SlideShare a Scribd company logo
1 of 18
AWS Security Best
Practices
Shibu Basheer
CTO
Cabot Technology Solutions Pvt Ltd
Topics
1. IAM
2. STS
3. Organisation
4. Cloudtrail
5. Cloudwatch
6. AWS Config
7. Secret Manager
8. Others
Policies / Compliance
Well Architected Framework
IAM
● Create individual users
● MFA
● Use groups to assign to assign permissions to users.
● Grant Least Privilege
● Use AWS Managed Policies
● Do not share access keys
● Use Roles for Applications that run in EC2
● Use STS to generate temporary security credentials (apps, web applications)
STS
● Security Token Service
● Avoid hard coding access key IDs in code
● Use STS for temporary access to aws services
● STS service will generate temporary accessKeyID, secretAccessKey and
sessionToken
● Cognito
● OpenId connect
AWS Organizations
● Manage multiple aws accounts under one account
● Restrict resources
● Billing Entities
● Business Units
● Environments (dev, test, prod)
Cloudtrail
● Log/Record every API call.
● Used for auditing any information
● Automate remediation on incidents
Cloudwatch
● Logs from things - Applications, devices, services
● Alarms
● Rules
● Logs
● Dashboard
AWS Config
● Infrastructure keeps changing
● AWS Config keeps track of everything that changed in AWS
● Compliance Rules
○ E.g. EIP Attached
○ Cloudtrail Enabled
● Prebuilt and Custom Rules
Secret Manager
● Rotate RDS passwords
● Store security credentials
● Retrieve via API calls.
● No hard coding of DB passwords in code
Other items
● VPC Flow logs
● Security Groups
● EC2 Key Pairs
Other Services
● AWS Inspector
○ Security Assessment Service
○ Scan vulnerabilities
● Macie
○ Discover sensitive data stored in your infrastructure
● Guard Duty
○ Threat detection service
○ Uses data from vpc flow logs, cloudtrail logs, and dns
● KMS (Key management Service)
○ Store keys that encrypts your data
Thank you!
Shibu Basheer
Linkedin / Twitter / Instagram
@shibubasheer
shibu@cabotsolutions.com

More Related Content

More from AWS User Group Kochi

More from AWS User Group Kochi (7)

ACDKOCHI19 - Opening Keynote - Building an Innovation mindset
ACDKOCHI19 - Opening Keynote - Building an Innovation mindsetACDKOCHI19 - Opening Keynote - Building an Innovation mindset
ACDKOCHI19 - Opening Keynote - Building an Innovation mindset
 
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWSACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
ACDKOCHI19 - Enterprise grade security for web and mobile applications on AWS
 
ACDKOCHI19 - Next Generation Data Analytics Platform on AWS
ACDKOCHI19 - Next Generation Data Analytics Platform on AWSACDKOCHI19 - Next Generation Data Analytics Platform on AWS
ACDKOCHI19 - Next Generation Data Analytics Platform on AWS
 
ACDKOCHI19 - IAM Everywhere
ACDKOCHI19 - IAM EverywhereACDKOCHI19 - IAM Everywhere
ACDKOCHI19 - IAM Everywhere
 
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
ACDKOCHI19 - Turbocharge Developer productivity with platform build on K8S an...
 
ACDKOCHI19 - Demystifying amazon sagemaker
ACDKOCHI19 - Demystifying amazon sagemakerACDKOCHI19 - Demystifying amazon sagemaker
ACDKOCHI19 - Demystifying amazon sagemaker
 
ACDKOCHI19 - Building a serverless full-stack AWS native website
ACDKOCHI19 - Building a serverless full-stack AWS native websiteACDKOCHI19 - Building a serverless full-stack AWS native website
ACDKOCHI19 - Building a serverless full-stack AWS native website
 

Recently uploaded

Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
UK Journal
 

Recently uploaded (20)

Portal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russePortal Kombat : extension du réseau de propagande russe
Portal Kombat : extension du réseau de propagande russe
 
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
TEST BANK For, Information Technology Project Management 9th Edition Kathy Sc...
 
How we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdfHow we scaled to 80K users by doing nothing!.pdf
How we scaled to 80K users by doing nothing!.pdf
 
Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024Extensible Python: Robustness through Addition - PyCon 2024
Extensible Python: Robustness through Addition - PyCon 2024
 
ERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage IntacctERP Contender Series: Acumatica vs. Sage Intacct
ERP Contender Series: Acumatica vs. Sage Intacct
 
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
(Explainable) Data-Centric AI: what are you explaininhg, and to whom?
 
