SlideShare a Scribd company logo
1 of 53
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Introduction to Threat Detection and Remediation on AWS
Cameron Worrell
Solutions Architect
Amazon Web Services
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Agenda
• Quick Intro to Security on AWS
• Overview of Threat Detection and Remediation on AWS
– AWS WAF
– AWS Shield
– Amazon GuardDuty
– Amazon Macie
– AWS Lambda
– AWS Config
– Amazon Inspector
– AWS Systems Manager
– Amazon CloudWatch Events
• Putting it all together
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Introduction to Security on AWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
At AWS, cloud security is job zero.
All AWS customers benefit from a data center
and network architecture built to satisfy the
requirements of the most security-sensitive
organizations.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Gain access to a world-class security team
Where would some of the world’s top security
people like to work? At scale on huge challenges
with huge rewards
So AWS has world-class security and compliance
teams watching your back!
Every customer benefits from the tough
scrutiny of other AWS customers
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Glacier Vault Lock
& SEC Rule 17a-4(f)
Broad Accreditations & Certifications
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Shared Responsibility Model
Customers are
responsible for their
security and
compliance IN the
Cloud
AWS is responsible
for the security OF
the Cloud
CustomerAWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Shared Responsibility Model
Facilities
Physical security
Compute infrastructure
Storage infrastructure
Network infrastructure
Virtualization layer (EC2)
Hardened service endpoints
Rich IAM capabilities
Network configuration
Security groups
OS firewalls
Operating systems
Applications
Proper service configuration
AuthN & acct management
Authorization policies
+ =
Customer
.
• Scope of responsibility depends on the type of service offered by AWS:
Infrastructure, Container, Abstracted Services
• Understanding who is responsible for what is critical to ensuring your AWS data and
systems are secure!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Threat Detection and Remediation on AWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is a WAF?
Web Application Firewall
Monitors HTTP/S requests and protects
web applications from malicious
activities
Layer 7 inspection and mitigation tool
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is AWS WAF?
Web traffic filtering with
custom rules
• Rate based rules
• IP Match & Geo-IP filters
• Regex & String Match
• Size constraints
• Action: Allow/Block
Malicious request blocking
• SQLi
• XSS
Active monitoring & tuning
• CloudWatch
Metrics/Alarms
• Sampled Logs
• Count Action mode
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where AWS WAF can help
Application
layer
Bad botsDDoS Application attacks
HTTP floods
Content scrapers
Scanners & probes
CrawlersSQL injection
Application exploits
Social engineering
AWS WAF
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF benefits
Fast incidence
response
Powerful rule
languageEasy to deploy
AffordableSecurity automation Managed
rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Managed rules from security leaders
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS SHIELD
Standard Protection Advanced Protection
Available to ALL AWS customers at
no additional cost
Paid service that provides additional
protections, features, and benefits
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Automatic defense against the most
common network and transport layer DDoS
attacks for any AWS resource, in any AWS
Region
• Comprehensive defense against all known
network and transport layer attacks when
using Amazon CloudFront and Amazon
Route 53
• Application layer defense available when
using AWS WAF
AWS SHIELD
Standard Protection
Automatically provided to all AWS
customers at no additional cost
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Fast escalation to the AWS DDoS
Response Team (DRT) to assist with
complex edge cases
• Attack visibility and enhanced
detection
• Cost Protection to mitigate economic
attack vectors
• AWS WAF for application-layer defense,
at no additional cost
AWS SHIELD
Advanced Protection
Available globally on Amazon
CloudFront, Amazon Route 53, and in
select AWS Regions
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Effective Against:
• HTTP Floods
• Bad Bots
• Suspicious IPs
Effective Against:
• SSL Attacks
• Slowloris
• Malformed HTTP
Effective Against:
• SYN Floods
• Reflection Attacks
• Suspicious
Sources
DEFENSE IN DEPTH
Border Network
Network Layer Mitigations
AWS Services
Web Layer Mitigations
Customer Infrastructure
DDoS
Detection
Internet
Internet-
Layer
Mitigations
DDoS
Effective Against:
• Large-scale
attacks
Effective Against:
• Sophisticated
Layer 7 attacks
DDoS
Response
Team
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
What is Amazon GuardDuty?
• A threat detection service re-imagined for the cloud
• Continuously monitors and protects AWS accounts, along with the
applications and services running within them
• Detects known and unknown threats
• Makes use of artificial intelligence and machine learning
• Integrated threat intelligence
• Operates on CloudTrail, VPC Flow Logs & DNS
• Detailed & Actionable Findings
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Detecting Known Threats
