SlideShare a Scribd company logo
1 of 17
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
David McNeely
VP of Product Strategy, Centrify
AWS Security Best Practices
in a Zero Trust Security Model
DEM06
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• Security and your part of Shared Responsibility Model
• Zero Trust Security overview
• Centrify best practices for AWS security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shared Responsibility Model
YOU:
AWS:
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
VERIFY
THE USER
VALIDATE
THEIR DEVICE
LIMIT ACCESS
& PRIVILEGE
LEARN & ADAPT
Centrify Zero Trust Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
MATURITY
MORE
SECURE
DANGER
Too Many Passwords
Too Much Privilege
Zero Trust Security Maturity Model
Analyze Risk
Monitor Sessions
Integrate with SIEM
AUDIT
EVERYTHING
Just-in-Time Privilege
Just Enough Privilege
Don’t Break Glass
Lifecycle Management
ENFORCE
LEAST PRIVILEGE
Establish Access Zones
Trusted Endpoints
Conditional Access
Minimize VPN Access
No DevOps Passwords
LIMIT
LATERAL MOVEMENT
Consolidate Identities
MFA Everywhere
Risk-based Access
SSO Everywhere
ESTABLISH
IDENTITY ASSURANCE
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centrify Best Practices for Securing AWS workloads
Common Security
Model
Eliminate Shared
Amazon EC2 Key Pairs
Ensure
Accountability
Least Privilege
Access
MFA Everywhere Audit Everything
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Additional security for AWS Management Console access
Lock down the “root” or billing account
Establish Federated login
Enforce Role-based temporary privileges
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Enforce IAM Role-based Temporary Privileges
Delegate AWS privileges by AWS Role Mapping
Enable Request-based Access to enable temporary access rights
Centrify User Portal provides SSO access to the AWS Console
AWS CLI tools and PowerShell Access
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Control Access to Amazon EC2 Instances
Extend Enterprise IAM to Amazon EC2
Enforce Least Privilege
Require Multi-Factor Authentication
Site to Site
VPN
Active Directory
ENTERPRISE
Active Directory
VPC
AD 1-way
Trust
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centrify Privilege Service for Amazon EC2 Instances
Secure Remote Access
Access Request Workflow
Lock down root accounts
Application Password Management
Active Directory
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Enterprise IAM and MFA for Hosted Applications
Extend Enterprise IAM for Apps
Require Multi-Factor Authentication
Single Sign-on for Users
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure Docker Hosts
IAM and PAM for Linux Docker Host or CoreOS
Container Linux
Docker Group Management
PAM for Docker
IT Ops
Containers
Container Host
Docker
AD
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure Apps in Containers
IAM and PAM for DevOps login access to Containers
• Developers login to container via SSH independent of the host
• Ops will most likely need break-glass access
AAPM and Service Accounts for Apps Containers
Container
Host
Docker
Developers
AD
Containers
Container
Host
Docker
Centrify
Infrastructure
Services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure Your Container Management Platforms
IAM Services for Container Management
Active Directory Integration for on-premises
deployments
Containers
Container
Host
Docker
DevOps
Staff
Container
Orchestration
AD
Linux
Host with
Centrify
LDAP
Proxy
DevOps
Staff
Centrify
Service
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Additional Resources
Centrify Solutions for AWS
• www.centrify.com/aws
TechCenter for AWS
• community.centrify.com/aws
Script Repository
• github.com/centrify
White Papers:
• Centrify’s Six Best Practices for Securing AWS Environments
• http://www.centrify.com/resources/six-best-practices-for-securing-amazon-web-services/
• AWS IAM Best Practices and Use Cases
• http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
• Gartner “How to Make Cloud IaaS Workloads More Secure Than Your Own Data Center”
• https://www.gartner.com/doc/3352444/make-cloud-iaas-workloads-secure
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete the session survey in
the summit mobile app!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank You!
Please stop by Centrify booth #201
David.McNeely@Centrify.com

More Related Content

What's hot

Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Amazon Web Services
 

What's hot (20)

Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
CASB: Securing your cloud applications
CASB: Securing your cloud applicationsCASB: Securing your cloud applications
CASB: Securing your cloud applications
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
Big Data Analytics Architectural Patterns and Best Practices (ANT201-R1) - AW...
Big Data Analytics Architectural Patterns and Best Practices (ANT201-R1) - AW...Big Data Analytics Architectural Patterns and Best Practices (ANT201-R1) - AW...
Big Data Analytics Architectural Patterns and Best Practices (ANT201-R1) - AW...
 
Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)Succeeding with Secure Access Service Edge (SASE)
Succeeding with Secure Access Service Edge (SASE)
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases5 Highest-Impact CASB Use Cases
5 Highest-Impact CASB Use Cases
 
Cloud Migration Strategy Framework
Cloud Migration Strategy FrameworkCloud Migration Strategy Framework
Cloud Migration Strategy Framework
 
Forcepoint Dynamic Data Protection
Forcepoint Dynamic Data ProtectionForcepoint Dynamic Data Protection
Forcepoint Dynamic Data Protection
 
A Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence AdoptionA Roadmap to Cloud Center of Excellence Adoption
A Roadmap to Cloud Center of Excellence Adoption
 
Introduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls MatrixIntroduction to the CSA Cloud Controls Matrix
Introduction to the CSA Cloud Controls Matrix
 
Disaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site RecoveryDisaster Recovery Planning using Azure Site Recovery
Disaster Recovery Planning using Azure Site Recovery
 
Disaster Recovery Options with AWS
Disaster Recovery Options with AWSDisaster Recovery Options with AWS
Disaster Recovery Options with AWS
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
FireEye Solutions
FireEye SolutionsFireEye Solutions
FireEye Solutions
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 

Similar to AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta AWS Summit

Similar to AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta AWS Summit (20)

Landing zones: Creating a Foundation for Your AWS Migrations
Landing zones: Creating a Foundation for Your AWS MigrationsLanding zones: Creating a Foundation for Your AWS Migrations
Landing zones: Creating a Foundation for Your AWS Migrations
 
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
 
AWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_SingaporeAWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_Singapore
 
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
AWSome Day Online Conference 2018 Module 1.pdf
AWSome Day Online Conference 2018 Module 1.pdfAWSome Day Online Conference 2018 Module 1.pdf
AWSome Day Online Conference 2018 Module 1.pdf
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
Security & Compliance for Modern Serverless Applications (SRV319-R1) - AWS re...
 
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
 
The Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech TalksThe Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
The Evolution of Identity and Access Management on AWS - AWS Online Tech Talks
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
Making Headless Drupal Serverless
Making Headless Drupal ServerlessMaking Headless Drupal Serverless
Making Headless Drupal Serverless
 
Governance@scale [Portuguese]
Governance@scale [Portuguese]Governance@scale [Portuguese]
Governance@scale [Portuguese]
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Cloud Migration Insights Forum, Sydney
Cloud Migration Insights Forum, SydneyCloud Migration Insights Forum, Sydney
Cloud Migration Insights Forum, Sydney
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta AWS Summit

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. David McNeely VP of Product Strategy, Centrify AWS Security Best Practices in a Zero Trust Security Model DEM06
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • Security and your part of Shared Responsibility Model • Zero Trust Security overview • Centrify best practices for AWS security
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Shared Responsibility Model YOU: AWS:
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. VERIFY THE USER VALIDATE THEIR DEVICE LIMIT ACCESS & PRIVILEGE LEARN & ADAPT Centrify Zero Trust Security
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. MATURITY MORE SECURE DANGER Too Many Passwords Too Much Privilege Zero Trust Security Maturity Model Analyze Risk Monitor Sessions Integrate with SIEM AUDIT EVERYTHING Just-in-Time Privilege Just Enough Privilege Don’t Break Glass Lifecycle Management ENFORCE LEAST PRIVILEGE Establish Access Zones Trusted Endpoints Conditional Access Minimize VPN Access No DevOps Passwords LIMIT LATERAL MOVEMENT Consolidate Identities MFA Everywhere Risk-based Access SSO Everywhere ESTABLISH IDENTITY ASSURANCE
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Centrify Best Practices for Securing AWS workloads Common Security Model Eliminate Shared Amazon EC2 Key Pairs Ensure Accountability Least Privilege Access MFA Everywhere Audit Everything
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Additional security for AWS Management Console access Lock down the “root” or billing account Establish Federated login Enforce Role-based temporary privileges
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Enforce IAM Role-based Temporary Privileges Delegate AWS privileges by AWS Role Mapping Enable Request-based Access to enable temporary access rights Centrify User Portal provides SSO access to the AWS Console AWS CLI tools and PowerShell Access
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Control Access to Amazon EC2 Instances Extend Enterprise IAM to Amazon EC2 Enforce Least Privilege Require Multi-Factor Authentication Site to Site VPN Active Directory ENTERPRISE Active Directory VPC AD 1-way Trust
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Centrify Privilege Service for Amazon EC2 Instances Secure Remote Access Access Request Workflow Lock down root accounts Application Password Management Active Directory
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Enterprise IAM and MFA for Hosted Applications Extend Enterprise IAM for Apps Require Multi-Factor Authentication Single Sign-on for Users
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure Docker Hosts IAM and PAM for Linux Docker Host or CoreOS Container Linux Docker Group Management PAM for Docker IT Ops Containers Container Host Docker AD
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure Apps in Containers IAM and PAM for DevOps login access to Containers • Developers login to container via SSH independent of the host • Ops will most likely need break-glass access AAPM and Service Accounts for Apps Containers Container Host Docker Developers AD Containers Container Host Docker Centrify Infrastructure Services
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure Your Container Management Platforms IAM Services for Container Management Active Directory Integration for on-premises deployments Containers Container Host Docker DevOps Staff Container Orchestration AD Linux Host with Centrify LDAP Proxy DevOps Staff Centrify Service
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Additional Resources Centrify Solutions for AWS • www.centrify.com/aws TechCenter for AWS • community.centrify.com/aws Script Repository • github.com/centrify White Papers: • Centrify’s Six Best Practices for Securing AWS Environments • http://www.centrify.com/resources/six-best-practices-for-securing-amazon-web-services/ • AWS IAM Best Practices and Use Cases • http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html • Gartner “How to Make Cloud IaaS Workloads More Secure Than Your Own Data Center” • https://www.gartner.com/doc/3352444/make-cloud-iaas-workloads-secure
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey in the summit mobile app!
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank You! Please stop by Centrify booth #201 David.McNeely@Centrify.com