SlideShare a Scribd company logo
1 of 37
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automating Compliance & Governance
Jeffery Levine, Solutions Architect
Rahul Rahul, Technical Act Manager
Agenda
• What are compliance & governance?
• Why automation?
• AWS IAM & Service Catalog (Briefly)
• AWS Config
• AWS CloudTrail
• Pulling it together
• Demo
What are compliance & governance?
According to Gartner:
Compliance is the “process of adhering to policies and decisions.”
http://www.gartner.com/it-glossary/compliance
“IT governance (ITG) is defined as the processes that ensure the effective and
efficient use of IT in enabling an organization to achieve its goals.”
http://www.gartner.com/it-glossary/it-governance
So what does this mean for us?
If we want to ensure the effective use of IT in enabling an
organization to achieve its governance and compliance
goals, we have to know what our IT is doing.
• Phase 1: Control what IT is supposed to do
• Phase 2: Monitor what IT is doing
• Phase 3: Respond to IT incidents and perform reporting
and remediation as appropriate.
Who is responsible?
But we have a problem….
The cloud is dynamic.
Resources come and go.
Things scale up and they scale down.
So how do you implement governance in the cloud?
Automation.
Use the cloud to protect the cloud.
Why governance automation?
• Reduce risk of human error
• - Automation is effective
• - Automation is reliable
• - Automation is scalable
• Don’t worry…we still need humans!
Phase 1: Control
• Prevent actions that could be bad
• IAM Policies
• Service Catalog
• Disable Root credentials
• Check on GitHub for access keys available publicly
IAM Policy to Restrict Instance Types
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "ec2:RunInstances",
"Resource": [
"arn:aws:ec2:us-east-1:111122223333:instance/*"
],
"Condition": {
"StringEquals": {
"ec2:InstanceType": “t2.micro"
}
}
}
]
}
t2.micro = $0.012/hr
p2.16xlarge = $14.4/hr
IAM User Access keys: Keep them safe
• Do not generate access key for root account
• Use IAM roles
• Code to prevent you from committing secrets and
credentials into git repositories
• https://github.com/awslabs/git-secrets
Example: AWS Config: No IAM permissions
CloudTrail: Read-only permissions
What is AWS Service Catalog?
AWS Service Catalog allows organizations to create and manage
catalogs of IT services. It enables users to quickly deploy the approved
IT services they need in a self-service manner.
Organizations Developers
Control
Standardization
Governance
Agility
Self-service
Time to market
Why should I use AWS Service Catalog?
• Self-service
• Increase agility with access to services
• Promote standardization
• Compliance with business goals and policies
• Control provisioning of AWS resources
• Restrict user permissions
Phase 2: Monitor
Gather necessary data to see how IT resources are being
used.
• AWS Config/Config Rules
• CloudTrail
AWS Config / Config Rules - Overview
AWS Config
• Enables you to assess, audit, and evaluate the
configurations of your AWS resources
• Monitors and records your AWS resource configurations
AWS Config Rules
• Managed (pre-defined) or Customer-created rules that
AWS periodically runs to evaluate your configuration to
see if configuration is in compliance and provides action.
AWS Config – Recording Process
• AWS periodically interrogates AWS resources using
list and describe API calls.
• AWS Config seeks to answer the question “What is the
state of my resources?” not “How did my resources get
to be configured as they are?”
AWS Config - Overview
In short:
AWS Config offers a configuration management “lens” on
your AWS resources that can be helpful in your corporate
governance objectives.
AWS Config – Configuration Items
• AWS Config records Configuration Items that contain
information about an AWS resource. It also keeps track
of relationships between resources.
• AWS Config sends a configuration history file every six
hours to your S3 bucket if changes were made in that
interval. It can also send a snapshot on demand.
AWS Config Rules
• Rules can either be managed (supplied by AWS) or
customer-defined using Lambda functions
• Rules are run either on a scheduled basis or in response
to resource changes.
AWS Config & Config Rules
Changing
resources
AWS Config
Config Rules
Evaluations
History, Snapshot
Notifications
API Access
Normalize
AWS Config: Inventory and compliance
AWS CloudTrail - Overview