Threat intelligence
• GuardDuty consumes feeds from various sources
• AWS Security
• Commercial feeds
• Open source feeds
• Customer provided threat intel (STIX)
• Known malware infected hosts
• Anonymizing proxies
• Sites hosting malware & hacker tools
• Crypto-currency mining pools and wallets
• Great catch-all for suspicious & malicious activity
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Detecting Unknown Threats
Anomaly detection
• Algorithms to detect unusual behavior
• Inspecting signal patterns for signatures
• Profiling normal and looking at deviations
• Machine learning classifiers
• Larger R&D effort
• Highly skilled data scientists to study data
• Develop theoretical detection models
• Experiment with implementations
• Testing, tuning, and validation
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
What can the service detect?
RDP brute
force
RAT Installed
Exfiltrate
temp IAM
creds over
DNS
Probe API
with temp
creds
Attempt to
compromise
account
Malicious or
suspicious IP
Unusual ports DNS exfiltration
RDP brute force
Unusual traffic volumeConnect to blacklisted site
Recon
Anonymizing proxy
Temp credentials
used off-instance
Unusual ISP caller
Bitcoin activity
Unusual instance launch
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• Recon
• Port Probe on unprotected port
• Outbound port scans
• Callers from anonymizing proxies
• Backdoor
• Spambot or C&C activity detected
• Exfiltration over DNS channel
• Suspicious domain request
• Trojan
• DGA Domain Request
• Blackhole traffic
• DropPoint
• Unauthorized Access
• Unusual ISP caller
• SSH BruteForce
• RDP Brute Force
• Stealth
• Password Policy Change
• CloudTrail Logging Disabled
• GuardDuty Disabled in member account
• CryptoCurrency
• Communication with Bitcoin DNS pools
• CryptoCurrency related DNS calls
• Connections to Bitcoin mining pools
Finding Type Categories
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Demo: Alexa “Ask GuardDuty”
“Get flash briefing”
“Get statistics for Virginia”
“Get medium severity findings for Oregon”
Amazon
Echo
Alexa
Custom
Skill
(Lambda)
GuardDuty
API
Finding Statistics and
Details
“Alexa, Ask GuardDuty”
read only
“Here is your GuardDuty flash
briefing…”
1
2
3
4
5 Alexa
Service
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• AMAZON MACIE
• ML-POWERED VISIBILITY SERVICE IDENTIFIES
SENSITIVE INFORMATION TO HELP AUTOMATE
SECURITY AND COMPLIANCE
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Macie overview
Understand
your data
Natural Language
Processing (NLP)
Understand data
access
Predictive User
Behavior Analytics
(UBA)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Macie Content Classification
• PII and personal data
• Source code
• SSL certificates, private keys
• iOS and Android app signing keys
• Database backups
• OAuth and Cloud SAAS API Keys
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automated actions on alerts
• Simplify with Lambda
• Delete the object
• Revoke access—bucket or object
• Perimeter guard
• Update IAM policies
• Suspend user
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cost-effective and
efficient
No infrastructure
to manage
Pay only for what you use
Bring your
own code
Productivity-focused compute service to build powerful, dynamic, modular
applications in the cloud
Run code in standard
languages
Focus on business logic
Benefits of AWS Lambda
1 2 3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Lambda: Run Code in Response to Events
FUNCTION SERVICES (ANYTHING)
Changes in
data state
Requests to
endpoints
Changes in
resource state
Node
Python
Java
C#
EVENT SOURCE
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• A W S C o n f i g a n d
• A W S C o n f i g R u l e s
• A W S C l o u d T r a i l a n d
• A m a z o n C l o u d W a t c h L o g s
Active Auditing with AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Config & AWS Config Rules
• A continuous recording and continuous assessment service
Changing resources
AWS Config
Config Rules
History, Snapshot
Notifications
API Access
Normalized
Answer the questions:
How are my resources configured over time?
Is a change that just occurred to a resource, compliant?
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Lambda as Auditor
App Account 1
App Account n
Security Team Account
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Amazon Inspector
• Vulnerability Assessment Service
– Built from the ground up to support DevSecOps
– Automatable via APIs
– Integrates with CI/CD tools
– On-Demand Pricing model
– Static & Dynamic Rules Packages
– Generates Findings
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Amazon Inspector
• Rules Packages
– Common Vulnerabilities & Exposures
– CIS Operating System Security Configuration Benchmarks
– Security Best Practices
– Runtime Behavior Analysis
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automating Remediation
• Findings are JSON formatted and taggable
• Name of assessment target & template
• Start time, end time, status
• Name of rule packages
• Name & severity of the finding
• Description & remediation steps
• Lamd-ify your incident response
• Integrate with Jira-like services
• Integrate with Pagerduty-like services
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Introducing AWS Systems Manager
• A set of capabilities that:
• enable automated configuration
• support ongoing management of systems at scale
• work across all of your Windows and Linux workloads
