SlideShare a Scribd company logo
1 of 46
Download to read offline
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Force Multiply Your Security
Team with Automation and Alexa
D o n “ B e e t l e ” B a i l e y , A W S S e c u r i t y
B r i a n W a g n e r , A W S P r o f e s s i o n a l S e r v i c e s
S I D 3 0 2
N o v e m b e r 2 7 , 2 0 1 7
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What to Expect from This Session
• Iteration of previous re:Invent talks
• Philosophy behind automating security work stuff
• Guide for picking stuff to automate
• Examples for various parts of your team
• Additional Resources
• Demos!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Previously @ re:Invent
YouTube search …
• “Intrusion Detection in the Cloud” 2014
• “Incident Response (IR) in the Cloud” 2014
• “Wrangling Security Events in The Cloud” 2015
• “Automating Security Event Response” 2016
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Why Alexa? … Why Not?
• Familiar
• Helpful
• Process repeatability
• Forcing function
• Goals
• “Suspension of Strong Authn/Authz Disbelief”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevSecOps in A Nutshell
• Cloud-y
• Security that permeates
• Beyond security as part of SDLC
• Security LIVES in prod
• Security scaling to support the business
SID306 - How Chick-fil-A Embraces DevSecOps on AWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Modern Security Roles (Not Roles for EC2)
• Application Security
• Compliance
• Security Engineering
• Security Operations
• Threat Intelligence
• And MORE …!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Everyone Has An “Ugh”
• Manual
• Repetitive
• Time-consuming
• Soul-crushing
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Importance of Empowering Security Geeks
• Deepest understanding
• Self-preservation
• Build or buy economics
• No more holding out for a hero
• Burn-out is real
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How AWS Can Naturally Enable
• Ability to programmatically inventory environment—
knowing what you need to protect is key
• Awareness of what’s happening, what’s changing, from
AWS API activity to application behavior
• Detection and alerting mechanisms, freedom to create,
and flexibility to configure and tune what’s appropriate
for YOU
• Analysis and response, via the same platform, natively
or with AWS partner solutions
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS
CloudTrail
Amazon
CloudWatch
Events
AWS
Lambda
Amazon
Simple
Notification
Service
AWS API
endpoints
Your Staff Amazon S3
bucket
Your
security
team
AWS
IAM
role
AWS API
Your SaaS
tools
Event Detect → Automation Workflow Example
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
From Idea to Code to Execution Redux
• What is my expressed security objective in words?
• Is this configuration or behavior related?
• What data, where, could help inform me?
• Do I have requisite ownership or visibility?
• What are my performance requirements?
• What mechanisms support the above?
• What is my expressed security objective in code?
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“I want to identify any instances
running vulnerable software.”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo #1 Under The Hood
Amazon Inspector
webappdata
AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The Alexa Difference
• Complexity beyond push-button
• Desired interrupts/gates
• Ad-hoc opportunities
• Staff flexibility
• Training fodder
• Not an either/or
Alexa Skill
Echo Lambda
Function
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example Activities
• Audit (scanning, inventory, confirm configuration)
• Remediation (patching, refresh)
• Response (isolation, tagging, enforcement)
• Analysis (forensics, log diving)
• Reporting (event summary, output pivot)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where / How to Pivot from Events
• Amazon SNS notification
• Use of tags
• Look for tags
• New work from event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where / How to Pivot from Events
• Amazon SNS notification
• Use of tags
• Look for tags
• New work from event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where / How to Pivot from Events
• Amazon SNS notification
• Use of tags
• Look for tags
• New work from event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where / How to Pivot from Events
• Amazon SNS notification
• Use of tags
• Look for tags
• New work from event
{
"detail-type": [
"AWS API Call via CloudTrail"
],
"detail": {
"eventSource": [
”ec2.amazonaws.com"
],
"eventName": [
"CreateTags"
]
}
}
CloudWatch Event Rule
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where / How to Pivot from Events
• Amazon SNS notification
• Use of tags
• Look for tags
• New work from event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“I want to patch any instances
running vulnerable software.”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon EC2 Systems Manager FTW
State Manager Maintenance WindowInventory
Automation Parameter Store
Run Command
Patch Manager
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo #2 Under The Hood
Patch Manager
webappdata
AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“I want to tag and isolate an
abnormally acting instance.”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo #3 Under The Hood
AWS Lambda
CloudWatch
Event Rule
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo #3 Under The Hood
AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“I want to run forensics on an
instance previously tagged as
suspicious.”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo #3 Under The Hood
AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Army of One, Yay!
Interacting with Alexa to do things like …
• Launch Amazon Inspector to identify instances with
vulnerabilities
• Patch instances with critical vulnerabilities
• Isolate misbehaving instances and tag them for forensic
analysis
• Perform forensic analysis on implicated instances
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“I want to know what my awesome
security team has done recently.”
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Demo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Other Resources
• ThreatResponse, open source IR tools for AWS
https://threatresponse.cloud
• Netflix, “Security Monkey”, “Scumblr”, etc.
https://netflix.github.io/
• NCC Group, “Scout2”
https://nccgroup.github.io/Scout2/
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Partners
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Other Talks
• SID301 - Using AWS Lambda as a Security Team
• SID304 - SecOps 2021 Today: Using AWS Services to
Deliver SecOps
• SID319 - Incident Response in the Cloud
• SID322 - The AWS Philosophy of Security
• ALX326 - Applying Alexa's Natural Language To Your
Challenges
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Other AWS Security Resources
• Support
https://aws.amazon.com/support
• AWS Cloud Security
https://aws.amazon.com/security
• AWS Security Blog
https://aws.amazon.com/blogs/security/
• Contact the AWS security team
aws-security@amazon.com
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Summary
• Automating security stuff with Alexa is not sci-fi
• There is a wide variety of your activities that could
benefit from and are ripe for Alexa
• Empowering your security geeks to automate with
Alexa pays dividends
• There are plenty of resources to help you get started,
and starting small/simple is A-OK
• Go find some ugh and automate with Alexa today!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