• AWS CloudTrail is a
fully managed service
that records API calls
made on your AWS
account.
• CloudTrail helps you
gain visibility into API
activity, enables you to
troubleshoot
operational issues,
conduct security
analysis and meet
internal or external
compliance
requirements.
Customers
are making
API calls...
On a
growing set
of services
around the
world…
CloudTrail is
continuously
recording API
calls…
And
delivering
events and
log files to
customers
What can you answer using a CloudTrail event?
 Who made the API call?
 When was the API call made?
 What was the API call?
 Which resources were acted up on in the API call?
 Where was the API call made from and made to?
AWS CloudTrail seeks to answer the question “What is in the process
of happening in my AWS environment?”
CloudTrail Features
Service Coverage
• Most AWS services are integrated
with CloudTrail
• Includes most new services
Features
• S3 Data Events: Get timely events for object-level API
activity for action and audit
• Event selectors to filter or add event types to a trail
• User identity included in AssumeRole calls, so you can
trace IAM user, even in role-based APIs.
• Turn on a trail in all existing and future AWS regions
• Support for 5 trails per region
• Encrypt CloudTrail log files using your KMS key
• Log File Integrity Validation
• PCI, ISO 270001/9001, 27017, 27018, SOC1,2,3
• API events can be captured by CloudWatch events
What does an event look like?
{
"userIdentity":{
"type":"AssumedRole",
"principalId":"ABCDEFGHIJKLMNOPQRSTU:awsusername",
"arn":"arn:aws:sts::123456789012:assumed-role/Admin/awsusername",
"accountId":"123456789012",
"accessKeyId":"ABCDEFGHIJKLMNOPQRST",
}
},
"eventTime":"2017-07-06T01:51:41Z",
"eventSource":"ec2.amazonaws.com",
"eventName":"AuthorizeSecurityGroupIngress",
"awsRegion":"us-west-2",
"sourceIPAddress":"999.999.999.999",
"userAgent":"console.ec2.amazonaws.com",
"requestParameters":{
"groupId":"sg-ABCDEFGH",
"ipPermissions":{
"items":[{"ipProtocol":"tcp", "fromPort":23, "toPort":23}]
}
},
"responseElements":{"_return":true},
"requestID":"1-2-3-4-5",
"eventID":"6-7-8-9-0",
"eventType":"AwsApiCall"
}
Scenario:
Suppose someone adds an ingress port to an EC2 security
group. How can we detect the change?
Using AWS Config?
Using AWS CloudTrail?
The AWS Config Approach
AWS Config will periodically use the list and describe
calls to see if the resource has changed and execute a rule
if requested. AWS Config keeps track of the resource
state over those periods. It’s a configuration timeline.
The AWS CloudTrail Approach
You can use AWS CloudTrail to see if an API call (e.g.
AuthorizeSecurityGroupIngress) acted upon the security
group and generated an API event that could be processed
by CloudWatch Events in near real time.
So which is better?
Q: Should you use AWS Config or AWS CloudTrail to
monitor security groups?
A: You can use either. It depends on your goal. Is your
goal to maintain a configuration timeline? Or, is your goal
to respond to a security incident. You can use both for a
defense-in-depth approach
Phase 3: Respond using AWS services
AWS Config Rules
CloudWatch Events
with Lambda rules
Lambda Functions – Event-Driven
• For AWS Config Rules
• Lambda function is passed an event
• Function processes event and optionally performs remediation
• Returns status of COMPLIANT, NON_COMPLIANT, or NOT_APPLICABLE
• Compliance status is reflected in AWS Config Dashboard
• Community repository of functions at
https://github.com/awslabs/aws-config-rules
• For Amazon Cloudtrail/CloudWatch Events
• Lambda function is passed an API event
• Function performs notification through CloudWatch Logs and optionally
performs remediation.
Pulling it All Together
Phase 1
Control
IAM
Service Catalog
Phase 2
Monitor
Config
CloudTrail
Phase 3
Respond
Config Rules
CloudWatch Events
+
CloudFormation Templates
=
Governance as Code
DEMO!
Additional Resources
https://aws.amazon.com/blogs/security/how-to-monitor-
aws-account-configuration-changes-and-api-calls-to-
amazon-ec2-security-groups/
https://aws.amazon.com/blogs/security/now-available-
videos-and-slide-decks-from-reinvent-2016-security-and-
compliance-sessions/#more-2173
https://aws.amazon.com/cloudtrail/
https://aws.amazon.com/config/
https://github.com/awslabs/aws-security-
benchmark/blob/master/aws_cis_foundation_framework/aw
s-cis-foundation-benchmark-checklist.py
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

