SlideShare a Scribd company logo
Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you.
Make the subtitle something clever. People will think it’s neat.
Welcome!
DoiT International
Practicing multi-cloud & cloud cyber security since 2010.
DoIT International confidential │ Do not distribute
DoIT International confidential │ Do not distribute
DoIT International confidential │ Do not distribute
● Customer Operations Engineer
● Big Data Engineering
● Cloud Sales Rep.
Looking for Talent
Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you.
Make the subtitle something clever. People will think it’s neat.
AWS Cyber Security Best Practices
Shay Kirshenboim - Cloud Cyber Security // DoiT International
Agenda
1
2
3
4
5
AWS Security Components
MFA Authentication
Logging, Audit and Monitoring tools
AWS Shield & WAF
Centralize logs using AWS Elastic
6
AWS Monitoring and Security Controls
& Trusted Advisor
ElasticSearch Service
AWS Shared Security Model
AWS Security Groups and Network ACLs
Security Groups
Affects Instances (1st protection
layer)
Only "Allow" rules & by default
"Deny"
Stateful (Return traffic is allowed)
Rules order is insignificant as all
rules are “allow” rules
Many to many relationship
10
Network ACL’s
Affects an entire subnet (2nd
protection layer)
Support “Allow” & “Deny” rules
Stateless (You must explicitly allow
return traffic
Evaluates rules in number order (like
traditional firewall)
Security Groups & Network ACL’s
Security Groups
Avoid using the “default VPC security group” which enables inbound
communication from all members of the SG and outbound communication to
any destination
Delete “any to any” rules and configure specific name servers and other
services rules as needed
Use easy to understand names (and naming convention)
Create functional related SG (db servers, web server etc.)
Create default SG for Infra services (Windows RDP or Linux ssh etc.)
Try to balance simplicity of SG and amount of SG per instance to achieve
simple management.
Enable VPC flow logs
Security Groups & NACL’s - Best Practices
Monitor changes to SG (Demo)
Identify your critical SGs (sg-8f9ee8f7)
Create Lambda execution role and policy
Create Lambda function:
review Code, configure role and handler
"detail-type": [
"AWS API Call via CloudTrail"
],
"detail": {
"eventSource": [
"ec2.amazonaws.com"
],
"eventName": [
"AuthorizeSecurityGroupIngress",
"RevokeSecurityGroupIngress"
],
"requestParameters": {
"groupId": [
"<YourSGid>"
● Configure CloudWatch rule to catch API calls
that may cause SG changes
● Modify SG and look for CloudWatch
phrases : ‘This permission must be authorized’
‘This permission must be revoked’
Auto Update SG using SNS & Lambda
Use case: Update Web servers SG with AWS CloudFront IP ranges
Target SGs tagged with “Name:cloudfront” and “AutoUpdate:true”
IAM policy and role (as in previous example)
Create Lambda function using code
Configure Lambda function's trigger by SNS subscription
aws sns subscribe --topic-arn arn:aws:sns:us-east-1:806199016981:AmazonIpSpaceChanged --protocol lambda --
notification-endpoint <Lambda ARN>
Run test ⇒ Check Security Group Inbound rules
Alert on IAM policy change
The process:
Logs ⇒ mark “DefaultLogGroup” ⇒ create metric filter:
{ ( ($.eventSource = "iam.amazonaws.com") && (($.eventName =
"Add*") || ($.eventName = "Attach*") || ($.eventName = "Change*") ||
($.eventName = "Create*") || ($.eventName = "Deactivate*") ||
($.eventName = "Delete*") || ($.eventName = "Detach*") ||
($.eventName = "Enable*") || ($.eventName = "Put*") ||
($.eventName = "Remove*") || ($.eventName = "Set*") ||
($.eventName = "Update*") || ($.eventName = "Upload*")) ) }
Same can be done for SG, S3
bucket policy etc.
Examples
Attach IAM Role to an Existing EC2
New! (Feb 2017) Attach the IAM role to an existing EC2 instance that was
originally launched without an IAM role / Replace the attached IAM role
Create an instance profile
aws iam create-instance-profile
Add a role to an instance profile
aws iam add-role-to-instance-profile
List instance profiles
aws iam list-instance-profiles
aws iam list-instance-profiles-for-role
Remove a role from an instance profile
aws iam remove-role-from-instance-profile
Delete an instance profile
aws iam delete-instance-profile
Bastion Host and MFA
Securing (at least) your Bastion Host with MFA
1. Install and launch Google Authenticator
sudo yum install google-authenticator –y ⇒ google-authenticator
1. Configure the sshd PAM module to use Google Authenticator:
vi /etc/pam.d/sshd
Add: auth required pam_google_authenticator.so
Comment out: auth substack password-auth
1. Configuring SSH so that Google Authenticator is called as a second factor of
authentication
vi /etc/ssh/sshd_config
change: “ChallengeResponseAuthentication” option to “yes”
add: to the bottom of the file: “AuthenticationMethods publickey,keyboard-interactive”
1. Restart SSH daemon
sudo /etc/init.d/sshd restart
Enable MFA Protection on Your AWS API
