SlideShare a Scribd company logo
1 of 41
Download to read offline
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Stephen Schmidt
Humans and Data Don’t Mix
Best Practices to Secure Your Cloud
@AWSSecurityInfo
Vice President and Chief Information Security Officer
Amazon Web Services (AWS)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Get Humans Away from Your Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Security Blind Spots
Disparate sources
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Lack of rigorDisparate sources
Security Blind Spots
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Can’t scaleLack of rigorDisparate sources
Security Blind Spots
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
DEPLOY TO
PRODUCTION ENVIRONMENT
MANAGE RUNTIME
SOURCE
CONTROL BUILD PRODUCTION MAINTAIN
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Security in the CI/CD Pipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit
AWS
CloudFormation
AWS
CodeBuild
AWS
Step Functions
AWS
Step Functions
AWS
CodePipeline
AWS
X-Ray
AWS
CodeDeploy
AWS
Elastic Beanstalk
AWS EC2
Systems Manager
Amazon
GuardDuty
TESTING &
STAGING
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
DEPLOY TO
PRODUCTION ENVIRONMENT
MANAGE RUNTIME
SOURCE
CONTROL BUILD PRODUCTION MAINTAIN
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Security in the CI/CD Pipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit
AWS
CloudFormation
AWS
Step Functions
AWS
Step Functions
AWS
X-Ray
AWS
CodeDeploy
AWS
Elastic Beanstalk
AWS EC2
Systems Manager
Amazon
GuardDuty
TESTING &
STAGING
AWS
CodeBuild
AWS
CodePipeline
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
DEPLOY TO
PRODUCTION ENVIRONMENT
MANAGE RUNTIME
SOURCE
CONTROL BUILD TESTING &
STAGING
PRODUCTION MAINTAIN
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Security in the CI/CD Pipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit
AWS
CloudFormation
AWS
Step Functions
AWS
Step Functions
AWS
X-Ray
AWS
CodeDeploy
AWS
Elastic Beanstalk
AWS EC2
Systems Manager
Amazon
GuardDuty
AWS
CodeBuild
AWS
CodePipeline
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES
SOURCE
CONTROL
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Source Control
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit AWS
CloudFormation
AWS
CodeCommit
AWS
CloudFormation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
VS.
SOURCE
CONTROL
Infrastructure as Code
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Seek Vendors Who Embrace APIs
SOURCE
CONTROL
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES
SOURCE
CONTROL
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Build
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit AWS
CloudFormation
BUILD
AWS
CodeCommit
AWS
CloudFormation
AWS
Step Functions
BUILD ARTIFACTS
AWS
CodeBuild
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sns:*",
"Resource": "*”
},
{
"Effect": "Allow",
"NotAction":"sns:Delete*",
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": "sns:*",
"Resource": "*”
},
{
"Effect": ”Deny",
"Action": "sns:Delete*",
"Resource": "*"
}
]
}
Policy A Policy B
Is Policy A more permissive than Policy B?
BUILD
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES
SOURCE
CONTROL
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Testing & Staging
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit AWS
CloudFormation
BUILD
AWS
CodeCommit
AWS
CloudFormation
BUILD ARTIFACTS
TESTING &
STAGING
DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
AWS
Step Functions
AWS
Step Functions
AWS
X-Ray
AWS
CodeBuild
AWS
CodePipeline
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Finding Weaknesses & Defects
TESTING
& STAGING
Amazon
Inspector
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES
SOURCE
CONTROL
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Deployment & Production
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit AWS
CloudFormation
BUILD
AWS
CodeCommit
AWS
CloudFormation
BUILD ARTIFACTS
TESTING &
STAGING
DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
AWS
Step Functions
AWS
Step Functions
AWS
X-Ray
DEPLOY TO
PRODUCTION ENVIRONMENT
PRODUCTION
AWS
CodeDeploy
AWS
Elastic Beanstalk
AWS
CodeBuild
AWS
CodePipeline
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Management,
Security, and
Monitoring
Storage
Customer Instances
Network
Hypervisor
Original Amazon EC2 Host Architecture
SERVER
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Management,
Security, and
Monitoring
Storage
Customer Instances
Network
Hypervisor
Amazon EC2 C3 Instances
SERVER
NITRO
SYSTEM
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Management,
Security, and
Monitoring
Storage
Customer Instances
Network
Hypervisor
Amazon EC2 C4 Instances
SERVER
NITRO
SYSTEM
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Management,
Security, and
Monitoring
Storage
Customer Instances
Network
Nitro Hypervisor
Amazon EC2 C5 Instances
SERVER
NITRO
SYSTEM
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
No Shell Access!
23
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT
RUN INTEGRATION, SECURITY,
LOAD AND OTHER TESTS
DEPLOY TO
PRODUCTION ENVIRONMENT
MANAGE RUNTIME
SOURCE
CONTROL BUILD PRODUCTION MAINTAIN
CONTINUOUS INTEGRATION CONTINUOUS DELIVERY
Maintaining Runtime Environment
AWS
CodeStar
AWS
CodePipeline
AWS
CodeStar
AWS
CodePipeline
AWS
CodeCommit
AWS
CloudFormation
AWS
Step Functions
AWS
Step Functions
AWS
X-Ray
AWS
CodeDeploy
AWS
Elastic Beanstalk
AWS EC2
Systems Manager
Amazon
GuardDuty
TESTING &
