SlideShare a Scribd company logo
1 of 86
ADD YOUR
BRAND HERE
Thinking Out cLOUD 2022
AWS COPENHAGEN
@stuhirstinfosec
/stuhirst
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Disclaimers;
BRACE FOR MEMES.
I’m not an ‘expert’ or a
‘thought leader’, but I’ve
learned some stuff along the
way.
@stuhirstinfosec
ADD YOUR
BRAND HERE
Who Am I?
@stuhirstinfosec
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
So, where to even
begin with this
Security nonsense?!
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
What do you care
about?!
ADD YOUR
BRAND HERE
Risks
Threats
Vulnerabilities
Business Context
ADD YOUR
BRAND HERE
There are existing frameworks that can help;
• CIS Benchmarking
• NIST
• ISACA
• Cloud Security Alliance
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Threats
ADD YOUR
BRAND HERE
Cryptojacking /
Bitcoin Mining
Accessing resources you own to leverage computing power to
mine for cryptocurrency
ADD YOUR
BRAND HERE
Data Breaches
(hackers/bots)
Open buckets
Open databases
General misconfiguration
Privilege escalation
Leaked keys
ADD YOUR
BRAND HERE
Denial Of Service
Though if major Cloud providers are down - everyone has a
problem!
ADD YOUR
BRAND HERE
Insider Threats
Malicious or mistake
ADD YOUR
BRAND HERE
Hijacking of
Accounts/Domains
To log on and access resources and data
ADD YOUR
BRAND HERE
Lack of awareness &
training
Cloud is still new and complex!
ADD YOUR
BRAND HERE
Business
Context
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Practical Steps To Protect
Your AWS Environments
ADD YOUR
BRAND HERE
Look out
for…
ADD YOUR
BRAND HERE
ROOT ACCOUNT
ADD YOUR
BRAND HERE
@stuhirstinfosec
Give your Root Account physical
MFA token to someone non-technical
They’re less likely to kill your
business
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
BANANA
SKIN
ALERT!
ADD YOUR
BRAND HERE
@stuhirstinfosec
Advice:
Delete your Root Account Access
Key and Secret Key ID - you don’t
need them!
ADD YOUR
BRAND HERE
MFA
ADD YOUR
BRAND HERE
Ensure EVERY user
has MFA - no
excuses!
Or SAML/SSO…
ADD YOUR
BRAND HERE
@stuhirstinfosec
Advice:
You can stipulate in IAM policies that
an action CANNOT take place without
MFA!
ADD YOUR
BRAND HERE
@stuhirstinfosec
So perhaps you can perform:
DescribeInstances and RunInstances with no
checks
But TerminateInstance can only be where
aws:MultiFactorAuthAge is < X
minutes
ADD YOUR
BRAND HERE
IAM
ADD YOUR
BRAND HERE
Check your IAM password policy
Automate checks for unused
passwords or access keys
ALERT FOR ROOT USAGE!!!
ADD YOUR
BRAND HERE
BANANA
SKIN
ALERT!
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Over time, you have probably
created too many roles!
IAM Access Advisor - service last
accessed
ADD YOUR
BRAND HERE
LOGGING
ADD YOUR
BRAND HERE
LOG. ALL. THE. THINGS!
ADD YOUR
BRAND HERE
Cloudtrail
S3 Access
VPC Flow
Cloudwatch
API Gateway
ADD YOUR
BRAND HERE
At WORST - make sure you’re
logging Cloudtrail events in every
account.
ALERT IF YOU’RE NOT!
ADD YOUR
BRAND HERE
S3 BUCKETS
ADD YOUR
BRAND HERE
Still arguably the easiest mistake
to make and most impactful
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
BANANA
SKIN
ALERT!
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Be Careful:
A bucket can be restricted, but an
object within it can still be
readable!
ADD YOUR
BRAND HERE
SECURITY GROUPS
ADD YOUR
BRAND HERE
SG’s act like a firewall for your
instances….
But they’re easy to misconfigure
ADD YOUR
BRAND HERE
BANANA
SKIN
ALERT!
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
• Restrict traffic to internal IPs for protocols such as
SSH
• Use NACL’s to block ports
• Avoid the dreaded 0.0.0.0/0
• Use ELB's SGs wisely to restrict EC2’s access to
the Internet
• Trusted Advisor will help you!
@stuhirstinfosec
ADD YOUR
BRAND HERE
INCIDENT
RESPONSE
ADD YOUR
BRAND HERE
Behaviour
Alert
Slack
ADD YOUR
BRAND HERE
Create playbooks for incident
response
Even if they just say who to
contact!!!
ADD YOUR
BRAND HERE
ENCRYPTION
ADD YOUR
BRAND HERE
Are you encrypting
by default?
If not, why not?!
S3, EBS, RDS etc
ADD YOUR
BRAND HERE
KEY ROTATION &
CREDS
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
North Carolina State University
examined accidental leakage of
authentication secrets to
GitHub…..
ADD YOUR
BRAND HERE
1. Secrets in over
100,000
repositories
2. Over 1000
committed daily
ADD YOUR
BRAND HERE
Other helpful tips!
ADD YOUR
BRAND HERE
Well Architected
Reviews with AWS
Use your Technical
Account Managers!
ADD YOUR
BRAND HERE
Manually audit
your accounts -
looking for gaps,
misconfigs,
permissions
ADD YOUR
BRAND HERE
Or leverage….
Open Source
Goodies!
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
The most important
part of securing
AWS…
ADD YOUR
BRAND HERE
RECRUIT!
RECRUIT!
RECRUIT!
ADD YOUR
BRAND HERE
TAKEAWAYS
ADD YOUR
BRAND HERE
• Start with basics - what do you
care about
• Establish a risk framework
• Look out for the banana skins!
• Automate as much as you can
• Leverage the tooling
• Have fun!
• RECRUIT!
ADD YOUR
BRAND HERE
So what have I learnt these last 2-3 years?
* Your journey has to start somewhere!
* Changing businesses takes real time and graft. And
it’s painful!
* Try and get the major stakeholders around the table
regularly to collaborate - this takes effort!
* Cloud is HARD and often COMPLEX
* Recruitment is absolutely KEY!
* TEACHING EACH OTHER IS KEY ALSO!!!
ADD YOUR
BRAND HERE
Before I leave you…
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
ADD YOUR
BRAND HERE
Want to know more?
Cloud Security Forum on Slack - DM ME ON
TWITTER!
AWS Arsenal - open source tools
https://github.com/stuhirst/awssecurity
AWS Vulnerability & Risk list
https://github.com/stuhirst/awssecurity/blob/master/risksan
dvulns.md
ADD YOUR
BRAND HERE
Thanks!
Questions?!
@stuhirstinfosec