CON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersCON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersAmazon Web Services
 
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017Amazon Web Services
 
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017Amazon Web Services
 
CON317_Advanced container management at catsndogs.lol
CON317_Advanced container management at catsndogs.lolCON317_Advanced container management at catsndogs.lol
CON317_Advanced container management at catsndogs.lolAmazon Web Services
 
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017Amazon Web Services
 
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineWIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineAmazon Web Services
 
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoTIOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoTAmazon Web Services
 
CTD403_Supercharge Your Websites with the Power of Lambda@Edge
CTD403_Supercharge Your Websites with the Power of Lambda@EdgeCTD403_Supercharge Your Websites with the Power of Lambda@Edge
CTD403_Supercharge Your Websites with the Power of Lambda@EdgeAmazon Web Services
 
DVC304_Compliance and Top Security Threats in the Cloud—Are You Protected
DVC304_Compliance and Top Security Threats in the Cloud—Are You ProtectedDVC304_Compliance and Top Security Threats in the Cloud—Are You Protected
DVC304_Compliance and Top Security Threats in the Cloud—Are You ProtectedAmazon Web Services
 
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017Amazon Web Services
 
ENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsAmazon Web Services
 
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...Amazon Web Services
 
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017Amazon Web Services
 
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesIntroduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesAmazon Web Services
 
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017Amazon Web Services
 
ENT301_Real-World AI For the Enterprise
ENT301_Real-World AI For the EnterpriseENT301_Real-World AI For the Enterprise
ENT301_Real-World AI For the EnterpriseAmazon Web Services
 
CON320_Monitoring, Logging and Debugging Containerized Services
CON320_Monitoring, Logging and Debugging Containerized ServicesCON320_Monitoring, Logging and Debugging Containerized Services
CON320_Monitoring, Logging and Debugging Containerized ServicesAmazon Web Services
 