1. Author an IAM policy to grant “Allow” access for MFA-authenticated users
1. Using aws:MultiFactorAuthPresent
"Sid": "AllowActionsForEC2WhenMFAIsPresent",
"Effect":"Allow",
"Action":"ec2:RunInstances",
"Condition":{
"Bool":{"aws:MultiFactorAuthPresent":"true"}
1. <Demo> Preventing AWS API calls from left open consoles
1. Using aws:MultiFactorAuthAge and Conditions
Long-term credentials (IAM user access keys) cannot be used with
MFA-protected API access because they don't expire (AWS CLI) !
Enable MFA Protection on Your AWS CLI
1. Using temporary session token
$ aws sts get-session-token --serial-number arn:aws:iam::AWS-account-number:mfa/user --token-
code code-from-token (Optional: --profile user)
1. Edit the AWS CLI credentials file, which defaults to ~/.aws/credentials with
returned values:
[profile-name]
aws_access_key_id = <Access-key-as-in-returned-output>
aws_secret_access_key = <Secret-access-key-as-in-returned-output>
aws_session_token = <Session-Token-as-in-returned-output>
1. <Demo> ec2 describe-instances only to MFA enabled users using “AWS CLI"
2. Check out AWS Security Blog for very useful guides (an excellent example:
How to Record SSH Sessions Established Through a Bastion Host)
Inspector / Trusted Advisor (Business Support)
AWS Trusted Advisor Security Checks
● Upgrading your Support plan will enable many more security best
practices checks
AWS Inspector
Prerequisites: Create Role ⇒ Tag EC2 instances ⇒
Install AWS agent:
curl -O https://d1wk0tztpsntt1.cloudfront.net/linux/latest/install
sudo bash install
sudo /opt/aws/awsagent/bin/awsagent status
Auto install Agent when launching new instance
Advanced Details ⇒ User Data
#!/bin/bash
cd /tmp
curl -O https://d1wk0tztpsntt1.cloudfront.net/linux/latest/install
chmod +x install
AWS Inspector Findings (examples)
Security Best Practices-1.0:
Finding
Instance xxxx is configured to allow users to log in with root credentials over SSH.
This increases the likelihood of a successful brute-force attack.
Description
This rule helps determine whether the SSH daemon is configured to permit logging
in to your EC2 instance as root.
Recommendation
It is recommended that you configure your EC2 instance to prevent root logins over
SSH. Instead, log in as a non-root user and use sudo to escalate privileges when
necessary. To disable SSH root logins, set PermitRootLogin to "no" in
/etc/ssh/sshd_config and restart sshd
AWSLabs GitHub links:
https://github.com/awslabs/amazon-
inspector-agent-autodeploy
Lambda job in Python to automatically deploy
Inspector agent to newly-launched EC2 instances.
https://github.com/awslabs/amazon-
inspector-finding-forwarder
Lambda script that receives findings from the Amazon
Inspector service in AWS, via SNS, and forwards
them to a destination email address.
https://github.com/awslabs/aws-security-
benchmark
Collection of resources related to security benchmark
currently: CIS AWS Foundations Benchmark 1.1
How to Remediate Amazon Inspector Security Findings Automatically
AWS Shield & WAF
AWS Shield
Rules
AND / OR
Allow, Block or
Count
Ordered
conditions
AWS WAF
Web ACLs contain rules
Rule#1: Block Bad User-
Agents
IP match
Suspicious IPs
&
String match
Bad bots
OR
Rule#2: Block SQLi
SQLi match
SQLi checks
ELSE
Default Action: Allow
Conditions
IP match
Suspicious IPs
192.0.2.0/24
String
User-Agent
header matches
Bad bots
SQL injection
URI contains SQL
injection
Recommended Order
1. WhiteListed iPs-
Allow
2. BlackListed IPs-
Block
3. BlackListedSignat
ures- Block
4. SQLInjection-
Block
5. SuspiciousActivity-
Count
Default: Allow
AWS WAF Security Automations
http://docs.aws.amazon.com/solutions/latest/aws-waf-security-automations/deployment.html
Lambda Functions:
Log Parser:
parses CloudFront access logs to identify suspicious behavior, such as an abnormal amount
of requests or errors. It then blocks those IP addresses for a customer-defined period of time.
Default Parameters: RequestThreshold:400, ErrorThreshold:50, WAFBlockPeriod:240(min)
IP Lists Parser:
checks third-party IP reputation lists hourly for new IP ranges to block. These lists include the
Spamhaus Don't Route Or Peer (DROP) and Extended Drop (EDROP) lists, the Proofpoint
Emerging Threats IP list, and the Tor exit node list.
BadBot Parser:
intercepts and inspects trap endpoint requests to extract its IP address, and then add it to an
AWS WAF block list.
AWS ElasticSearch
Forensics on logs with AWS ElasticSearch (or your own)
Create your Elasticsearch domain
Stream all relevant logs (CloudWatch)
Create Dashboards by topic
Monitor and Investigate
Section Slide Template Option 2
Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you.
Make the subtitle something clever. People will think it’s neat.
Questions?
Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you.
Make the subtitle something clever. People will think it’s neat.
Thank You!
DoiT International
Practicing multi-cloud & cloud cyber security since 2010.

