SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Security Best Practices
Vasily Pantyukhin, AWS Solutions Architect
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Is Easy…
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
It is the goal of every security organization
to build a system that, over time,
maximizes the delivered customer value
while minimizing the cost of that delivery.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The most vulnerable part of the SYSTEM…
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“The gradual process through which
unacceptable practice or standards become
acceptable. As the deviant behavior is repeated
without catastrophic results, it becomes the
social norm for the organization.”
Normalization of deviance
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
We can not patch our brain
https://www.kisspng.com/png-human-brain-cerebrum-spinal-cord-central-nervous-s-666789
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
"Good intentions never work, you need good
mechanisms to make anything happen"
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Some
Lots
Many
Then
N
ow
Soon
Automation
Features vs support
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Least Privilege = Maximum Effort
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Prevention
Analysis Response
Detection
Preventing BAD things happening ->
preventing GOOD things happening
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Prevention
Analysis Response
Detection
Shift focus to detective controls
cheaper to implement and don’t block innovation
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Anti-Patterns
M i s t a k e s t o A v o i d
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Anti-Pattern: A common response to a recurring problem
that is usually ineffective and risks being highly counterproductive
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
InfoSec Auditing
Four Types of Security Anti-Patterns
Account Structure Network Design Software Delivery
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
InfoSec Auditing
Four Types of Security Anti-Patterns
Account Structure Network Design Software Delivery
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Root login: one person’s inbox
• Root MFA: that person’s mobile phone
• Risk: What if they leave the company?
• Only root can edit this. AWS cannot.
Anti-Pattern: Personally Owned AWS Accounts
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Root email: team distribution list address
• Root MFA: hardware device, in office safe
• Contact info: company street address
• Phone number: company main number
• No one logs into account root! Use IAM only!
Best Practice: Group Contacts on All Accounts
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Anti-Pattern: AWS Account Overcrowding
Database Team 7Personalization
Team
Privileged Admin Analytics Team 1
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Analytics Team 1
Database Team 7
Personalization
Team
User Profiles Ops
Team
Capital Markets
UX Team
New App Dev
Team
DevSecOpsTeam
Random
Developer
Random
Contractor
Privileged Admin
BU Architect
Anti-Pattern: AWS Account Overcrowding
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Risk: Ambiguous Security Boundaries
Analytics Team 1
Database Team 7
Personalization
Team
User Profiles Ops
Team
Capital Markets
UX Team
New App Dev
Team
DevSecOpsTeam
Random
Developer
Random
Contractor
Privileged Admin
BU Architect
?
? ?
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Multi-Account Strategy: AWS Account is the single family home
Analytics Team 1 Database Team 7
DevOps Team
Capital
Markets UX
Team
New App Dev
Team
DevOpsTeam
Random
Contractor
SecOps
Auditor
BU Architect
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Full Accountability: SecOps overlay across accounts
Capital Markets
UX Team
Portfolio API
Team
Monitoring AuthN,
AuthZ
Data
Protection
MonitoringAuthN,
AuthZ
Data
Protection
SecOps Team
Detective
Controls
Preventative
Controls
Directive
Controls
Service Integrations
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Object Oriented Design: Each Biz Capability Team is a
Separate Object
Capital Markets
UX Team
Portfolio API
Team
Monitoring AuthN,
AuthZ
Data
Protection
MonitoringAuthN,
AuthZ
Data
Protection
REST API calls
Service Integrations
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
InfoSec Auditing
Four Types of Security Anti-Patterns
Account Structure Software DeliveryNetwork Design
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Routing is not security
• Dynamic IP whack-a-mole
• Doesn’t identify end users
• Not defense in depth
• Not highly scalable
Anti-Pattern: Trusted IP Access w/o Client Auth
HTTP (80) ALLOW 88.44.21.148
HTTP (80) ALLOW 64.23.0.0/16
HTTP (80) ALLOW 204.172.63.12
HTTP (80) ALLOW 183.62.242.71
