SlideShare a Scribd company logo
1 of 39
S U M M I T
SYDNEY
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian's Solution for Multi-Region
Encryption and Decryption
Tom Knight
Developer
Atlassian
Martien Verbruggen
Architect
Atlassian
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian
creates products for customers
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian
creates customerscloud products for
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian
creates more customerscloud products for
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian
creates more customerscloud products for
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian
cloud products for more customerscreates more
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Atlassian’s Platform as a Service
µ Micros
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Micros, our PaaS
µ Micros
Developers
Services
Resources
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Micros, our PaaS
µ Micros
Developers
Services
Resources
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Region 1
Cryptor use case: database credentials
Application
Region 2
Application
Region X
DB
Manager
config config
1 - create database
2 - store credentials
3 - get credentials4 - connect
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Region 4
Cryptor use case: confidential messages
Not a
Consumer
Region 1
Producer
MessagesMessages
Region 4
Consumer
Messages
Region 2
Consumer
Messages
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor optimises for
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor optimises for
Security Resilience Performance Ease of use
Manage keys
and
authorisation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor optimises for
Security Resilience Performance Ease of use
Manage keys
and
authorisation
Never™ fail
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor optimises for
Security Resilience Performance Ease of use
Manage keys
and
authorisation
Never™ fail Deal with
latency and
scale
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor optimises for
Security Resilience Performance Ease of use
Manage keys
and
authorisation
Never™ fail Deal with
latency and
scale
Simple API,
standard
metrics, multi-
region
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Why not just use KMS?
Single-region
Performance
Resilience
Trusted
Secure
Powerful authZ
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Region 1
Solution: Use the SDK and customise
Region 2 Region 3
Any region
KMS 3KMS 2KMS 1
TTL
based
cache
encryption
envelope
Application
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Encryption SDK example
val cache = LocalCryptoMaterialsCache(KMS_MAX_CACHE_SIZE)
val keyProvider = MultipleProviderFactory.buildMultiProvider(KmsMasterKey::class.java, keys)
val cmm = CachingCryptoMaterialsManager
.newBuilder()
.withMasterKeyProvider(keyProvider)
.withCache(cache)
.withMaxAge(KMS_MAX_CACHE_AGE, TimeUnit.SECONDS)
.build()
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Multi-region Fault
tolerance
Performance
Implementation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Solution: Encryption
Multiple regions
Quorum: 2 out of 3 regions - configurable
Bespoke encryption context
Improve datakey reusage
Encryption pooling
Pre fetch data keys
Usage and TTL
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Encryption context
Meta data Extra layer of
security
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Solution: Encryption
Multiple regions
Quorum: 2 out of 3 regions - configurable
Bespoke encryption context
Improve datakey reusage
Encryption pooling
Pre fetch data keys
Usage and TTL
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Solution: Decryption
Decryption caching
Latency-based selection of KMS
Fetch keys in parallel
Datakeys are decrypted in parallel
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Solution: Integration
Java library
Most widely used language in Atlassian
Sidecar
Docker container with 2 API endpoints
Java library with Spring Boot
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sample code for library call
// Setup
val cryptorClient = CryptorClientFactory.build(keyAliasList, config)
// Values
val originalPlainText = "Encrypt Me"
val encryptionContext = mapOf("CustomerId" to "123456")
// Encrypt and Decrypt
val cipherText = cryptorClient.encrypt(keyAlias, originalPlainText,
encryptionContext)
val plainText = cryptorClient.decrypt(cipherText, encryptionContext)
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sample REST call
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Solution: service descriptor
name: encrypting-service
organization: foo
...
resources:
- type: cryptor
name: secret-key
decryptors:
- secret-reader
- secret-checker
- audit-agent
µ
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Cryptor account
Micros account
Solution: PaaS and resource provider
Keys
Roles
Policies
AWS IAM
AWS KMS
setup(@roles, key-alias)
µ Micros
Cryptor
provider
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Solution: Operational
Standard metrics and logs from sidecar
Visible to service owners, security and central team
Standard configuration
Standardised cache configurations
Multi-region configurations
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Metrics dashboard
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Summary
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Summary
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Summary
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Summary
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Summary
Security Resilience Performance Ease of use
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Open source
Announcement when we ship it, at
https://www.atlassian.com/blog/technology
Thank you!
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Tom Knight Martien Verbruggen

