SlideShare a Scribd company logo
1 of 29
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Introducing AWS Security Hub
Ely Kahn
Principal Product Manager
AWS Security Hub
S E C 3 7 9
Jack Bomkamp
Senior Technical Program Manager
AWS Security Hub
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Service introduction
Demonstration
Partner/customer use cases
Next steps
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS security workflow
ArchiveSnapshot
Protect Detect Respond RecoverIdentify
Investigate
Automate
Amazon
Macie
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Problem statement
1
Large volume of
alerts and the need
to prioritize
3
Dozens of security
tools with different
data formats
2
Ensure that your
AWS infrastructure
meets compliance
requirements
1
PrioritizationMultiple formats VisibilityCompliance
Lack of a single
pane of glass across
security and
compliance tools
4
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Security Hub overview
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Rollout plans and pricing
AWS Security Hub is rolling out today
as a public preview
Available at no additional cost except for AWS
Config costs for new AWS Config users
Open to everyone
Get started in a few clicks
Goal is to iterate on latest features with
customers before releasing as generally
available (GA)
Full API/CLI/SDK support
C++, Go, Java, JS, .Net, PHP, Python, Ruby
Supported Regions (15)
Asia Pacific (Mumbai)
Asia Pacific (Seoul)
Asia Pacific (Singapore)
Asia Pacific (Sydney)
Asia Pacific (Tokyo)
Canada (Central)
EU (Frankfurt
EU (Ireland)
EU (London)
EU (Paris)
South America (Sao Paulo)
US East (N. Virginia)
US East (Ohio)
US West (N. California)
US West (Oregon)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Partner integrations
Firewalls
Vulnerability
SOAR
SIEM
Endpoint
Compliance
MSSP
Other
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Partner integration examples — CrowdStrike
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Partner integration examples — Alert Logic
1. Inspected data is transported to Alert Logic’s data
ingestion, processing, and analytics platform
2. Alert Logic’s threat detection and response
capability analyzes the data and identifies
incidents
3. An internal service (dedicated to AWS Security
Hub) assesses the incident for potential posting
to AWS Security Hub
4. The incident is then posted to the respective
customer’s AWS Security Hub console as a finding
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Examples of partner integration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Setup and multi-account
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Compliance checks
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Insights
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Response and remediation
Event (event-
based)
Rule
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Private beta testers
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case: LifeLock without AWS Security Hub
Flow logs
CWP events
Log aggregation
Evaluate scan results
Repeat until
event remediated
CWP manually scans
Amazon EC2 instance
Findings warrant
further investigation
Finding
Analyst investigation Analyst action
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case: LifeLock with AWS Security Hub
AWS
Security Hub
CWP
CloudWatch
event
FindingsFindings
File scan
Scan Results
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case: The Pokémon Company and Demisto
➢ Business Challenges
Growing alerts No consistent process Long MTTR and risk
➢ Use Case
➢ Benefits
Unify security functions Keyless automation Orchestrate cloud security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case: The Pokémon Company and Demisto
➢ Use Case
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cloud Custodian and AWS Security Hub
https://aws.amazon.com/blogs/opensource/cloud-custodian-integration-aws-security-hub
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Key takeaways
Collect and process security findings from multiple accounts within a region
Evaluate your compliance against regulatory and best practice frameworks
Identify and prioritize the most important issues by grouping and correlating security
findings with Insights
Understand and manage your overall AWS security and compliance posture
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Next steps
Try the preview: https://console.aws.amazon.com/securityhub/
Become a partner: Contact us at securityhub-partners@amazon.com
Learn more: https://aws.amazon.com/security-hub/
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Ely Kahn
Twitter: @elykahn
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

What's hot (20)

Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...
Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...
Build a Searchable Media Library & Moderate Content at Scale Using Machine Le...
 
Mythical Mysfits: Management and Ops with AWS Fargate (CON322-R1) - AWS re:In...
Mythical Mysfits: Management and Ops with AWS Fargate (CON322-R1) - AWS re:In...Mythical Mysfits: Management and Ops with AWS Fargate (CON322-R1) - AWS re:In...
Mythical Mysfits: Management and Ops with AWS Fargate (CON322-R1) - AWS re:In...
 
