SlideShare a Scribd company logo
1 of 46
P U B L I C S E C T O R
S U M M I T
Washingt on, DC
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Beyond Security Automation:
How to Move Past Developing Ad-hoc Tools and Make Tools that
Develop Automatically
Brad Dispensa
Pr. Security and Compliance
AWS WWPS
3 0 2 8 3 0
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Agenda
• Security tools available to develop with in your environment
• Where to start on this journey
• Looking at data differently
• Proactive vs. reactive model
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Security tools available
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Quick overview of the tools of the trade
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Core security services
Amazon GuardDuty
Amazon Inspector
Amazon Macie
AWS Artifact
AWS Certificate Manager AWS CloudHSM
AWS Firewall Manager
AWS Identity and Access
Management (IAM)
AWS Secrets Manager
AWS Key Management
Service
AWS Security Hub
AWS Shield
AWS WAF
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Meta security tools
AWS Lambda Amazon Simple
Notification Service Amazon Elasticsearch
Service
Amazon Athena
AWS Systems Manager
AWS Command Line
Interface
AWS Config
Amazon CloudWatch
AWS CloudFormation AWS CloudTrail
Amazon Simple Storage
Service (S3)
AWS Organizations
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Example core + Meta
9
Example:
GuardDuty auto-responder
AWS Cloud
AWS Lambda
GD Finding
Amazon GuardDuty Amazon CloudWatch
AWS Cloud
AWS Lambda
Lambda responder
Amazon GuardDutyRole Amazon EC2
AWS Systems Manager
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Where do we need to start
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Observation
In order to react to anything, we first need to know what we have and
review its contents.
Common mistakes:
• Customers don’t look at the data they already have
• Forgot to check that “X” was enabled
Why?
• “Unknown uknowns”: I don’t know what I should be looking for
• Relying on manual process instead of codified solutions
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Check assumptions in code
AWS Cloud
AWS Lambda
AWS Cloud
AWS Cloud
AWS Cloud
Role
AWS CloudTrail
AWS CloudTrail
AWS CloudTrail
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Example Cloudtrail lookup
import boto3
client = boto3.client('cloudtrail')
response = client.describe_trails(
includeShadowTrails=True )
for i in response['trailList']:
if i['IsMultiRegionTrail'] == True:
return i['S3BucketName'], i['TrailARN']
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Check for FlowLogs enabled on all VPCs
import boto3
client = boto3.client('ec2’)
def check_flowlogs(vpc_id):
response = client.describe_flow_logs(
Filter=[
{ 'Name': 'resource-id',
'Values': [ vpc_id ] },
],)
if len(response[u'FlowLogs']) == 0:
print vpc_id
response = client.describe_vpcs()
for i in response['Vpcs']:
check_flowlogs(i['VpcId'])
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Example
AWS Security best practices white paper:
• P.70 - “Log everything and alert based on given threshold for the
policies.”
• Use core functionality like VPC flow logs
• Constrain security groups with high-risk access to limit CIDR ranges
Common response:
• Look only for patterns you already know
• E.g. Only looking for port open port TCP 22 with Config or an Adhoc
Lambda function.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
This is what customers do
import boto3
client = boto3.client('ec2')
response = client.describe_vpcs()
for i in response['Vpcs']:
sgid = client.describe_security_groups(
Filters=[
{
'Name': 'vpc-id',
'Values': [i['VpcId']]
},
])
for ii in sgid['SecurityGroups']:
for iii in ii['IpPermissions']:
if 'FromPort' in iii or 'ToPort' in iii:
if iii['FromPort'] == 22 or iii['ToPort'] == 22:
if len(iii['IpRanges']) != 0 and iii['IpRanges'][0]['CidrIp'] == '0.0.0.0/0':
print ii['GroupId']
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Wait, so then what’s the issue with it?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Why is this a bad idea then?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
SSM Sessions Manager > SSH
• SSH access should be an exception moving forward
• SSM is policy driven and integrates with IAM
• Interaction with SSM is logged via Cloudtrail
• Granular IAM policy allows specific resource access.
AWS Systems Manager
