SlideShare a Scribd company logo
Cloud Security
And some preferred practices
“”Werner Vogels - CTO & VP, Amazon
Web Services
Dance like nobody's watching…
Encrypt like everyone is!
2
Contents
1. Why Security Matters
2. Why Me?
3. Security vs Compliance
4. Encryption
5. Data Storage
6. Version Control
7. Environment Variables, Vaults, Encryption Utils
8. Vaults
9. Staying In The Network
10. Reducing Attack Vectors
11. Separating The Data
Costs of a breach
Including but not limited to...
Monetary
Legal / Regulatory
Reputation
Crisis Services
Shared Responsibility
AWS responsible for “Security of the Cloud”
Vs
Customer responsible for “Security in the Cloud”
5
Security vs Compliance
Compliance isn’t enough - it should be the
outcome, not the driver!
Compliance can’t cover everything, and often isn’t
enough. Threat Actors Don't Care if You're
Compliant.
● Sum of processes and features safeguarding your
data
● Threat identification through proactive risk
assessment
● Threat intelligence
● Active monitoring
Security
Cloud Security | peak.ai
(Generic blueprint for the security of certain kinds of data -
governmental, non-profit, industry groups etc.
Compliance
● Regulatory Orgs. provide standards set a minimum standard
● Enforced with Audits or Assessments (Only a snapshot!)
● Responsive opposed to Proactive, creating lag
● It should be the outcome, not the driver!
Cloud Security | peak.ai
Security is inherently risk-based.
Instead of measuring effectiveness based on adherence to prescribed controls, its success is
defined by the ability to protect against and respond to threats.
Protection as a metric isn’t always easy to track, but can’t be underappreciated – especially when
a single data breach can ruin an organisation.
Security vs Compliance
Encryption
Basics
Convert the data in some unreadable form
Helps in protecting the privacy while sending the
data from sender to receiver
The Key
The concept of encryption and decryption
requires some extra information for encrypting
and decrypting the data.
Decryption
On the receiver side, the data can be decrypted
and can be brought back to its original form. The
reverse of encryption is called as decryption.
Asymmetric Encryption
There may be cases when same key can be used
for both encryption and decryption while in certain
cases, encryption and decryption may require
different keys.
Data Storage & Encryption
Data (encryption) at Rest
Data (encryption) in Transit
“”Don’t share them with your neighbours
Don’t use the same key for your
house
as every other house on the
street!
12
Don’t but keys and tokens in git! (Even private repositories)
More common than you would think..
Always in the history
But if you do…
Revoke the key immediately
Check audit trails for any malicious activity
Create a new key and don’t make the same
mistake!
The same goes for passwords and other secret values
Version Control
Cloud Security | peak.ai
Environment Variables
“Env Var” = Key/Value pair usually set outside of the program
Used to decouple configuration from the application
Dynamic variables, instead of hard coding and/or storing in git
Not always secure (often stored in plain text), but a step forward
Cloud Security | peak.ai
Vaults & Encryption Utilities
There are many ‘vault’ services that can be used to store secrets
● Hashicorp Vault
● AWS Secrets Manager
● AWS Parameter Store (Secret Text)
● Key Vault for Azure
Used for Infra As Code, Applications and more
Encryption Utilities also help manage credentials and other secrets
● Credstash
● Git-crypt
● Java Keystore
Cloud Security | peak.ai
Virtual Private Cloud
Keep traffic in the boundaries, not out and back
Service endpoints
Specify as a target to route traffic directly to a service.
E.g. S3, DynamoDB etc.
Use Endpoint Policies to define access
Often quicker and cheaper!
Cloud Security | peak.ai
Reducing the Attack Vectors
Network Security
● WAF
● Shield
● CloudFront
● Route 53
● NACL / Security Groups
Monitoring and Alerting
● Guard Duty
● CloudWatch
Scaling in and out fast
● Load Balancers
● Autoscaling
Cloud Security | peak.ai
Separating the Data
Keeping people away from the data, and the data from the data
AIS is a multi tenant platform (shared access to an interface), but
● Separated Data Storage and Processing
● Separate AWS accounts (Federated access and MFA)
● Role Based Access Control (RBAC)
● Separated Development Environments
● Abstraction layers
Cloud Security | peak.ai
Design Principles
(Review)
Cloud Security | peak.ai
● Principle of least privileges (roles and not just users!)
● Enable traceability
● Security at all layers - firewalls, app security etc.
● Automate best practices - threat detection, response etc.
● Protect data in transit and at rest - confidentiality and
integrity of the data
● Keep people away from the data - No prod data for dev! Use
abstraction layers etc.
● Prepare for security events - priorities, who to contact, what
to do to remediate etc.
“”
Tools alone won’t transform and
organisation,
you need to change the mindset of
the team.
20
Question Time