• run in Amazon EC2 or on-premises
• carry no additional charge to use
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Why should I care?
Support for hybrid
Architecture
Cross-platform Scalable
Secure Easy-to-write
automation
Expected Reduction
in Total Cost of
Ownership (TCO)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Systems Manager capabilities
state manager maintenance
window
inventory
automation parameter store
run command
patch manager
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
CloudWatch Events
• Delivers a near real-time stream of system events that describe changes in
Amazon Web Services (AWS) resources.
• Using simple rules, you can match events and route them to one or more target
functions or streams.
• CloudWatch Events becomes aware of operational changes as they occur and
responds to these operational changes and takes corrective action as
necessary, by sending messages to respond to the environment, activating
functions, making changes, and capturing state information.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Supported Services
• AWS CodeStar
• AWS Console Sign-In
• Auto Scaling
• Batch
• Certificate Manager
• Chime
• Cloud Directory
• CloudFormation
• CloudFront
• CloudHSM
• CloudSearch
• CloudTrail
• CloudWatch Events
• CloudWatch Logs
• CodeBuild
• CodeCommit
• CodeDeploy
• CodePipeline
• Cognito Identity
• Cognito Sync
• Cognito User Pool
• Config
• Data Pipeline
• Database Migration Service
• Direct Connect
• Directory Service
• DynamoDB
• EC2
• EC2 Container Registry
• EC2 Container Service (ECS)
• EC2 Simple Systems Manager (SSM)
• EMR
• ElastiCache
• Elastic Beanstalk
• Elastic File System (EFS)
• Elastic Load Balancing
• Elastic Map Reduce (EMR)
• Elastic Transcoder
• Elasticsearch
• Gamelift
• Glacier
• Glue
• GuardDuty
• Health
• IAM
• Inspector
• IoT
• Key Management Service (KMS)
• Kinesis
• Kinesis Firehose
• Lambda
• Machine Learning
• Macie
• Managed Services
• MediaConvert
• MediaLive
• Metering Marketplace
• Monitoring
• OpsWorks
• OpsWorks for Chef Automate
• Organizations
• Polly
• RedShift
• Relational Database Service (RDS)
• Route 53
• Security Token Service (STS)
• Server Migration Service (SMS)
• Service Catalog
• Simple Email Service (SES)
• Simple Notification Service (SNS)
• Simple Queue Service (SQS)
• Simple Storage Service (S3)
• Simple Workflow Service (SWF)
• Step Functions
• Storage Gateway
• Support
• Trusted Advisor
• WAF Regional
• Web Application Firewall (WAF)
• WorkDocs
• WorkSpaces
* As of 2/20/18
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Supported Targets
• Amazon EC2 instances
• AWS Lambda functions
• Streams in Amazon Kinesis Data Streams
• Delivery streams in Amazon Kinesis Data Firehose
• Amazon ECS tasks
• SSM Run Command
• SSM Automation
• Step Functions state machines
• Pipelines in AWS CodePipeline
• AWS CodeBuild projects
• Amazon Inspector assessment templates
• Amazon SNS topics
• Amazon SQS queues
• Built-in targets
• The default event bus of another AWS account
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Not just API
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Putting it all together
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Service Outputs
Service Outputs
WAF CloudWatch Metrics
Shield CloudWatch Metrics
GuardDuty CloudWatch Events
Macie CloudWatch Events
Lambda CloudWatch Logs
Config Config Rules
Inspector CloudWatch Events
Systems Manager CloudWatch Events
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Remediation through CloudWatch Events and Lambda
Remediation
Lambda
function
GuardDuty
Finding
CloudWatch
Event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Remediation through CloudWatch Events and Lambda
Macie Finding
Remediation
Lambda
function
CloudWatch
Event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Multiple Accounts
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Threat Detection and Remediation in Multiple Accounts
• GuardDuty and Macie Support Master / Member accounts
– Centralized Console for many accounts, per region
• CloudWatch Events supports receiving events from multiple accounts through
the Event Bus feature
– All CloudWatch Events across your organization can be sent to an Event Bus owned
by your InfoSec team
• CloudFormation
– All services discussed today support CloudFormation directly or through custom
Lambda resources
– CloudFormation allows you to deploy services discussed today as code
– CloudFormation StackSets allows you to centrally deploy templates across accounts
and regions
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Wrap Up
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Security Center
Comprehensive security portal to provide a variety of security notifications,
information and documentation.
Security Whitepapers
• Overview of Security Process
• AWS Risk and Compliance
• AWS Security Best Practices
Security Bulletin
Security Resources
Vulnerability Reporting
Penetration Testing
Requests
Report Suspicious Emails
http://aws.amazon.com/security
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Security Blog
http://blogs.aws.amazon.com/security/
Subscribe to the blog – it’s a great way to stay up-to-date on
AWS security and compliance.
Security Resources
http://aws.amazon.com/security/security-resources/
Developer Information, Articles and Tutorials,
Security Products, and Whitepapers
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