STAGING
AWS
CodeBuild
AWS
CodePipeline
Automate Answering the Tough Questions
• What data do I have in the cloud?
• Where is it located?
• Where does my sensitive data exist?
• What’s sensitive about the data?
• What PII/PHI is possibly exposed?
• How is data being shared and stored?
• How and where is my data accessed?
• How can I classify data in near-real time?
• How do I build workflow remediation for my security and compliance
needs?
AWS CloudTrail
Track user
activity and API
usage
Automation: Log Data Inputs
VPC Flow Logs
IP traffic to/from
network
interfaces in your
VPC
CloudWatch Logs
Monitor apps using
log data, store &
access log files
DNS Logs
Log of DNS
queries in a VPC
when using the
VPC DNS resolver
Amazon
GuardDuty
Intelligent threat detection
and continuous monitoring
to protect your AWS
accounts and workloads
Automation: Machine Learning
Amazon Macie
Machine learning-powered
security service to discover,
classify, & protect sensitive
data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Using NLP and ML together
Understand
your data
Natural Language
Processing (NLP)
Understand data
access
Predictive User
Behavior Analytics
(UBA)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Content Classification with NLP
PII and personal data
Source code
SSL certificates, private keys
iOS and Android app signing keys
Database backups
OAuth and Cloud SaaS API Keys
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Use ML and Scaled Services
• Use behavioral
analytics to
baseline normal
behavior patterns
• Contextualize by
value of data being
accessed
Amazon GuardDuty Threat Detection and Notification
Automation: Triggers
Amazon CloudWatch
Events
Delivers a near real-time stream
of system events that describe
changes in AWS resources
AWS Config Rules
Continuously tracks your
resource configuration changes
and if they violate any of the
conditions in your rules
Automating Remediation
AWS Systems
Manager
Automate patching and
proactively mitigate threats
at the instance level
AWS Lambda
Capture info about the IP
traffic going to and from
network interfaces in your
VPC
• Asynchronously
execute commands
• No need to SSH/RDP
• Commands and output
logged
Remediating Threats on Amazon EC2 Instances
Amazon EC2 Systems Manager -
Run Command
EC2 Instances
Lambda
function
AWS Systems
Manager
Amazon
EC2
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Tools we use: COEs
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
• In your company, deeply understand how software is created and
shipped. Sit security team members with a development team for
as many days as you can (and not just the appsec team) (1-2
months).
Call to Action – Do Try This at Home
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
Call to Action – Do Try This at Home
• In your company, deeply understand how software is created and
shipped. Sit security team members with a development team for
as many days as you can (and not just the appsec team) (1-2
months).
• Catalog the controls and visibility into CI/CD pipelines. That’s
where change management and control happens now (1-3
months).
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
• In your company, deeply understand how software is created and
shipped. Sit security team members with a development team for
as many days as you can (and not just the appsec team) (1-2
months).
• Catalog the controls and visibility into CI/CD pipelines. That’s
where change management and control happens now (1-3
months).
• Begin to document every instance of human interaction with
systems that process data. Let engineering & operations teams
drive this goal. (1-6 months).
Call to Action – Do Try This at Home
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
• In your company, deeply understand how software is created and
shipped. Sit security team members with a development team for
as many days as you can (and not just the appsec team) (1-2
months).
• Catalog the controls and visibility into CI/CD pipelines. That’s
where change management and control happens now. Set clear
goals with owners to harden the pipeline (1-3 months).
• Begin to document every instance of human interaction with
systems that process data. Let engineering & operations teams
drive this goal. (1-6 months).
• Set and achieve a goal to reduce human access to systems that
process sensitive data by 80% (1-2 years).
Call to Action – Do Try This at Home
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
• In your company, deeply understand how software is created and
shipped. Sit security team members with a development team for as
many days as you can (and not just the appsec team) (1-2 months).
• Catalog the controls and visibility into CI/CD pipelines. That’s where
change management and control happens now. Set clear goals with
owners to harden the pipeline (1-3 months).
• Begin to document every instance of human interaction with systems
that process data. Let engineering & operations teams drive this goal.
(1-6 months).
• Set and achieve a goal to reduce human access to systems that
process sensitive data by 80% (1-2 years).
• Set and achieve a goal to drive workload deployment from source
code. Catalog the % of workloads that are built on automation vs.
those built with manual steps (1 year).
Call to Action – Do Try This at Home
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
More Information
Visit the AWS Booth: Exhibit Hall #805
AWS Security Twitter: @AWSSecurityInfo
AWS Security Blog: aws.amazon.com/blogs/security/

