SlideShare a Scribd company logo
Agenda
- Introduction
- AWS Shared Responsibility Model
- AWS Data Security
- AWS Servers Security
- AWS Applications Security
- Security Best Practice
1
Cloud Journey 2
Shared Responsibility Model 3
Shared Responsibility Model and service
categories 4
AWS Cloud Adoption Framework Overview 5
6
AWS Security Best Practices Checklist
Amazon Elastic
Compute Cloud
Amazon Relational
Database Service
Amazon Aurora
Amazon
CloudFront
Amazon API
Gateway
AWS Lambda
AWS Lightsail DNS Zone Walking
As of now, the AWS penetration testing policy allows testing of the
following AWS services:
7
Amazon inspector
Amazon Inspector features and benefits
 Enforce security standards and compliance
 Increasing development agility
 Leverage AWS Security expertise
 Integrated with AWS services and AWS partners
Amazon Inspector Components
8
AWS Agent
Assessment
run
Assessmen
t target Findings
Assessmen
t report
Rules
package
9
AWS Shield
AWS Shield features and benefits
 Seamless integration and deployment
 Customizable protection
 Cost efficient
 Quick detection
 Inline attack mitigation
10
AWS Web Application Firewall (WAF)
 Increased protection against web attacks
 Security integrated with how you develop applications
 Ease of deployment and maintenance
 Improved web traffic visibility
 Cost effective web application development
11
Amazon Cognito
12
Amazon API Gateway
 Low cost and efficient
 Flexible security controls
 Run your APIs without servers
 Monitor APIs
AWS Security
Best Practices
Checklist
(IAM)
• Avoid using AWS root account user access keys as it gives
full access to all resources
• Make sure MFA authentication is enabled for the root
account to provide two-factor authentication
• Assign individual IAM users with necessary permissions to
enable login ensure User Accounts also have MFA
authentication
• IAM Access Keys must be rotated at periodic intervals
• Ensure a strong password policy for users
• Assign permissions to users based on User Groups, instead
of individual IAM users
• Provide access to a resource through IAM Roles
• Grant least access while creating IAM Policies, needed to
perform the necessary actions
• Attach IAM Policies to Groups or Roles on creation
• If required, conditions can be defined for Policies under
which access is granted to a resource
• Get rid of unnecessary IAM credentials, those with are
inactive or unused use IAM Roles to grant access to
applications on EC2 Instances
13
AWS Security
Best Practices
Checklist (S3)
•Ensure S3 buckets are not publicly accessible (public read or
write
permissions)
•Make use of object-level or bucket-level permissions in addition
to IAM policies to grant access to resources
•Enable MFA Delete to prevent accidental deletion of buckets
•Consider encryption of stored data, which can be done in two
ways
server-side and client-side encryption
•Enable encryption of inbound and outbound data traffic,
through SSL
endpoints
•Configure S3 lifecycle management through rule-based actions
and
use versioning to store and retrieve multiple versions of an
object in
a bucket, to deal with accidental deletions
•Ensure S3 access logging is enabled
•Constantly audit and monitor S3 buckets using CloudWatch 14
AWS Security
Best Practices
Checklist
(EC2, VPC &
EBS)
•Ensure data and disk volumes in EBS are encrypted with AES-
256, the
industry standard algorithm
•Restrict access to instances from limited IP ranges using Security
Groups
limit the range of open ports on EC2 security groups, to prevent
exposure to vulnerabilities
•Ensure ELBs have a valid security group attached to it
•Monitor and optimize default security groups, as they allow
unrestricted access for inbound and outbound traffic
•Ensure restricted inbound access to SSH, FTP, SMTP, MySQL,
PostgreSQL, MongoDB, MSSQL, CIFS, etc; to required entities
only
•Use IAM roles to grant access to EC2, instead of access keys for
temporary requirements
•If you’re using IAM user access keys for long term permissions,
ensure
that you don’t embed the keys directly into code, generate different
keys for different applications, rotate your access keys, use MFA
authentication and decommission unused key pairs.
•Enable and activate your VPC flow logs to record inbound and
outbound
traffic in your VPC for better monitoring and early diagnosis
•Delete unused Virtual Private Gateways and VPC Internet
Gateways
•Make sure that no VPC endpoints are exposed, by checking the
principal
value in the policy
•Ensure no ACLs allow unrestricted inbound or outbound access
15
AWS Security
Best Practices
Checklist
(CloudTrail)
•Ensure CloudTrail is activated across all regions, and for global
services like IAM, STS, etc
•It is recommended to log to a centralized S3 bucket
•Make sure both CloudTrail itself and CloudTrail logging are
enable
for all regions
•Ensure CloudTrail log file integrity validation is enabled
•Ensure CloudTrail log files are encrypted
16
20
AWS Security Best Practices Checklist
RDS
•Ensure RDS security groups do not allow unrestricted access
•Ensure encryption of the RDS instances and snapshots, using AES-256 level encryption
•Protect data in transit to RDS through SSL endpoints
•Monitor control to RDS using AWS KMS and Customer Managed Keys
•Ensure RDS database instances and snapshots are not publicly accessible
•Enable the auto minor upgrade feature for RDS
21
AWS Security Best Practices Checklist
Redshift “
•Enable require_ssl parameter in all Redshift clusters to minimize risk for encryption of
data in transit for Redshift, and to connect your SQL client with your cluster
•Enable Redshift Cluster encryption
•Ensure Redshift user activity logging is enabled
•Ensure Redshift encryption with KMS Customer Managed Keys
•It is recommended that Redshift clusters are launched within a VPC for better control
•Ensure that the Redshift clusters are not publicly accessible
22
VPC Security Best Practices
•Plan Your VPC before You Create It
•Choose the Highest CIDR Block
•Unique IP Address Range
•Leave the Default VPC Alone
•Design for Region Expansion
•Tier Your Subnets
•Follow the Least Privilege Principle
•Keep Most Resources in the Private Subnet
23
IAM Security Best Practices
•Delete your root access keys
•Enforce MFA
•Use roles instead of users
•Use access advisor periodically
•Develop a Zero Trust Approach to Security
•Automate Onboarding and Offboarding
•User Access review
24
DATA Security Best Practices
•Encryption
•Use KMS
•Rotate your keys
•Classify your data
•Secure data in transit
•S3 bucket permissions
25
Servers Security Best Practices
•Use IAM roles for EC2
•Use ELB
•Security group configuration
•Use Web Application Firewall (WAF)
•Secured access:
•Backup and recovery
•EC2 termination protection
26
Application Security Best Practices
•Use web application firewall
•Amazon Inspector
•Penetration testing
•Utilize AWS security tools
27
Monitoring in AWS
AWS allows you to monitor all your resources in the cloud such as your servers and
your AWS services, along with applications running on these services through its fully
managed monitoring service AWS CloudWatch.
AWS CloudWatch provide
 Metrics
 Dashboards
 Events
 Alarms
 Log monitoring
28
AWS
Well
Architected
Framework
29
AWS
Security
Building
Blocks