More Related Content

Similar to AWS Meet Up COPENHAGEN.pptx

How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
Chris Watts
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Nick Galbreath
 
How serverless changes the cost paradigm
How serverless changes the cost paradigmHow serverless changes the cost paradigm
How serverless changes the cost paradigm
Yan Cui
 
ASAE Tech: Data Data Everywhere
ASAE Tech: Data Data EverywhereASAE Tech: Data Data Everywhere
ASAE Tech: Data Data Everywhere
mjgoldsmith
 

Similar to AWS Meet Up COPENHAGEN.pptx (20)

How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
How to Incorporate a Security-First Approach to Your Products by spiderSlik C...
 
Building Successful APIs Overnight - Orlando K - Codemotion Rome 2015
Building Successful APIs Overnight - Orlando K - Codemotion Rome 2015Building Successful APIs Overnight - Orlando K - Codemotion Rome 2015
Building Successful APIs Overnight - Orlando K - Codemotion Rome 2015
 
How to Install SSL on WordPress.pdf
How to Install SSL on WordPress.pdfHow to Install SSL on WordPress.pdf
How to Install SSL on WordPress.pdf
 
AWS Cloud Experience CA: Receta del Éxito en la Nube: Cultura, Estrategia e I...
AWS Cloud Experience CA: Receta del Éxito en la Nube: Cultura, Estrategia e I...AWS Cloud Experience CA: Receta del Éxito en la Nube: Cultura, Estrategia e I...
AWS Cloud Experience CA: Receta del Éxito en la Nube: Cultura, Estrategia e I...
 
Denver Atlassian Community Meeting - April 2019
Denver Atlassian Community Meeting - April 2019Denver Atlassian Community Meeting - April 2019
Denver Atlassian Community Meeting - April 2019
 
How not to suck at Cyber Security
How not to suck at Cyber SecurityHow not to suck at Cyber Security
How not to suck at Cyber Security
 
It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?It's 10pm, Do You Know Where Your Access Keys Are?
It's 10pm, Do You Know Where Your Access Keys Are?
 