More Related Content

What's hot

Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​AlgoSec
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud SecurityAlert Logic
 
무선침입방지시스템 WIPS
무선침입방지시스템 WIPS무선침입방지시스템 WIPS
무선침입방지시스템 WIPS시온시큐리티
 
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)Amazon Web Services
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)BAKOTECH
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Zscaler
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021Matt Soseman
 
次世代KYCと自己主権型アイデンティティの動向
次世代KYCと自己主権型アイデンティティの動向次世代KYCと自己主権型アイデンティティの動向
次世代KYCと自己主権型アイデンティティの動向Naohiro Fujie
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWSAmazon Web Services
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Amazon Web Services
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMWSO2
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explainedrtp2009
 
Gaming on aws 〜ゲームにおけるAWS最新活用術〜
Gaming on aws 〜ゲームにおけるAWS最新活用術〜Gaming on aws 〜ゲームにおけるAWS最新活用術〜
Gaming on aws 〜ゲームにおけるAWS最新活用術〜Amazon Web Services Japan
 
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...Simplilearn
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...Amazon Web Services
 
NPR API: Create Once Publish Everywhere
NPR API: Create Once Publish EverywhereNPR API: Create Once Publish Everywhere
NPR API: Create Once Publish Everywherezachbrand
 
Microsoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat SheetMicrosoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat SheetMilos Halecka
 

What's hot (20)

AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​Zero Trust Framework for Network Security​
Zero Trust Framework for Network Security​
 
Best Practices in Cloud Security
Best Practices in Cloud SecurityBest Practices in Cloud Security
Best Practices in Cloud Security
 
무선침입방지시스템 WIPS
무선침입방지시스템 WIPS무선침입방지시스템 WIPS
무선침입방지시스템 WIPS
 
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)
AWS re:Invent 2016: Building a Solid Business Case for Cloud Migration (ENT308)
 
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
End-to-Eend security with Palo Alto Networks (Onur Kasap, Palo Alto Networks)
 
Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?Adopting A Zero-Trust Model. Google Did It, Can You?
Adopting A Zero-Trust Model. Google Did It, Can You?
 
MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021MCAS High Level Architecture May 2021
MCAS High Level Architecture May 2021
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
次世代KYCと自己主権型アイデンティティの動向
次世代KYCと自己主権型アイデンティティの動向次世代KYCと自己主権型アイデンティティの動向
次世代KYCと自己主権型アイデンティティの動向
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
 
Standardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIMStandardizing Identity Provisioning with SCIM
Standardizing Identity Provisioning with SCIM
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
NIST Zero Trust Explained
NIST Zero Trust ExplainedNIST Zero Trust Explained
NIST Zero Trust Explained
 
Gaming on aws 〜ゲームにおけるAWS最新活用術〜
Gaming on aws 〜ゲームにおけるAWS最新活用術〜Gaming on aws 〜ゲームにおけるAWS最新活用術〜
Gaming on aws 〜ゲームにおけるAWS最新活用術〜
 
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...
Microsoft Azure Training | Azure Training For Beginners | Azure Tutorial For ...
 
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
AWS Certificate Management and Private Certificate Authority Deep Dive (SEC41...
 