More Related Content

What's hot

1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
Alert Logic
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Amazon Web Services
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
Devyani Vaidya
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
Alert Logic
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
Amazon Web Services
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
Amazon Web Services
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
Allen Brokken
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
Amazon Web Services
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
Sai Kesavamatham
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
Amazon Web Services
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
Alert Logic
 
Cloud security
Cloud securityCloud security
Cloud security
François Boucher
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
Lalit Rawat
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
Amazon Web Services
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
Amazon Web Services
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
Amazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
Amazon Web Services
 

What's hot (20)

1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
Govern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for SuccessGovern Your Cloud: The Foundation for Success
Govern Your Cloud: The Foundation for Success
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Cloud security
Cloud securityCloud security
Cloud security
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
AWS Security Best Practices in a Zero Trust Security Model - DEM06 - Atlanta ...
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 

Similar to AWS Security

Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment
Alert Logic
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
Alert Logic
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
Sundeep Roxx
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
Amazon Web Services
 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
Faiza Mehar
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Amazon Web Services
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
Amazon Web Services
 
Advanced security best practices - Masterclass - Pop-up Loft Tel Aviv
Advanced security best practices - Masterclass - Pop-up Loft Tel AvivAdvanced security best practices - Masterclass - Pop-up Loft Tel Aviv
Advanced security best practices - Masterclass - Pop-up Loft Tel Aviv
Amazon Web Services
 
Advanced Security Masterclass - Tel Aviv Loft
Advanced Security Masterclass - Tel Aviv LoftAdvanced Security Masterclass - Tel Aviv Loft
Advanced Security Masterclass - Tel Aviv Loft
Ian Massingham
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
Amazon Web Services
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
Alert Logic
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Amazon Web Services
 
Cloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWS
CloudHesive
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
RightScale
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
Amazon Web Services
 
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
Amazon Web Services
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
Amazon Web Services
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
Faiza Mehar
 

Similar to AWS Security (20)

Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment#ALSummit: Architecting Security into your AWS Environment
#ALSummit: Architecting Security into your AWS Environment
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...CIS Compliance Automations   Eevidence Collection, Security and Compliance Be...
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
Advanced security best practices - Masterclass - Pop-up Loft Tel Aviv
Advanced security best practices - Masterclass - Pop-up Loft Tel AvivAdvanced security best practices - Masterclass - Pop-up Loft Tel Aviv
Advanced security best practices - Masterclass - Pop-up Loft Tel Aviv
 
Advanced Security Masterclass - Tel Aviv Loft
Advanced Security Masterclass - Tel Aviv LoftAdvanced Security Masterclass - Tel Aviv Loft
Advanced Security Masterclass - Tel Aviv Loft
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Managed Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS ApplicationsManaged Threat Detection & Response for AWS Applications
Managed Threat Detection & Response for AWS Applications
 
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
Hackproof Your Gov Cloud: Mitigating Risks for 2017 and Beyond | AWS Public S...
 
Cloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWSCloudifying your Security Operations on AWS
Cloudifying your Security Operations on AWS
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
AWS re:Invent 2016: Hackproof Your Cloud: Responding to 2016 Threats (SAC308)
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 

Recently uploaded

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
wolfsoftcompanyco
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
uehowe
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
Paul Walk
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
uehowe
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
Donato Onofri
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
uehowe
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
Tarandeep Singh
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
3a0sd7z3
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
rtunex8r
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
fovkoyb
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
Toptal Tech
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
ysasp1
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
xjq03c34
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
k4ncd0z
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
davidjhones387
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
3a0sd7z3
 

Recently uploaded (16)

manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaalmanuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
manuaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaal
 
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
办理毕业证(UPenn毕业证)宾夕法尼亚大学毕业证成绩单快速办理
 
Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?Should Repositories Participate in the Fediverse?
Should Repositories Participate in the Fediverse?
 
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
办理毕业证(NYU毕业证)纽约大学毕业证成绩单官方原版办理
 
HijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process HollowingHijackLoader Evolution: Interactive Process Hollowing
HijackLoader Evolution: Interactive Process Hollowing
 
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
留学挂科(UofM毕业证)明尼苏达大学毕业证成绩单复刻办理
 
Bengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal BrandingBengaluru Dreamin' 24 - Personal Branding
Bengaluru Dreamin' 24 - Personal Branding
 
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
快速办理(Vic毕业证书)惠灵顿维多利亚大学毕业证完成信一模一样
 
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
怎么办理(umiami毕业证书)美国迈阿密大学毕业证文凭证书实拍图原版一模一样
 
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
存档可查的(USC毕业证)南加利福尼亚大学毕业证成绩单制做办理
 
Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!Ready to Unlock the Power of Blockchain!
Ready to Unlock the Power of Blockchain!
 
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
成绩单ps(UST毕业证)圣托马斯大学毕业证成绩单快速办理
 
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
办理新西兰奥克兰大学毕业证学位证书范本原版一模一样
 
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理一比一原版(USYD毕业证)悉尼大学毕业证如何办理
一比一原版(USYD毕业证)悉尼大学毕业证如何办理
 
Discover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to IndiaDiscover the benefits of outsourcing SEO to India
Discover the benefits of outsourcing SEO to India
 
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
快速办理(新加坡SMU毕业证书)新加坡管理大学毕业证文凭证书一模一样
 