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Stepping up the game
Instead of looking only at what we expect, can we look at what we
observe normally and draw from that?
Can we look at multiple data-sources and combine information to better
evaluate risk?
Public subnet
Example:
Look for normal traffic
patterns
VPC
AWS Cloud
Virtual private cloud
10.1.0.0/16
Public subnet
10.1.0.0/19
Internet gateway
Web Instance-1 Web Instance-2
Attempted probe
TCP-3389
Elastic Load Balancing (ELB)
Flow logs
Public subnet
Example:
Look for normal traffic
patterns
VPC
AWS Cloud
Virtual private cloud
10.1.0.0/16
Public subnet
10.1.0.0/19
Internet gateway
Web Instance-1 Web Instance-2
Attempted probe
TCP-3389
Elastic Load Balancing (ELB)
Flow logs
AWS Systems Manager
Amazon CloudWatch
AWS Lambda
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Get process and pulling connections
AWS SSM Run:
#Network dump
netstat –ant|grep ESTABLISHED
#Process compare
netstat -nlpt
#Pull process list
ps aux
tcp 0 0 10.1.1.179:49058 212.7.219.6:8800 ESTABLISHED
tcp 0 0 10.1.1.179:33324 173.194.36.117:443 ESTABLISHED
tcp 0 0 127.0.1.1:8080 0.0.0.0:* LISTEN 1391/tomcat
tcp 0 0 127.0.0.1:443 0.0.0.0:* LISTEN 661/NGINX
tcp6 0 0 ::1:631 :::* LISTEN 661/cupsd
USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAN
ec2-user 26464 11.1 0.7 2861432 62132 ?? S Fri09AM 1:29.23 /bin/tomcat
root 169 6.5 1.2 3947388 97728 ?? Ss Tue02PM 70:48.79 /usr/local/src/nginx
Public subnet
Example:
Look for normal traffic
patterns
VPC
AWS Cloud
Virtual private cloud
10.1.0.0/16
Public subnet
10.1.0.0/19
Internet gateway
Web Instance-1 Web Instance-2
Attempted probe
TCP-3389
Elastic Load Balancing (ELB)
Flow logs
AWS Systems Manager
Amazon CloudWatch
AWS Lambda
outputs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Can we automate this automation?
Function that will use SageMaker to look for patterns in IPV4 traffic intra-
vpc and detect outlier but authorized communication.
Amazon SageMaker: IP Insights
Capture associations between IPv4 addresses and various entities
(user IDs, account numbers, etc..).
Identify a user attempting to log into a web service from an
anomalous IP address
Identify an account that is attempting to create computing resources
from an unusual IP address.
Amazon SageMaker IP
Insights model gives much
higher scores to malicious
events, and there is a clear
separation between the two
distributions.
Amazon Simple
Notification Service
AWS
Lambda
Elastic Load Balancing
(ELB)
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Account A
Account B
Account B
Security account
Amazon S3
bucket
1.2.3.4/32
1.2.3.4/32
1.2.3.4/32
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Looking at data differently
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Adding another meta-tool
AWS Step Functions
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Small, reusable code functions
AWS Lambda
AWS Lambda
AWS Lambda
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Proactive > Reactive
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Look for changes from baseline
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Advanced functions
Use tools and functions as early alerting and respond with the data
collected from the event.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": ”Deny",
"Action": "*",
"Resource": "*"
}
]
}
aws iam create-user --user-name developer-team-owl
aws iam attach-user-policy --policy-arn arn:aws:iam::aws:policy/audit-
owl --user-name developer-team-owl
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
aws iam create-access-key --user-name developer-team-owl
{
"AccessKey": {
"UserName": "developer-team-owl ",
"Status": "Active",
"CreateDate": "2015-03-09T18:39:23.411Z",
"SecretAccessKey":
"wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY",
"AccessKeyId": "AKIAIOSFODNN7EXAMPLE"
}
}
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
VPC Flow Logs: Automation
Private subnet
Compliance
app
If any REJECT > 0,
then…
Elastic
Network
Interface
Metric filter
Filter on all
any REJECTFlow Logs group
CloudWatch
alarm
Source IP
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
S3 honey bucket
Company-
payroleAdversary http Adversaryapi
Amazon Simple
Storage Service (S3)
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
Auto retire resources
Thank you!
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R
S U M M I T