NPR API: Create Once Publish Everywhere
NPR API: Create Once Publish EverywhereNPR API: Create Once Publish Everywhere
NPR API: Create Once Publish Everywhere
 
Microsoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat SheetMicrosoft Azure VM Cheat Sheet
Microsoft Azure VM Cheat Sheet
 

Similar to Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit Sydney

Secure machine learning - Guarding your data and gaining insights
Secure machine learning - Guarding your data and gaining insightsSecure machine learning - Guarding your data and gaining insights
Secure machine learning - Guarding your data and gaining insightsAmazon Web Services
 
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS Summit
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS SummitHow Nubank is building a customer-obsessed bank - FSV201 - New York AWS Summit
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS SummitAmazon Web Services
 
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Amazon Web Services
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
 
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summits
 
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Amazon Web Services
 
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...Amazon Web Services
 
Castles in Castles - Secure Operational Scale - AWS Summit Sydney
Castles in Castles - Secure Operational Scale - AWS Summit SydneyCastles in Castles - Secure Operational Scale - AWS Summit Sydney
Castles in Castles - Secure Operational Scale - AWS Summit SydneyAmazon Web Services
 
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS Summit
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS SummitIntroduction to AWS Global Accelerator - SVC211 - Chicago AWS Summit
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS SummitAmazon Web Services
 
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdf
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdfBuilding data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdf
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdfAmazon Web Services
 
Architecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentArchitecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentAmazon Web Services
 
Running Lean Performant Yet Cost Optimised - AWS Summit Sydney
Running Lean Performant Yet Cost Optimised - AWS Summit SydneyRunning Lean Performant Yet Cost Optimised - AWS Summit Sydney
Running Lean Performant Yet Cost Optimised - AWS Summit SydneyAmazon Web Services
 
Threat Detection using artificial intelligence
Threat Detection using artificial intelligenceThreat Detection using artificial intelligence
Threat Detection using artificial intelligenceAmazon Web Services
 
Automated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAutomated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAmazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitAmazon Web Services
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...Amazon Web Services
 
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...Amazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 

Similar to Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit Sydney (20)

Secure machine learning - Guarding your data and gaining insights
Secure machine learning - Guarding your data and gaining insightsSecure machine learning - Guarding your data and gaining insights
Secure machine learning - Guarding your data and gaining insights
 
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS Summit
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS SummitHow Nubank is building a customer-obsessed bank - FSV201 - New York AWS Summit
How Nubank is building a customer-obsessed bank - FSV201 - New York AWS Summit
 
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
 
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
 
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
 
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...
Introduction to the AWS Well-Architected Framework and AWS WA Tool - SVC214-R...
 
Castles in Castles - Secure Operational Scale - AWS Summit Sydney
Castles in Castles - Secure Operational Scale - AWS Summit SydneyCastles in Castles - Secure Operational Scale - AWS Summit Sydney
Castles in Castles - Secure Operational Scale - AWS Summit Sydney
 
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS Summit
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS SummitIntroduction to AWS Global Accelerator - SVC211 - Chicago AWS Summit
Introduction to AWS Global Accelerator - SVC211 - Chicago AWS Summit
 
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdf
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdfBuilding data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdf
Building data lakes for analytics on AWS - ADB201 - Santa Clara AWS Summit.pdf
 
Architecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentArchitecting security & governance across your AWS environment
Architecting security & governance across your AWS environment
 
Running Lean Performant Yet Cost Optimised - AWS Summit Sydney
Running Lean Performant Yet Cost Optimised - AWS Summit SydneyRunning Lean Performant Yet Cost Optimised - AWS Summit Sydney
Running Lean Performant Yet Cost Optimised - AWS Summit Sydney
 
Threat Detection using artificial intelligence
Threat Detection using artificial intelligenceThreat Detection using artificial intelligence
Threat Detection using artificial intelligence
 
Automated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAutomated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit Sydney
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
 
