SlideShare a Scribd company logo
1 of 44
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Best Practices for Implementing Your Encryption
Strategy Using AWS Key Management Service
Matt Bretan – Principal Security Consultant
S I D 3 3 0
AWS re:Invent
N o v e m b e r 2 9 , 2 0 1 7
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Cloud Adoption Framework
5 Core Security Capabilities
Infrastructure Security
Identity and Access Management
Detective Controls
Data Protection
Incident Response
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The AnyCompany
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AnyCompany Bank
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AnyCompany Stakeholders
Sally
Software
Developer
Paul
IT Security
Engineer
Vatsan
Compliance
Officer
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AnyCompany Bank App
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AnyCompany Current Requirements
Protect data at rest and in motion
Select a secure key management infrastructure
Ensure least privilege access to PII
Log all action to a central repository
Automate the identification and response to high risk events
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Infrastructure Controls
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS Controls
•Sensitive cryptographic materials are only
stored in volatile memory
•TLS Perfect Forward Secrecy on all KMS APIs
•No tooling available to access a clear text copy
of a Customer Master Key (CMK)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CMK Types
AWS-managed CMK Customer-managed CMK
Creation AWS generated on customer’s behalf Customer generated
Rotation Once every three years automatically
Once a year automatically through opt-in or
on-demand manually
Deletion Can’t be deleted Can be deleted
Scope of use Limited to a specific AWS service Controlled via KMS/IAM policy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Account Strategy
Security Account
111111111111
Analytics Account
333333333333
Application Account
222222222222
Bank App CMK Analytics CMK
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key Creation & Management
DO:
• Segment keys based upon business unit, data
classification, environment, etc.
• Create keys within the account where the data
exists if possible
• Rotate keys
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Identity and Access Management
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key Policies
• IAM policies are NOT sufficient to allow access to a CMK
• Edit the default CMK policy to align with your
organization’s best practices for least privilege!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CMK — Least Privilege
• Separate keys per business unit and data classification
• Separate CMK admins from users
• Limit KMS actions within IAM policies (No kms:*)
• Cross Account Delegation
• Account Root Principal  allows target account to
further delegate permissions
• Explicit management of principals within key policy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CMK Policy
{
"Sid": "Enable IAM User Permissions",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:root”
},
"Action": "kms:*",
"Resource": "*"
}
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CMK Policy
{
"Sid": ”CMKAdmin Breakglass Role",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:role/CMKAdmin”
},
"Action": "kms:*",
"Resource": "*"
}
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CMK Policy
{
"Sid": "Allow access for Key Administrators",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:role/CMKAdmin-Bank-App"
},
"Action": [
"kms:Create*",
"kms:Describe*",
…
"kms:Enable*",
],
"Resource": "*"
},
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
ViaService and Grants
• Grants:
• Delegate a subset of permissions to AWS services/other
principals so that they can use the CMK on the customer’s
behalf
• ViaService:
• Scope down API calls to a CMK based on the AWS Service
from which it is called
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
{
"Sid": "Allow use of CMK via RDS",
"Effect": "Allow",
"Principal": {
"AWS": "arn:aws:iam::222222222222:role/MortgageApp”,
},
"Action" : [ "kms:ListGrants", "kms:Decrypt", "kms:CreateGrant", "kms:GenerateDataKey*",
"kms:ReEncrypt*", "kms:DescribeKey", "kms:Encrypt" ],
"Resource" : "*",
"Condition" : {
"StringEquals" : {
"kms:CallerAccount" : ”222222222222",
"kms:ViaService" : "rds.us-west-1.amazonaws.com"
}
}
},
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Detective Controls
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudTrail
Security Account
111111111111
Analytics Account
333333333333
Application Account
222222222222
AWS
CloudTrail
AWS
CloudTrail
AWS
CloudTrail
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config Rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config Rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon S3 Bucket Policy — Old Method
{
"Version":"2012-10-17",
"Statement":[{
"Effect":"Deny",
"Principal":"*",
"Action":"s3:PutObject",
"Resource":"arn:aws:s3:::YourBucket/*",
"Condition":{
"StringNotEquals":{
"s3:x-amz-server-side-encryption":"aws:kms”
}
}
} ]
}
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon S3 Bucket Policy — Improved Method
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Detailed Inventory Reporting
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Protection
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Design
Amazon
RDS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Design
Amazon
RDS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Design
Amazon
RDS
Amazon S3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Design
Amazon
RDS
Encrypted
RDS
Snapshots
AWS
Encryption
SDK
Data Lake
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption Context
Key-value pair of additional data that you want associated with
AWS KMS-protected information
• Enforce tighter controls for your encrypted resources
• Insight into the usage of your keys from an audit perspective
Encryption Context is logged in clear text within CloudTrail
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Design
Analytics Account
333333333333
Application Account
222222222222
Amazon S3
Amazon S3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Incident Response
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon CloudWatch Rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon CloudWatch Rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AnyCompany Current Requirements
Protect data at rest and in motion
Select a hardened key management infrastructure
Ensure least privilege access to PII
Log all action to a central repository
Automate the identification and response to high risk events
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS Cryptographic Details Whitepaper
https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS Best Practices Whitepapers
https://d0.awsstatic.com/whitepapers/aws-kms-best-practices.pdf
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS Compliance Reports
https://aws.amazon.com/kms/details/#compliance
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Other re:Invent Sessions of Interest
SID329: A Deep Dive into AWS Encryption Services
SID339: Deep Dive on AWS CloudHSM
SID345: AWS Encryption SDK: The Busy Engineer’s Guide
to Client-Side Encryption
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
PLEASE FILL OUT THE SURVEY!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018Amazon Web Services Korea
 
