
– Forward CloudWatch Logs to Kinesis Stream in Main Account
Secure storage of Logs on S3
• Ensure Permissions to CloudTrail and Config log buckets are
sufficiently restrictive
• Enable access logging (write it to another bucket)
• Enable notifications unexpected activities
• Enable MFA Delete
• Setup a lifecycle rule to transition to Glacier
• Setup a Vault Lock rule in Glacier to protect access to the data
Using Managed/Abstracted Services
• AWS has DoS/DDoS mitigation capabilities but it’s a shared
responsibility
• Follow VPC Recommendations
• Utilize additional AWS services
– Route53 (front end DNS request)
– CloudFront (front end web/application server requests)
– WAF (application layer firewall
– ELB (acts like a reverse proxy/distributes load)
– ASG (scales up as load increases)
• Some of these services allow logging to S3
– Use an S3 bucket in the Main Account
Provisioning EC2 Instances
• Launch instance with IAM roles
• Encrypt data at rest using KMS or a third party solution (like ours)
• Encrypt data in flight
• Collect instance logs using CloudWatch logs
• Ensure Active Directory Domain Controllers are using an external NTP
server
• Assume the instance will fail at some point
• Utilize a directory service for authentication – use key pairs once and
throw them away (additional thoughts on administrative access are on
the next slide)
Administration of EC2 Instances
• Utilize an SSH Bastion, RDP Proxy or AWS Workspaces for
Administration
– Authenticate an existing directory service (if you have one) or
utilize AWS’
– Don’t forget the security of these hosts – same rules apply
• Use a secure means of sharing data
• Automate instead of administrate
AWS Continuous Monitoring Services
• Trusted Advisor – Top Security Recommendations
• Config Rules – Pre-built and custom best practice rules
• Inspector – Application level vulnerability scanning
• AWS
Continuous Monitoring Ideas
• Identify users who have not logged in in the last quarter
• Identify users who have disabled accounts
• Identify users who have not rotated passwords in the last quarter
• Identify users who have passwords out of compliance
• Identify credentials that cannot be accounted for
• Identify weak security group entries and ones that cannot be accounted
for
• Identify public AMI, Snapshot and S3 items and ones that cannot be
accounted for
• Identify shared AMI, Snapshot and S3 items and ones that cannot be
accounted for
• Identify expiring certificates on ELB
• Did someone use the root credentials?
• Did someone unexpected access (successfully or otherwise) S3 Logs
or CloudWatch logs?
Conclusion and Some Advice
• First place to start is collecting the data
• Once you collect the data you can build a baseline
• Once you build a baseline you can identify anomalies
• There are many tools on the market can help
Further Learning
• AWS Security: https://aws.amazon.com/security
• AWS Security Blog: https://blogs.aws.amazon.com/security/
• AWS Documentation
– http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/vpc-
endpoints.html
– http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPN_CloudHu
b.html
– http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/S
ubscriptions.html
– http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/S
3Export.html
– https://docs.aws.amazon.com/IAM/latest/UserGuide/walkthru_cross-
account-with-roles.html
– https://aws.amazon.com/articles/2781451301784570
– https://www.dropbox.com/s/hizoeicmgf4iha5/DDoS_White_Paper_June201
5.pdf
• IAM Best Practices: https://evidentio.squarespace.com/blog/2015/2/12/top-10-
aws-security-best-practices-1-disable-root-account-api-access-key
• Realtime Alerting: https://cloudonaut.io/monitor-your-aws-account-to-detect-
suspicious-behavior-in-real-time/
• CloudTrail in Kibana: https://github.com/AppliedTrust/traildash
Florida Meetups
• http://www.meetup.com/aws-user-group-miami/
• http://www.meetup.com/Miami-AWS-Users-Group/
• http://www.meetup.com/South-Florida-Amazon-
Web-Services-Meetup/
• http://www.meetup.com/awsflorida/
• http://www.meetup.com/AWS-User-Groups-of-
Florida-Jacksonville/
Q&A
• Questions?
Question 1
• What’s the difference between a Security Group and
ACL?
Question 2
• What’s the difference between a Public and Private
Subnet (AWS Definition)?
Question 3
• What AWS services you can use for continuous
monitoring?
Question 4
• What AWS services can you use to help mitigate a
DoS/DDoS attack?
THANK YOU!
Want a copy of this presentation?
sales@cloudhesive.com
http://www.cloudhesive.com

Weitere ähnliche Inhalte

Was ist angesagt?

Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...Automated Monitoring of Best Practices and Operational Health of Your AWS Res...
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...Amazon Web Services
 
How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...Amazon Web Services
 
Reading the AWS Compliance Framework
Reading the AWS Compliance FrameworkReading the AWS Compliance Framework
Reading the AWS Compliance FrameworkAmazon Web Services
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Amazon Web Services
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Amazon Web Services
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Amazon Web Services
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSAkshay Mathur
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) NewAmazon Web Services
 
Account Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWSAccount Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWSAmazon Web Services
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big DataAmazon Web Services
 
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...AWS Germany
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSCloudHesive
 
Informix into the future13 july2017
Informix into the future13 july2017Informix into the future13 july2017
Informix into the future13 july2017Shawn Moe
 

Was ist angesagt? (20)

Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...Automated Monitoring of Best Practices and Operational Health of Your AWS Res...
Automated Monitoring of Best Practices and Operational Health of Your AWS Res...
 
How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...
 
Reading the AWS Compliance Framework
Reading the AWS Compliance FrameworkReading the AWS Compliance Framework
Reading the AWS Compliance Framework
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
Shared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWSShared Security Responsibility Model of AWS
Shared Security Responsibility Model of AWS
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
Account Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWSAccount Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWS
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
Towards Full Stack Security
Towards Full Stack SecurityTowards Full Stack Security
Towards Full Stack Security
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...
So verarbeiten Sie AWS Sensordaten, um Anwendungen zu sichern - AWS Security ...
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWSAWS Spotlight Series - Modernization and Security with AWS
AWS Spotlight Series - Modernization and Security with AWS
 
AWS Security Hub Deep Dive
AWS Security Hub Deep DiveAWS Security Hub Deep Dive
AWS Security Hub Deep Dive
 
Informix into the future13 july2017
Informix into the future13 july2017Informix into the future13 july2017
Informix into the future13 july2017
 

Ähnlich wie Cloudifying your Security Operations on AWS

Aws security best practices
Aws security best practicesAws security best practices
Aws security best practicesSundeep Roxx
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresAmazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...Amazon Web Services
 
ENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesAmazon Web Services
 
Alfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureAlfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureDevSecCon
 
Using AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics ServiceUsing AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics ServiceChristian Beedgen
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
Modernizing your AWS Deployment - January 2017
Modernizing your AWS Deployment - January 2017Modernizing your AWS Deployment - January 2017
Modernizing your AWS Deployment - January 2017CloudHesive
 
Modernizing your AWS Deployment
Modernizing your AWS DeploymentModernizing your AWS Deployment
Modernizing your AWS DeploymentCloudHesive
 
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsIn the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsGarth Boyd
 
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleAmazon Web Services
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on securityCloudHesive
 
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)Amazon Web Services
 
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleAmazon Web Services
 

Ähnlich wie Cloudifying your Security Operations on AWS (20)

Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
ENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New LaunchesENT302 Deep Dive on AWS Management Tools and New Launches
ENT302 Deep Dive on AWS Management Tools and New Launches
 
Alfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azureAlfredo Reino - Monitoring aws and azure
Alfredo Reino - Monitoring aws and azure
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Using AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics ServiceUsing AWS To Build A Scalable Machine Data Analytics Service
Using AWS To Build A Scalable Machine Data Analytics Service
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Modernizing your AWS Deployment - January 2017
Modernizing your AWS Deployment - January 2017Modernizing your AWS Deployment - January 2017
Modernizing your AWS Deployment - January 2017
 
Modernizing your AWS Deployment
Modernizing your AWS DeploymentModernizing your AWS Deployment
Modernizing your AWS Deployment
 
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOpsIn the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
 
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You ScaleENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
ENT316 Keeping Pace With The Cloud: Managing and Optimizing as You Scale
 
AWS Black Belt Tips
AWS Black Belt TipsAWS Black Belt Tips
AWS Black Belt Tips
 
AWS Black Belt Tips
AWS Black Belt TipsAWS Black Belt Tips
AWS Black Belt Tips
 

Mehr von CloudHesive

Serverless Generative AI on AWS, AWS User Groups of Florida
Serverless Generative AI on AWS, AWS User Groups of FloridaServerless Generative AI on AWS, AWS User Groups of Florida
Serverless Generative AI on AWS, AWS User Groups of FloridaCloudHesive
 
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...CloudHesive
 
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...CloudHesive
 
Accelerating Business and Research Through Automation and Artificial Intellig...
Accelerating Business and Research Through Automation and Artificial Intellig...Accelerating Business and Research Through Automation and Artificial Intellig...
Accelerating Business and Research Through Automation and Artificial Intellig...CloudHesive
 