More Related Content

What's hot

Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSAmazon Web Services
 
Introduction to Incident Response on AWS
Introduction to Incident Response on AWSIntroduction to Incident Response on AWS
Introduction to Incident Response on AWSAmazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Amazon Web Services
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAmazon Web Services
 
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignAmazon Web Services
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance John Varghese
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Amazon Web Services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionAmazon Web Services
 

What's hot (20)

Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
AWS-Vizalytics-March-2018 2.pdf
AWS-Vizalytics-March-2018 2.pdfAWS-Vizalytics-March-2018 2.pdf
AWS-Vizalytics-March-2018 2.pdf
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWS
 
Introduction to Incident Response on AWS
Introduction to Incident Response on AWSIntroduction to Incident Response on AWS
Introduction to Incident Response on AWS
 
Governance at Scale
Governance at Scale Governance at Scale
Governance at Scale
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
AWS Storage Stage of Union
AWS Storage Stage of UnionAWS Storage Stage of Union
AWS Storage Stage of Union
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
AWS Secrets for Best Practices
AWS Secrets for Best PracticesAWS Secrets for Best Practices
AWS Secrets for Best Practices
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 

Similar to Intro to Threat Detection and Remediation on AWS

Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationAmazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWSAmazon Web Services
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksAmazon Web Services
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...Amazon Web Services
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Amazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Amazon Web Services
 
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Amazon Web Services
 

Similar to Intro to Threat Detection and Remediation on AWS (20)

Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
HLC302_Adopting Microservices in Healthcare Building a Compliant DevOps Pipel...
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
Automating DDoS Response in the Cloud - SID324 - re:Invent 2017
 
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Intro to Threat Detection and Remediation on AWS