More Related Content

What's hot

Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 BarcelonaMachine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 BarcelonaAmazon Web Services
 
Containers-AWS-Webinar-13-11-2018.pdf
Containers-AWS-Webinar-13-11-2018.pdfContainers-AWS-Webinar-13-11-2018.pdf
Containers-AWS-Webinar-13-11-2018.pdfAmazon Web Services
 
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisions
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisionsai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisions
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better DecisionsAmazon Web Services
 
Serverless workshop with Amazon Web Services
Serverless workshop with Amazon Web ServicesServerless workshop with Amazon Web Services
Serverless workshop with Amazon Web ServicesTheFamily
 
The family - presentation on AWS Serverless
The family - presentation on AWS ServerlessThe family - presentation on AWS Serverless
The family - presentation on AWS ServerlessAlexandre Pinhel
 
customerBuilding a Customer Obsessed Business in a Regulated Industry
customerBuilding a Customer Obsessed Business in a Regulated IndustrycustomerBuilding a Customer Obsessed Business in a Regulated Industry
customerBuilding a Customer Obsessed Business in a Regulated IndustryAmazon Web Services
 
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...Amazon Web Services
 
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018Amazon Web Services Korea
 
re:Invent 2018 Recap Digital Advertising (Japanese)
re:Invent 2018 Recap Digital Advertising (Japanese)re:Invent 2018 Recap Digital Advertising (Japanese)
re:Invent 2018 Recap Digital Advertising (Japanese)Amazon Web Services Japan
 
Threat detection - SEC207 - New York AWS Summit
Threat detection - SEC207 - New York AWS SummitThreat detection - SEC207 - New York AWS Summit
Threat detection - SEC207 - New York AWS SummitAmazon Web Services
 
打造新一代的企業 IT - Transforming Enterprise IT
打造新一代的企業 IT - Transforming Enterprise IT打造新一代的企業 IT - Transforming Enterprise IT
打造新一代的企業 IT - Transforming Enterprise ITAmazon Web Services
 
Resiliency and Availability Design Patterns for the Cloud
Resiliency and Availability Design Patterns for the CloudResiliency and Availability Design Patterns for the Cloud
Resiliency and Availability Design Patterns for the CloudAmazon Web Services
 
The Future of AI - AllCloud Best of reInvent
The Future of AI - AllCloud Best of reInventThe Future of AI - AllCloud Best of reInvent
The Future of AI - AllCloud Best of reInventBoaz Ziniman
 
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Amazon Web Services
 
Virtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_WorldVirtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_WorldAmazon Web Services
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesAmazon Web Services
 
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS Summit
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS SummitPerforming serverless analytics in AWS Glue - ADB202 - Chicago AWS Summit
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS SummitAmazon Web Services
 
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018Amazon Web Services Korea
 
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享Amazon Web Services
 

What's hot (20)

Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 BarcelonaMachine Learning with Kubernetes- AWS Container Day 2019 Barcelona
Machine Learning with Kubernetes- AWS Container Day 2019 Barcelona
 
Containers-AWS-Webinar-13-11-2018.pdf
Containers-AWS-Webinar-13-11-2018.pdfContainers-AWS-Webinar-13-11-2018.pdf
Containers-AWS-Webinar-13-11-2018.pdf
 
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisions
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisionsai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisions
ai mlLeverage Data and AI/ML to Drive New Experiences and Make Better Decisions
 
