SlideShare a Scribd company logo
1 of 31
Download to read offline
AWS SECURITY
PRESENTER: CHRISTOPHER CAPLAN
ABOUT ME
Christopher Caplan
IT Support Technician at Ultimate Finance Group
4 Years in supporting companies with implementation with best security best
practices of AWS.
linkedin: https://www.linkedin.com/in/christopher-caplan
christopher.caplan@gmail.com
▸ Introduction to AWS foundational services.
▸ AWS account security best practices.
▸ IAM basics.
▸ Introduction to EC2 security groups.
▸ Introduction to AWS SDK security
▸ Demo
▸ Review
Agenda
INTRODUCTION TO AWS
FOUNDATIONAL SERVICES.
INTRODUCTION
AWS FOUNDATION SERVICES
▸ EC2
▸ S3
▸ VPC
▸ RDS
▸ IAM
AWS EC2.
EC2
▸ Is the base of most things with in AWS.
▸ Is virtual infrastructure.
▸ Designed to use other aspects of
AWS.
▸ No restrictions to how you can set up
your instances.
AWS S3.
S3
▸ Pay As You Go Storage.
▸ Can be used to share files
▸ REST API
▸ High availability
AWS VPC.
VPC
▸ Allow you to design the
network you want.
▸ Allows to multiple
subnets, so able to create
services that are not
internet facing.
▸ Able to connect to the
certain subnets via VPN
▸ Very simple to use.
AWS IAM.
TEXT
IAM
▸ Should be the first thing you set up in AWS!
▸ Create users that are allowed to use AWS,
without exposing the root credentials.
▸ Very powerful and fine grained permissions
▸ Can assign roles to individual EC2
instances.
▸ Permissions as code (JSON)
AWS SECURITY BEST PRACTICES.
SECURITY BEST PRACTICES
▸ Avoid using the root account instead use IAM users.
▸ Ensure that a password policy has been set I.E (must be 9 characters
with 1 symbol and 1 number) or stronger.
▸ Ensure that MFA (multi factor authentication) is enabled for both your
IAM users and Root account and user accounts.
▸ Use IAM roles and policies instead of keys when possible.
▸ Ensure that passwords and API KEYS are being rotated every 90 days
or less.
▸ Ensure that SSH keys are rotated every 90 days or less.
AWS API
AWS SDK
▸ Do NOT use the AWS SDK with the Key and secret in code.
▸ This allows for accidental check-in to the VCS and it can get very difficult to
role the keys and secrets at a later date.
▸ The most (if not all) can check if you are using IAM roles if you are in a EC2
instance using them.
▸ If you are not using IAM roles or you are not in an EC2 instances, you can
create environment variables called AWS_ACCESS_KEY_ID and
AWS_SECRET_ACCESS_KEY
▸ If you are using the AWS CLI the SDK is smart enough to get the
credentials from the credentials file. good for a development environment.
USING MFA FOR ROOT AND IAM ACCOUNTS
BENEFITS OF USING MFA
▸ Increased security of every aspect of the AWS account
▸ Users will need a MFA compatible devices or software such as
google authenticator which is available on most smart phones.
▸ Users will need to know that the account is using MFA.
▸ MFA can be enabled to API calls. Could be useful for internal
tools
IAM BASICS.
IAM BASICS
IAM BASICS
▸ IAM breaks down into users and groups.
▸ We manage IAM user and groups access with polices
▸ Able to attach policies to other services.
IAM USERS
▸ Should be created as soon as you create an AWS account
▸ Very good for adding users to use the AWS account
▸ Can assign permissions
▸ IAM is set a a global level
▸ All users are assigned no permissions by default.
▸ Users by default get a API secret and key, but can be
disabled.
IAM BASICS
IAM BASICS
IAM GROUPS
▸ Used for creating groups of users.
▸ Able to use assign group permissions.
IAM BASICS
IAM POLICIES
▸ Are ways to create custom permissions
▸ Everything is set to deny by default.
▸ Are written in JSON.
▸ So therefore can be put into version control.
▸ Can be attached to users, groups and roles.
IAM BASICS
IAM ROLES
▸ Roles can be attached to AWS services
▸ Eliminated the need to having API keys stored in your
code
▸ Roles are temporary credentials what only last for 1 hour.
▸ AWS handles everything from creation to destruction.
IAM BASICS
CAVEAT WITH IAM ROLES
▸ Due to IAM roles being assigned on EC2 instances creation.
you will not be able to add or change the role name after the
instances is booted. you are able to change the role
permissions
IAM POLICIES
IAM POLICIES EXAMPLE
{
"VERSION": "2012-10-17",
"STATEMENT": [
{
"EFFECT": "ALLOW",
"ACTION": "S3:LISTALLMYBUCKETS",
"RESOURCE": "ARN:AWS:S3:::*"
},
{
"EFFECT": "ALLOW",
"ACTION": [
"S3:LISTBUCKET",
"S3:GETBUCKETLOCATION"
],
"RESOURCE": "ARN:AWS:S3:::EXAMPLE-BUCKET-NAME"
},
{
"EFFECT": "ALLOW",
"ACTION": [
"S3:PUTOBJECT",
"S3:GETOBJECT",
"S3:DELETEOBJECT"
],
"RESOURCE": "ARN:AWS:S3:::EXAMPLE-BUCKET-NAME/*"
}
]
}
‣ This allows users to view
certain S3 buckets.
‣This will only allow what
is the actions that are set
as allow. (everything else
is set to deny)
INTRODUCTION TO EC2 SECURITY GROUPS.
INTRODUCTION TO EC2 SECURITY GROUPS
EC2 SECURITY GROUPS
▸ Is a virtual firewall in front of the every instance.
▸ set to deny everything be default.
▸ Can assign other security groups within the security groups.
▸ Can attach multiple security groups to one instances.
DEMO.
DEMO
WHAT THIS DEMO IS COVERING
▸ Set up IAM for the first time.
▸ Creating users
▸ Adding MFA to the root account
▸ Attaching a policy to the user.
▸ Creating a role.
▸ Attaching the role to a EC2 instance.
▸ EC2 security groups.
REVIEW
REVIEW
▸ Should set up IAM as the first thing you do on any AWS
account.
▸ You should be using MFA for at least your root account.
▸ Use IAM users for your team.
▸ Using IAM Policies for custom permissions.
▸ Use IAM Roles for your instances.
REFERENCES
▸ EC2: https://aws.amazon.com/ec2/
▸ S3: https://aws.amazon.com/s3/
▸ VPC: https://aws.amazon.com/vpc/
▸ RDS: https://aws.amazon.com/rds/
▸ IAM: https://aws.amazon.com/iam/
▸ CIS Amazon web services foundations: https://
benchmarks.cisecurity.org/en-us/?
route=permalink.a329c371c6b8fb268a5676caa71dc22a