Amazon Connect Rethink Your Contact Center with CloudHesive.pptx
Amazon Connect Rethink Your Contact Center with CloudHesive.pptxAmazon Connect Rethink Your Contact Center with CloudHesive.pptx
Amazon Connect Rethink Your Contact Center with CloudHesive.pptxCloudHesive
 
ConnectPath Introduction
ConnectPath IntroductionConnectPath Introduction
ConnectPath IntroductionCloudHesive
 
Modernize your contact center with ConnectPath CX v2.pdf
Modernize your contact center with ConnectPath CX v2.pdfModernize your contact center with ConnectPath CX v2.pdf
Modernize your contact center with ConnectPath CX v2.pdfCloudHesive
 
Modernize your contact center with ConnectPath CX — Chart.pdf
Modernize your contact center with ConnectPath CX — Chart.pdfModernize your contact center with ConnectPath CX — Chart.pdf
Modernize your contact center with ConnectPath CX — Chart.pdfCloudHesive
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxCloudHesive
 
Analytics at CloudHesive
Analytics at CloudHesiveAnalytics at CloudHesive
Analytics at CloudHesiveCloudHesive
 
Supporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicSupporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicCloudHesive
 
Best Practices and Resources to Effectively Manage and Optimize Your AWS Costs
Best Practices and Resources to Effectively Manage and Optimize Your AWS CostsBest Practices and Resources to Effectively Manage and Optimize Your AWS Costs
Best Practices and Resources to Effectively Manage and Optimize Your AWS CostsCloudHesive
 
Serverless data and analytics on AWS for operations
Serverless data and analytics on AWS for operations Serverless data and analytics on AWS for operations
Serverless data and analytics on AWS for operations CloudHesive
 
reInvent reCap 2022
reInvent reCap 2022reInvent reCap 2022
reInvent reCap 2022CloudHesive
 
Serverless without Code (Lambda)
Serverless without Code (Lambda)Serverless without Code (Lambda)
Serverless without Code (Lambda)CloudHesive
 
AWS Advanced Analytics Automation Toolkit (AAA)
AWS Advanced Analytics Automation Toolkit (AAA)AWS Advanced Analytics Automation Toolkit (AAA)
AWS Advanced Analytics Automation Toolkit (AAA)CloudHesive
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control TowerCloudHesive
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupCloudHesive
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudCloudHesive
 

Mehr von CloudHesive (20)

Serverless Generative AI on AWS, AWS User Groups of Florida
Serverless Generative AI on AWS, AWS User Groups of FloridaServerless Generative AI on AWS, AWS User Groups of Florida
Serverless Generative AI on AWS, AWS User Groups of Florida
 
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
 
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
Amazon Connect & AI - Shaping the Future of Customer Interactions - GenAI and...
 
Accelerating Business and Research Through Automation and Artificial Intellig...
Accelerating Business and Research Through Automation and Artificial Intellig...Accelerating Business and Research Through Automation and Artificial Intellig...
Accelerating Business and Research Through Automation and Artificial Intellig...
 
Amazon Connect Rethink Your Contact Center with CloudHesive.pptx
Amazon Connect Rethink Your Contact Center with CloudHesive.pptxAmazon Connect Rethink Your Contact Center with CloudHesive.pptx
Amazon Connect Rethink Your Contact Center with CloudHesive.pptx
 
ConnectPath Introduction
ConnectPath IntroductionConnectPath Introduction
ConnectPath Introduction
 
Modernize your contact center with ConnectPath CX v2.pdf
Modernize your contact center with ConnectPath CX v2.pdfModernize your contact center with ConnectPath CX v2.pdf
Modernize your contact center with ConnectPath CX v2.pdf
 
Modernize your contact center with ConnectPath CX — Chart.pdf
Modernize your contact center with ConnectPath CX — Chart.pdfModernize your contact center with ConnectPath CX — Chart.pdf
Modernize your contact center with ConnectPath CX — Chart.pdf
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptx
 
Analytics at CloudHesive
Analytics at CloudHesiveAnalytics at CloudHesive
Analytics at CloudHesive
 
Supporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo LogicSupporting your CMMC initiatives with Sumo Logic
Supporting your CMMC initiatives with Sumo Logic
 
Best Practices and Resources to Effectively Manage and Optimize Your AWS Costs
Best Practices and Resources to Effectively Manage and Optimize Your AWS CostsBest Practices and Resources to Effectively Manage and Optimize Your AWS Costs
Best Practices and Resources to Effectively Manage and Optimize Your AWS Costs
 