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Introduction to Threat Detection and Remediation on AWS Cameron Worrell Solutions Architect Amazon Web Services
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Agenda • Quick Intro to Security on AWS • Overview of Threat Detection and Remediation on AWS – AWS WAF – AWS Shield – Amazon GuardDuty – Amazon Macie – AWS Lambda – AWS Config – Amazon Inspector – AWS Systems Manager – Amazon CloudWatch Events • Putting it all together
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Introduction to Security on AWS
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved At AWS, cloud security is job zero. All AWS customers benefit from a data center and network architecture built to satisfy the requirements of the most security-sensitive organizations.
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Gain access to a world-class security team Where would some of the world’s top security people like to work? At scale on huge challenges with huge rewards So AWS has world-class security and compliance teams watching your back! Every customer benefits from the tough scrutiny of other AWS customers
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Glacier Vault Lock & SEC Rule 17a-4(f) Broad Accreditations & Certifications
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Shared Responsibility Model Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud CustomerAWS
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Shared Responsibility Model Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure Virtualization layer (EC2) Hardened service endpoints Rich IAM capabilities Network configuration Security groups OS firewalls Operating systems Applications Proper service configuration AuthN & acct management Authorization policies + = Customer . • Scope of responsibility depends on the type of service offered by AWS: Infrastructure, Container, Abstracted Services • Understanding who is responsible for what is critical to ensuring your AWS data and systems are secure!
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Threat Detection and Remediation on AWS
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is a WAF? Web Application Firewall Monitors HTTP/S requests and protects web applications from malicious activities Layer 7 inspection and mitigation tool
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is AWS WAF? Web traffic filtering with custom rules • Rate based rules • IP Match & Geo-IP filters • Regex & String Match • Size constraints • Action: Allow/Block Malicious request blocking • SQLi • XSS Active monitoring & tuning • CloudWatch Metrics/Alarms • Sampled Logs • Count Action mode
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where AWS WAF can help Application layer Bad botsDDoS Application attacks HTTP floods Content scrapers Scanners & probes CrawlersSQL injection Application exploits Social engineering AWS WAF
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF benefits Fast incidence response Powerful rule languageEasy to deploy AffordableSecurity automation Managed rules
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Managed rules from security leaders
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS SHIELD Standard Protection Advanced Protection Available to ALL AWS customers at no additional cost Paid service that provides additional protections, features, and benefits
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Automatic defense against the most common network and transport layer DDoS attacks for any AWS resource, in any AWS Region • Comprehensive defense against all known network and transport layer attacks when using Amazon CloudFront and Amazon Route 53 • Application layer defense available when using AWS WAF AWS SHIELD Standard Protection Automatically provided to all AWS customers at no additional cost
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Fast escalation to the AWS DDoS Response Team (DRT) to assist with complex edge cases • Attack visibility and enhanced detection • Cost Protection to mitigate economic attack vectors • AWS WAF for application-layer defense, at no additional cost AWS SHIELD Advanced Protection Available globally on Amazon CloudFront, Amazon Route 53, and in select AWS Regions
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Effective Against: • HTTP Floods • Bad Bots • Suspicious IPs Effective Against: • SSL Attacks • Slowloris • Malformed HTTP Effective Against: • SYN Floods • Reflection Attacks • Suspicious Sources DEFENSE IN DEPTH Border Network Network Layer Mitigations AWS Services Web Layer Mitigations Customer Infrastructure DDoS Detection Internet Internet- Layer Mitigations DDoS Effective Against: • Large-scale attacks Effective Against: • Sophisticated Layer 7 attacks DDoS Response Team
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved What is Amazon GuardDuty? • A threat detection service re-imagined for the cloud • Continuously monitors and protects AWS accounts, along with the applications and services running within them • Detects known and unknown threats • Makes use of artificial intelligence and machine learning • Integrated threat intelligence • Operates on CloudTrail, VPC Flow Logs & DNS • Detailed & Actionable Findings