More Related Content

What's hot

What's hot (20)

BDA305 Building Data Lakes and Analytics on AWS
BDA305 Building Data Lakes and Analytics on AWSBDA305 Building Data Lakes and Analytics on AWS
BDA305 Building Data Lakes and Analytics on AWS
 
Building Serverless Analytics Solutions with Amazon QuickSight (ANT391) - AWS...
Building Serverless Analytics Solutions with Amazon QuickSight (ANT391) - AWS...Building Serverless Analytics Solutions with Amazon QuickSight (ANT391) - AWS...
Building Serverless Analytics Solutions with Amazon QuickSight (ANT391) - AWS...
 
ABD303_Developing an Insights Platform—the Sysco Journey from Disparate Syste...
ABD303_Developing an Insights Platform—the Sysco Journey from Disparate Syste...ABD303_Developing an Insights Platform—the Sysco Journey from Disparate Syste...
ABD303_Developing an Insights Platform—the Sysco Journey from Disparate Syste...
 
Visualize your data in Data Lake with AWS Athena and AWS Quicksight Hands-on ...
Visualize your data in Data Lake with AWS Athena and AWS Quicksight Hands-on ...Visualize your data in Data Lake with AWS Athena and AWS Quicksight Hands-on ...
Visualize your data in Data Lake with AWS Athena and AWS Quicksight Hands-on ...
 
Building Data Lakes and Analytics on AWS. IPExpo Manchester.
Building Data Lakes and Analytics on AWS. IPExpo Manchester.Building Data Lakes and Analytics on AWS. IPExpo Manchester.
Building Data Lakes and Analytics on AWS. IPExpo Manchester.
 
Builders' Day- Mastering Kubernetes on AWS
Builders' Day- Mastering Kubernetes on AWSBuilders' Day- Mastering Kubernetes on AWS
Builders' Day- Mastering Kubernetes on AWS
 
Effective Data Lakes: Challenges and Design Patterns (ANT316) - AWS re:Invent...
Effective Data Lakes: Challenges and Design Patterns (ANT316) - AWS re:Invent...Effective Data Lakes: Challenges and Design Patterns (ANT316) - AWS re:Invent...
Effective Data Lakes: Challenges and Design Patterns (ANT316) - AWS re:Invent...
 
Analyze your Data Lake, Fast @ Any Scale - AWS Online Tech Talks
Analyze your Data Lake, Fast @ Any Scale - AWS Online Tech TalksAnalyze your Data Lake, Fast @ Any Scale - AWS Online Tech Talks
Analyze your Data Lake, Fast @ Any Scale - AWS Online Tech Talks
 
Building Your First Serverless Data Lake (ANT356-R1) - AWS re:Invent 2018
Building Your First Serverless Data Lake (ANT356-R1) - AWS re:Invent 2018Building Your First Serverless Data Lake (ANT356-R1) - AWS re:Invent 2018
Building Your First Serverless Data Lake (ANT356-R1) - AWS re:Invent 2018
 
The Future of Enterprise Applications is Serverless (ENT314-R1) - AWS re:Inve...
The Future of Enterprise Applications is Serverless (ENT314-R1) - AWS re:Inve...The Future of Enterprise Applications is Serverless (ENT314-R1) - AWS re:Inve...
The Future of Enterprise Applications is Serverless (ENT314-R1) - AWS re:Inve...
 