Serverless data and analytics on AWS for operations
Serverless data and analytics on AWS for operations Serverless data and analytics on AWS for operations
Serverless data and analytics on AWS for operations
 
reInvent reCap 2022
reInvent reCap 2022reInvent reCap 2022
reInvent reCap 2022
 
Serverless without Code (Lambda)
Serverless without Code (Lambda)Serverless without Code (Lambda)
Serverless without Code (Lambda)
 
AWS Advanced Analytics Automation Toolkit (AAA)
AWS Advanced Analytics Automation Toolkit (AAA)AWS Advanced Analytics Automation Toolkit (AAA)
AWS Advanced Analytics Automation Toolkit (AAA)
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
NIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public CloudNIST Cybersecurity Framework (CSF) on the Public Cloud
NIST Cybersecurity Framework (CSF) on the Public Cloud
 

Kürzlich hochgeladen

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringmulugeta48
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...roncy bisnoi
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...SUHANI PANDEY
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.Kamal Acharya
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptxJIT KUMAR GUPTA
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptDineshKumar4165
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXssuser89054b
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfRagavanV2
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapRishantSharmaFr
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityMorshed Ahmed Rahath
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startQuintin Balsdon
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...tanu pandey
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VDineshKumar4165
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf203318pmpc
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationBhangaleSonal
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . pptDineshKumar4165
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptNANDHAKUMARA10
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxJuliansyahHarahap1
 

Kürzlich hochgeladen (20)

chapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineeringchapter 5.pptx: drainage and irrigation engineering
chapter 5.pptx: drainage and irrigation engineering
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
COST-EFFETIVE  and Energy Efficient BUILDINGS ptxCOST-EFFETIVE  and Energy Efficient BUILDINGS ptx
COST-EFFETIVE and Energy Efficient BUILDINGS ptx
 
Thermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.pptThermal Engineering -unit - III & IV.ppt
Thermal Engineering -unit - III & IV.ppt
 
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
XXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXXX
 
Unit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdfUnit 1 - Soil Classification and Compaction.pdf
Unit 1 - Soil Classification and Compaction.pdf
 
Unleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leapUnleashing the Power of the SORA AI lastest leap
Unleashing the Power of the SORA AI lastest leap
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...Bhosari ( Call Girls ) Pune  6297143586  Hot Model With Sexy Bhabi Ready For ...
Bhosari ( Call Girls ) Pune 6297143586 Hot Model With Sexy Bhabi Ready For ...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
Thermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - VThermal Engineering-R & A / C - unit - V
Thermal Engineering-R & A / C - unit - V
 
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
(INDIRA) Call Girl Bhosari Call Now 8617697112 Bhosari Escorts 24x7
 
22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf22-prompt engineering noted slide shown.pdf
22-prompt engineering noted slide shown.pdf
 
DC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equationDC MACHINE-Motoring and generation, Armature circuit equation
DC MACHINE-Motoring and generation, Armature circuit equation
 
Thermal Engineering Unit - I & II . ppt
Thermal Engineering  Unit - I & II . pptThermal Engineering  Unit - I & II . ppt
Thermal Engineering Unit - I & II . ppt
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
Work-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptxWork-Permit-Receiver-in-Saudi-Aramco.pptx
Work-Permit-Receiver-in-Saudi-Aramco.pptx
 