Backend network
DMZ network
Backend Core Services
VPN 1
… and so many more …
VPN 2
Private Route 3
Private NAT 4
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Design your web services to be publically
addressable, even if they’re not
• Especially for core services
• Highly scalable and auditable
• Defense in depth: stacked edge services
Best Practice: Implement AuthN and AuthZ
Amazon API Gateway
Amazon EC2
IAM Auth, Cert, or Custom Auth
AWS Lambda
AWS Shield
Amazon S3
bucket
Amazon
DynamoDB
Core Shared Resources
AWS CloudTrail
AWS API Calls
AWS
Service
Integration
AWS service Integrations
AWS VPC Endpoints
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Four Types of Security Anti-Patterns
Account Structure Network Design Software DeliveryInfoSec Auditing
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• How you audit yourself
• Manual technical audits
• Not highly scalable
• Inconsistent process
• Typically reactive
Anti-Pattern: Manual Technical Auditing
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevSecOps: security as code:
• Proactive controls enforced by code
• Continuous evidence-based auditing
Continuous detective controls:
• Amazon CloudWatch Logs + Alarms
• Amazon Inspector for EC2
• Amazon Macie for Amazon S3
• AWS Trusted Advisor
• AWS Config rules
• Cloud Conformity
• Cloud Custodian
• evident.io
• Dome9
• cfn-nag
• …and many more!
Best Practice: Continuous Automated Auditing
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
import boto3
ec2 = boto3.client('ec2')
regions = ec2.describe_regions()
# Lambda invoked by a CloudWatch Scheduled Event
def handler(event, context):
# scan each AWS region
for reg in regions['Regions']:
# check each RDS instance in region
rds = boto3.client('rds', 
region_name = reg['RegionName'])
try:
dbis = rds.describe_db_instances()['DBInstances']
for dbi in dbis:
print '{} {} {}'.format(
reg['RegionName'],
dbi['DBInstanceIdentifier'],
dbi['StorageEncrypted'])
# react if database StorageEncrypted is False
• (Python example)
• Can be serverless
• Can be continuous
• Can log the results
• Can send alerts
• Can remediate
• No DB connection
• AWS Config rule:
RDS_STORAGE_ENCRYPTED
Example: Amazon RDS At-Rest Encryption Audit
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The IKEA effect
We love it
more when we
do it ourselves
https://www.digitalsurgeons.com/thoughts/creative/the-ikea-effect-on-creatives/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Anti-Pattern: Not Using AWS Native-Managed Services
DevOps Team A DevOps Team B DevOps Team C DevOps Team D
Methodology sprawl: audit complications + patch drift
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Consistency and Compliance from AWS-Managed Services
DevOps Team A DevOps Team B DevOps Team C DevOps Team D
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• AWS Auditor Learning Path
• AWS Tech Essentials
• Goal: DevSecOps
Best Practice: Train Your Technical Auditors
https://docs.aws.amazon.com/general/latest/gr/aws-security-audit-guide.html
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
InfoSec Auditing
Four Types of Security Anti-Patterns
Account Structure Network Design Software Delivery
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Development QA
Operations
Architecture
Anti-Pattern: Over-the-Wall Software Delivery
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevOps: Small Interdisciplinary Delivery Teams
Development QA
Operations
DevOps
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevOps Delivery: SDLC (Software Development Lifecycle)
Development QA
Operations
Automated
Delivery
Automated Tests
Automated
Deployment
Automated
Monitoring
Change
Request
Develop
DevOps
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DevOps Quality: Fanatical Testing and Automation
Development QA
Operations
Automated
Delivery
Automated Tests
Automated
Deployment
Automated
Monitoring
Change
Request
Develop
DevOps
UI
Tests
Integration Tests
Unit Tests
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Critical Practice: SSDLC (Secure Software Development Lifecycle)
Development QA
Operations
UI
Tests
Security
Tests
Code Review
Integration Tests
Unit Tests, Static Analysis
Automated
Delivery
Automated Tests
Code Review
Automated
Deployment
Automated
Monitoring
Change
Request
Develop
DevSecOps
Test results
Deployment logs
Deployment notifications
Audit Trails and Artifacts
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: DevSecOps Pipeline on AWS
Commit Build Test Approve Production
AWS CodePipeline
AWS CodeCommit
private git repo
AWS CloudFormation Amazon SNS
Review Dashboard
Amazon EC2Unit
Tests
Acceptance
Tests
AWS CodeDeploy
Amazon EC2
SecOps Monitoring
and Alerts
AWS CodeBuild
Developers
commit app
code
Security
Tests
Code
scanning
Amazon S3
Build artifact
Change Review
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Security Solutions