Developing with .NET Core on AWS: What's New (DEV318-R1) - AWS re:Invent 2018
Developing with .NET Core on AWS: What's New (DEV318-R1) - AWS re:Invent 2018Developing with .NET Core on AWS: What's New (DEV318-R1) - AWS re:Invent 2018
Developing with .NET Core on AWS: What's New (DEV318-R1) - AWS re:Invent 2018
 
Analyzing your web and application logs with the Amazon Elasticsearch Service...
Analyzing your web and application logs with the Amazon Elasticsearch Service...Analyzing your web and application logs with the Amazon Elasticsearch Service...
Analyzing your web and application logs with the Amazon Elasticsearch Service...
 
Builders' Day - Building Data Lakes for Analytics On AWS LC
Builders' Day - Building Data Lakes for Analytics On AWS LCBuilders' Day - Building Data Lakes for Analytics On AWS LC
Builders' Day - Building Data Lakes for Analytics On AWS LC
 
ABD311_Deploying Amazon QuickSight For Enterprise
ABD311_Deploying Amazon QuickSight For EnterpriseABD311_Deploying Amazon QuickSight For Enterprise
ABD311_Deploying Amazon QuickSight For Enterprise
 
Running Your SQL Server Database on Amazon RDS (DAT329) - AWS re:Invent 2018
Running Your SQL Server Database on Amazon RDS (DAT329) - AWS re:Invent 2018Running Your SQL Server Database on Amazon RDS (DAT329) - AWS re:Invent 2018
Running Your SQL Server Database on Amazon RDS (DAT329) - AWS re:Invent 2018
 
Managed NoSQL databases
Managed NoSQL databasesManaged NoSQL databases
Managed NoSQL databases
 
[REPEAT 1] Executing a Large-Scale Migration to AWS (ENT205-R1) - AWS re:Inve...
[REPEAT 1] Executing a Large-Scale Migration to AWS (ENT205-R1) - AWS re:Inve...[REPEAT 1] Executing a Large-Scale Migration to AWS (ENT205-R1) - AWS re:Inve...
[REPEAT 1] Executing a Large-Scale Migration to AWS (ENT205-R1) - AWS re:Inve...
 
Building Serverless Web Applications - DevDay Los Angeles 2017
Building Serverless Web Applications - DevDay Los Angeles 2017Building Serverless Web Applications - DevDay Los Angeles 2017
Building Serverless Web Applications - DevDay Los Angeles 2017
 
Adding Search to Relational Databases
Adding Search to Relational DatabasesAdding Search to Relational Databases
Adding Search to Relational Databases
 
SRV307 Applying AWS Purpose-Built Database Strategy: Match Your Workload to ...
 SRV307 Applying AWS Purpose-Built Database Strategy: Match Your Workload to ... SRV307 Applying AWS Purpose-Built Database Strategy: Match Your Workload to ...
SRV307 Applying AWS Purpose-Built Database Strategy: Match Your Workload to ...
 

Similar to Humans and Data Don't Mix- Best Practices to Secure Your Cloud

Similar to Humans and Data Don't Mix- Best Practices to Secure Your Cloud (20)

Keeping Humans Away From Data
Keeping Humans Away From DataKeeping Humans Away From Data
Keeping Humans Away From Data
 
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your CloudAWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
AWS Security Week: Humans & Data Don’t Mix - Best Practices to Secure Your Cloud
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Enterprise Security
Enterprise SecurityEnterprise Security
Enterprise Security
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
 
Module 3 - AWSome Day Online Conference 2018
Module 3 - AWSome Day Online Conference 2018Module 3 - AWSome Day Online Conference 2018
Module 3 - AWSome Day Online Conference 2018
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
 
AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & Learn
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Humans and Data Don't Mix- Best Practices to Secure Your Cloud