More Related Content

What's hot

AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...Amazon Web Services
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Amazon Web Services
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Amazon Web Services
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Amazon Web Services
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesAmazon Web Services
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 
Wrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsWrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsAmazon Web Services
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...Amazon Web Services
 
Using AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your CloudUsing AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your CloudAmazon Web Services
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAmazon Web Services
 
AWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAmazon Web Services
 
AWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAriel Smoliar
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountAmazon Web Services
 
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...Amazon Web Services
 
Automate Best Practices and Operational Health for your AWS resources
Automate Best Practices and Operational Health for your AWS resourcesAutomate Best Practices and Operational Health for your AWS resources
Automate Best Practices and Operational Health for your AWS resourcesAmazon Web Services
 
Navigating the AWS Compliance Framework | AWS Security Roadshow Dublin
Navigating the AWS Compliance Framework | AWS Security Roadshow DublinNavigating the AWS Compliance Framework | AWS Security Roadshow Dublin
Navigating the AWS Compliance Framework | AWS Security Roadshow DublinAmazon Web Services
 
Wrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsWrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsAmazon Web Services
 

What's hot (20)

AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
AWS April Webinar Series - Security Best Practices: Compliance Beyond the Che...
 
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...Scaling Security Operations and Automating Governance: Which AWS Services Sho...
Scaling Security Operations and Automating Governance: Which AWS Services Sho...
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Monitoring on Amazon AWS Cloud
Monitoring on Amazon AWS Cloud Monitoring on Amazon AWS Cloud
Monitoring on Amazon AWS Cloud
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Wrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsWrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS Organizations
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
 
Using AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your CloudUsing AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your Cloud
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS Resources
 
AWS Service Drill Downs
AWS Service Drill DownsAWS Service Drill Downs
AWS Service Drill Downs
 
AWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config RulesAWS November Webinar Series - Introducing Config Rules
AWS November Webinar Series - Introducing Config Rules
 
AWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS MeetupAWS Config Rules - Advanced AWS Meetup
AWS Config Rules - Advanced AWS Meetup
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...
Bringing Governance to an Existing Cloud at NASA’s Jet Propulsion Laboratory ...
 
Automate Best Practices and Operational Health for your AWS resources
Automate Best Practices and Operational Health for your AWS resourcesAutomate Best Practices and Operational Health for your AWS resources
Automate Best Practices and Operational Health for your AWS resources
 
Navigating the AWS Compliance Framework | AWS Security Roadshow Dublin
Navigating the AWS Compliance Framework | AWS Security Roadshow DublinNavigating the AWS Compliance Framework | AWS Security Roadshow Dublin
Navigating the AWS Compliance Framework | AWS Security Roadshow Dublin
 
Wrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsWrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS Organizations
 

Similar to Automated Compliance and Governance with AWS Config and AWS CloudTrail

Automated Compliance and Governance with AWS Config and AWS CloudTrail
Automated Compliance and Governance with AWS Config and AWS CloudTrailAutomated Compliance and Governance with AWS Config and AWS CloudTrail
Automated Compliance and Governance with AWS Config and AWS CloudTrailAmazon Web Services
 
(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWSAmazon Web Services
 
Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Amazon Web Services
 
AWS Security Week: CAF Detective Controls - Gain Visibility & Record Change
AWS Security Week: CAF Detective Controls - Gain Visibility & Record ChangeAWS Security Week: CAF Detective Controls - Gain Visibility & Record Change
AWS Security Week: CAF Detective Controls - Gain Visibility & Record ChangeAmazon Web Services
 
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Amazon Web Services
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeAmazon Web Services
 
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Amazon Web Services
 
(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The Cloud(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The CloudAmazon Web Services
 
The Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudThe Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudAmazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Amazon Web Services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionAmazon Web Services
 
(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and AutomationAmazon Web Services
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
 
Automated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAutomated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAmazon Web Services
 
Easily Govern and Audit your AWS Resources
Easily Govern and Audit your AWS ResourcesEasily Govern and Audit your AWS Resources
Easily Govern and Audit your AWS ResourcesAmazon Web Services
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)Amazon Web Services
 
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...Amazon Web Services
 

Similar to Automated Compliance and Governance with AWS Config and AWS CloudTrail (20)

Automated Compliance and Governance with AWS Config and AWS CloudTrail
Automated Compliance and Governance with AWS Config and AWS CloudTrailAutomated Compliance and Governance with AWS Config and AWS CloudTrail
Automated Compliance and Governance with AWS Config and AWS CloudTrail
 
(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS(DVO303) Scaling Infrastructure Operations with AWS
(DVO303) Scaling Infrastructure Operations with AWS
 
Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301Enforcing Your Security Policy at Scale - Technical 301
Enforcing Your Security Policy at Scale - Technical 301
 