How to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSHow to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSAmazon Web Services
 
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례Amazon Web Services Korea
 
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...Amazon Web Services Korea
 
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...Amazon Web Services Korea
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...Amazon Web Services Korea
 
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용Amazon Web Services Korea
 
CI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateCI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateAmazon Web Services
 
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)Amazon Web Services
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Amazon Web Services Korea
 
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...Amazon Web Services
 
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...Amazon Web Services Korea
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...Amazon Web Services Korea
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCAmazon Web Services
 

What's hot (20)

다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
 
Deep Dive on AWS CloudFormation
Deep Dive on AWS CloudFormationDeep Dive on AWS CloudFormation
Deep Dive on AWS CloudFormation
 
How to use IAM roles grant access to AWS
How to use IAM roles grant access to AWSHow to use IAM roles grant access to AWS
How to use IAM roles grant access to AWS
 
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례
AWS Summit Seoul 2023 | Amazon EKS 데이터 전송 비용 절감 및 카오스 엔지니어링 적용 사례
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...
금융권 최신 AWS 도입 사례 총정리 – 신한 제주 은행, KB손해보험 사례를 중심으로 - 지성국 사업 개발 담당 이사, AWS / 정을용...
 
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...
AWS Summit Seoul 2023 | 데이터, 분석 및 AI를 통합하는 단 하나의 레이크하우스, Databricks on AWS 로 ...
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
 
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용
AWS Summit Seoul 2023 | 삼성전자/쿠팡의 대규모 트래픽 처리를 위한 클라우드 네이티브 데이터베이스 활용
 
CI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateCI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and Fargate
 
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)
Webinar AWS 201 - Using Amazon Virtual Private Cloud (VPC)
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트
 
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...
Best Practices for Running SQL Server on Amazon RDS (DAT323) - AWS re:Invent ...
 
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
KB국민은행은 시작했다 -  쉽고 빠른 클라우드 거버넌스 적용 전략 - 강병억 AWS 솔루션즈 아키텍트 / 장강홍 클라우드플랫폼단 차장, ...
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...
AWS Direct Connect 및 VPN을 이용한 클라우드 아키텍쳐 설계:: Steve Seymour :: AWS Summit Seou...
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPC
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 

Similar to Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service - SID330 - re:Invent 2017

SID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategySID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategyAmazon Web Services
 
ABD310 big data aws and security no notes
ABD310 big data aws and security no notesABD310 big data aws and security no notes
ABD310 big data aws and security no notesAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Amazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...Amazon Web Services
 
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Amazon Web Services
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Amazon Web Services
 

Similar to Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service - SID330 - re:Invent 2017 (20)

SID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategySID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account Strategy
 
ABD310 big data aws and security no notes
ABD310 big data aws and security no notesABD310 big data aws and security no notes
ABD310 big data aws and security no notes
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
Staying Armed with AWS Cloud HSM and AWS WAF - AWS Public Sector Summit Singa...
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...
Policy Verification and Enforcement at Scale with AWS (SEC320) - AWS re:Inven...
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
Security in Amazon Elasticsearch Service (ANT392) - AWS re:Invent 2018
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Getting started with AWS
Getting started with AWSGetting started with AWS
Getting started with AWS
 
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
Become an IAM Policy Master in 60 Minutes or Less (SEC316-R1) - AWS reInvent ...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service - SID330 - re:Invent 2017