More Related Content

What's hot

Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWSAmazon Web Services
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAmazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS SecurityLalitMohanSharma8
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Amazon Web Services
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Amazon Web Services
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance OverviewRightScale
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAlert Logic
 

What's hot (20)

Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Shared Security in AWS
Shared Security in AWSShared Security in AWS
Shared Security in AWS
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Security & Compliance (Part 2)
Security & Compliance (Part 2)Security & Compliance (Part 2)
Security & Compliance (Part 2)
 

Similar to Aws security Fundamentals

Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...
Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...
Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...Amazon Web Services
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarAmazon Web Services
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAMKnoldus Inc.
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live ByAmazon Web Services
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAmazon Web Services
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJean-François LOMBARDO
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriOWASP Delhi
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best PracticesDoiT International
 
ARC325_Managing Multiple AWS Accounts at Scale
ARC325_Managing Multiple AWS Accounts at ScaleARC325_Managing Multiple AWS Accounts at Scale
ARC325_Managing Multiple AWS Accounts at ScaleAmazon Web Services
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)Julien SIMON
 
Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Amazon Web Services
 
Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Amazon Web Services
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Amazon Web Services
 

Similar to Aws security Fundamentals (20)

Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...
Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...
Keep It Secret, Keep It Safe Credentials and Secrets Management on AWS - AWS ...
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
beAuth
beAuthbeAuth
beAuth
 
(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By(SEC302) IAM Best Practices To Live By
(SEC302) IAM Best Practices To Live By
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdfJeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
Jeff Lombardo - Enforcing access control in depth with AWS - v1.2.pdf
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
 
Fundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWSFundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWS
 