MCL306_Making IoT Smarter with AWS Rekognition.pdf
MCL306_Making IoT Smarter with AWS Rekognition.pdfMCL306_Making IoT Smarter with AWS Rekognition.pdf
MCL306_Making IoT Smarter with AWS Rekognition.pdfAmazon Web Services
 

What's hot (20)

Introducing Amazon EKS
Introducing Amazon EKSIntroducing Amazon EKS
Introducing Amazon EKS
 
CON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersCON203_Driving Innovation with Containers
CON203_Driving Innovation with Containers
 
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017
Building Serverless Websites with Lambda@Edge - CTD309 - re:Invent 2017
 
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017
NEW LAUNCH! Introducing Amazon EKS - CON215 - re:Invent 2017
 
CON317_Advanced container management at catsndogs.lol
CON317_Advanced container management at catsndogs.lolCON317_Advanced container management at catsndogs.lol
CON317_Advanced container management at catsndogs.lol
 
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017
NEW LAUNCH! Introducing AWS IoT Analytics - IOT214 - re:Invent 2017
 
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineWIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
 
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoTIOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
IOT308-One Message to a Million Things Done in 60 seconds with AWS IoT
 
CTD403_Supercharge Your Websites with the Power of Lambda@Edge
CTD403_Supercharge Your Websites with the Power of Lambda@EdgeCTD403_Supercharge Your Websites with the Power of Lambda@Edge
CTD403_Supercharge Your Websites with the Power of Lambda@Edge
 
DVC304_Compliance and Top Security Threats in the Cloud—Are You Protected
DVC304_Compliance and Top Security Threats in the Cloud—Are You ProtectedDVC304_Compliance and Top Security Threats in the Cloud—Are You Protected
DVC304_Compliance and Top Security Threats in the Cloud—Are You Protected
 
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
NEW LAUNCH! AWS IoT Device Management - IOT330 - re:Invent 2017
 
ENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale Migrations
 
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...
GPSWKS408-GPS Migrate Your Databases with AWS Database Migration Service and ...
 
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017
NEW LAUNCH! Amazon EC2 Bare Metal Instances - CMP330 - re:Invent 2017
 
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesIntroduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
 
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017
NEW LAUNCH! Deep dive on Amazon Neptune - DAT318 - re:Invent 2017
 
ALX328_Smart Devices Everywhere
ALX328_Smart Devices EverywhereALX328_Smart Devices Everywhere
ALX328_Smart Devices Everywhere
 
ENT301_Real-World AI For the Enterprise
ENT301_Real-World AI For the EnterpriseENT301_Real-World AI For the Enterprise
ENT301_Real-World AI For the Enterprise
 
CON320_Monitoring, Logging and Debugging Containerized Services
CON320_Monitoring, Logging and Debugging Containerized ServicesCON320_Monitoring, Logging and Debugging Containerized Services
CON320_Monitoring, Logging and Debugging Containerized Services
 
MCL306_Making IoT Smarter with AWS Rekognition.pdf
MCL306_Making IoT Smarter with AWS Rekognition.pdfMCL306_Making IoT Smarter with AWS Rekognition.pdf
MCL306_Making IoT Smarter with AWS Rekognition.pdf
 

Similar to SID302_Force Multiply Your Security Team with Automation and Alexa

Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Amazon Web Services
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Amazon Web Services
 
Devoxx: Building AI-powered applications on AWS
Devoxx: Building AI-powered applications on AWSDevoxx: Building AI-powered applications on AWS
Devoxx: Building AI-powered applications on AWSAdrian Hornsby
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
 
What's New in Serverless - SRV305 - re:Invent 2017
What's New in Serverless - SRV305 - re:Invent 2017What's New in Serverless - SRV305 - re:Invent 2017
What's New in Serverless - SRV305 - re:Invent 2017Amazon Web Services
 
MAE401_Designing for DisneyMarvel Studio-Grade Security
MAE401_Designing for DisneyMarvel Studio-Grade SecurityMAE401_Designing for DisneyMarvel Studio-Grade Security
MAE401_Designing for DisneyMarvel Studio-Grade SecurityAmazon Web Services
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemAmazon Web Services
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemAmazon Web Services
 