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Detecting Known Threats Threat intelligence • GuardDuty consumes feeds from various sources • AWS Security • Commercial feeds • Open source feeds • Customer provided threat intel (STIX) • Known malware infected hosts • Anonymizing proxies • Sites hosting malware & hacker tools • Crypto-currency mining pools and wallets • Great catch-all for suspicious & malicious activity
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Detecting Unknown Threats Anomaly detection • Algorithms to detect unusual behavior • Inspecting signal patterns for signatures • Profiling normal and looking at deviations • Machine learning classifiers • Larger R&D effort • Highly skilled data scientists to study data • Develop theoretical detection models • Experiment with implementations • Testing, tuning, and validation
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved What can the service detect? RDP brute force RAT Installed Exfiltrate temp IAM creds over DNS Probe API with temp creds Attempt to compromise account Malicious or suspicious IP Unusual ports DNS exfiltration RDP brute force Unusual traffic volumeConnect to blacklisted site Recon Anonymizing proxy Temp credentials used off-instance Unusual ISP caller Bitcoin activity Unusual instance launch
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • Recon • Port Probe on unprotected port • Outbound port scans • Callers from anonymizing proxies • Backdoor • Spambot or C&C activity detected • Exfiltration over DNS channel • Suspicious domain request • Trojan • DGA Domain Request • Blackhole traffic • DropPoint • Unauthorized Access • Unusual ISP caller • SSH BruteForce • RDP Brute Force • Stealth • Password Policy Change • CloudTrail Logging Disabled • GuardDuty Disabled in member account • CryptoCurrency • Communication with Bitcoin DNS pools • CryptoCurrency related DNS calls • Connections to Bitcoin mining pools Finding Type Categories
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Demo: Alexa “Ask GuardDuty” “Get flash briefing” “Get statistics for Virginia” “Get medium severity findings for Oregon” Amazon Echo Alexa Custom Skill (Lambda) GuardDuty API Finding Statistics and Details “Alexa, Ask GuardDuty” read only “Here is your GuardDuty flash briefing…” 1 2 3 4 5 Alexa Service
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • AMAZON MACIE • ML-POWERED VISIBILITY SERVICE IDENTIFIES SENSITIVE INFORMATION TO HELP AUTOMATE SECURITY AND COMPLIANCE
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Macie overview Understand your data Natural Language Processing (NLP) Understand data access Predictive User Behavior Analytics (UBA)
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Macie Content Classification • PII and personal data • Source code • SSL certificates, private keys • iOS and Android app signing keys • Database backups • OAuth and Cloud SAAS API Keys
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automated actions on alerts • Simplify with Lambda • Delete the object • Revoke access—bucket or object • Perimeter guard • Update IAM policies • Suspend user
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cost-effective and efficient No infrastructure to manage Pay only for what you use Bring your own code Productivity-focused compute service to build powerful, dynamic, modular applications in the cloud Run code in standard languages Focus on business logic Benefits of AWS Lambda 1 2 3
  • 30. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Lambda: Run Code in Response to Events FUNCTION SERVICES (ANYTHING) Changes in data state Requests to endpoints Changes in resource state Node Python Java C# EVENT SOURCE
  • 31. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • A W S C o n f i g a n d • A W S C o n f i g R u l e s • A W S C l o u d T r a i l a n d • A m a z o n C l o u d W a t c h L o g s Active Auditing with AWS Lambda
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Config & AWS Config Rules • A continuous recording and continuous assessment service Changing resources AWS Config Config Rules History, Snapshot Notifications API Access Normalized Answer the questions: How are my resources configured over time? Is a change that just occurred to a resource, compliant?
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Lambda as Auditor App Account 1 App Account n Security Team Account
  • 34. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Amazon Inspector • Vulnerability Assessment Service – Built from the ground up to support DevSecOps – Automatable via APIs – Integrates with CI/CD tools – On-Demand Pricing model – Static & Dynamic Rules Packages – Generates Findings
  • 35. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Amazon Inspector • Rules Packages – Common Vulnerabilities & Exposures – CIS Operating System Security Configuration Benchmarks – Security Best Practices – Runtime Behavior Analysis
  • 36. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automating Remediation • Findings are JSON formatted and taggable • Name of assessment target & template • Start time, end time, status • Name of rule packages • Name & severity of the finding • Description & remediation steps • Lamd-ify your incident response • Integrate with Jira-like services • Integrate with Pagerduty-like services
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Introducing AWS Systems Manager • A set of capabilities that: • enable automated configuration • support ongoing management of systems at scale • work across all of your Windows and Linux workloads • run in Amazon EC2 or on-premises • carry no additional charge to use