T o o l s t o u s e
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Identity & Access
Management (IAM)
AWS Directory Service
AWS Organizations
AWS Secrets Manager
AWS Single Sign-On
Amazon Cognito
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
AWS Systems
Manager
AWS Shield
AWS WAF – Web
application firewall
AWS Firewall Manager
Amazon Inspector
Amazon Virtual
Private Cloud (VPC)
AWS Key
Management Service
(KMS)
AWS CloudHSM
Amazon Macie
AWS Certificate
Manager
Server-Side
Encryption
AWS Config Rules
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS Security Solutions
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Identity and Access Management (IAM)
Securely control access to AWS services and resources
AWS Directory Service
Managed Microsoft Active Directory in the AWS Cloud
AWS Organizations
Policy-based management for multiple AWS accounts
AWS Secrets Manager
Easily rotate, manage, and retrieve database credentials, API keys,
and other secrets through their lifecycle
AWS Single Sign-On
Centrally manage single sign-on (SSO) access to multiple AWS
accounts and business applications
Amazon Cognito
Add user sign-up, sign-in, and access control to your web
and mobile apps
Define, enforce, and audit
user permissions across
AWS services, actions
and resources.
Identity & access
management
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon CloudWatch
Monitor AWS Cloud resources and your applications on AWS to
collect metrics, monitor log files, set alarms, and automatically
react to changes
VPC Flow Logs
Capture information about the IP traffic going to and from network
interfaces in your VPC. Flow log data is stored using Amazon
CloudWatch Logs
AWS CloudTrail
Enable governance, compliance, and operational/risk auditing of your
AWS account
AWS Config
Record and evaluate configurations of your AWS resources. Enable
compliance auditing, security analysis, resource change tracking, and
troubleshooting
Amazon GuardDuty
Intelligent threat detection and continuous monitoring to protect
your AWS accounts and workloads
Gain the visibility you need
to spot issues before they
impact the business, improve
your security posture, and
reduce the risk profile of
your environment.
Detective
control
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon Virtual Private Cloud (VPC)
Provision a logically isolated section of AWS where you can launch AWS
resources in a virtual network that you define
AWS Systems Manager
Easily configure and manage Amazon EC2 and on-premises systems to
apply OS patches, create secure system images, and configure secure
operating systems
AWS Shield
Managed DDoS protection service that safeguards web applications
running on AWS
AWS WAF – Web application firewall
Protects your web applications from common web exploits ensuring
availability and security
AWS Firewall Manager
Centrally configure and manage AWS WAF rules across accounts and
applications
Amazon Inspector
Automates security assessments to help improve the security and
compliance of applications deployed on AWS
Reduce surface area to manage
and increase privacy for and
control of your overall
infrastructure on AWS.
Infrastructure
security
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Certificate Manager
Easily provision, manage, and deploy SSL/TLS certificates for use
with AWS services
AWS Key Management Service (KMS)
Easily create and control the keys used to encrypt your data
AWS CloudHSM
Managed hardware security module (HSM) on the AWS Cloud
Server-Side Encryption
Flexible data encryption options using AWS service managed keys,
AWS managed keys via AWS KMS, or customer managed keys
Amazon Macie
Machine learning-powered security service to discover, classify, and
protect sensitive data
In addition to our automatic
data encryption and
management services,
employ more features for
data protection.
(including data management, data
security, and encryption key storage)
Data
protection
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config Rules
Create rules that automatically take action in response to changes in your
environment, such as isolating resources, enriching events with additional
data, or restoring configuration to a known-good state
AWS Lambda
Use our serverless compute service to run code without provisioning or
managing servers so you can scale your programmed, automated
response to incidents
During an incident, containing
the event and returning to a
known good state are important
elements of a response plan.
AWS provides the following
tools to automate aspects of
this best practice.
Incident
response
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
Well-architected - Security Pillar
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you !
V a s i l y P a n t y u k h i n
S o l u t i o n s A r c h i t e c t A W S