More Related Content

What's hot

Amazon Redshift
Amazon RedshiftAmazon Redshift
Amazon Redshift
Jeff Patti
 
Where Is My Data - ILTAM Session
Where Is My Data - ILTAM SessionWhere Is My Data - ILTAM Session
Where Is My Data - ILTAM Session
Tamir Dresher
 
Azure CosmosDb - Where we are
Azure CosmosDb - Where we areAzure CosmosDb - Where we are
Azure CosmosDb - Where we are
Marco Parenzan
 
Optimizing Storage for Big Data/Analytics Workloads
Optimizing Storage for Big Data/Analytics WorkloadsOptimizing Storage for Big Data/Analytics Workloads
Optimizing Storage for Big Data/Analytics Workloads
Amazon Web Services
 
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQLNEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
Amazon Web Services
 
Querying Data Pipeline with AWS Athena
Querying Data Pipeline with AWS AthenaQuerying Data Pipeline with AWS Athena
Querying Data Pipeline with AWS Athena
Yaroslav Tkachenko
 
Zero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DBZero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DB
Adnan Hashmi
 
Accelerating DynamoDB with DAX
Accelerating DynamoDB with DAXAccelerating DynamoDB with DAX
Accelerating DynamoDB with DAX
Amazon Web Services
 
Deep Dive on Amazon DynamoDB
Deep Dive on Amazon DynamoDBDeep Dive on Amazon DynamoDB
Deep Dive on Amazon DynamoDB
Amazon Web Services
 
Aws Kinesis
Aws KinesisAws Kinesis
Aws Kinesis
Szilveszter Molnár
 
Data Warehousing in the Era of Big Data
Data Warehousing in the Era of Big DataData Warehousing in the Era of Big Data
Data Warehousing in the Era of Big Data
Amazon Web Services
 
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
Amazon Web Services
 
Querying and Analyzing Data in Amazon S3
Querying and Analyzing Data in Amazon S3Querying and Analyzing Data in Amazon S3
Querying and Analyzing Data in Amazon S3
Amazon Web Services
 
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
Amazon Web Services
 
Introduction to azure cosmos db
Introduction to azure cosmos dbIntroduction to azure cosmos db
Introduction to azure cosmos db
Ratan Parai
 
Data Warehousing with Amazon Redshift
Data Warehousing with Amazon RedshiftData Warehousing with Amazon Redshift
Data Warehousing with Amazon Redshift
Amazon Web Services
 
AWS Redshift Introduction - Big Data Analytics
AWS Redshift Introduction - Big Data AnalyticsAWS Redshift Introduction - Big Data Analytics
AWS Redshift Introduction - Big Data Analytics
Keeyong Han
 
Hands-on Lab: Data Lake Analytics
Hands-on Lab: Data Lake AnalyticsHands-on Lab: Data Lake Analytics
Hands-on Lab: Data Lake Analytics
Amazon Web Services
 
Data Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
Data Warehousing in the Era of Big Data: Deep Dive into Amazon RedshiftData Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
Data Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
Amazon Web Services
 
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar SeriesDeep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Amazon Web Services
 

What's hot (20)

Amazon Redshift
Amazon RedshiftAmazon Redshift
Amazon Redshift
 
Where Is My Data - ILTAM Session
Where Is My Data - ILTAM SessionWhere Is My Data - ILTAM Session
Where Is My Data - ILTAM Session
 
Azure CosmosDb - Where we are
Azure CosmosDb - Where we areAzure CosmosDb - Where we are
Azure CosmosDb - Where we are
 
Optimizing Storage for Big Data/Analytics Workloads
Optimizing Storage for Big Data/Analytics WorkloadsOptimizing Storage for Big Data/Analytics Workloads
Optimizing Storage for Big Data/Analytics Workloads
 
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQLNEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
 
Querying Data Pipeline with AWS Athena
Querying Data Pipeline with AWS AthenaQuerying Data Pipeline with AWS Athena
Querying Data Pipeline with AWS Athena
 
Zero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DBZero to 60 with Azure Cosmos DB
Zero to 60 with Azure Cosmos DB
 
Accelerating DynamoDB with DAX
Accelerating DynamoDB with DAXAccelerating DynamoDB with DAX
Accelerating DynamoDB with DAX
 
Deep Dive on Amazon DynamoDB
Deep Dive on Amazon DynamoDBDeep Dive on Amazon DynamoDB
Deep Dive on Amazon DynamoDB
 
Aws Kinesis
Aws KinesisAws Kinesis
Aws Kinesis
 
Data Warehousing in the Era of Big Data
Data Warehousing in the Era of Big DataData Warehousing in the Era of Big Data
Data Warehousing in the Era of Big Data
 
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
AWS re:Invent 2016: How Amazon S3 Storage Management Helps Optimize Storage a...
 
Querying and Analyzing Data in Amazon S3
Querying and Analyzing Data in Amazon S3Querying and Analyzing Data in Amazon S3
Querying and Analyzing Data in Amazon S3
 
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
NEW LAUNCH! Intro to Amazon Athena. Easily analyze data in S3, using SQL.
 
Introduction to azure cosmos db
Introduction to azure cosmos dbIntroduction to azure cosmos db
Introduction to azure cosmos db
 
Data Warehousing with Amazon Redshift
Data Warehousing with Amazon RedshiftData Warehousing with Amazon Redshift
Data Warehousing with Amazon Redshift
 
AWS Redshift Introduction - Big Data Analytics
AWS Redshift Introduction - Big Data AnalyticsAWS Redshift Introduction - Big Data Analytics
AWS Redshift Introduction - Big Data Analytics
 
Hands-on Lab: Data Lake Analytics
Hands-on Lab: Data Lake AnalyticsHands-on Lab: Data Lake Analytics
Hands-on Lab: Data Lake Analytics
 
Data Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
Data Warehousing in the Era of Big Data: Deep Dive into Amazon RedshiftData Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
Data Warehousing in the Era of Big Data: Deep Dive into Amazon Redshift
 
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar SeriesDeep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
Deep Dive Amazon Redshift for Big Data Analytics - September Webinar Series
 

Viewers also liked

Google Cloud Spanner Preview
Google Cloud Spanner PreviewGoogle Cloud Spanner Preview
Google Cloud Spanner Preview
DoiT International
 
Revista Municipal Torremejia 08
Revista Municipal Torremejia 08Revista Municipal Torremejia 08
Revista Municipal Torremejia 08
AyuntamientoTorremejia
 
Raciocinio logico quantitativo
Raciocinio logico quantitativoRaciocinio logico quantitativo
Raciocinio logico quantitativo
Jennifer Oliveira
 