Cloudifying your Security Operations on AWS

  • 1. Cloudifying your Security Operations on AWS Presented by Patrick Hannah VP of Engineering, CloudHesive
  • 2. Introduction • Who am I? • What’s my background? • What do I hope to get out of the presentation? • How am I using cloud services? • Why did I pick the cloud services that I am using?
  • 3. What are we going to talk about? • Overview • Shared Responsibility Model • Getting Started • Securely Operating in AWS • Continuous Monitoring • Conclusion
  • 4. Overview of AWS • Regional footprints, some with special use cases (GovCloud, China) • Access to services via a Web Based Console (customizable via AWS Service Catalog) or Programmatically (CLI/API/SDK) using credentials with granular role assignment (Identity & Access Management) • Access to E-Mail, Chat and Phone support via AWS Support and proactive recommendations via Trusted Advisor • Access to third party products and services via AWS Marketplace • Access to itemized billing via AWS Billing and Cost Management • Access to infrastructure monitoring via Amazon CloudWatch • Access to an audit trail via AWS CloudTrail and configuration change history via AWS Config
  • 5. Overview of AWS Infrastructure Services • Networking – Amazon VPC – Software Defined Network – AWS Direct Connect – Dedicated WAN Connectivity – Elastic Load Balancing – Load Balancing – Amazon Route 53 – DNS – Amazon CloudFront – Content Delivery Network • Compute – Amazon EC2 – Virtualized Servers • Storage & Content Delivery – Amazon S3 – Object Storage – Amazon EBS – Block Storage – Amazon EFS – NFS Storage – Amazon Glacier – Long Term Object Storage – AWS Import/Export/Snowball – Bulk Import/Export of data to disk • Database – Amazon RDS – Managed RDBMS – Amazon DynamoDB – Managed NoSQL – Amazon ElastiCache – Managed In Memory Cache – Amazon Redshift – Managed Data Warehouse – Amazon Elasticsearch Service – Managed ElasticSearch – Amazon EMR – Managed Big Data platform – Amazon CloudSearch – Managed Indexer
  • 6. Overview of AWS Enterprise, Security and Automation Services • Enterprise Applications – Amazon AppStream – Managed Application Publishing – Amazon WorkSpaces – Managed Desktop Publishing – Amazon WorkDocs – Managed Document Sharing – Amazon WorkMail – Managed Enterprise E-Mail – Amazon SES – Managed SMTP Gateway – AWS Directory Service – Managed Directory Service (Active Directory Compatible) • Security & Identity – AWS CloudHSM – Dedicated HSM Appliances – AWS KMS – Managed Data-At-Rest Encryption – Amazon Inspector – Managed Application Security Scanner – AWS WAF – Managed Web Application Firewall – AWS IAM – User Credential Management • Automation – Auto Scaling – Managed Infrastructure Scaling – AWS Elastic Beanstalk – Managed Application Deployment – AWS CloudFormation – Infrastructure Configuration Management – AWS CodeCommit – Managed Repository – AWS CodeDeploy – Managed Software Deployment – AWS CodePipeline – Managed Continuous Delivery Service – AWS OpsWorks – Infrastructure + Software Configuration Management
  • 7. Overview of AWS Managed (Abstracted) Services • Amazon EC2 Container Service – Managed Docker Container Deployment • Amazon API Gateway – Managed API Gateway • AWS Lambda – Managed Application Container • Amazon Cognito – Data Persistence for Mobile Devices • Amazon SNS – Managed Notification Service • Amazon Elastic Transcoder – Managed Transcoding Service • Amazon SQS – Managed Queue Service • Amazon SWF – Managed Workflow Service • Amazon Kinesis – Managed Data Pipeline (Streaming) • AWS Data Pipeline – Managed Data Pipeline (Bulk)
  • 9. AWS Account • Setup AWS Accounts • Balance the number of AWS Accounts with actual need • Setup General Distribution Lists and Register your AWS Accounts with them • Setup more specific distribution lists for Billing, Security and Support on each account • These distribution lists shouldn’t be on a domain hosted on AWS • Keep them generic enough to prevent guessing • Limit usefulness of Root Account
  • 10. IAM • Customize the IAM users sign-in link but don’t use something predictable • Create Users in Main Account/Leverage roles to manage other Accounts • Follow Standard Best Practices • Manage user policies at group level (where it makes sense) • Use managed policies as a starting point but evaluate them for fit • Utilize conditions for more granular control • Validate Roles and Policies
  • 11. Asset Management • Enable Billing Alerts • Enable Billing Reports • Implement a Tagging Policy – name: Matches Hostname – env: Matches Environment – role: Matches Role – owner: The name of the resource (typically an instance) that utilizes other resources (such as EBS Volumes) – managed: Who manages the asset • Enable Billing Tags
  • 12. VPC and Subnets • How many VPCs? – All Environments or one per Environment – Shared Services – Management Services • How many Subnets? – Public Subnets for Internet Routable Services – Private Subnets for Non-Internet Routable Services – Subnets for Abstracted/Managed Services (ELB, etc.) – Subnets for consistent IP Addressing – Ensure you take into account how an instance with multiple ENIs may behave