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Why should I care? Support for hybrid Architecture Cross-platform Scalable Secure Easy-to-write automation Expected Reduction in Total Cost of Ownership (TCO)
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Systems Manager capabilities state manager maintenance window inventory automation parameter store run command patch manager
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved CloudWatch Events • Delivers a near real-time stream of system events that describe changes in Amazon Web Services (AWS) resources. • Using simple rules, you can match events and route them to one or more target functions or streams. • CloudWatch Events becomes aware of operational changes as they occur and responds to these operational changes and takes corrective action as necessary, by sending messages to respond to the environment, activating functions, making changes, and capturing state information.
  • 41. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Supported Services • AWS CodeStar • AWS Console Sign-In • Auto Scaling • Batch • Certificate Manager • Chime • Cloud Directory • CloudFormation • CloudFront • CloudHSM • CloudSearch • CloudTrail • CloudWatch Events • CloudWatch Logs • CodeBuild • CodeCommit • CodeDeploy • CodePipeline • Cognito Identity • Cognito Sync • Cognito User Pool • Config • Data Pipeline • Database Migration Service • Direct Connect • Directory Service • DynamoDB • EC2 • EC2 Container Registry • EC2 Container Service (ECS) • EC2 Simple Systems Manager (SSM) • EMR • ElastiCache • Elastic Beanstalk • Elastic File System (EFS) • Elastic Load Balancing • Elastic Map Reduce (EMR) • Elastic Transcoder • Elasticsearch • Gamelift • Glacier • Glue • GuardDuty • Health • IAM • Inspector • IoT • Key Management Service (KMS) • Kinesis • Kinesis Firehose • Lambda • Machine Learning • Macie • Managed Services • MediaConvert • MediaLive • Metering Marketplace • Monitoring • OpsWorks • OpsWorks for Chef Automate • Organizations • Polly • RedShift • Relational Database Service (RDS) • Route 53 • Security Token Service (STS) • Server Migration Service (SMS) • Service Catalog • Simple Email Service (SES) • Simple Notification Service (SNS) • Simple Queue Service (SQS) • Simple Storage Service (S3) • Simple Workflow Service (SWF) • Step Functions • Storage Gateway • Support • Trusted Advisor • WAF Regional • Web Application Firewall (WAF) • WorkDocs • WorkSpaces * As of 2/20/18
  • 42. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Supported Targets • Amazon EC2 instances • AWS Lambda functions • Streams in Amazon Kinesis Data Streams • Delivery streams in Amazon Kinesis Data Firehose • Amazon ECS tasks • SSM Run Command • SSM Automation • Step Functions state machines • Pipelines in AWS CodePipeline • AWS CodeBuild projects • Amazon Inspector assessment templates • Amazon SNS topics • Amazon SQS queues • Built-in targets • The default event bus of another AWS account
  • 43. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Not just API
  • 44. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Putting it all together
  • 45. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Service Outputs Service Outputs WAF CloudWatch Metrics Shield CloudWatch Metrics GuardDuty CloudWatch Events Macie CloudWatch Events Lambda CloudWatch Logs Config Config Rules Inspector CloudWatch Events Systems Manager CloudWatch Events
  • 46. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Remediation through CloudWatch Events and Lambda Remediation Lambda function GuardDuty Finding CloudWatch Event
  • 47. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Remediation through CloudWatch Events and Lambda Macie Finding Remediation Lambda function CloudWatch Event
  • 48. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Multiple Accounts
  • 49. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Threat Detection and Remediation in Multiple Accounts • GuardDuty and Macie Support Master / Member accounts – Centralized Console for many accounts, per region • CloudWatch Events supports receiving events from multiple accounts through the Event Bus feature – All CloudWatch Events across your organization can be sent to an Event Bus owned by your InfoSec team • CloudFormation – All services discussed today support CloudFormation directly or through custom Lambda resources – CloudFormation allows you to deploy services discussed today as code – CloudFormation StackSets allows you to centrally deploy templates across accounts and regions
  • 50. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Wrap Up
  • 51. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Security Center Comprehensive security portal to provide a variety of security notifications, information and documentation. Security Whitepapers • Overview of Security Process • AWS Risk and Compliance • AWS Security Best Practices Security Bulletin Security Resources Vulnerability Reporting Penetration Testing Requests Report Suspicious Emails http://aws.amazon.com/security
  • 52. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Security Blog http://blogs.aws.amazon.com/security/ Subscribe to the blog – it’s a great way to stay up-to-date on AWS security and compliance. Security Resources http://aws.amazon.com/security/security-resources/ Developer Information, Articles and Tutorials, Security Products, and Whitepapers
  • 53. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved aws.amazon.com/activate Everything and Anything Startups Need to Get Started on AWS