Imposto que gera cultura, rende benefícios
Imposto que gera cultura, rende benefíciosImposto que gera cultura, rende benefícios
Imposto que gera cultura, rende benefícios
Evoé
 
Designing & prototyping useful apps
Designing & prototyping useful appsDesigning & prototyping useful apps
Designing & prototyping useful apps
Robin De Croon
 
Ethereum 101
Ethereum 101Ethereum 101
Ethereum 101
Chang-Wu Chen
 
Cegled tancsics cities of the future#SciChallenge2017
Cegled tancsics cities of the future#SciChallenge2017Cegled tancsics cities of the future#SciChallenge2017
Cegled tancsics cities of the future#SciChallenge2017
Andrea Jozanne Kamuti
 
Cultura escrita y escuela rural aportes para leer y escribir en el plurigrado
Cultura escrita y escuela rural aportes para leer y escribir en el plurigradoCultura escrita y escuela rural aportes para leer y escribir en el plurigrado
Cultura escrita y escuela rural aportes para leer y escribir en el plurigrado
Gabriela Irureta
 
Enfermedades más comunes en los gatos
Enfermedades más comunes en los gatosEnfermedades más comunes en los gatos
Enfermedades más comunes en los gatos
Kevin Acevedo Durango
 
Proyecto educativo diseño gráfico
Proyecto educativo diseño gráficoProyecto educativo diseño gráfico
Proyecto educativo diseño gráfico
Elver Chaparro Cardozo
 
Bio it 2014-published
Bio it 2014-publishedBio it 2014-published
Bio it 2014-published
Toby Bloom
 
Klimastrategi
KlimastrategiKlimastrategi
Why React's Awesome!
Why React's Awesome!Why React's Awesome!
Why React's Awesome!
nomanalikk
 
Phyllis Schlafly Report 1970 June
Phyllis Schlafly Report 1970 JunePhyllis Schlafly Report 1970 June
Phyllis Schlafly Report 1970 June
PhyllisSchlaflyEagles
 
неделя дружбы
неделя дружбынеделя дружбы
неделя дружбы
lavrenteva
 
P3 e2 añadirelrestodelasdiapositivas
P3 e2 añadirelrestodelasdiapositivasP3 e2 añadirelrestodelasdiapositivas
P3 e2 añadirelrestodelasdiapositivas
Andres Laseca
 
I chronicles 8 commentaryA
I chronicles 8 commentaryAI chronicles 8 commentaryA
I chronicles 8 commentaryA
GLENN PEASE
 
Programaciones 18 03-17
Programaciones 18 03-17Programaciones 18 03-17
Programaciones 18 03-17
Web Futbolaragones
 
Impresionismo en españa
Impresionismo en españaImpresionismo en españa
Impresionismo en españa
Gonzalo Costa
 
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
National Science and Technology Development Agency (NSTDA) - Thailand
 

Viewers also liked (20)

Google Cloud Spanner Preview
Google Cloud Spanner PreviewGoogle Cloud Spanner Preview
Google Cloud Spanner Preview
 
Revista Municipal Torremejia 08
Revista Municipal Torremejia 08Revista Municipal Torremejia 08
Revista Municipal Torremejia 08
 
Raciocinio logico quantitativo
Raciocinio logico quantitativoRaciocinio logico quantitativo
Raciocinio logico quantitativo
 
Imposto que gera cultura, rende benefícios
Imposto que gera cultura, rende benefíciosImposto que gera cultura, rende benefícios
Imposto que gera cultura, rende benefícios
 
Designing & prototyping useful apps
Designing & prototyping useful appsDesigning & prototyping useful apps
Designing & prototyping useful apps
 
Ethereum 101
Ethereum 101Ethereum 101
Ethereum 101
 
Cegled tancsics cities of the future#SciChallenge2017
Cegled tancsics cities of the future#SciChallenge2017Cegled tancsics cities of the future#SciChallenge2017
Cegled tancsics cities of the future#SciChallenge2017
 
Cultura escrita y escuela rural aportes para leer y escribir en el plurigrado
Cultura escrita y escuela rural aportes para leer y escribir en el plurigradoCultura escrita y escuela rural aportes para leer y escribir en el plurigrado
Cultura escrita y escuela rural aportes para leer y escribir en el plurigrado
 
Enfermedades más comunes en los gatos
Enfermedades más comunes en los gatosEnfermedades más comunes en los gatos
Enfermedades más comunes en los gatos
 
Proyecto educativo diseño gráfico
Proyecto educativo diseño gráficoProyecto educativo diseño gráfico
Proyecto educativo diseño gráfico
 
Bio it 2014-published
Bio it 2014-publishedBio it 2014-published
Bio it 2014-published
 
Klimastrategi
KlimastrategiKlimastrategi
Klimastrategi
 
Why React's Awesome!
Why React's Awesome!Why React's Awesome!
Why React's Awesome!
 
Phyllis Schlafly Report 1970 June
Phyllis Schlafly Report 1970 JunePhyllis Schlafly Report 1970 June
Phyllis Schlafly Report 1970 June
 
неделя дружбы
неделя дружбынеделя дружбы
неделя дружбы
 
P3 e2 añadirelrestodelasdiapositivas
P3 e2 añadirelrestodelasdiapositivasP3 e2 añadirelrestodelasdiapositivas
P3 e2 añadirelrestodelasdiapositivas
 
I chronicles 8 commentaryA
I chronicles 8 commentaryAI chronicles 8 commentaryA
I chronicles 8 commentaryA
 
Programaciones 18 03-17
Programaciones 18 03-17Programaciones 18 03-17
Programaciones 18 03-17
 
Impresionismo en españa
Impresionismo en españaImpresionismo en españa
Impresionismo en españa
 