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Stephen Schmidt Humans and Data Don’t Mix Best Practices to Secure Your Cloud @AWSSecurityInfo Vice President and Chief Information Security Officer Amazon Web Services (AWS)
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Get Humans Away from Your Data
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Security Blind Spots Disparate sources
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Lack of rigorDisparate sources Security Blind Spots
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Can’t scaleLack of rigorDisparate sources Security Blind Spots
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS DEPLOY TO PRODUCTION ENVIRONMENT MANAGE RUNTIME SOURCE CONTROL BUILD PRODUCTION MAINTAIN CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Security in the CI/CD Pipeline AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation AWS CodeBuild AWS Step Functions AWS Step Functions AWS CodePipeline AWS X-Ray AWS CodeDeploy AWS Elastic Beanstalk AWS EC2 Systems Manager Amazon GuardDuty TESTING & STAGING
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS DEPLOY TO PRODUCTION ENVIRONMENT MANAGE RUNTIME SOURCE CONTROL BUILD PRODUCTION MAINTAIN CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Security in the CI/CD Pipeline AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation AWS Step Functions AWS Step Functions AWS X-Ray AWS CodeDeploy AWS Elastic Beanstalk AWS EC2 Systems Manager Amazon GuardDuty TESTING & STAGING AWS CodeBuild AWS CodePipeline
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS DEPLOY TO PRODUCTION ENVIRONMENT MANAGE RUNTIME SOURCE CONTROL BUILD TESTING & STAGING PRODUCTION MAINTAIN CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Security in the CI/CD Pipeline AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation AWS Step Functions AWS Step Functions AWS X-Ray AWS CodeDeploy AWS Elastic Beanstalk AWS EC2 Systems Manager Amazon GuardDuty AWS CodeBuild AWS CodePipeline
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES SOURCE CONTROL CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Source Control AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation AWS CodeCommit AWS CloudFormation
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark VS. SOURCE CONTROL Infrastructure as Code
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Seek Vendors Who Embrace APIs SOURCE CONTROL
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES SOURCE CONTROL CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Build AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation BUILD AWS CodeCommit AWS CloudFormation AWS Step Functions BUILD ARTIFACTS AWS CodeBuild
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "sns:*", "Resource": "*” }, { "Effect": "Allow", "NotAction":"sns:Delete*", "Resource": "*" } ] } { "Version": "2012-10-17", "Statement": [ { "Effect": "Allow", "Action": "sns:*", "Resource": "*” }, { "Effect": ”Deny", "Action": "sns:Delete*", "Resource": "*" } ] } Policy A Policy B Is Policy A more permissive than Policy B? BUILD
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES SOURCE CONTROL CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Testing & Staging AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation BUILD AWS CodeCommit AWS CloudFormation BUILD ARTIFACTS TESTING & STAGING DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS AWS Step Functions AWS Step Functions AWS X-Ray AWS CodeBuild AWS CodePipeline
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Finding Weaknesses & Defects TESTING & STAGING Amazon Inspector
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES SOURCE CONTROL CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Deployment & Production AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation BUILD AWS CodeCommit AWS CloudFormation BUILD ARTIFACTS TESTING & STAGING DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS AWS Step Functions AWS Step Functions AWS X-Ray DEPLOY TO PRODUCTION ENVIRONMENT PRODUCTION AWS CodeDeploy AWS Elastic Beanstalk AWS CodeBuild AWS CodePipeline
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Management, Security, and Monitoring Storage Customer Instances Network Hypervisor Original Amazon EC2 Host Architecture SERVER
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Management, Security, and Monitoring Storage Customer Instances Network Hypervisor Amazon EC2 C3 Instances SERVER NITRO SYSTEM
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Management, Security, and Monitoring Storage Customer Instances Network Hypervisor Amazon EC2 C4 Instances SERVER NITRO SYSTEM
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Management, Security, and Monitoring Storage Customer Instances Network Nitro Hypervisor Amazon EC2 C5 Instances SERVER NITRO SYSTEM
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark No Shell Access! 23
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark COMMIT CHANGES BUILD ARTIFACTS DEPLOY TO TEST ENVIRONMENT RUN INTEGRATION, SECURITY, LOAD AND OTHER TESTS DEPLOY TO PRODUCTION ENVIRONMENT MANAGE RUNTIME SOURCE CONTROL BUILD PRODUCTION MAINTAIN CONTINUOUS INTEGRATION CONTINUOUS DELIVERY Maintaining Runtime Environment AWS CodeStar AWS CodePipeline AWS CodeStar AWS CodePipeline AWS CodeCommit AWS CloudFormation AWS Step Functions AWS Step Functions AWS X-Ray AWS CodeDeploy AWS Elastic Beanstalk AWS EC2 Systems Manager Amazon GuardDuty TESTING & STAGING AWS CodeBuild AWS CodePipeline