AWS Security Week: CAF Detective Controls - Gain Visibility & Record Change
AWS Security Week: CAF Detective Controls - Gain Visibility & Record ChangeAWS Security Week: CAF Detective Controls - Gain Visibility & Record Change
AWS Security Week: CAF Detective Controls - Gain Visibility & Record Change
 
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record Change
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
Using AWS CloudTrail and AWS Config to Enhance the Governance and Compliance ...
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The Cloud(SEC308) Wrangling Security Events In The Cloud
(SEC308) Wrangling Security Events In The Cloud
 
The Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudThe Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the Cloud
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Automated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAutomated Governance of Your AWS Resources
Automated Governance of Your AWS Resources
 
Easily Govern and Audit your AWS Resources
Easily Govern and Audit your AWS ResourcesEasily Govern and Audit your AWS Resources
Easily Govern and Audit your AWS Resources
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
 
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...
AWS re:Invent 2016: Continuous Compliance in the AWS Cloud for Regulated Life...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Automated Compliance and Governance with AWS Config and AWS CloudTrail

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automating Compliance & Governance Jeffery Levine, Solutions Architect Rahul Rahul, Technical Act Manager
  • 2. Agenda • What are compliance & governance? • Why automation? • AWS IAM & Service Catalog (Briefly) • AWS Config • AWS CloudTrail • Pulling it together • Demo
  • 3. What are compliance & governance? According to Gartner: Compliance is the “process of adhering to policies and decisions.” http://www.gartner.com/it-glossary/compliance “IT governance (ITG) is defined as the processes that ensure the effective and efficient use of IT in enabling an organization to achieve its goals.” http://www.gartner.com/it-glossary/it-governance
  • 4. So what does this mean for us? If we want to ensure the effective use of IT in enabling an organization to achieve its governance and compliance goals, we have to know what our IT is doing. • Phase 1: Control what IT is supposed to do • Phase 2: Monitor what IT is doing • Phase 3: Respond to IT incidents and perform reporting and remediation as appropriate.
  • 6. But we have a problem…. The cloud is dynamic. Resources come and go. Things scale up and they scale down. So how do you implement governance in the cloud?
  • 7. Automation. Use the cloud to protect the cloud.
  • 8. Why governance automation? • Reduce risk of human error • - Automation is effective • - Automation is reliable • - Automation is scalable • Don’t worry…we still need humans!
  • 9. Phase 1: Control • Prevent actions that could be bad • IAM Policies • Service Catalog • Disable Root credentials • Check on GitHub for access keys available publicly
  • 10. IAM Policy to Restrict Instance Types { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "ec2:RunInstances", "Resource": [ "arn:aws:ec2:us-east-1:111122223333:instance/*" ], "Condition": { "StringEquals": { "ec2:InstanceType": “t2.micro" } } } ] } t2.micro = $0.012/hr p2.16xlarge = $14.4/hr
  • 11. IAM User Access keys: Keep them safe • Do not generate access key for root account • Use IAM roles • Code to prevent you from committing secrets and credentials into git repositories • https://github.com/awslabs/git-secrets
  • 12. Example: AWS Config: No IAM permissions
  • 14. What is AWS Service Catalog? AWS Service Catalog allows organizations to create and manage catalogs of IT services. It enables users to quickly deploy the approved IT services they need in a self-service manner. Organizations Developers Control Standardization Governance Agility Self-service Time to market
  • 15. Why should I use AWS Service Catalog? • Self-service • Increase agility with access to services • Promote standardization • Compliance with business goals and policies • Control provisioning of AWS resources • Restrict user permissions
  • 16. Phase 2: Monitor Gather necessary data to see how IT resources are being used. • AWS Config/Config Rules • CloudTrail
  • 17. AWS Config / Config Rules - Overview AWS Config • Enables you to assess, audit, and evaluate the configurations of your AWS resources • Monitors and records your AWS resource configurations AWS Config Rules • Managed (pre-defined) or Customer-created rules that AWS periodically runs to evaluate your configuration to see if configuration is in compliance and provides action.
  • 18. AWS Config – Recording Process • AWS periodically interrogates AWS resources using list and describe API calls. • AWS Config seeks to answer the question “What is the state of my resources?” not “How did my resources get to be configured as they are?”