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...Amazon Web Services
 
SID301_Using AWS Lambda as a Security Team
SID301_Using AWS Lambda as a Security TeamSID301_Using AWS Lambda as a Security Team
SID301_Using AWS Lambda as a Security TeamAmazon Web Services
 
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...Amazon Web Services
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemAmazon Web Services
 
Introduction to the Serverless Cloud
Introduction to the Serverless CloudIntroduction to the Serverless Cloud
Introduction to the Serverless CloudAmazon Web Services
 
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Amazon Web Services
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Amazon Web Services
 

Similar to SID302_Force Multiply Your Security Team with Automation and Alexa (20)

Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
 
Devoxx: Building AI-powered applications on AWS
Devoxx: Building AI-powered applications on AWSDevoxx: Building AI-powered applications on AWS
Devoxx: Building AI-powered applications on AWS
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
What's New in Serverless - SRV305 - re:Invent 2017
What's New in Serverless - SRV305 - re:Invent 2017What's New in Serverless - SRV305 - re:Invent 2017
What's New in Serverless - SRV305 - re:Invent 2017
 
MAE401_Designing for DisneyMarvel Studio-Grade Security
MAE401_Designing for DisneyMarvel Studio-Grade SecurityMAE401_Designing for DisneyMarvel Studio-Grade Security
MAE401_Designing for DisneyMarvel Studio-Grade Security
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
 
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...
Manage Infrastructure Securely at Scale and Eliminate Operational Risks - DEV...
 
SID301_Using AWS Lambda as a Security Team
SID301_Using AWS Lambda as a Security TeamSID301_Using AWS Lambda as a Security Team
SID301_Using AWS Lambda as a Security Team
 
Amazon Macie Demo
Amazon Macie DemoAmazon Macie Demo
Amazon Macie Demo
 
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
 
Use Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition SystemUse Amazon Rekognition to Build a Facial Recognition System
Use Amazon Rekognition to Build a Facial Recognition System
 
Introduction to the Serverless Cloud
Introduction to the Serverless CloudIntroduction to the Serverless Cloud
Introduction to the Serverless Cloud
 