More Related Content

What's hot

What's hot (20)

Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
 
How to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startupsHow to implement DevSecOps on AWS for startups
How to implement DevSecOps on AWS for startups
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your Firewall
 
Incident Response - Eyes Everywhere
Incident Response - Eyes EverywhereIncident Response - Eyes Everywhere
Incident Response - Eyes Everywhere
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
The Perimeter is Dead. Long Live the Perimeters. (SEC312-S) - AWS re:Invent 2018
 
Automating Incident Response and Forensics
Automating Incident Response and ForensicsAutomating Incident Response and Forensics
Automating Incident Response and Forensics
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
 
Advanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web ApplicationsAdvanced Techniques for Securing Web Applications
Advanced Techniques for Securing Web Applications
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Best Practices for Securing Serverless Applications (SEC362-R1) - AWS re:Inve...
Best Practices for Securing Serverless Applications (SEC362-R1) - AWS re:Inve...Best Practices for Securing Serverless Applications (SEC362-R1) - AWS re:Inve...
Best Practices for Securing Serverless Applications (SEC362-R1) - AWS re:Inve...
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
Find All the Threats: AWS Threat Detection and Remediation (SEC331) - AWS re:...
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWS
 
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
The 1%: Identity and Governance Patterns From the Most Advanced AWS Customers...
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 

Similar to AWS Security Best Practices

Similar to AWS Security Best Practices (20)

Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018Landing Zones Creating a Foundation - AWS Summit Sydney 2018
Landing Zones Creating a Foundation - AWS Summit Sydney 2018
 
Five New Security Automations Using AWS Security Services & Open Source (SEC4...
Five New Security Automations Using AWS Security Services & Open Source (SEC4...Five New Security Automations Using AWS Security Services & Open Source (SEC4...
Five New Security Automations Using AWS Security Services & Open Source (SEC4...
 
Landing zones: Creating a Foundation for Your AWS Migrations
Landing zones: Creating a Foundation for Your AWS MigrationsLanding zones: Creating a Foundation for Your AWS Migrations
Landing zones: Creating a Foundation for Your AWS Migrations
 
So You Want to be Well-Architected?
So You Want to be Well-Architected?So You Want to be Well-Architected?
So You Want to be Well-Architected?
 
Retail Marketing with Machine Learning & Amazon Rekognition (RET205) - AWS re...
Retail Marketing with Machine Learning & Amazon Rekognition (RET205) - AWS re...Retail Marketing with Machine Learning & Amazon Rekognition (RET205) - AWS re...
Retail Marketing with Machine Learning & Amazon Rekognition (RET205) - AWS re...
 
Your road to a Well Architected solution in the Cloud - Tel Aviv Summit 2018
Your road to a Well Architected solution in the Cloud - Tel Aviv Summit 2018Your road to a Well Architected solution in the Cloud - Tel Aviv Summit 2018
Your road to a Well Architected solution in the Cloud - Tel Aviv Summit 2018
 
Operating at Scale- Preparing for the Journey [Portuguese]
Operating at Scale- Preparing for the Journey [Portuguese]Operating at Scale- Preparing for the Journey [Portuguese]
Operating at Scale- Preparing for the Journey [Portuguese]
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best PracticesSecurity Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Security Framework Shakedown
Security Framework ShakedownSecurity Framework Shakedown
Security Framework Shakedown
 
Serverless and DevOps
Serverless and DevOpsServerless and DevOps
Serverless and DevOps
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
Moving to DevOps the Amazon Way (DEV210-R1) - AWS re:Invent 2018
 
Are you Well-Architected?
Are you Well-Architected?Are you Well-Architected?
Are you Well-Architected?
 