Serverless workshop with Amazon Web Services
Serverless workshop with Amazon Web ServicesServerless workshop with Amazon Web Services
Serverless workshop with Amazon Web Services
 
The family - presentation on AWS Serverless
The family - presentation on AWS ServerlessThe family - presentation on AWS Serverless
The family - presentation on AWS Serverless
 
customerBuilding a Customer Obsessed Business in a Regulated Industry
customerBuilding a Customer Obsessed Business in a Regulated IndustrycustomerBuilding a Customer Obsessed Business in a Regulated Industry
customerBuilding a Customer Obsessed Business in a Regulated Industry
 
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...
Deep Dive into Firecracker Using Lightweight Virtual Machines to Enhance the ...
 
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018
AWS 기반 인공지능 비디오 분석 서비스 소개::Ranju Das::AWS Summit Seoul 2018
 
re:Invent 2018 Recap Digital Advertising (Japanese)
re:Invent 2018 Recap Digital Advertising (Japanese)re:Invent 2018 Recap Digital Advertising (Japanese)
re:Invent 2018 Recap Digital Advertising (Japanese)
 
Threat detection - SEC207 - New York AWS Summit
Threat detection - SEC207 - New York AWS SummitThreat detection - SEC207 - New York AWS Summit
Threat detection - SEC207 - New York AWS Summit
 
打造新一代的企業 IT - Transforming Enterprise IT
打造新一代的企業 IT - Transforming Enterprise IT打造新一代的企業 IT - Transforming Enterprise IT
打造新一代的企業 IT - Transforming Enterprise IT
 
Resiliency and Availability Design Patterns for the Cloud
Resiliency and Availability Design Patterns for the CloudResiliency and Availability Design Patterns for the Cloud
Resiliency and Availability Design Patterns for the Cloud
 
The Future of AI - AllCloud Best of reInvent
The Future of AI - AllCloud Best of reInventThe Future of AI - AllCloud Best of reInvent
The Future of AI - AllCloud Best of reInvent
 
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
Building system-of-record applications with Amazon QLDB - SVC218 - New York A...
 
Virtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_WorldVirtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_World
 
What’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT ServicesWhat’s New with Device Qualification Program and IoT Services
What’s New with Device Qualification Program and IoT Services
 
Federation & Access Management
Federation & Access ManagementFederation & Access Management
Federation & Access Management
 
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS Summit
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS SummitPerforming serverless analytics in AWS Glue - ADB202 - Chicago AWS Summit
Performing serverless analytics in AWS Glue - ADB202 - Chicago AWS Summit
 
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018
Amazon Deeplens 와 컴퓨터 비전 딥러닝 어플리케이션 활용::Sunil Mallya::AWS Summit Seoul 2018
 
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享
AWS 主題演講:聚焦企業工作負載 (enterprise workloads) 與全球案例分享
 

Similar to Beyond Security Automation: How to Move Past Developing Ad-hoc Tools and Make Tools that Develop Automatically

Centralized SOC Architectures on AWS
Centralized SOC Architectures on AWSCentralized SOC Architectures on AWS
Centralized SOC Architectures on AWSAmazon Web Services
 
Security at the Speed of Cloud How to Think About it & How You Can Do it Now
Security at the Speed of Cloud How to Think About it & How You Can Do it NowSecurity at the Speed of Cloud How to Think About it & How You Can Do it Now
Security at the Speed of Cloud How to Think About it & How You Can Do it NowAmazon Web Services
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesAWS Summits
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWSNathan Case
 
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2..."Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...Provectus
 
Analyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev DayAnalyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev Dayjavier ramirez
 
AWS CloudFormation Deep Dive and Recent Enhancements
AWS CloudFormation Deep Dive and Recent EnhancementsAWS CloudFormation Deep Dive and Recent Enhancements
AWS CloudFormation Deep Dive and Recent EnhancementsAmazon Web Services
 