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

SID302_Force Multiply Your Security Team with Automation and Alexa

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Force Multiply Your Security Team with Automation and Alexa D o n “ B e e t l e ” B a i l e y , A W S S e c u r i t y B r i a n W a g n e r , A W S P r o f e s s i o n a l S e r v i c e s S I D 3 0 2 N o v e m b e r 2 7 , 2 0 1 7
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What to Expect from This Session • Iteration of previous re:Invent talks • Philosophy behind automating security work stuff • Guide for picking stuff to automate • Examples for various parts of your team • Additional Resources • Demos!
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Previously @ re:Invent YouTube search … • “Intrusion Detection in the Cloud” 2014 • “Incident Response (IR) in the Cloud” 2014 • “Wrangling Security Events in The Cloud” 2015 • “Automating Security Event Response” 2016
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Why Alexa? … Why Not? • Familiar • Helpful • Process repeatability • Forcing function • Goals • “Suspension of Strong Authn/Authz Disbelief”
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevSecOps in A Nutshell • Cloud-y • Security that permeates • Beyond security as part of SDLC • Security LIVES in prod • Security scaling to support the business SID306 - How Chick-fil-A Embraces DevSecOps on AWS
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Modern Security Roles (Not Roles for EC2) • Application Security • Compliance • Security Engineering • Security Operations • Threat Intelligence • And MORE …!
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Everyone Has An “Ugh” • Manual • Repetitive • Time-consuming • Soul-crushing
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Importance of Empowering Security Geeks • Deepest understanding • Self-preservation • Build or buy economics • No more holding out for a hero • Burn-out is real
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How AWS Can Naturally Enable • Ability to programmatically inventory environment— knowing what you need to protect is key • Awareness of what’s happening, what’s changing, from AWS API activity to application behavior • Detection and alerting mechanisms, freedom to create, and flexibility to configure and tune what’s appropriate for YOU • Analysis and response, via the same platform, natively or with AWS partner solutions
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail Amazon CloudWatch Events AWS Lambda Amazon Simple Notification Service AWS API endpoints Your Staff Amazon S3 bucket Your security team AWS IAM role AWS API Your SaaS tools Event Detect → Automation Workflow Example
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. From Idea to Code to Execution Redux • What is my expressed security objective in words? • Is this configuration or behavior related? • What data, where, could help inform me? • Do I have requisite ownership or visibility? • What are my performance requirements? • What mechanisms support the above? • What is my expressed security objective in code?
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “I want to identify any instances running vulnerable software.”
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo #1 Under The Hood Amazon Inspector webappdata AWS Lambda
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The Alexa Difference • Complexity beyond push-button • Desired interrupts/gates • Ad-hoc opportunities • Staff flexibility • Training fodder • Not an either/or Alexa Skill Echo Lambda Function
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Example Activities • Audit (scanning, inventory, confirm configuration) • Remediation (patching, refresh) • Response (isolation, tagging, enforcement) • Analysis (forensics, log diving) • Reporting (event summary, output pivot)
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where / How to Pivot from Events • Amazon SNS notification • Use of tags • Look for tags • New work from event
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where / How to Pivot from Events • Amazon SNS notification • Use of tags • Look for tags • New work from event
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where / How to Pivot from Events • Amazon SNS notification • Use of tags • Look for tags • New work from event
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where / How to Pivot from Events • Amazon SNS notification • Use of tags • Look for tags • New work from event { "detail-type": [ "AWS API Call via CloudTrail" ], "detail": { "eventSource": [ ”ec2.amazonaws.com" ], "eventName": [ "CreateTags" ] } } CloudWatch Event Rule
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where / How to Pivot from Events • Amazon SNS notification • Use of tags • Look for tags • New work from event
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “I want to patch any instances running vulnerable software.”
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon EC2 Systems Manager FTW State Manager Maintenance WindowInventory Automation Parameter Store Run Command Patch Manager
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo #2 Under The Hood Patch Manager webappdata AWS Lambda
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “I want to tag and isolate an abnormally acting instance.”
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo #3 Under The Hood AWS Lambda CloudWatch Event Rule
  • 30. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 31. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo #3 Under The Hood AWS Lambda
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “I want to run forensics on an instance previously tagged as suspicious.”
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 34. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo #3 Under The Hood AWS Lambda
  • 35. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Army of One, Yay! Interacting with Alexa to do things like … • Launch Amazon Inspector to identify instances with vulnerabilities • Patch instances with critical vulnerabilities • Isolate misbehaving instances and tag them for forensic analysis • Perform forensic analysis on implicated instances
  • 36. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “I want to know what my awesome security team has done recently.”
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Demo
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Other Resources • ThreatResponse, open source IR tools for AWS https://threatresponse.cloud • Netflix, “Security Monkey”, “Scumblr”, etc. https://netflix.github.io/ • NCC Group, “Scout2” https://nccgroup.github.io/Scout2/
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 41. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 42. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Partners
  • 43. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Other Talks • SID301 - Using AWS Lambda as a Security Team • SID304 - SecOps 2021 Today: Using AWS Services to Deliver SecOps • SID319 - Incident Response in the Cloud • SID322 - The AWS Philosophy of Security • ALX326 - Applying Alexa's Natural Language To Your Challenges
  • 44. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Other AWS Security Resources • Support https://aws.amazon.com/support • AWS Cloud Security https://aws.amazon.com/security • AWS Security Blog https://aws.amazon.com/blogs/security/ • Contact the AWS security team aws-security@amazon.com
  • 45. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Summary • Automating security stuff with Alexa is not sci-fi • There is a wide variety of your activities that could benefit from and are ripe for Alexa • Empowering your security geeks to automate with Alexa pays dividends • There are plenty of resources to help you get started, and starting small/simple is A-OK • Go find some ugh and automate with Alexa today!
  • 46. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!