Scale Your SAP HANA In-Memory Database on Amazon EC2 High Memory Instances wi...
Scale Your SAP HANA In-Memory Database on Amazon EC2 High Memory Instances wi...Scale Your SAP HANA In-Memory Database on Amazon EC2 High Memory Instances wi...
Scale Your SAP HANA In-Memory Database on Amazon EC2 High Memory Instances wi...
 
Save up to 90% on Big Data and Machine Learning Workloads with Spot Instances...
Save up to 90% on Big Data and Machine Learning Workloads with Spot Instances...Save up to 90% on Big Data and Machine Learning Workloads with Spot Instances...
Save up to 90% on Big Data and Machine Learning Workloads with Spot Instances...
 
Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. General El...
Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. General El...Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. General El...
Computing at the Edge with AWS Greengrass and Amazon FreeRTOS, ft. General El...
 
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
 
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
 
How AWS Minimizes the Blast Radius of Failures (ARC338) - AWS re:Invent 2018
How AWS Minimizes the Blast Radius of Failures (ARC338) - AWS re:Invent 2018How AWS Minimizes the Blast Radius of Failures (ARC338) - AWS re:Invent 2018
How AWS Minimizes the Blast Radius of Failures (ARC338) - AWS re:Invent 2018
 
How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...
How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...
How Rovio Uses ML to Acquire, Retain, and Monetize Users (GAM304) - AWS re:In...
 
使用 AWS Step Functions 靈活調度 AWS Lambda (Level:200)
使用 AWS Step Functions 靈活調度 AWS Lambda (Level:200)使用 AWS Step Functions 靈活調度 AWS Lambda (Level:200)
使用 AWS Step Functions 靈活調度 AWS Lambda (Level:200)
 
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
Breaking Up the Monolith While Migrating to AWS (GPSTEC320) - AWS re:Invent 2018
 
Building a Hybrid Architecture: Enterprise Backup & Recovery (ENT212-S) - AWS...
Building a Hybrid Architecture: Enterprise Backup & Recovery (ENT212-S) - AWS...Building a Hybrid Architecture: Enterprise Backup & Recovery (ENT212-S) - AWS...
Building a Hybrid Architecture: Enterprise Backup & Recovery (ENT212-S) - AWS...
 
Scale Your Studio: Rendering with Spot and Deadline on AWS (CMP202) - AWS re:...
Scale Your Studio: Rendering with Spot and Deadline on AWS (CMP202) - AWS re:...Scale Your Studio: Rendering with Spot and Deadline on AWS (CMP202) - AWS re:...
Scale Your Studio: Rendering with Spot and Deadline on AWS (CMP202) - AWS re:...
 
Building a Governance, Risk, and Compliance Strategy with AWS (WPS204) - AWS ...
Building a Governance, Risk, and Compliance Strategy with AWS (WPS204) - AWS ...Building a Governance, Risk, and Compliance Strategy with AWS (WPS204) - AWS ...
Building a Governance, Risk, and Compliance Strategy with AWS (WPS204) - AWS ...
 
How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...
How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...
How Verizon is Accelerating Cloud Adoption and Migration with the AWS Service...
 
Digital Transformation Playbook in Five Steps (ARC322) - AWS re:Invent 2018
Digital Transformation Playbook in Five Steps (ARC322) - AWS re:Invent 2018Digital Transformation Playbook in Five Steps (ARC322) - AWS re:Invent 2018
Digital Transformation Playbook in Five Steps (ARC322) - AWS re:Invent 2018
 
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
 
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
What's New with the AWS CLI (DEV322-R1) - AWS re:Invent 2018
 
AWS 良好架構服務概述 (Level: 200)
AWS 良好架構服務概述 (Level: 200)AWS 良好架構服務概述 (Level: 200)
AWS 良好架構服務概述 (Level: 200)
 
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
Shift-Left SRE: Self-Healing with AWS Lambda Functions (DEV313-S) - AWS re:In...
 