GPSTEC310_IAM Best Practices and Becoming an IAM Ninja
GPSTEC310_IAM Best Practices and Becoming an IAM NinjaGPSTEC310_IAM Best Practices and Becoming an IAM Ninja
GPSTEC310_IAM Best Practices and Becoming an IAM Ninja
 
Operating at Scale: Preparing for the Journey
Operating at Scale: Preparing for the JourneyOperating at Scale: Preparing for the Journey
Operating at Scale: Preparing for the Journey
 
Launching applications the Amazon Way
Launching applications the Amazon WayLaunching applications the Amazon Way
Launching applications the Amazon Way
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 

More from Aleksandr Maklakov

More from Aleksandr Maklakov (13)

GraphQL backend with AWS AppSync & AWS Lambda
GraphQL backend with AWS AppSync & AWS LambdaGraphQL backend with AWS AppSync & AWS Lambda
GraphQL backend with AWS AppSync & AWS Lambda
 
AWS Certification from scratch
AWS Certification from scratchAWS Certification from scratch
AWS Certification from scratch
 
Chronicle of ReInvent 2019
Chronicle of ReInvent 2019Chronicle of ReInvent 2019
Chronicle of ReInvent 2019
 
How to stop dreaming about security and start implementing
How to stop dreaming about security and start implementingHow to stop dreaming about security and start implementing
How to stop dreaming about security and start implementing
 
Secure perimeter with AWS workspaces
Secure perimeter with  AWS workspacesSecure perimeter with  AWS workspaces
Secure perimeter with AWS workspaces
 
Going Serverless on AWS
Going Serverless on AWSGoing Serverless on AWS
Going Serverless on AWS
 
AWS Container services
AWS Container servicesAWS Container services
AWS Container services
 
AWS CloudFront
AWS CloudFrontAWS CloudFront
AWS CloudFront
 
HOW TO DRONE.IO IN CI/CD WORLD
HOW TO DRONE.IO IN CI/CD WORLDHOW TO DRONE.IO IN CI/CD WORLD
HOW TO DRONE.IO IN CI/CD WORLD
 
Amazon EC2 container service
Amazon EC2 container serviceAmazon EC2 container service
Amazon EC2 container service
 
Continuous operations in AWS
Continuous operations in AWSContinuous operations in AWS
Continuous operations in AWS
 
Architecture of NoSQL distributed clusters on AWS
Architecture of NoSQL distributed clusters on AWSArchitecture of NoSQL distributed clusters on AWS
Architecture of NoSQL distributed clusters on AWS
 
Managing users and aws accounts
Managing users and aws accountsManaging users and aws accounts
Managing users and aws accounts
 

Recently uploaded

Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Peter Udo Diehl
 

Recently uploaded (20)

Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdfSmart TV Buyer Insights Survey 2024 by 91mobiles.pdf
Smart TV Buyer Insights Survey 2024 by 91mobiles.pdf
 
Ransomware Mallox [EN].pdf
Ransomware         Mallox       [EN].pdfRansomware         Mallox       [EN].pdf
Ransomware Mallox [EN].pdf
 
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo DiehlFuture Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
Future Visions: Predictions to Guide and Time Tech Innovation, Peter Udo Diehl
 
Quantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIsQuantum Computing: Current Landscape and the Future Role of APIs
Quantum Computing: Current Landscape and the Future Role of APIs
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»НАДІЯ ФЕДЮШКО БАЦ  «Професійне зростання QA спеціаліста»
НАДІЯ ФЕДЮШКО БАЦ «Професійне зростання QA спеціаліста»
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...КАТЕРИНА АБЗЯТОВА  «Ефективне планування тестування  ключові аспекти та практ...
КАТЕРИНА АБЗЯТОВА «Ефективне планування тестування ключові аспекти та практ...
 
Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...Designing Great Products: The Power of Design and Leadership by Chief Designe...
Designing Great Products: The Power of Design and Leadership by Chief Designe...
 