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Best Practices for Implementing Your Encryption Strategy Using AWS Key Management Service Matt Bretan – Principal Security Consultant S I D 3 3 0 AWS re:Invent N o v e m b e r 2 9 , 2 0 1 7
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Cloud Adoption Framework 5 Core Security Capabilities Infrastructure Security Identity and Access Management Detective Controls Data Protection Incident Response
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The AnyCompany
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AnyCompany Bank
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AnyCompany Stakeholders Sally Software Developer Paul IT Security Engineer Vatsan Compliance Officer
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AnyCompany Bank App
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AnyCompany Current Requirements Protect data at rest and in motion Select a secure key management infrastructure Ensure least privilege access to PII Log all action to a central repository Automate the identification and response to high risk events
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Infrastructure Controls
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS Controls •Sensitive cryptographic materials are only stored in volatile memory •TLS Perfect Forward Secrecy on all KMS APIs •No tooling available to access a clear text copy of a Customer Master Key (CMK)
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CMK Types AWS-managed CMK Customer-managed CMK Creation AWS generated on customer’s behalf Customer generated Rotation Once every three years automatically Once a year automatically through opt-in or on-demand manually Deletion Can’t be deleted Can be deleted Scope of use Limited to a specific AWS service Controlled via KMS/IAM policy
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Account Strategy Security Account 111111111111 Analytics Account 333333333333 Application Account 222222222222 Bank App CMK Analytics CMK
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key Creation & Management DO: • Segment keys based upon business unit, data classification, environment, etc. • Create keys within the account where the data exists if possible • Rotate keys
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Identity and Access Management
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key Policies • IAM policies are NOT sufficient to allow access to a CMK • Edit the default CMK policy to align with your organization’s best practices for least privilege!
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CMK — Least Privilege • Separate keys per business unit and data classification • Separate CMK admins from users • Limit KMS actions within IAM policies (No kms:*) • Cross Account Delegation • Account Root Principal  allows target account to further delegate permissions • Explicit management of principals within key policy
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CMK Policy { "Sid": "Enable IAM User Permissions", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::222222222222:root” }, "Action": "kms:*", "Resource": "*" }
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CMK Policy { "Sid": ”CMKAdmin Breakglass Role", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::222222222222:role/CMKAdmin” }, "Action": "kms:*", "Resource": "*" }
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CMK Policy { "Sid": "Allow access for Key Administrators", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::222222222222:role/CMKAdmin-Bank-App" }, "Action": [ "kms:Create*", "kms:Describe*", … "kms:Enable*", ], "Resource": "*" },
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. ViaService and Grants • Grants: • Delegate a subset of permissions to AWS services/other principals so that they can use the CMK on the customer’s behalf • ViaService: • Scope down API calls to a CMK based on the AWS Service from which it is called
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. { "Sid": "Allow use of CMK via RDS", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::222222222222:role/MortgageApp”, }, "Action" : [ "kms:ListGrants", "kms:Decrypt", "kms:CreateGrant", "kms:GenerateDataKey*", "kms:ReEncrypt*", "kms:DescribeKey", "kms:Encrypt" ], "Resource" : "*", "Condition" : { "StringEquals" : { "kms:CallerAccount" : ”222222222222", "kms:ViaService" : "rds.us-west-1.amazonaws.com" } } },
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Detective Controls
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail Security Account 111111111111 Analytics Account 333333333333 Application Account 222222222222 AWS CloudTrail AWS CloudTrail AWS CloudTrail
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Rules
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Rules
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon S3 Bucket Policy — Old Method { "Version":"2012-10-17", "Statement":[{ "Effect":"Deny", "Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::YourBucket/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption":"aws:kms” } } } ] }
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon S3 Bucket Policy — Improved Method
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Detailed Inventory Reporting
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Protection
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Design Amazon RDS
  • 30. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Design Amazon RDS
  • 31. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Design Amazon RDS Amazon S3
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Design Amazon RDS Encrypted RDS Snapshots AWS Encryption SDK Data Lake
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption Context Key-value pair of additional data that you want associated with AWS KMS-protected information • Enforce tighter controls for your encrypted resources • Insight into the usage of your keys from an audit perspective Encryption Context is logged in clear text within CloudTrail
  • 34. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Application Design Analytics Account 333333333333 Application Account 222222222222 Amazon S3 Amazon S3
  • 35. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Incident Response
  • 36. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudWatch Rules
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudWatch Rules
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AnyCompany Current Requirements Protect data at rest and in motion Select a hardened key management infrastructure Ensure least privilege access to PII Log all action to a central repository Automate the identification and response to high risk events
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS Cryptographic Details Whitepaper https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS Best Practices Whitepapers https://d0.awsstatic.com/whitepapers/aws-kms-best-practices.pdf
  • 41. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS Compliance Reports https://aws.amazon.com/kms/details/#compliance
  • 42. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Other re:Invent Sessions of Interest SID329: A Deep Dive into AWS Encryption Services SID339: Deep Dive on AWS CloudHSM SID345: AWS Encryption SDK: The Busy Engineer’s Guide to Client-Side Encryption
  • 43. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. PLEASE FILL OUT THE SURVEY!
  • 44. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!