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...Amazon Web Services
 
Managing Enterprise security in the Cloud
Managing Enterprise security in the CloudManaging Enterprise security in the Cloud
Managing Enterprise security in the CloudAmazon Web Services
 
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Amazon Web Services
 
AWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAmazon Web Services
 
Continuous Delivery Best Practices
Continuous Delivery Best PracticesContinuous Delivery Best Practices
Continuous Delivery Best PracticesAmazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesAmazon Web Services
 
Building a Critical Communications Platform Using Serverless Technologies
Building a Critical Communications Platform Using Serverless TechnologiesBuilding a Critical Communications Platform Using Serverless Technologies
Building a Critical Communications Platform Using Serverless TechnologiesAmazon Web Services
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesAmazon Web Services
 
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Amazon Web Services
 
Building Private API’s for Security Automation at Monash University
Building Private API’s for Security Automation at Monash UniversityBuilding Private API’s for Security Automation at Monash University
Building Private API’s for Security Automation at Monash UniversityAmazon Web Services
 
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Amazon Web Services
 

Similar to Beyond Security Automation: How to Move Past Developing Ad-hoc Tools and Make Tools that Develop Automatically (20)

Centralized SOC Architectures on AWS
Centralized SOC Architectures on AWSCentralized SOC Architectures on AWS
Centralized SOC Architectures on AWS
 
Security at the Speed of Cloud How to Think About it & How You Can Do it Now
Security at the Speed of Cloud How to Think About it & How You Can Do it NowSecurity at the Speed of Cloud How to Think About it & How You Can Do it Now
Security at the Speed of Cloud How to Think About it & How You Can Do it Now
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2..."Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
"Analyzing your web and application logs", Javier Ramirez, AWS Dev Day Kyiv 2...
 
Analyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev DayAnalyzing your web and application logs on AWS. Utrecht AWS Dev Day
Analyzing your web and application logs on AWS. Utrecht AWS Dev Day
 
AWS CloudFormation Deep Dive and Recent Enhancements
AWS CloudFormation Deep Dive and Recent EnhancementsAWS CloudFormation Deep Dive and Recent Enhancements
AWS CloudFormation Deep Dive and Recent Enhancements
 
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...
Built & Delivered in Six Months Using Serverless Technical Patterns and Micro...
 
Managing Enterprise security in the Cloud
Managing Enterprise security in the CloudManaging Enterprise security in the Cloud
Managing Enterprise security in the Cloud
 
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
 
AWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management Tools
 
Continuous Delivery Best Practices
Continuous Delivery Best PracticesContinuous Delivery Best Practices
Continuous Delivery Best Practices
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Building a Critical Communications Platform Using Serverless Technologies
Building a Critical Communications Platform Using Serverless TechnologiesBuilding a Critical Communications Platform Using Serverless Technologies
Building a Critical Communications Platform Using Serverless Technologies
 
Getting Started with Serverless Architectures
Getting Started with Serverless ArchitecturesGetting Started with Serverless Architectures
Getting Started with Serverless Architectures
 
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...Network visibility into the traffic traversing your AWS infrastructure - SVC2...
Network visibility into the traffic traversing your AWS infrastructure - SVC2...
 
Building Private API’s for Security Automation at Monash University
Building Private API’s for Security Automation at Monash UniversityBuilding Private API’s for Security Automation at Monash University
Building Private API’s for Security Automation at Monash University
 
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Beyond Security Automation: How to Move Past Developing Ad-hoc Tools and Make Tools that Develop Automatically