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Elevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object CalisthenicsElevating Tactical DDD Patterns Through Object Calisthenics
Elevating Tactical DDD Patterns Through Object Calisthenics
 
PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)PHP Frameworks: I want to break free (IPC Berlin 2024)
PHP Frameworks: I want to break free (IPC Berlin 2024)
 
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdfFIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
FIDO Alliance Osaka Seminar: Passkeys and the Road Ahead.pdf
 
The Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and SalesThe Art of the Pitch: WordPress Relationships and Sales
The Art of the Pitch: WordPress Relationships and Sales
 
The Future of Platform Engineering
The Future of Platform EngineeringThe Future of Platform Engineering
The Future of Platform Engineering
 
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
From Siloed Products to Connected Ecosystem: Building a Sustainable and Scala...
 

AWS Security Best Practices

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Security Best Practices Vasily Pantyukhin, AWS Solutions Architect
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Is Easy…
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. It is the goal of every security organization to build a system that, over time, maximizes the delivered customer value while minimizing the cost of that delivery.
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The most vulnerable part of the SYSTEM…
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “The gradual process through which unacceptable practice or standards become acceptable. As the deviant behavior is repeated without catastrophic results, it becomes the social norm for the organization.” Normalization of deviance
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. We can not patch our brain https://www.kisspng.com/png-human-brain-cerebrum-spinal-cord-central-nervous-s-666789
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. "Good intentions never work, you need good mechanisms to make anything happen"
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Some Lots Many Then N ow Soon Automation Features vs support
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Least Privilege = Maximum Effort
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Prevention Analysis Response Detection Preventing BAD things happening -> preventing GOOD things happening
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Prevention Analysis Response Detection Shift focus to detective controls cheaper to implement and don’t block innovation
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Anti-Patterns M i s t a k e s t o A v o i d
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Anti-Pattern: A common response to a recurring problem that is usually ineffective and risks being highly counterproductive
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. InfoSec Auditing Four Types of Security Anti-Patterns Account Structure Network Design Software Delivery
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. InfoSec Auditing Four Types of Security Anti-Patterns Account Structure Network Design Software Delivery
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Root login: one person’s inbox • Root MFA: that person’s mobile phone • Risk: What if they leave the company? • Only root can edit this. AWS cannot. Anti-Pattern: Personally Owned AWS Accounts
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Root email: team distribution list address • Root MFA: hardware device, in office safe • Contact info: company street address • Phone number: company main number • No one logs into account root! Use IAM only! Best Practice: Group Contacts on All Accounts
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Anti-Pattern: AWS Account Overcrowding Database Team 7Personalization Team Privileged Admin Analytics Team 1
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Analytics Team 1 Database Team 7 Personalization Team User Profiles Ops Team Capital Markets UX Team New App Dev Team DevSecOpsTeam Random Developer Random Contractor Privileged Admin BU Architect Anti-Pattern: AWS Account Overcrowding
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Risk: Ambiguous Security Boundaries Analytics Team 1 Database Team 7 Personalization Team User Profiles Ops Team Capital Markets UX Team New App Dev Team DevSecOpsTeam Random Developer Random Contractor Privileged Admin BU Architect ? ? ?
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Multi-Account Strategy: AWS Account is the single family home Analytics Team 1 Database Team 7 DevOps Team Capital Markets UX Team New App Dev Team DevOpsTeam Random Contractor SecOps Auditor BU Architect
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Full Accountability: SecOps overlay across accounts Capital Markets UX Team Portfolio API Team Monitoring AuthN, AuthZ Data Protection MonitoringAuthN, AuthZ Data Protection SecOps Team Detective Controls Preventative Controls Directive Controls Service Integrations