  • 13. ACLs and Security Groups • Follow best practices – Be Smart – Controlling outbound traffic is just as important as controlling inbound traffic – Don’t forget about RDS DB Security Groups – Watch out for /0 • Use Security Groups and ACLs where they make sense – ACLs and Security Groups (along with IAM) can help incorporate policies requiring separation of duties – Security Groups are stateful, have a default deny and no processing order – ACLs are stateless, have multiple denies (or no denies at all) and have a processing order • Devise a Security Group Scheme – Environment? – Role? – ENIs?
  • 14. VPC Logs, CloudTrail, Config, CloudWatch Logs • VPC Logs – Enable VPC logs on critical ENIs or Subnets • Public Facing • NAT Instance ENI – Enable on the entire VPC if needed • CloudTrail – Don’t forget to enable in each account and each region – Use an S3 bucket in the Main account – Use SSE-KMS to encrypt logs (logs are generally redacted) • Config – Don’t forget to enable in each account and each region – Use an S3 bucket in the Main account • CloudWatch Logs – Batch export to S3 bucket in the Main account – Forward CloudWatch Logs to Kinesis Stream in Main Account
  • 15. Secure storage of Logs on S3 • Ensure Permissions to CloudTrail and Config log buckets are sufficiently restrictive • Enable access logging (write it to another bucket) • Enable notifications unexpected activities • Enable MFA Delete • Setup a lifecycle rule to transition to Glacier • Setup a Vault Lock rule in Glacier to protect access to the data
  • 16. Using Managed/Abstracted Services • AWS has DoS/DDoS mitigation capabilities but it’s a shared responsibility • Follow VPC Recommendations • Utilize additional AWS services – Route53 (front end DNS request) – CloudFront (front end web/application server requests) – WAF (application layer firewall – ELB (acts like a reverse proxy/distributes load) – ASG (scales up as load increases) • Some of these services allow logging to S3 – Use an S3 bucket in the Main Account
  • 17. Provisioning EC2 Instances • Launch instance with IAM roles • Encrypt data at rest using KMS or a third party solution (like ours) • Encrypt data in flight • Collect instance logs using CloudWatch logs • Ensure Active Directory Domain Controllers are using an external NTP server • Assume the instance will fail at some point • Utilize a directory service for authentication – use key pairs once and throw them away (additional thoughts on administrative access are on the next slide)
  • 18. Administration of EC2 Instances • Utilize an SSH Bastion, RDP Proxy or AWS Workspaces for Administration – Authenticate an existing directory service (if you have one) or utilize AWS’ – Don’t forget the security of these hosts – same rules apply • Use a secure means of sharing data • Automate instead of administrate
  • 19. AWS Continuous Monitoring Services • Trusted Advisor – Top Security Recommendations • Config Rules – Pre-built and custom best practice rules • Inspector – Application level vulnerability scanning • AWS
  • 20. Continuous Monitoring Ideas • Identify users who have not logged in in the last quarter • Identify users who have disabled accounts • Identify users who have not rotated passwords in the last quarter • Identify users who have passwords out of compliance • Identify credentials that cannot be accounted for • Identify weak security group entries and ones that cannot be accounted for • Identify public AMI, Snapshot and S3 items and ones that cannot be accounted for • Identify shared AMI, Snapshot and S3 items and ones that cannot be accounted for • Identify expiring certificates on ELB • Did someone use the root credentials? • Did someone unexpected access (successfully or otherwise) S3 Logs or CloudWatch logs?
  • 21. Conclusion and Some Advice • First place to start is collecting the data • Once you collect the data you can build a baseline • Once you build a baseline you can identify anomalies • There are many tools on the market can help
  • 22. Further Learning • AWS Security: https://aws.amazon.com/security • AWS Security Blog: https://blogs.aws.amazon.com/security/ • AWS Documentation – http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/vpc- endpoints.html – http://docs.aws.amazon.com/AmazonVPC/latest/UserGuide/VPN_CloudHu b.html – http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/S ubscriptions.html – http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/S 3Export.html – https://docs.aws.amazon.com/IAM/latest/UserGuide/walkthru_cross- account-with-roles.html – https://aws.amazon.com/articles/2781451301784570 – https://www.dropbox.com/s/hizoeicmgf4iha5/DDoS_White_Paper_June201 5.pdf • IAM Best Practices: https://evidentio.squarespace.com/blog/2015/2/12/top-10- aws-security-best-practices-1-disable-root-account-api-access-key • Realtime Alerting: https://cloudonaut.io/monitor-your-aws-account-to-detect- suspicious-behavior-in-real-time/ • CloudTrail in Kibana: https://github.com/AppliedTrust/traildash
  • 23. Florida Meetups • http://www.meetup.com/aws-user-group-miami/ • http://www.meetup.com/Miami-AWS-Users-Group/ • http://www.meetup.com/South-Florida-Amazon- Web-Services-Meetup/ • http://www.meetup.com/awsflorida/ • http://www.meetup.com/AWS-User-Groups-of- Florida-Jacksonville/
  • 25. Question 1 • What’s the difference between a Security Group and ACL?
  • 26. Question 2 • What’s the difference between a Public and Private Subnet (AWS Definition)?
  • 27. Question 3 • What AWS services you can use for continuous monitoring?
  • 28. Question 4 • What AWS services can you use to help mitigate a DoS/DDoS attack?
  • 29. THANK YOU! Want a copy of this presentation? sales@cloudhesive.com http://www.cloudhesive.com