  • 1. P U B L I C S E C T O R S U M M I T Washingt on, DC
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Beyond Security Automation: How to Move Past Developing Ad-hoc Tools and Make Tools that Develop Automatically Brad Dispensa Pr. Security and Compliance AWS WWPS 3 0 2 8 3 0
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Agenda • Security tools available to develop with in your environment • Where to start on this journey • Looking at data differently • Proactive vs. reactive model
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Security tools available
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Quick overview of the tools of the trade
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Core security services Amazon GuardDuty Amazon Inspector Amazon Macie AWS Artifact AWS Certificate Manager AWS CloudHSM AWS Firewall Manager AWS Identity and Access Management (IAM) AWS Secrets Manager AWS Key Management Service AWS Security Hub AWS Shield AWS WAF
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Meta security tools AWS Lambda Amazon Simple Notification Service Amazon Elasticsearch Service Amazon Athena AWS Systems Manager AWS Command Line Interface AWS Config Amazon CloudWatch AWS CloudFormation AWS CloudTrail Amazon Simple Storage Service (S3) AWS Organizations
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Example core + Meta 9 Example: GuardDuty auto-responder AWS Cloud AWS Lambda GD Finding Amazon GuardDuty Amazon CloudWatch AWS Cloud AWS Lambda Lambda responder Amazon GuardDutyRole Amazon EC2 AWS Systems Manager
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Where do we need to start
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Observation In order to react to anything, we first need to know what we have and review its contents. Common mistakes: • Customers don’t look at the data they already have • Forgot to check that “X” was enabled Why? • “Unknown uknowns”: I don’t know what I should be looking for • Relying on manual process instead of codified solutions
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Check assumptions in code AWS Cloud AWS Lambda AWS Cloud AWS Cloud AWS Cloud Role AWS CloudTrail AWS CloudTrail AWS CloudTrail
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Example Cloudtrail lookup import boto3 client = boto3.client('cloudtrail') response = client.describe_trails( includeShadowTrails=True ) for i in response['trailList']: if i['IsMultiRegionTrail'] == True: return i['S3BucketName'], i['TrailARN']
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Check for FlowLogs enabled on all VPCs import boto3 client = boto3.client('ec2’) def check_flowlogs(vpc_id): response = client.describe_flow_logs( Filter=[ { 'Name': 'resource-id', 'Values': [ vpc_id ] }, ],) if len(response[u'FlowLogs']) == 0: print vpc_id response = client.describe_vpcs() for i in response['Vpcs']: check_flowlogs(i['VpcId'])
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Example AWS Security best practices white paper: • P.70 - “Log everything and alert based on given threshold for the policies.” • Use core functionality like VPC flow logs • Constrain security groups with high-risk access to limit CIDR ranges Common response: • Look only for patterns you already know • E.g. Only looking for port open port TCP 22 with Config or an Adhoc Lambda function.
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T This is what customers do import boto3 client = boto3.client('ec2') response = client.describe_vpcs() for i in response['Vpcs']: sgid = client.describe_security_groups( Filters=[ { 'Name': 'vpc-id', 'Values': [i['VpcId']] }, ]) for ii in sgid['SecurityGroups']: for iii in ii['IpPermissions']: if 'FromPort' in iii or 'ToPort' in iii: if iii['FromPort'] == 22 or iii['ToPort'] == 22: if len(iii['IpRanges']) != 0 and iii['IpRanges'][0]['CidrIp'] == '0.0.0.0/0': print ii['GroupId']
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Wait, so then what’s the issue with it?
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Why is this a bad idea then?
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T SSM Sessions Manager > SSH • SSH access should be an exception moving forward • SSM is policy driven and integrates with IAM • Interaction with SSM is logged via Cloudtrail • Granular IAM policy allows specific resource access. AWS Systems Manager