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
NSTDA Newsletter ปีที่ 2 ฉบับที่ 12 ประจำเดือนมีนาคม 2560 (ฉบับที่ 24)
 

Similar to AWS Cyber Security Best Practices

Notes for AWS IoT
Notes for AWS IoTNotes for AWS IoT
Notes for AWS IoT
承翰 蔡
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdf
Amazon Web Services
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
Amazon Web Services
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
Amazon Web Services
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Amazon Web Services
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013
Jay Zarfoss
 
Integrating-Cloud-Development-Security-And-Operations.pdf
Integrating-Cloud-Development-Security-And-Operations.pdfIntegrating-Cloud-Development-Security-And-Operations.pdf
Integrating-Cloud-Development-Security-And-Operations.pdf
Amazon Web Services
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
OWASP Delhi
 
Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
Amazon Web Services
 
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
Amazon Web Services
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
Amazon Web Services
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM
Oleg Gryb
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
Amazon Web Services
 
AWS October Webinar Series - Getting Started with AWS IoT
AWS October Webinar Series - Getting Started with AWS IoTAWS October Webinar Series - Getting Started with AWS IoT
AWS October Webinar Series - Getting Started with AWS IoT
Amazon Web Services
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS Security
Amazon Web Services
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
Amazon Web Services
 
AWS Serverless Workshop
AWS Serverless WorkshopAWS Serverless Workshop
AWS Serverless Workshop
Mikael Puittinen
 
(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure
Amazon Web Services
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
Kristana Kane
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
Aleksandr Maklakov
 

Similar to AWS Cyber Security Best Practices (20)

Notes for AWS IoT
Notes for AWS IoTNotes for AWS IoT
Notes for AWS IoT
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdf
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
 
Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013Cloud Security At Netflix, October 2013
Cloud Security At Netflix, October 2013
 
Integrating-Cloud-Development-Security-And-Operations.pdf
Integrating-Cloud-Development-Security-And-Operations.pdfIntegrating-Cloud-Development-Security-And-Operations.pdf
Integrating-Cloud-Development-Security-And-Operations.pdf
 
Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
 
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
AWS re:Invent 2016: Workshop: Adhere to the Principle of Least Privilege by U...
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM LASCON 2013 - AWS CLoud HSM
LASCON 2013 - AWS CLoud HSM
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
AWS October Webinar Series - Getting Started with AWS IoT
AWS October Webinar Series - Getting Started with AWS IoTAWS October Webinar Series - Getting Started with AWS IoT
AWS October Webinar Series - Getting Started with AWS IoT
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS Security
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
AWS Serverless Workshop
AWS Serverless WorkshopAWS Serverless Workshop
AWS Serverless Workshop
 
(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure(ARC401) Cloud First: New Architecture for New Infrastructure
(ARC401) Cloud First: New Architecture for New Infrastructure
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
 

More from DoiT International

Terraform Modules Restructured
Terraform Modules RestructuredTerraform Modules Restructured
Terraform Modules Restructured
DoiT International
 
GAN training with Tensorflow and Tensor Cores
GAN training with Tensorflow and Tensor CoresGAN training with Tensorflow and Tensor Cores
GAN training with Tensorflow and Tensor Cores
DoiT International
 
Orchestrating Redis & K8s Operators
Orchestrating Redis & K8s OperatorsOrchestrating Redis & K8s Operators
Orchestrating Redis & K8s Operators
DoiT International
 
K8s best practices from the field!
K8s best practices from the field!K8s best practices from the field!
K8s best practices from the field!
DoiT International
 
An Open-Source Platform to Connect, Manage, and Secure Microservices
An Open-Source Platform to Connect, Manage, and Secure MicroservicesAn Open-Source Platform to Connect, Manage, and Secure Microservices
An Open-Source Platform to Connect, Manage, and Secure Microservices
DoiT International
 
Is your Elastic Cluster Stable and Production Ready?
Is your Elastic Cluster Stable and Production Ready?Is your Elastic Cluster Stable and Production Ready?
Is your Elastic Cluster Stable and Production Ready?
DoiT International
 
Applying ML for Log Analysis
Applying ML for Log AnalysisApplying ML for Log Analysis
Applying ML for Log Analysis
DoiT International
 
GCP for AWS Professionals
GCP for AWS ProfessionalsGCP for AWS Professionals
GCP for AWS Professionals
DoiT International
 
Cloud Dataflow - A Unified Model for Batch and Streaming Data Processing
Cloud Dataflow - A Unified Model for Batch and Streaming Data ProcessingCloud Dataflow - A Unified Model for Batch and Streaming Data Processing
Cloud Dataflow - A Unified Model for Batch and Streaming Data Processing
DoiT International
 
AWS Athena vs. Google BigQuery for interactive SQL Queries
AWS Athena vs. Google BigQuery for interactive SQL QueriesAWS Athena vs. Google BigQuery for interactive SQL Queries
AWS Athena vs. Google BigQuery for interactive SQL Queries
DoiT International
 
Google BigQuery 101 & What’s New
Google BigQuery 101 & What’s NewGoogle BigQuery 101 & What’s New
Google BigQuery 101 & What’s New
DoiT International
 
Running Production-Grade Kubernetes on AWS
Running Production-Grade Kubernetes on AWSRunning Production-Grade Kubernetes on AWS
Running Production-Grade Kubernetes on AWS
DoiT International
 
Scaling Jenkins with Kubernetes by Ami Mahloof
Scaling Jenkins with Kubernetes by Ami MahloofScaling Jenkins with Kubernetes by Ami Mahloof
Scaling Jenkins with Kubernetes by Ami Mahloof
DoiT International
 