Hinweis der Redaktion

  1. Who are you? Patrick Hannah, CloudHesive (where I’m a co-founder and the VP of Engineering) What’s your background? Architecture, Security and Operations on AWS for 5 years, prior to that Contact Center Architecture and Operations for over 8 years (SaaS but we didn’t call it that). I’ve drawn on experience in both spaces in this presentation. What do you hope to get out of the presentation? I want to help folks get as the same out of AWS as I have. I’d also like to see how others are using AWS – as with just about any thing in technology there are multiple ways to do something right (or wrong). How are you using cloud services? At CloudHesive, we provide consulting services to customers who wish to, or who are, leveraging AWS and we also use a number of AWS services to host our managed services customers (and the back-office systems supporting them). Why did you pick the cloud services that you are using? AWS is at the forefront of Cloud; their service catalog can support most traditional on-premise software use cases (infrastructure) but they also offer more abstracted services for software built on the cloud (such as SQS, which is one of my favorite) that negate the need to manage server infrastructure – on premise or on cloud. What about you?
  2. A lot of this has come from AWS in the form of blog posts, presentations, documentation, trusted advisor, etc. as well as the community One of the challenges I expect most folks encounter is piecing it all together I’ll try to do this in this presentation, but probably missed something
  3. This is not a complete list and I’ve categorized certain services to suit my needs. A key point to note is when I refer to infrastructure I refer to building blocks and when I refer to abstracted I refer to a managed service to solve a specific requirement (like SES, SQS, etc.)
  4. Don’t forget to talk about legal cases
  5. Setup AWS Accounts Main - Parent/Master Payer Not Change Controlled - Used for prototyping and other activities in which change control is not required Change Controlled, Change Controlled 2, etc. - Used for environments in which change control is required Balance the number of AWS Accounts with actual need Most use cases for isolation can be done within an account using IAM and VPC Complexity increases as more accounts are added Standardization Moving resources Setup General Distribution Lists and Register your AWS Accounts with them Setup more specific distribution lists for Billing, Security and Support on each account These distribution lists shouldn’t be on a domain hosted on AWS Keep them generic enough to prevent guessing Limit usefulness of Root Account Don’t use a predicable username Disable Root Access Key/Secret Key Set a Strong Password Enable MFA Some AWS activities still require access to the root credentials so pick a physical device that can be physically secured but is accessible to more than just one person (imagine how you would secure physical media)
  6. Customize the IAM users sign-in link but don’t use something predictable Create Users in Main Account Don’t use a predicable username Set a Strong Password Enable MFA Leverage roles to manage other Accounts Supported in AWS Console Supported in AWS CLI Standard Best Practices Disable Access Key/Secret key when not using Disable user when not using Set a password policy congruent with your corporate password policies Follow the principal of least privilege Separate user/role for function Is an application using the AWS API? Use roles Manage user policies at group level (where it makes sense) Use managed policies as a starting point but evaluate them for fit Utilize conditions for more granular control Validate Roles and Policies Test for desired result Test for undesired result Policy Simulator Access Advisor
  7. Enable Billing Alerts Set alarms for cost thresholds congruent with your budget Enable Billing Reports Save to S3 (you’ll need them later) Implement a Tagging Policy name: Matches Hostname env: Matches Environment role: Matches Role owner: The name of the resource (typically an instance) that utilizes other resources (such as EBS Volumes) managed: Who manages the asset Enable Billing Tags
  8. How many VPCs? All Environments or one per Environment Shared Services Management Services Peer VPCs together and utilize the stateful-ness of Security Groups to secure traffic between VPCs Your management VPC might need to talk to the rest of your VPCs but not the other way around) Note that Transitive routing isn’t possible one VPC, even if peered to another VPC cannot utilize that VPC’s VGW There was a limitation with creating multiple CGWs with the same Public IP Address but this is no longer the case How many Subnets? Public Subnets for Internet Routable Services Route through IGW Private Subnets for Non-Internet Routable Services Route through NAT Instance (maybe) NAT Instance is potential bottleneck Use Prefix lists to connect to S3 Use an IGW if it makes more sense NAT Instance can be a SpoF but can be (kind of) mitigated 1 Per Subnet/Route Table Divide /0 in half CloudWatch Actions Auto Scaling Group Heartbeat Script Subnets for Abstracted/Managed Services (ELB, etc.) Subnets for consistent IP Addressing Ensure you take into account how an instance with multiple ENIs may behave Route Tables More specific networks take precident Route metrics don’t exist