  • 25. Automate Answering the Tough Questions • What data do I have in the cloud? • Where is it located? • Where does my sensitive data exist? • What’s sensitive about the data? • What PII/PHI is possibly exposed? • How is data being shared and stored? • How and where is my data accessed? • How can I classify data in near-real time? • How do I build workflow remediation for my security and compliance needs?
  • 26. AWS CloudTrail Track user activity and API usage Automation: Log Data Inputs VPC Flow Logs IP traffic to/from network interfaces in your VPC CloudWatch Logs Monitor apps using log data, store & access log files DNS Logs Log of DNS queries in a VPC when using the VPC DNS resolver
  • 27. Amazon GuardDuty Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads Automation: Machine Learning Amazon Macie Machine learning-powered security service to discover, classify, & protect sensitive data
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Using NLP and ML together Understand your data Natural Language Processing (NLP) Understand data access Predictive User Behavior Analytics (UBA)
  • 29. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Content Classification with NLP PII and personal data Source code SSL certificates, private keys iOS and Android app signing keys Database backups OAuth and Cloud SaaS API Keys
  • 30. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Use ML and Scaled Services • Use behavioral analytics to baseline normal behavior patterns • Contextualize by value of data being accessed
  • 31. Amazon GuardDuty Threat Detection and Notification
  • 32. Automation: Triggers Amazon CloudWatch Events Delivers a near real-time stream of system events that describe changes in AWS resources AWS Config Rules Continuously tracks your resource configuration changes and if they violate any of the conditions in your rules
  • 33. Automating Remediation AWS Systems Manager Automate patching and proactively mitigate threats at the instance level AWS Lambda Capture info about the IP traffic going to and from network interfaces in your VPC
  • 34. • Asynchronously execute commands • No need to SSH/RDP • Commands and output logged Remediating Threats on Amazon EC2 Instances Amazon EC2 Systems Manager - Run Command EC2 Instances Lambda function AWS Systems Manager Amazon EC2
  • 35. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Tools we use: COEs
  • 36. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark • In your company, deeply understand how software is created and shipped. Sit security team members with a development team for as many days as you can (and not just the appsec team) (1-2 months). Call to Action – Do Try This at Home
  • 37. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark Call to Action – Do Try This at Home • In your company, deeply understand how software is created and shipped. Sit security team members with a development team for as many days as you can (and not just the appsec team) (1-2 months). • Catalog the controls and visibility into CI/CD pipelines. That’s where change management and control happens now (1-3 months).
  • 38. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark • In your company, deeply understand how software is created and shipped. Sit security team members with a development team for as many days as you can (and not just the appsec team) (1-2 months). • Catalog the controls and visibility into CI/CD pipelines. That’s where change management and control happens now (1-3 months). • Begin to document every instance of human interaction with systems that process data. Let engineering & operations teams drive this goal. (1-6 months). Call to Action – Do Try This at Home
  • 39. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark • In your company, deeply understand how software is created and shipped. Sit security team members with a development team for as many days as you can (and not just the appsec team) (1-2 months). • Catalog the controls and visibility into CI/CD pipelines. That’s where change management and control happens now. Set clear goals with owners to harden the pipeline (1-3 months). • Begin to document every instance of human interaction with systems that process data. Let engineering & operations teams drive this goal. (1-6 months). • Set and achieve a goal to reduce human access to systems that process sensitive data by 80% (1-2 years). Call to Action – Do Try This at Home
  • 40. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark • In your company, deeply understand how software is created and shipped. Sit security team members with a development team for as many days as you can (and not just the appsec team) (1-2 months). • Catalog the controls and visibility into CI/CD pipelines. That’s where change management and control happens now. Set clear goals with owners to harden the pipeline (1-3 months). • Begin to document every instance of human interaction with systems that process data. Let engineering & operations teams drive this goal. (1-6 months). • Set and achieve a goal to reduce human access to systems that process sensitive data by 80% (1-2 years). • Set and achieve a goal to drive workload deployment from source code. Catalog the % of workloads that are built on automation vs. those built with manual steps (1 year). Call to Action – Do Try This at Home
  • 41. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Confidential and Trademark More Information Visit the AWS Booth: Exhibit Hall #805 AWS Security Twitter: @AWSSecurityInfo AWS Security Blog: aws.amazon.com/blogs/security/