Similar to [NEW LAUNCH!] Introduction to AWS Security Hub (SEC397) - AWS re:Invent 2018

New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
Amazon Web Services
 

Similar to [NEW LAUNCH!] Introduction to AWS Security Hub (SEC397) - AWS re:Invent 2018 (20)

New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Take action on your security & compliance alerts with AWS Security Hub - SEC2...
Take action on your security & compliance alerts with AWS Security Hub - SEC2...Take action on your security & compliance alerts with AWS Security Hub - SEC2...
Take action on your security & compliance alerts with AWS Security Hub - SEC2...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models AWS Systems Manage: Bridging Operational Models
AWS Systems Manage: Bridging Operational Models
 
Inventory, Track, and Respond to AWS Asset Changes within Seconds at Scale (S...
Inventory, Track, and Respond to AWS Asset Changes within Seconds at Scale (S...Inventory, Track, and Respond to AWS Asset Changes within Seconds at Scale (S...
Inventory, Track, and Respond to AWS Asset Changes within Seconds at Scale (S...
 
How to act on security and compliance alerts with AWS Security Hub - SEC202 -...
How to act on security and compliance alerts with AWS Security Hub - SEC202 -...How to act on security and compliance alerts with AWS Security Hub - SEC202 -...
How to act on security and compliance alerts with AWS Security Hub - SEC202 -...
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesSecurity Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

[NEW LAUNCH!] Introduction to AWS Security Hub (SEC397) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Introducing AWS Security Hub Ely Kahn Principal Product Manager AWS Security Hub S E C 3 7 9 Jack Bomkamp Senior Technical Program Manager AWS Security Hub
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Service introduction Demonstration Partner/customer use cases Next steps
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS security workflow ArchiveSnapshot Protect Detect Respond RecoverIdentify Investigate Automate Amazon Macie
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Problem statement 1 Large volume of alerts and the need to prioritize 3 Dozens of security tools with different data formats 2 Ensure that your AWS infrastructure meets compliance requirements 1 PrioritizationMultiple formats VisibilityCompliance Lack of a single pane of glass across security and compliance tools 4
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Security Hub overview
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Rollout plans and pricing AWS Security Hub is rolling out today as a public preview Available at no additional cost except for AWS Config costs for new AWS Config users Open to everyone Get started in a few clicks Goal is to iterate on latest features with customers before releasing as generally available (GA) Full API/CLI/SDK support C++, Go, Java, JS, .Net, PHP, Python, Ruby Supported Regions (15) Asia Pacific (Mumbai) Asia Pacific (Seoul) Asia Pacific (Singapore) Asia Pacific (Sydney) Asia Pacific (Tokyo) Canada (Central) EU (Frankfurt EU (Ireland) EU (London) EU (Paris) South America (Sao Paulo) US East (N. Virginia) US East (Ohio) US West (N. California) US West (Oregon)
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Partner integrations Firewalls Vulnerability SOAR SIEM Endpoint Compliance MSSP Other
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Partner integration examples — CrowdStrike
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Partner integration examples — Alert Logic 1. Inspected data is transported to Alert Logic’s data ingestion, processing, and analytics platform 2. Alert Logic’s threat detection and response capability analyzes the data and identifies incidents 3. An internal service (dedicated to AWS Security Hub) assesses the incident for potential posting to AWS Security Hub 4. The incident is then posted to the respective customer’s AWS Security Hub console as a finding
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Examples of partner integration
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Setup and multi-account
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Compliance checks
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Insights
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Response and remediation Event (event- based) Rule
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Private beta testers
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case: LifeLock without AWS Security Hub Flow logs CWP events Log aggregation Evaluate scan results Repeat until event remediated CWP manually scans Amazon EC2 instance Findings warrant further investigation Finding Analyst investigation Analyst action
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case: LifeLock with AWS Security Hub AWS Security Hub CWP CloudWatch event FindingsFindings File scan Scan Results
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case: The Pokémon Company and Demisto ➢ Business Challenges Growing alerts No consistent process Long MTTR and risk ➢ Use Case ➢ Benefits Unify security functions Keyless automation Orchestrate cloud security
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case: The Pokémon Company and Demisto ➢ Use Case
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Cloud Custodian and AWS Security Hub https://aws.amazon.com/blogs/opensource/cloud-custodian-integration-aws-security-hub
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Key takeaways Collect and process security findings from multiple accounts within a region Evaluate your compliance against regulatory and best practice frameworks Identify and prioritize the most important issues by grouping and correlating security findings with Insights Understand and manage your overall AWS security and compliance posture
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Next steps Try the preview: https://console.aws.amazon.com/securityhub/ Become a partner: Contact us at securityhub-partners@amazon.com Learn more: https://aws.amazon.com/security-hub/
  • 28. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Ely Kahn Twitter: @elykahn
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.