CI Implementation with Kubernetes at LivePerson by Saar Demri
CI Implementation with Kubernetes at LivePerson by Saar DemriCI Implementation with Kubernetes at LivePerson by Saar Demri
CI Implementation with Kubernetes at LivePerson by Saar Demri
DoiT International
 
Kubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen FisherKubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen Fisher
DoiT International
 
Dataflow - A Unified Model for Batch and Streaming Data Processing
Dataflow - A Unified Model for Batch and Streaming Data ProcessingDataflow - A Unified Model for Batch and Streaming Data Processing
Dataflow - A Unified Model for Batch and Streaming Data Processing
DoiT International
 
Kubernetes - State of the Union (Q1-2016)
Kubernetes - State of the Union (Q1-2016)Kubernetes - State of the Union (Q1-2016)
Kubernetes - State of the Union (Q1-2016)
DoiT International
 

More from DoiT International (17)

Terraform Modules Restructured
Terraform Modules RestructuredTerraform Modules Restructured
Terraform Modules Restructured
 
GAN training with Tensorflow and Tensor Cores
GAN training with Tensorflow and Tensor CoresGAN training with Tensorflow and Tensor Cores
GAN training with Tensorflow and Tensor Cores
 
Orchestrating Redis & K8s Operators
Orchestrating Redis & K8s OperatorsOrchestrating Redis & K8s Operators
Orchestrating Redis & K8s Operators
 
K8s best practices from the field!
K8s best practices from the field!K8s best practices from the field!
K8s best practices from the field!
 
An Open-Source Platform to Connect, Manage, and Secure Microservices
An Open-Source Platform to Connect, Manage, and Secure MicroservicesAn Open-Source Platform to Connect, Manage, and Secure Microservices
An Open-Source Platform to Connect, Manage, and Secure Microservices
 
Is your Elastic Cluster Stable and Production Ready?
Is your Elastic Cluster Stable and Production Ready?Is your Elastic Cluster Stable and Production Ready?
Is your Elastic Cluster Stable and Production Ready?
 
Applying ML for Log Analysis
Applying ML for Log AnalysisApplying ML for Log Analysis
Applying ML for Log Analysis
 
GCP for AWS Professionals
GCP for AWS ProfessionalsGCP for AWS Professionals
GCP for AWS Professionals
 
Cloud Dataflow - A Unified Model for Batch and Streaming Data Processing
Cloud Dataflow - A Unified Model for Batch and Streaming Data ProcessingCloud Dataflow - A Unified Model for Batch and Streaming Data Processing
Cloud Dataflow - A Unified Model for Batch and Streaming Data Processing
 
AWS Athena vs. Google BigQuery for interactive SQL Queries
AWS Athena vs. Google BigQuery for interactive SQL QueriesAWS Athena vs. Google BigQuery for interactive SQL Queries
AWS Athena vs. Google BigQuery for interactive SQL Queries
 
Google BigQuery 101 & What’s New
Google BigQuery 101 & What’s NewGoogle BigQuery 101 & What’s New
Google BigQuery 101 & What’s New
 
Running Production-Grade Kubernetes on AWS
Running Production-Grade Kubernetes on AWSRunning Production-Grade Kubernetes on AWS
Running Production-Grade Kubernetes on AWS
 
Scaling Jenkins with Kubernetes by Ami Mahloof
Scaling Jenkins with Kubernetes by Ami MahloofScaling Jenkins with Kubernetes by Ami Mahloof
Scaling Jenkins with Kubernetes by Ami Mahloof
 
CI Implementation with Kubernetes at LivePerson by Saar Demri
CI Implementation with Kubernetes at LivePerson by Saar DemriCI Implementation with Kubernetes at LivePerson by Saar Demri
CI Implementation with Kubernetes at LivePerson by Saar Demri
 
Kubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen FisherKubernetes @ Nanit by Chen Fisher
Kubernetes @ Nanit by Chen Fisher
 
Dataflow - A Unified Model for Batch and Streaming Data Processing
Dataflow - A Unified Model for Batch and Streaming Data ProcessingDataflow - A Unified Model for Batch and Streaming Data Processing
Dataflow - A Unified Model for Batch and Streaming Data Processing
 
Kubernetes - State of the Union (Q1-2016)
Kubernetes - State of the Union (Q1-2016)Kubernetes - State of the Union (Q1-2016)
Kubernetes - State of the Union (Q1-2016)
 

Recently uploaded

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
hackersuli
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
SEO Article Boost
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
keoku
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
3ipehhoa
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
zyfovom
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
ufdana
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
3ipehhoa
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
harveenkaur52
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
zoowe
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
cuobya
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Brad Spiegel Macon GA
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
Rogerio Filho
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
Danica Gill
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
vmemo1
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
eutxy
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Florence Consulting
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
cuobya
 

Recently uploaded (20)

[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024[HUN][hackersuli] Red Teaming alapok 2024
[HUN][hackersuli] Red Teaming alapok 2024
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
Understanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdfUnderstanding User Behavior with Google Analytics.pdf
Understanding User Behavior with Google Analytics.pdf
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
一比一原版(SLU毕业证)圣路易斯大学毕业证成绩单专业办理
 
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
原版仿制(uob毕业证书)英国伯明翰大学毕业证本科学历证书原版一模一样
 
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
学位认证网(DU毕业证)迪肯大学毕业证成绩单一比一原版制作
 
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
一比一原版(CSU毕业证)加利福尼亚州立大学毕业证成绩单专业办理
 
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
APNIC Foundation, presented by Ellisha Heppner at the PNG DNS Forum 2024
 
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
1比1复刻(bath毕业证书)英国巴斯大学毕业证学位证原版一模一样
 
Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027Italy Agriculture Equipment Market Outlook to 2027
Italy Agriculture Equipment Market Outlook to 2027
 
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
国外证书(Lincoln毕业证)新西兰林肯大学毕业证成绩单不能毕业办理
 
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
可查真实(Monash毕业证)西澳大学毕业证成绩单退学买
 
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptxBridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
Bridging the Digital Gap Brad Spiegel Macon, GA Initiative.pptx
 
guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...guildmasters guide to ravnica Dungeons & Dragons 5...
guildmasters guide to ravnica Dungeons & Dragons 5...
 