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Stepping up the game Instead of looking only at what we expect, can we look at what we observe normally and draw from that? Can we look at multiple data-sources and combine information to better evaluate risk?
  • 23. Public subnet Example: Look for normal traffic patterns VPC AWS Cloud Virtual private cloud 10.1.0.0/16 Public subnet 10.1.0.0/19 Internet gateway Web Instance-1 Web Instance-2 Attempted probe TCP-3389 Elastic Load Balancing (ELB) Flow logs
  • 24. Public subnet Example: Look for normal traffic patterns VPC AWS Cloud Virtual private cloud 10.1.0.0/16 Public subnet 10.1.0.0/19 Internet gateway Web Instance-1 Web Instance-2 Attempted probe TCP-3389 Elastic Load Balancing (ELB) Flow logs AWS Systems Manager Amazon CloudWatch AWS Lambda
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Get process and pulling connections AWS SSM Run: #Network dump netstat –ant|grep ESTABLISHED #Process compare netstat -nlpt #Pull process list ps aux tcp 0 0 10.1.1.179:49058 212.7.219.6:8800 ESTABLISHED tcp 0 0 10.1.1.179:33324 173.194.36.117:443 ESTABLISHED tcp 0 0 127.0.1.1:8080 0.0.0.0:* LISTEN 1391/tomcat tcp 0 0 127.0.0.1:443 0.0.0.0:* LISTEN 661/NGINX tcp6 0 0 ::1:631 :::* LISTEN 661/cupsd USER PID %CPU %MEM VSZ RSS TT STAT STARTED TIME COMMAN ec2-user 26464 11.1 0.7 2861432 62132 ?? S Fri09AM 1:29.23 /bin/tomcat root 169 6.5 1.2 3947388 97728 ?? Ss Tue02PM 70:48.79 /usr/local/src/nginx
  • 26. Public subnet Example: Look for normal traffic patterns VPC AWS Cloud Virtual private cloud 10.1.0.0/16 Public subnet 10.1.0.0/19 Internet gateway Web Instance-1 Web Instance-2 Attempted probe TCP-3389 Elastic Load Balancing (ELB) Flow logs AWS Systems Manager Amazon CloudWatch AWS Lambda outputs
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Can we automate this automation? Function that will use SageMaker to look for patterns in IPV4 traffic intra- vpc and detect outlier but authorized communication.
  • 28. Amazon SageMaker: IP Insights Capture associations between IPv4 addresses and various entities (user IDs, account numbers, etc..). Identify a user attempting to log into a web service from an anomalous IP address Identify an account that is attempting to create computing resources from an unusual IP address. Amazon SageMaker IP Insights model gives much higher scores to malicious events, and there is a clear separation between the two distributions.
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Account A Account B Account B Security account Amazon S3 bucket 1.2.3.4/32 1.2.3.4/32 1.2.3.4/32
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Looking at data differently
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Adding another meta-tool AWS Step Functions
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Small, reusable code functions AWS Lambda AWS Lambda AWS Lambda
  • 36. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Proactive > Reactive
  • 37. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Look for changes from baseline
  • 38. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Advanced functions Use tools and functions as early alerting and respond with the data collected from the event.
  • 39. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 40. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T { "Version": "2012-10-17", "Statement": [ { "Effect": ”Deny", "Action": "*", "Resource": "*" } ] } aws iam create-user --user-name developer-team-owl aws iam attach-user-policy --policy-arn arn:aws:iam::aws:policy/audit- owl --user-name developer-team-owl
  • 41. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T aws iam create-access-key --user-name developer-team-owl { "AccessKey": { "UserName": "developer-team-owl ", "Status": "Active", "CreateDate": "2015-03-09T18:39:23.411Z", "SecretAccessKey": "wJalrXUtnFEMI/K7MDENG/bPxRfiCYzEXAMPLEKEY", "AccessKeyId": "AKIAIOSFODNN7EXAMPLE" } }
  • 42. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T VPC Flow Logs: Automation Private subnet Compliance app If any REJECT > 0, then… Elastic Network Interface Metric filter Filter on all any REJECTFlow Logs group CloudWatch alarm Source IP
  • 43. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T S3 honey bucket Company- payroleAdversary http Adversaryapi Amazon Simple Storage Service (S3)
  • 44. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T Auto retire resources
  • 45. Thank you! © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T
  • 46. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.P U B L I C S E C T O R S U M M I T