AWS Cyber Security Best Practices
AWS Cyber Security Best PracticesAWS Cyber Security Best Practices
AWS Cyber Security Best Practices
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
ARC325_Managing Multiple AWS Accounts at Scale
ARC325_Managing Multiple AWS Accounts at ScaleARC325_Managing Multiple AWS Accounts at Scale
ARC325_Managing Multiple AWS Accounts at Scale
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017
 
Implementing the Top 10 AWS Security Best Practices
Implementing the Top 10 AWS Security Best PracticesImplementing the Top 10 AWS Security Best Practices
Implementing the Top 10 AWS Security Best Practices
 
Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Security & Compliance (Part 1)
Security & Compliance (Part 1)Security & Compliance (Part 1)
Security & Compliance (Part 1)
 

Recently uploaded

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfjoe51371421
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...soniya singh
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about usDynamic Netsoft
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfPower Karaoke
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...Christina Lin
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 

Recently uploaded (20)

why an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdfwhy an Opensea Clone Script might be your perfect match.pdf
why an Opensea Clone Script might be your perfect match.pdf
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
Russian Call Girls in Karol Bagh Aasnvi ➡️ 8264348440 💋📞 Independent Escort S...
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
DNT_Corporate presentation know about us
DNT_Corporate presentation know about usDNT_Corporate presentation know about us
DNT_Corporate presentation know about us
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...Call Girls In Mukherjee Nagar 📱  9999965857  🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
Call Girls In Mukherjee Nagar 📱 9999965857 🤩 Delhi 🫦 HOT AND SEXY VVIP 🍎 SE...
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
The Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdfThe Evolution of Karaoke From Analog to App.pdf
The Evolution of Karaoke From Analog to App.pdf
 
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
ODSC - Batch to Stream workshop - integration of Apache Spark, Cassandra, Pos...
 