You wouldn't build a toast, would you
You wouldn't build a toast, would youYou wouldn't build a toast, would you
You wouldn't build a toast, would you
 
Level Up - A Career in Security
Level Up - A Career in SecurityLevel Up - A Career in Security
Level Up - A Career in Security
 
Workshop SEO + ECOMMERCE #ECOMTEAM
Workshop SEO + ECOMMERCE #ECOMTEAMWorkshop SEO + ECOMMERCE #ECOMTEAM
Workshop SEO + ECOMMERCE #ECOMTEAM
 
How We end the Walking Dead in the Enterprise - Session Sponsored by Versent
How We end the Walking Dead in the Enterprise - Session Sponsored by VersentHow We end the Walking Dead in the Enterprise - Session Sponsored by Versent
How We end the Walking Dead in the Enterprise - Session Sponsored by Versent
 
Rapid Crush Inc. Software & Training Products Overview
Rapid Crush Inc. Software & Training Products OverviewRapid Crush Inc. Software & Training Products Overview
Rapid Crush Inc. Software & Training Products Overview
 
Threat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the CloudThreat Hunting, Detection, and Incident Response in the Cloud
Threat Hunting, Detection, and Incident Response in the Cloud
 
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
Fraud Engineering, from Merchant Risk Council Annual Meeting 2012
 
APIS for Startups - Running your Business Inside Out
APIS for Startups - Running your Business Inside OutAPIS for Startups - Running your Business Inside Out
APIS for Startups - Running your Business Inside Out
 
Infrastructure is development
Infrastructure is developmentInfrastructure is development
Infrastructure is development
 
How serverless changes the cost paradigm
How serverless changes the cost paradigmHow serverless changes the cost paradigm
How serverless changes the cost paradigm
 
ASAE Tech: Data Data Everywhere
ASAE Tech: Data Data EverywhereASAE Tech: Data Data Everywhere
ASAE Tech: Data Data Everywhere
 
A software developer guide to working with aws
A software developer guide to working with awsA software developer guide to working with aws
A software developer guide to working with aws
 
Moving at the Speed-of-Cloud Without Getting Owned
Moving at the Speed-of-Cloud Without Getting OwnedMoving at the Speed-of-Cloud Without Getting Owned
Moving at the Speed-of-Cloud Without Getting Owned
 

More from Stu Hirst

Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
Stu Hirst
 

More from Stu Hirst (12)

Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
Stu Hirst - Imposter Syndrome 2024 - Presented at Cloud Expo Europe (Cyber Ke...
 
Stu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To CisoStu Hirst - 10 Years To Ciso
Stu Hirst - 10 Years To Ciso
 
Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020Stu Hirst - Thinking Out cLoud 2020
Stu Hirst - Thinking Out cLoud 2020
 
Hi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love YouHi DevOps, I'm Security, I Love You
Hi DevOps, I'm Security, I Love You
 
Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019Stu Hirst - Thinking Out cLoud July 2019
Stu Hirst - Thinking Out cLoud July 2019
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019Stu Hirst "Thinking Out cLoud" 2019
Stu Hirst "Thinking Out cLoud" 2019
 
War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!War Stories - From The Front Lines Of InfoSec!
War Stories - From The Front Lines Of InfoSec!
 
An Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSecAn Imposter's Journey Into InfoSec
An Imposter's Journey Into InfoSec
 
Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018Turing's Testers - Security Scotland May 2018
Turing's Testers - Security Scotland May 2018
 
DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!DevSecOps - a 2 year journey of success & failure!
DevSecOps - a 2 year journey of success & failure!
 
Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016Building a Security culture at Skyscanner 2016
Building a Security culture at Skyscanner 2016
 

Recently uploaded

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
The Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and InsightThe Zero-ETL Approach: Enhancing Data Agility and Insight
The Zero-ETL Approach: Enhancing Data Agility and Insight
 
Design and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data ScienceDesign and Development of a Provenance Capture Platform for Data Science
Design and Development of a Provenance Capture Platform for Data Science
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
Navigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern EnterpriseNavigating Identity and Access Management in the Modern Enterprise
Navigating Identity and Access Management in the Modern Enterprise
 
Six Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal OntologySix Myths about Ontologies: The Basics of Formal Ontology
Six Myths about Ontologies: The Basics of Formal Ontology
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...Stronger Together: Developing an Organizational Strategy for Accessible Desig...
Stronger Together: Developing an Organizational Strategy for Accessible Desig...
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 

AWS Meet Up COPENHAGEN.pptx