7 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 20247 Best Cloud Hosting Services to Try Out in 2024
7 Best Cloud Hosting Services to Try Out in 2024
 
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
重新申请毕业证书(RMIT毕业证)皇家墨尔本理工大学毕业证成绩单精仿办理
 
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
一比一原版(LBS毕业证)伦敦商学院毕业证成绩单专业办理
 
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdfMeet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
Meet up Milano 14 _ Axpo Italia_ Migration from Mule3 (On-prem) to.pdf
 
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
制作毕业证书(ANU毕业证)莫纳什大学毕业证成绩单官方原版办理
 

AWS Cyber Security Best Practices

  • 1. Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you. Make the subtitle something clever. People will think it’s neat. Welcome! DoiT International Practicing multi-cloud & cloud cyber security since 2010.
  • 2. DoIT International confidential │ Do not distribute
  • 3. DoIT International confidential │ Do not distribute
  • 4. DoIT International confidential │ Do not distribute ● Customer Operations Engineer ● Big Data Engineering ● Cloud Sales Rep. Looking for Talent
  • 5. Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you. Make the subtitle something clever. People will think it’s neat. AWS Cyber Security Best Practices Shay Kirshenboim - Cloud Cyber Security // DoiT International
  • 6. Agenda 1 2 3 4 5 AWS Security Components MFA Authentication Logging, Audit and Monitoring tools AWS Shield & WAF Centralize logs using AWS Elastic 6
  • 7. AWS Monitoring and Security Controls & Trusted Advisor ElasticSearch Service
  • 9. AWS Security Groups and Network ACLs
  • 10. Security Groups Affects Instances (1st protection layer) Only "Allow" rules & by default "Deny" Stateful (Return traffic is allowed) Rules order is insignificant as all rules are “allow” rules Many to many relationship 10 Network ACL’s Affects an entire subnet (2nd protection layer) Support “Allow” & “Deny” rules Stateless (You must explicitly allow return traffic Evaluates rules in number order (like traditional firewall) Security Groups & Network ACL’s
  • 11. Security Groups Avoid using the “default VPC security group” which enables inbound communication from all members of the SG and outbound communication to any destination Delete “any to any” rules and configure specific name servers and other services rules as needed Use easy to understand names (and naming convention) Create functional related SG (db servers, web server etc.) Create default SG for Infra services (Windows RDP or Linux ssh etc.) Try to balance simplicity of SG and amount of SG per instance to achieve simple management. Enable VPC flow logs Security Groups & NACL’s - Best Practices
  • 12. Monitor changes to SG (Demo) Identify your critical SGs (sg-8f9ee8f7) Create Lambda execution role and policy Create Lambda function: review Code, configure role and handler "detail-type": [ "AWS API Call via CloudTrail" ], "detail": { "eventSource": [ "ec2.amazonaws.com" ], "eventName": [ "AuthorizeSecurityGroupIngress", "RevokeSecurityGroupIngress" ], "requestParameters": { "groupId": [ "<YourSGid>" ● Configure CloudWatch rule to catch API calls that may cause SG changes ● Modify SG and look for CloudWatch phrases : ‘This permission must be authorized’ ‘This permission must be revoked’
  • 13. Auto Update SG using SNS & Lambda Use case: Update Web servers SG with AWS CloudFront IP ranges Target SGs tagged with “Name:cloudfront” and “AutoUpdate:true” IAM policy and role (as in previous example) Create Lambda function using code Configure Lambda function's trigger by SNS subscription aws sns subscribe --topic-arn arn:aws:sns:us-east-1:806199016981:AmazonIpSpaceChanged --protocol lambda -- notification-endpoint <Lambda ARN> Run test ⇒ Check Security Group Inbound rules
  • 14. Alert on IAM policy change The process: Logs ⇒ mark “DefaultLogGroup” ⇒ create metric filter: { ( ($.eventSource = "iam.amazonaws.com") && (($.eventName = "Add*") || ($.eventName = "Attach*") || ($.eventName = "Change*") || ($.eventName = "Create*") || ($.eventName = "Deactivate*") || ($.eventName = "Delete*") || ($.eventName = "Detach*") || ($.eventName = "Enable*") || ($.eventName = "Put*") || ($.eventName = "Remove*") || ($.eventName = "Set*") || ($.eventName = "Update*") || ($.eventName = "Upload*")) ) } Same can be done for SG, S3 bucket policy etc. Examples
  • 15.
  • 16. Attach IAM Role to an Existing EC2 New! (Feb 2017) Attach the IAM role to an existing EC2 instance that was originally launched without an IAM role / Replace the attached IAM role Create an instance profile aws iam create-instance-profile Add a role to an instance profile aws iam add-role-to-instance-profile List instance profiles aws iam list-instance-profiles aws iam list-instance-profiles-for-role Remove a role from an instance profile aws iam remove-role-from-instance-profile Delete an instance profile aws iam delete-instance-profile
  • 18. Securing (at least) your Bastion Host with MFA 1. Install and launch Google Authenticator sudo yum install google-authenticator –y ⇒ google-authenticator 1. Configure the sshd PAM module to use Google Authenticator: vi /etc/pam.d/sshd Add: auth required pam_google_authenticator.so Comment out: auth substack password-auth 1. Configuring SSH so that Google Authenticator is called as a second factor of authentication vi /etc/ssh/sshd_config change: “ChallengeResponseAuthentication” option to “yes” add: to the bottom of the file: “AuthenticationMethods publickey,keyboard-interactive” 1. Restart SSH daemon sudo /etc/init.d/sshd restart