  9. Follow best practices Internet sourced traffic should use encrypted services Internet sourced traffic should be limited to specific addresses Don’t open access to the entire Internet for services prone to security issues (SSH, RDP, SMB, etc.) /0 Implies the entire Internet Controlling outbound traffic is just as important as controlling inbound traffic Watch out for RDS Instances with Public IPs Use Security Groups and ACLs where they make sense ACLs and Security Groups (along with IAM) can help incorporate policies requiring separation of duties Security Groups are stateful, have a default deny and no processing order ACLs are stateless, have multiple denies (or no denies at all) and have a processing order Useful for blocking specific IP Addresses/Networks Security Groups can allow traffic from other Security Groups Eases administration Devise a Security Group Scheme Environment? Role? ENI? Use separate security groups for managed/abstracted services Ensure you take into account how an instance with multiple ENIs may behave
  10. VPC Logs Same reason you log internally: Troubleshooting, Monitoring Behavior, Security RCA Enable VPC logs on critical ENIs or Subnets Public Facing NAT Instance ENI Enable on the entire VPC if needed CloudTrail What happened with the API? Don’t forget to enable in each account and each region Use an S3 bucket in the Main account Use SSE-KMS to encrypt logs (logs are generally redacted) Config What’s changed? Don’t forget to enable in each account and each region Use an S3 bucket in the Main account CloudWatch Logs Mostly useful if you have somewhere to dump, analyze and alert on Batch export to S3 bucket in the Main account Forward CloudWatch Logs to Kinesis Stream in Main Account
  11. Ensure Permissions to CloudTrail and Config log buckets are sufficiently restrictive No sense in showing the world what you’re doing Enable access logging (write it to another bucket) Quickly identify potential breach Enable notifications unexpected activities Quickly identify potential breach Enable MFA Delete MFA required to delete Setup a lifecycle rule to transition to Glacier Long term storage with an added benefit… Setup a Vault Lock rule in Glacier to protect access to the data Immutable policies for immutable data make it more difficult for someone to cover their tracks
  12. While AWS has DoS/DDoS mitigation built into its infrastructure it is designed to protect their customers as a whole rather than a specific customer The VPC recommendations made on prior slides will help mitigate some types of DoS/DDoS attacks, there are certain AWS services that can further help: Route53 (front end DNS request) CloudFront (front end web/application server requests) WAF (application layer firewall ELB (acts like a reverse proxy/distributes load) ASG (scales up as load increases) Some of these services allow logging to S3 Use an S3 bucket in the Main Account
  13. Launch instance with IAM roles Numerous benefits but of most interest is EC2 Commands Encrypt data at rest using KMS or a third party solution (like ours) Encrypt data in flight Terminate SSL/TLS at ELB Terminate SSL/TLS at instance Create an IPSEC mesh Create an OpenVPN overlay Collect instance logs using CloudWatch logs Ensure Active Directory Domain Controllers are using an external NTP server Assume the instance will fail at some point Does a service it is hosting need to be highly available? Do you have a recovery plan? Utilize a directory service for authentication – use key pairs once and throw them away (additional thoughts on administrative access are on the next slide)
  14. Utilize an SSH Bastion, RDP Proxy or AWS Workspaces for Administration Authenticate an existing directory service (if you have one) or utilize AWS’ Don’t forget the security of these hosts – same rules apply Access (Network, AAA) Change Logging Encryption (at rest/in flight) Host based security Use a secure means of sharing data Automate instead of administrate
  15. Services we haven’t talked about Trusted Advisor – Top Security Recommendations Config Rules – Pre-built and custom best practice rules Inspector – Application level vulnerability scanning Has AWS reached out to you on your Security Distribution List?
  16. First place to start is collecting the data Once you collect the data you can build a baseline Don’t forget CloudWatch – Anomolies here could be a good indicator Once you build a baseline you can identify anomalies For Example What’s changed? Account Environment Component Who’s changed it? Developer? When was it changed? Outside of Business Hours? Was it expected? No Is it counter to what we prescribed in here? Yes – 0.0.0.0/0 TCP/3389 open Allows you to both prevent issues and identify issues faster There are many tools on the market can help Splunk, Sumo, ELK
  17. Each service has it’s own site and set of documentation The SlideShare presentations can be an invaluable resource when it comes to diving into the details The GitHub repositories have excellent examples of applications you can build on AWS
  18. CloudHesive sponsors 5 Meetups in Florida; 4 in the South Florida-Tri-County Area and one in North Florida We are always looking for ideas on topics, as well as attendees and speakers (especially Jacksonville)