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit Sydney

  • 1. S U M M I T SYDNEY
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian's Solution for Multi-Region Encryption and Decryption Tom Knight Developer Atlassian Martien Verbruggen Architect Atlassian
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian creates products for customers
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian creates customerscloud products for
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian creates more customerscloud products for
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian creates more customerscloud products for
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian cloud products for more customerscreates more
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Atlassian’s Platform as a Service µ Micros
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Micros, our PaaS µ Micros Developers Services Resources
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Micros, our PaaS µ Micros Developers Services Resources
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Region 1 Cryptor use case: database credentials Application Region 2 Application Region X DB Manager config config 1 - create database 2 - store credentials 3 - get credentials4 - connect
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Region 4 Cryptor use case: confidential messages Not a Consumer Region 1 Producer MessagesMessages Region 4 Consumer Messages Region 2 Consumer Messages
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor optimises for Security Resilience Performance Ease of use
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor optimises for Security Resilience Performance Ease of use Manage keys and authorisation
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor optimises for Security Resilience Performance Ease of use Manage keys and authorisation Never™ fail
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor optimises for Security Resilience Performance Ease of use Manage keys and authorisation Never™ fail Deal with latency and scale
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor optimises for Security Resilience Performance Ease of use Manage keys and authorisation Never™ fail Deal with latency and scale Simple API, standard metrics, multi- region
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Why not just use KMS? Single-region Performance Resilience Trusted Secure Powerful authZ
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Region 1 Solution: Use the SDK and customise Region 2 Region 3 Any region KMS 3KMS 2KMS 1 TTL based cache encryption envelope Application
  • 20. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Encryption SDK example val cache = LocalCryptoMaterialsCache(KMS_MAX_CACHE_SIZE) val keyProvider = MultipleProviderFactory.buildMultiProvider(KmsMasterKey::class.java, keys) val cmm = CachingCryptoMaterialsManager .newBuilder() .withMasterKeyProvider(keyProvider) .withCache(cache) .withMaxAge(KMS_MAX_CACHE_AGE, TimeUnit.SECONDS) .build()
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Multi-region Fault tolerance Performance Implementation
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Solution: Encryption Multiple regions Quorum: 2 out of 3 regions - configurable Bespoke encryption context Improve datakey reusage Encryption pooling Pre fetch data keys Usage and TTL
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Encryption context Meta data Extra layer of security
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Solution: Encryption Multiple regions Quorum: 2 out of 3 regions - configurable Bespoke encryption context Improve datakey reusage Encryption pooling Pre fetch data keys Usage and TTL
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Solution: Decryption Decryption caching Latency-based selection of KMS Fetch keys in parallel Datakeys are decrypted in parallel
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Solution: Integration Java library Most widely used language in Atlassian Sidecar Docker container with 2 API endpoints Java library with Spring Boot
  • 27. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Sample code for library call // Setup val cryptorClient = CryptorClientFactory.build(keyAliasList, config) // Values val originalPlainText = "Encrypt Me" val encryptionContext = mapOf("CustomerId" to "123456") // Encrypt and Decrypt val cipherText = cryptorClient.encrypt(keyAlias, originalPlainText, encryptionContext) val plainText = cryptorClient.decrypt(cipherText, encryptionContext)
  • 28. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Sample REST call
  • 29. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Solution: service descriptor name: encrypting-service organization: foo ... resources: - type: cryptor name: secret-key decryptors: - secret-reader - secret-checker - audit-agent µ
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Cryptor account Micros account Solution: PaaS and resource provider Keys Roles Policies AWS IAM AWS KMS setup(@roles, key-alias) µ Micros Cryptor provider
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Solution: Operational Standard metrics and logs from sidecar Visible to service owners, security and central team Standard configuration Standardised cache configurations Multi-region configurations
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Metrics dashboard
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Summary Security Resilience Performance Ease of use
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Summary Security Resilience Performance Ease of use
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Summary Security Resilience Performance Ease of use
  • 36. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Summary Security Resilience Performance Ease of use
  • 37. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Summary Security Resilience Performance Ease of use
  • 38. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Open source Announcement when we ship it, at https://www.atlassian.com/blog/technology
  • 39. Thank you! S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Tom Knight Martien Verbruggen