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdfWhere to Learn More About FDO _ Richard at FIDO Alliance.pdf
Where to Learn More About FDO _ Richard at FIDO Alliance.pdf
 
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties ReimaginedEasier, Faster, and More Powerful – Notes Document Properties Reimagined
Easier, Faster, and More Powerful – Notes Document Properties Reimagined
 
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on ThanabotsContinuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
Continuing Bonds Through AI: A Hermeneutic Reflection on Thanabots
 
TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024TopCryptoSupers 12thReport OrionX May2024
TopCryptoSupers 12thReport OrionX May2024
 
Google I/O Extended 2024 Warsaw
Google I/O Extended 2024 WarsawGoogle I/O Extended 2024 Warsaw
Google I/O Extended 2024 Warsaw
 
AI mind or machine power point presentation
AI mind or machine power point presentationAI mind or machine power point presentation
AI mind or machine power point presentation
 
WebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM PerformanceWebAssembly is Key to Better LLM Performance
WebAssembly is Key to Better LLM Performance
 
Using IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & IrelandUsing IESVE for Room Loads Analysis - UK & Ireland
Using IESVE for Room Loads Analysis - UK & Ireland
 
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdfBreaking Down the Flutterwave Scandal What You Need to Know.pdf
Breaking Down the Flutterwave Scandal What You Need to Know.pdf
 
Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024Long journey of Ruby Standard library at RubyKaigi 2024
Long journey of Ruby Standard library at RubyKaigi 2024
 
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdfIntroduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
Introduction to FDO and How It works Applications _ Richard at FIDO Alliance.pdf
 
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
Event-Driven Architecture Masterclass: Integrating Distributed Data Stores Ac...
 
State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!State of the Smart Building Startup Landscape 2024!
State of the Smart Building Startup Landscape 2024!
 
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
FDO for Camera, Sensor and Networking Device – Commercial Solutions from VinC...
 

AWSUGKOCHI - SEP - 2019 - Meetup - An Introduction in to AWS Infrastructure Security Best Practices

  • 1. AWS Security Best Practices Shibu Basheer CTO Cabot Technology Solutions Pvt Ltd
  • 2. Topics 1. IAM 2. STS 3. Organisation 4. Cloudtrail 5. Cloudwatch 6. AWS Config 7. Secret Manager 8. Others
  • 3. Policies / Compliance Well Architected Framework
  • 4.
  • 5. IAM ● Create individual users ● MFA ● Use groups to assign to assign permissions to users. ● Grant Least Privilege ● Use AWS Managed Policies ● Do not share access keys ● Use Roles for Applications that run in EC2 ● Use STS to generate temporary security credentials (apps, web applications)
  • 6.
  • 7. STS ● Security Token Service ● Avoid hard coding access key IDs in code ● Use STS for temporary access to aws services ● STS service will generate temporary accessKeyID, secretAccessKey and sessionToken ● Cognito ● OpenId connect
  • 8.
  • 9.
  • 10.
  • 11. AWS Organizations ● Manage multiple aws accounts under one account ● Restrict resources ● Billing Entities ● Business Units ● Environments (dev, test, prod)
  • 12. Cloudtrail ● Log/Record every API call. ● Used for auditing any information ● Automate remediation on incidents
  • 13. Cloudwatch ● Logs from things - Applications, devices, services ● Alarms ● Rules ● Logs ● Dashboard
  • 14. AWS Config ● Infrastructure keeps changing ● AWS Config keeps track of everything that changed in AWS ● Compliance Rules ○ E.g. EIP Attached ○ Cloudtrail Enabled ● Prebuilt and Custom Rules
  • 15. Secret Manager ● Rotate RDS passwords ● Store security credentials ● Retrieve via API calls. ● No hard coding of DB passwords in code
  • 16. Other items ● VPC Flow logs ● Security Groups ● EC2 Key Pairs
  • 17. Other Services ● AWS Inspector ○ Security Assessment Service ○ Scan vulnerabilities ● Macie ○ Discover sensitive data stored in your infrastructure ● Guard Duty ○ Threat detection service ○ Uses data from vpc flow logs, cloudtrail logs, and dns ● KMS (Key management Service) ○ Store keys that encrypts your data
  • 18. Thank you! Shibu Basheer Linkedin / Twitter / Instagram @shibubasheer shibu@cabotsolutions.com