  • 19. AWS Config - Overview In short: AWS Config offers a configuration management “lens” on your AWS resources that can be helpful in your corporate governance objectives.
  • 20. AWS Config – Configuration Items • AWS Config records Configuration Items that contain information about an AWS resource. It also keeps track of relationships between resources. • AWS Config sends a configuration history file every six hours to your S3 bucket if changes were made in that interval. It can also send a snapshot on demand.
  • 21. AWS Config Rules • Rules can either be managed (supplied by AWS) or customer-defined using Lambda functions • Rules are run either on a scheduled basis or in response to resource changes.
  • 22. AWS Config & Config Rules Changing resources AWS Config Config Rules Evaluations History, Snapshot Notifications API Access Normalize
  • 23. AWS Config: Inventory and compliance
  • 24. AWS CloudTrail - Overview • AWS CloudTrail is a fully managed service that records API calls made on your AWS account. • CloudTrail helps you gain visibility into API activity, enables you to troubleshoot operational issues, conduct security analysis and meet internal or external compliance requirements. Customers are making API calls... On a growing set of services around the world… CloudTrail is continuously recording API calls… And delivering events and log files to customers
  • 25. What can you answer using a CloudTrail event?  Who made the API call?  When was the API call made?  What was the API call?  Which resources were acted up on in the API call?  Where was the API call made from and made to? AWS CloudTrail seeks to answer the question “What is in the process of happening in my AWS environment?”
  • 26. CloudTrail Features Service Coverage • Most AWS services are integrated with CloudTrail • Includes most new services Features • S3 Data Events: Get timely events for object-level API activity for action and audit • Event selectors to filter or add event types to a trail • User identity included in AssumeRole calls, so you can trace IAM user, even in role-based APIs. • Turn on a trail in all existing and future AWS regions • Support for 5 trails per region • Encrypt CloudTrail log files using your KMS key • Log File Integrity Validation • PCI, ISO 270001/9001, 27017, 27018, SOC1,2,3 • API events can be captured by CloudWatch events
  • 27. What does an event look like? { "userIdentity":{ "type":"AssumedRole", "principalId":"ABCDEFGHIJKLMNOPQRSTU:awsusername", "arn":"arn:aws:sts::123456789012:assumed-role/Admin/awsusername", "accountId":"123456789012", "accessKeyId":"ABCDEFGHIJKLMNOPQRST", } }, "eventTime":"2017-07-06T01:51:41Z", "eventSource":"ec2.amazonaws.com", "eventName":"AuthorizeSecurityGroupIngress", "awsRegion":"us-west-2", "sourceIPAddress":"999.999.999.999", "userAgent":"console.ec2.amazonaws.com", "requestParameters":{ "groupId":"sg-ABCDEFGH", "ipPermissions":{ "items":[{"ipProtocol":"tcp", "fromPort":23, "toPort":23}] } }, "responseElements":{"_return":true}, "requestID":"1-2-3-4-5", "eventID":"6-7-8-9-0", "eventType":"AwsApiCall" }
  • 28. Scenario: Suppose someone adds an ingress port to an EC2 security group. How can we detect the change? Using AWS Config? Using AWS CloudTrail?
  • 29. The AWS Config Approach AWS Config will periodically use the list and describe calls to see if the resource has changed and execute a rule if requested. AWS Config keeps track of the resource state over those periods. It’s a configuration timeline.
  • 30. The AWS CloudTrail Approach You can use AWS CloudTrail to see if an API call (e.g. AuthorizeSecurityGroupIngress) acted upon the security group and generated an API event that could be processed by CloudWatch Events in near real time.
  • 31. So which is better? Q: Should you use AWS Config or AWS CloudTrail to monitor security groups? A: You can use either. It depends on your goal. Is your goal to maintain a configuration timeline? Or, is your goal to respond to a security incident. You can use both for a defense-in-depth approach
  • 32. Phase 3: Respond using AWS services AWS Config Rules CloudWatch Events with Lambda rules
  • 33. Lambda Functions – Event-Driven • For AWS Config Rules • Lambda function is passed an event • Function processes event and optionally performs remediation • Returns status of COMPLIANT, NON_COMPLIANT, or NOT_APPLICABLE • Compliance status is reflected in AWS Config Dashboard • Community repository of functions at https://github.com/awslabs/aws-config-rules • For Amazon Cloudtrail/CloudWatch Events • Lambda function is passed an API event • Function performs notification through CloudWatch Logs and optionally performs remediation.
  • 34. Pulling it All Together Phase 1 Control IAM Service Catalog Phase 2 Monitor Config CloudTrail Phase 3 Respond Config Rules CloudWatch Events + CloudFormation Templates = Governance as Code
  • 35. DEMO!
  • 37. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved aws.amazon.com/activate Everything and Anything Startups Need to Get Started on AWS