AWS Security

  • 1. Agenda - Introduction - AWS Shared Responsibility Model - AWS Data Security - AWS Servers Security - AWS Applications Security - Security Best Practice 1
  • 4. Shared Responsibility Model and service categories 4
  • 5. AWS Cloud Adoption Framework Overview 5
  • 6. 6 AWS Security Best Practices Checklist Amazon Elastic Compute Cloud Amazon Relational Database Service Amazon Aurora Amazon CloudFront Amazon API Gateway AWS Lambda AWS Lightsail DNS Zone Walking As of now, the AWS penetration testing policy allows testing of the following AWS services:
  • 7. 7 Amazon inspector Amazon Inspector features and benefits  Enforce security standards and compliance  Increasing development agility  Leverage AWS Security expertise  Integrated with AWS services and AWS partners
  • 8. Amazon Inspector Components 8 AWS Agent Assessment run Assessmen t target Findings Assessmen t report Rules package
  • 9. 9 AWS Shield AWS Shield features and benefits  Seamless integration and deployment  Customizable protection  Cost efficient  Quick detection  Inline attack mitigation
  • 10. 10 AWS Web Application Firewall (WAF)  Increased protection against web attacks  Security integrated with how you develop applications  Ease of deployment and maintenance  Improved web traffic visibility  Cost effective web application development
  • 12. 12 Amazon API Gateway  Low cost and efficient  Flexible security controls  Run your APIs without servers  Monitor APIs
  • 13. AWS Security Best Practices Checklist (IAM) • Avoid using AWS root account user access keys as it gives full access to all resources • Make sure MFA authentication is enabled for the root account to provide two-factor authentication • Assign individual IAM users with necessary permissions to enable login ensure User Accounts also have MFA authentication • IAM Access Keys must be rotated at periodic intervals • Ensure a strong password policy for users • Assign permissions to users based on User Groups, instead of individual IAM users • Provide access to a resource through IAM Roles • Grant least access while creating IAM Policies, needed to perform the necessary actions • Attach IAM Policies to Groups or Roles on creation • If required, conditions can be defined for Policies under which access is granted to a resource • Get rid of unnecessary IAM credentials, those with are inactive or unused use IAM Roles to grant access to applications on EC2 Instances 13
  • 14. AWS Security Best Practices Checklist (S3) •Ensure S3 buckets are not publicly accessible (public read or write permissions) •Make use of object-level or bucket-level permissions in addition to IAM policies to grant access to resources •Enable MFA Delete to prevent accidental deletion of buckets •Consider encryption of stored data, which can be done in two ways server-side and client-side encryption •Enable encryption of inbound and outbound data traffic, through SSL endpoints •Configure S3 lifecycle management through rule-based actions and use versioning to store and retrieve multiple versions of an object in a bucket, to deal with accidental deletions •Ensure S3 access logging is enabled •Constantly audit and monitor S3 buckets using CloudWatch 14
  • 15. AWS Security Best Practices Checklist (EC2, VPC & EBS) •Ensure data and disk volumes in EBS are encrypted with AES- 256, the industry standard algorithm •Restrict access to instances from limited IP ranges using Security Groups limit the range of open ports on EC2 security groups, to prevent exposure to vulnerabilities •Ensure ELBs have a valid security group attached to it •Monitor and optimize default security groups, as they allow unrestricted access for inbound and outbound traffic •Ensure restricted inbound access to SSH, FTP, SMTP, MySQL, PostgreSQL, MongoDB, MSSQL, CIFS, etc; to required entities only •Use IAM roles to grant access to EC2, instead of access keys for temporary requirements •If you’re using IAM user access keys for long term permissions, ensure that you don’t embed the keys directly into code, generate different keys for different applications, rotate your access keys, use MFA authentication and decommission unused key pairs. •Enable and activate your VPC flow logs to record inbound and outbound traffic in your VPC for better monitoring and early diagnosis •Delete unused Virtual Private Gateways and VPC Internet Gateways •Make sure that no VPC endpoints are exposed, by checking the principal value in the policy •Ensure no ACLs allow unrestricted inbound or outbound access 15
  • 16. AWS Security Best Practices Checklist (CloudTrail) •Ensure CloudTrail is activated across all regions, and for global services like IAM, STS, etc •It is recommended to log to a centralized S3 bucket •Make sure both CloudTrail itself and CloudTrail logging are enable for all regions •Ensure CloudTrail log file integrity validation is enabled •Ensure CloudTrail log files are encrypted 16
  • 17. 20 AWS Security Best Practices Checklist RDS •Ensure RDS security groups do not allow unrestricted access •Ensure encryption of the RDS instances and snapshots, using AES-256 level encryption •Protect data in transit to RDS through SSL endpoints •Monitor control to RDS using AWS KMS and Customer Managed Keys •Ensure RDS database instances and snapshots are not publicly accessible •Enable the auto minor upgrade feature for RDS
  • 18. 21 AWS Security Best Practices Checklist Redshift “ •Enable require_ssl parameter in all Redshift clusters to minimize risk for encryption of data in transit for Redshift, and to connect your SQL client with your cluster •Enable Redshift Cluster encryption •Ensure Redshift user activity logging is enabled •Ensure Redshift encryption with KMS Customer Managed Keys •It is recommended that Redshift clusters are launched within a VPC for better control •Ensure that the Redshift clusters are not publicly accessible
  • 19. 22 VPC Security Best Practices •Plan Your VPC before You Create It •Choose the Highest CIDR Block •Unique IP Address Range •Leave the Default VPC Alone •Design for Region Expansion •Tier Your Subnets •Follow the Least Privilege Principle •Keep Most Resources in the Private Subnet
  • 20. 23 IAM Security Best Practices •Delete your root access keys •Enforce MFA •Use roles instead of users •Use access advisor periodically •Develop a Zero Trust Approach to Security •Automate Onboarding and Offboarding •User Access review
  • 21. 24 DATA Security Best Practices •Encryption •Use KMS •Rotate your keys •Classify your data •Secure data in transit •S3 bucket permissions
  • 22. 25 Servers Security Best Practices •Use IAM roles for EC2 •Use ELB •Security group configuration •Use Web Application Firewall (WAF) •Secured access: •Backup and recovery •EC2 termination protection
  • 23. 26 Application Security Best Practices •Use web application firewall •Amazon Inspector •Penetration testing •Utilize AWS security tools
  • 24. 27 Monitoring in AWS AWS allows you to monitor all your resources in the cloud such as your servers and your AWS services, along with applications running on these services through its fully managed monitoring service AWS CloudWatch. AWS CloudWatch provide  Metrics  Dashboards  Events  Alarms  Log monitoring