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 

Aws security Fundamentals

  • 2. ABOUT ME Christopher Caplan IT Support Technician at Ultimate Finance Group 4 Years in supporting companies with implementation with best security best practices of AWS. linkedin: https://www.linkedin.com/in/christopher-caplan christopher.caplan@gmail.com
  • 3. ▸ Introduction to AWS foundational services. ▸ AWS account security best practices. ▸ IAM basics. ▸ Introduction to EC2 security groups. ▸ Introduction to AWS SDK security ▸ Demo ▸ Review Agenda
  • 5. INTRODUCTION AWS FOUNDATION SERVICES ▸ EC2 ▸ S3 ▸ VPC ▸ RDS ▸ IAM
  • 7. EC2 ▸ Is the base of most things with in AWS. ▸ Is virtual infrastructure. ▸ Designed to use other aspects of AWS. ▸ No restrictions to how you can set up your instances.
  • 9. S3 ▸ Pay As You Go Storage. ▸ Can be used to share files ▸ REST API ▸ High availability
  • 11. VPC ▸ Allow you to design the network you want. ▸ Allows to multiple subnets, so able to create services that are not internet facing. ▸ Able to connect to the certain subnets via VPN ▸ Very simple to use.
  • 13. TEXT IAM ▸ Should be the first thing you set up in AWS! ▸ Create users that are allowed to use AWS, without exposing the root credentials. ▸ Very powerful and fine grained permissions ▸ Can assign roles to individual EC2 instances. ▸ Permissions as code (JSON)
  • 14. AWS SECURITY BEST PRACTICES.
  • 15. SECURITY BEST PRACTICES ▸ Avoid using the root account instead use IAM users. ▸ Ensure that a password policy has been set I.E (must be 9 characters with 1 symbol and 1 number) or stronger. ▸ Ensure that MFA (multi factor authentication) is enabled for both your IAM users and Root account and user accounts. ▸ Use IAM roles and policies instead of keys when possible. ▸ Ensure that passwords and API KEYS are being rotated every 90 days or less. ▸ Ensure that SSH keys are rotated every 90 days or less.
  • 16. AWS API AWS SDK ▸ Do NOT use the AWS SDK with the Key and secret in code. ▸ This allows for accidental check-in to the VCS and it can get very difficult to role the keys and secrets at a later date. ▸ The most (if not all) can check if you are using IAM roles if you are in a EC2 instance using them. ▸ If you are not using IAM roles or you are not in an EC2 instances, you can create environment variables called AWS_ACCESS_KEY_ID and AWS_SECRET_ACCESS_KEY ▸ If you are using the AWS CLI the SDK is smart enough to get the credentials from the credentials file. good for a development environment.
  • 17. USING MFA FOR ROOT AND IAM ACCOUNTS BENEFITS OF USING MFA ▸ Increased security of every aspect of the AWS account ▸ Users will need a MFA compatible devices or software such as google authenticator which is available on most smart phones. ▸ Users will need to know that the account is using MFA. ▸ MFA can be enabled to API calls. Could be useful for internal tools
  • 19. IAM BASICS IAM BASICS ▸ IAM breaks down into users and groups. ▸ We manage IAM user and groups access with polices ▸ Able to attach policies to other services.
  • 20. IAM USERS ▸ Should be created as soon as you create an AWS account ▸ Very good for adding users to use the AWS account ▸ Can assign permissions ▸ IAM is set a a global level ▸ All users are assigned no permissions by default. ▸ Users by default get a API secret and key, but can be disabled. IAM BASICS
  • 21. IAM BASICS IAM GROUPS ▸ Used for creating groups of users. ▸ Able to use assign group permissions.
  • 22. IAM BASICS IAM POLICIES ▸ Are ways to create custom permissions ▸ Everything is set to deny by default. ▸ Are written in JSON. ▸ So therefore can be put into version control. ▸ Can be attached to users, groups and roles.
  • 23. IAM BASICS IAM ROLES ▸ Roles can be attached to AWS services ▸ Eliminated the need to having API keys stored in your code ▸ Roles are temporary credentials what only last for 1 hour. ▸ AWS handles everything from creation to destruction.
  • 24. IAM BASICS CAVEAT WITH IAM ROLES ▸ Due to IAM roles being assigned on EC2 instances creation. you will not be able to add or change the role name after the instances is booted. you are able to change the role permissions
  • 25. IAM POLICIES IAM POLICIES EXAMPLE { "VERSION": "2012-10-17", "STATEMENT": [ { "EFFECT": "ALLOW", "ACTION": "S3:LISTALLMYBUCKETS", "RESOURCE": "ARN:AWS:S3:::*" }, { "EFFECT": "ALLOW", "ACTION": [ "S3:LISTBUCKET", "S3:GETBUCKETLOCATION" ], "RESOURCE": "ARN:AWS:S3:::EXAMPLE-BUCKET-NAME" }, { "EFFECT": "ALLOW", "ACTION": [ "S3:PUTOBJECT", "S3:GETOBJECT", "S3:DELETEOBJECT" ], "RESOURCE": "ARN:AWS:S3:::EXAMPLE-BUCKET-NAME/*" } ] } ‣ This allows users to view certain S3 buckets. ‣This will only allow what is the actions that are set as allow. (everything else is set to deny)
  • 26. INTRODUCTION TO EC2 SECURITY GROUPS.
  • 27. INTRODUCTION TO EC2 SECURITY GROUPS EC2 SECURITY GROUPS ▸ Is a virtual firewall in front of the every instance. ▸ set to deny everything be default. ▸ Can assign other security groups within the security groups. ▸ Can attach multiple security groups to one instances.
  • 28. DEMO.
  • 29. DEMO WHAT THIS DEMO IS COVERING ▸ Set up IAM for the first time. ▸ Creating users ▸ Adding MFA to the root account ▸ Attaching a policy to the user. ▸ Creating a role. ▸ Attaching the role to a EC2 instance. ▸ EC2 security groups.
  • 30. REVIEW REVIEW ▸ Should set up IAM as the first thing you do on any AWS account. ▸ You should be using MFA for at least your root account. ▸ Use IAM users for your team. ▸ Using IAM Policies for custom permissions. ▸ Use IAM Roles for your instances.
  • 31. REFERENCES ▸ EC2: https://aws.amazon.com/ec2/ ▸ S3: https://aws.amazon.com/s3/ ▸ VPC: https://aws.amazon.com/vpc/ ▸ RDS: https://aws.amazon.com/rds/ ▸ IAM: https://aws.amazon.com/iam/ ▸ CIS Amazon web services foundations: https:// benchmarks.cisecurity.org/en-us/? route=permalink.a329c371c6b8fb268a5676caa71dc22a