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Object Oriented Design: Each Biz Capability Team is a Separate Object Capital Markets UX Team Portfolio API Team Monitoring AuthN, AuthZ Data Protection MonitoringAuthN, AuthZ Data Protection REST API calls Service Integrations
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. InfoSec Auditing Four Types of Security Anti-Patterns Account Structure Software DeliveryNetwork Design
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Routing is not security • Dynamic IP whack-a-mole • Doesn’t identify end users • Not defense in depth • Not highly scalable Anti-Pattern: Trusted IP Access w/o Client Auth HTTP (80) ALLOW 88.44.21.148 HTTP (80) ALLOW 64.23.0.0/16 HTTP (80) ALLOW 204.172.63.12 HTTP (80) ALLOW 183.62.242.71 Backend network DMZ network Backend Core Services VPN 1 … and so many more … VPN 2 Private Route 3 Private NAT 4
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Design your web services to be publically addressable, even if they’re not • Especially for core services • Highly scalable and auditable • Defense in depth: stacked edge services Best Practice: Implement AuthN and AuthZ Amazon API Gateway Amazon EC2 IAM Auth, Cert, or Custom Auth AWS Lambda AWS Shield Amazon S3 bucket Amazon DynamoDB Core Shared Resources AWS CloudTrail AWS API Calls AWS Service Integration AWS service Integrations AWS VPC Endpoints
  • 29. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Four Types of Security Anti-Patterns Account Structure Network Design Software DeliveryInfoSec Auditing
  • 30. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • How you audit yourself • Manual technical audits • Not highly scalable • Inconsistent process • Typically reactive Anti-Pattern: Manual Technical Auditing
  • 31. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevSecOps: security as code: • Proactive controls enforced by code • Continuous evidence-based auditing Continuous detective controls: • Amazon CloudWatch Logs + Alarms • Amazon Inspector for EC2 • Amazon Macie for Amazon S3 • AWS Trusted Advisor • AWS Config rules • Cloud Conformity • Cloud Custodian • evident.io • Dome9 • cfn-nag • …and many more! Best Practice: Continuous Automated Auditing
  • 32. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. import boto3 ec2 = boto3.client('ec2') regions = ec2.describe_regions() # Lambda invoked by a CloudWatch Scheduled Event def handler(event, context): # scan each AWS region for reg in regions['Regions']: # check each RDS instance in region rds = boto3.client('rds', region_name = reg['RegionName']) try: dbis = rds.describe_db_instances()['DBInstances'] for dbi in dbis: print '{} {} {}'.format( reg['RegionName'], dbi['DBInstanceIdentifier'], dbi['StorageEncrypted']) # react if database StorageEncrypted is False • (Python example) • Can be serverless • Can be continuous • Can log the results • Can send alerts • Can remediate • No DB connection • AWS Config rule: RDS_STORAGE_ENCRYPTED Example: Amazon RDS At-Rest Encryption Audit
  • 33. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The IKEA effect We love it more when we do it ourselves https://www.digitalsurgeons.com/thoughts/creative/the-ikea-effect-on-creatives/
  • 34. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Anti-Pattern: Not Using AWS Native-Managed Services DevOps Team A DevOps Team B DevOps Team C DevOps Team D Methodology sprawl: audit complications + patch drift
  • 35. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Consistency and Compliance from AWS-Managed Services DevOps Team A DevOps Team B DevOps Team C DevOps Team D
  • 36. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • AWS Auditor Learning Path • AWS Tech Essentials • Goal: DevSecOps Best Practice: Train Your Technical Auditors https://docs.aws.amazon.com/general/latest/gr/aws-security-audit-guide.html
  • 37. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. InfoSec Auditing Four Types of Security Anti-Patterns Account Structure Network Design Software Delivery
  • 38. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Development QA Operations Architecture Anti-Pattern: Over-the-Wall Software Delivery
  • 39. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevOps: Small Interdisciplinary Delivery Teams Development QA Operations DevOps
  • 40. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevOps Delivery: SDLC (Software Development Lifecycle) Development QA Operations Automated Delivery Automated Tests Automated Deployment Automated Monitoring Change Request Develop DevOps
  • 41. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevOps Quality: Fanatical Testing and Automation Development QA Operations Automated Delivery Automated Tests Automated Deployment Automated Monitoring Change Request Develop DevOps UI Tests Integration Tests Unit Tests
  • 42. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Critical Practice: SSDLC (Secure Software Development Lifecycle) Development QA Operations UI Tests Security Tests Code Review Integration Tests Unit Tests, Static Analysis Automated Delivery Automated Tests Code Review Automated Deployment Automated Monitoring Change Request Develop DevSecOps Test results Deployment logs Deployment notifications Audit Trails and Artifacts