  • 19. Enable MFA Protection on Your AWS API 1. Author an IAM policy to grant “Allow” access for MFA-authenticated users 1. Using aws:MultiFactorAuthPresent "Sid": "AllowActionsForEC2WhenMFAIsPresent", "Effect":"Allow", "Action":"ec2:RunInstances", "Condition":{ "Bool":{"aws:MultiFactorAuthPresent":"true"} 1. <Demo> Preventing AWS API calls from left open consoles 1. Using aws:MultiFactorAuthAge and Conditions Long-term credentials (IAM user access keys) cannot be used with MFA-protected API access because they don't expire (AWS CLI) !
  • 20. Enable MFA Protection on Your AWS CLI 1. Using temporary session token $ aws sts get-session-token --serial-number arn:aws:iam::AWS-account-number:mfa/user --token- code code-from-token (Optional: --profile user) 1. Edit the AWS CLI credentials file, which defaults to ~/.aws/credentials with returned values: [profile-name] aws_access_key_id = <Access-key-as-in-returned-output> aws_secret_access_key = <Secret-access-key-as-in-returned-output> aws_session_token = <Session-Token-as-in-returned-output> 1. <Demo> ec2 describe-instances only to MFA enabled users using “AWS CLI" 2. Check out AWS Security Blog for very useful guides (an excellent example: How to Record SSH Sessions Established Through a Bastion Host)
  • 21. Inspector / Trusted Advisor (Business Support)
  • 22. AWS Trusted Advisor Security Checks ● Upgrading your Support plan will enable many more security best practices checks
  • 23. AWS Inspector Prerequisites: Create Role ⇒ Tag EC2 instances ⇒ Install AWS agent: curl -O https://d1wk0tztpsntt1.cloudfront.net/linux/latest/install sudo bash install sudo /opt/aws/awsagent/bin/awsagent status Auto install Agent when launching new instance Advanced Details ⇒ User Data #!/bin/bash cd /tmp curl -O https://d1wk0tztpsntt1.cloudfront.net/linux/latest/install chmod +x install
  • 24. AWS Inspector Findings (examples) Security Best Practices-1.0: Finding Instance xxxx is configured to allow users to log in with root credentials over SSH. This increases the likelihood of a successful brute-force attack. Description This rule helps determine whether the SSH daemon is configured to permit logging in to your EC2 instance as root. Recommendation It is recommended that you configure your EC2 instance to prevent root logins over SSH. Instead, log in as a non-root user and use sudo to escalate privileges when necessary. To disable SSH root logins, set PermitRootLogin to "no" in /etc/ssh/sshd_config and restart sshd AWSLabs GitHub links: https://github.com/awslabs/amazon- inspector-agent-autodeploy Lambda job in Python to automatically deploy Inspector agent to newly-launched EC2 instances. https://github.com/awslabs/amazon- inspector-finding-forwarder Lambda script that receives findings from the Amazon Inspector service in AWS, via SNS, and forwards them to a destination email address. https://github.com/awslabs/aws-security- benchmark Collection of resources related to security benchmark currently: CIS AWS Foundations Benchmark 1.1 How to Remediate Amazon Inspector Security Findings Automatically
  • 27. Rules AND / OR Allow, Block or Count Ordered conditions AWS WAF Web ACLs contain rules Rule#1: Block Bad User- Agents IP match Suspicious IPs & String match Bad bots OR Rule#2: Block SQLi SQLi match SQLi checks ELSE Default Action: Allow Conditions IP match Suspicious IPs 192.0.2.0/24 String User-Agent header matches Bad bots SQL injection URI contains SQL injection Recommended Order 1. WhiteListed iPs- Allow 2. BlackListed IPs- Block 3. BlackListedSignat ures- Block 4. SQLInjection- Block 5. SuspiciousActivity- Count Default: Allow
  • 28. AWS WAF Security Automations http://docs.aws.amazon.com/solutions/latest/aws-waf-security-automations/deployment.html Lambda Functions: Log Parser: parses CloudFront access logs to identify suspicious behavior, such as an abnormal amount of requests or errors. It then blocks those IP addresses for a customer-defined period of time. Default Parameters: RequestThreshold:400, ErrorThreshold:50, WAFBlockPeriod:240(min) IP Lists Parser: checks third-party IP reputation lists hourly for new IP ranges to block. These lists include the Spamhaus Don't Route Or Peer (DROP) and Extended Drop (EDROP) lists, the Proofpoint Emerging Threats IP list, and the Tor exit node list. BadBot Parser: intercepts and inspects trap endpoint requests to extract its IP address, and then add it to an AWS WAF block list.
  • 29. AWS ElasticSearch Forensics on logs with AWS ElasticSearch (or your own) Create your Elasticsearch domain Stream all relevant logs (CloudWatch) Create Dashboards by topic Monitor and Investigate
  • 30. Section Slide Template Option 2 Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you. Make the subtitle something clever. People will think it’s neat. Questions?
  • 31. Put your subtitle here. Feel free to pick from the handful of pretty Google colors available to you. Make the subtitle something clever. People will think it’s neat. Thank You! DoiT International Practicing multi-cloud & cloud cyber security since 2010.

Editor's Notes

  1. Before we talk about the next generation stack, let’s look at the principles that underlie it.