  • 43. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Example: DevSecOps Pipeline on AWS Commit Build Test Approve Production AWS CodePipeline AWS CodeCommit private git repo AWS CloudFormation Amazon SNS Review Dashboard Amazon EC2Unit Tests Acceptance Tests AWS CodeDeploy Amazon EC2 SecOps Monitoring and Alerts AWS CodeBuild Developers commit app code Security Tests Code scanning Amazon S3 Build artifact Change Review
  • 44. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Security Solutions T o o l s t o u s e
  • 45. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Identity & Access Management (IAM) AWS Directory Service AWS Organizations AWS Secrets Manager AWS Single Sign-On Amazon Cognito AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs AWS Systems Manager AWS Shield AWS WAF – Web application firewall AWS Firewall Manager Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service (KMS) AWS CloudHSM Amazon Macie AWS Certificate Manager Server-Side Encryption AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection AWS Security Solutions
  • 46. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Identity and Access Management (IAM) Securely control access to AWS services and resources AWS Directory Service Managed Microsoft Active Directory in the AWS Cloud AWS Organizations Policy-based management for multiple AWS accounts AWS Secrets Manager Easily rotate, manage, and retrieve database credentials, API keys, and other secrets through their lifecycle AWS Single Sign-On Centrally manage single sign-on (SSO) access to multiple AWS accounts and business applications Amazon Cognito Add user sign-up, sign-in, and access control to your web and mobile apps Define, enforce, and audit user permissions across AWS services, actions and resources. Identity & access management
  • 47. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudWatch Monitor AWS Cloud resources and your applications on AWS to collect metrics, monitor log files, set alarms, and automatically react to changes VPC Flow Logs Capture information about the IP traffic going to and from network interfaces in your VPC. Flow log data is stored using Amazon CloudWatch Logs AWS CloudTrail Enable governance, compliance, and operational/risk auditing of your AWS account AWS Config Record and evaluate configurations of your AWS resources. Enable compliance auditing, security analysis, resource change tracking, and troubleshooting Amazon GuardDuty Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads Gain the visibility you need to spot issues before they impact the business, improve your security posture, and reduce the risk profile of your environment. Detective control
  • 48. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon Virtual Private Cloud (VPC) Provision a logically isolated section of AWS where you can launch AWS resources in a virtual network that you define AWS Systems Manager Easily configure and manage Amazon EC2 and on-premises systems to apply OS patches, create secure system images, and configure secure operating systems AWS Shield Managed DDoS protection service that safeguards web applications running on AWS AWS WAF – Web application firewall Protects your web applications from common web exploits ensuring availability and security AWS Firewall Manager Centrally configure and manage AWS WAF rules across accounts and applications Amazon Inspector Automates security assessments to help improve the security and compliance of applications deployed on AWS Reduce surface area to manage and increase privacy for and control of your overall infrastructure on AWS. Infrastructure security
  • 49. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Certificate Manager Easily provision, manage, and deploy SSL/TLS certificates for use with AWS services AWS Key Management Service (KMS) Easily create and control the keys used to encrypt your data AWS CloudHSM Managed hardware security module (HSM) on the AWS Cloud Server-Side Encryption Flexible data encryption options using AWS service managed keys, AWS managed keys via AWS KMS, or customer managed keys Amazon Macie Machine learning-powered security service to discover, classify, and protect sensitive data In addition to our automatic data encryption and management services, employ more features for data protection. (including data management, data security, and encryption key storage) Data protection
  • 50. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Rules Create rules that automatically take action in response to changes in your environment, such as isolating resources, enriching events with additional data, or restoring configuration to a known-good state AWS Lambda Use our serverless compute service to run code without provisioning or managing servers so you can scale your programmed, automated response to incidents During an incident, containing the event and returning to a known good state are important elements of a response plan. AWS provides the following tools to automate aspects of this best practice. Incident response
  • 51. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Identity Detective control Infrastructure security Incident response Data protection Well-architected - Security Pillar
  • 52. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you ! V a s i l y P a n t y u k h i n S o l u t i o n s A r c h i t e c t A W S