More Related Content

What's hot

How to Develop and Deploy Web-Scale Applications on AWS
How to Develop and Deploy Web-Scale Applications on AWSHow to Develop and Deploy Web-Scale Applications on AWS
How to Develop and Deploy Web-Scale Applications on AWS
Databarracks
 
How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWS
Lahav Savir
 
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
CSF18 - External Collaboration with Azure B2B - Sjoukje ZaalCSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
NCCOMMS
 
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureUsing Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Jose Hernandez
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
NCCOMMS
 
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridExploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
CloudVillage
 
Pyramid Analytics vs Sisense
Pyramid Analytics vs SisensePyramid Analytics vs Sisense
Pyramid Analytics vs Sisense
Pyramid Analytics
 
Pyramid vs QlikView
Pyramid vs QlikViewPyramid vs QlikView
Pyramid vs QlikView
Pyramid Analytics
 
Secret Management Architectures
Secret Management Architectures Secret Management Architectures
Secret Management Architectures
Stenio Ferreira
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
John Varghese
 
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and AzureBuild and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
CloudHesive
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
Amazon Web Services
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
Amazon Web Services
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
Security Innovation
 
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS SummitUnified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Amazon Web Services
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
Bryan Len
 
Scale out magento 2 at aws
Scale out magento 2 at awsScale out magento 2 at aws
Scale out magento 2 at aws
root360 GmbH
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
Yuechuan (Mike) Chen
 
Microsoft Azure News - 2018 May
Microsoft Azure News - 2018 MayMicrosoft Azure News - 2018 May
Microsoft Azure News - 2018 May
Daniel Toomey
 
GoGrid February 2010 Webinar on New Features
GoGrid February 2010 Webinar on New FeaturesGoGrid February 2010 Webinar on New Features
GoGrid February 2010 Webinar on New Features
GoGrid Cloud Hosting
 

What's hot (20)

How to Develop and Deploy Web-Scale Applications on AWS
How to Develop and Deploy Web-Scale Applications on AWSHow to Develop and Deploy Web-Scale Applications on AWS
How to Develop and Deploy Web-Scale Applications on AWS
 
How to protect your IoT data on AWS
How to protect your IoT data on AWSHow to protect your IoT data on AWS
How to protect your IoT data on AWS
 
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
CSF18 - External Collaboration with Azure B2B - Sjoukje ZaalCSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
CSF18 - External Collaboration with Azure B2B - Sjoukje Zaal
 
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security postureUsing Splunk/ELK for auditing AWS/GCP/Azure security posture
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
 
CSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-MelhaouiCSF18 - Securing the Cloud - Karim El-Melhaoui
CSF18 - Securing the Cloud - Karim El-Melhaoui
 
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_faridExploiting IAM in the google cloud platform - dani_goland_mohsan_farid
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
 
Pyramid Analytics vs Sisense
Pyramid Analytics vs SisensePyramid Analytics vs Sisense
Pyramid Analytics vs Sisense
 
Pyramid vs QlikView
Pyramid vs QlikViewPyramid vs QlikView
Pyramid vs QlikView
 
Secret Management Architectures
Secret Management Architectures Secret Management Architectures
Secret Management Architectures
 
Securing aws workloads with embedded application security
Securing aws workloads with embedded application securitySecuring aws workloads with embedded application security
Securing aws workloads with embedded application security
 
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and AzureBuild and Manage a Highly Secure Cloud Environment on AWS and Azure
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
 
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) |...
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS SummitUnified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
Unified Security through Armor and AWS - DEM05 - Atlanta AWS Summit
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
 
Scale out magento 2 at aws
Scale out magento 2 at awsScale out magento 2 at aws
Scale out magento 2 at aws
 
Overview of secret management solutions and architecture
Overview of secret management solutions and architectureOverview of secret management solutions and architecture
Overview of secret management solutions and architecture
 
Microsoft Azure News - 2018 May
Microsoft Azure News - 2018 MayMicrosoft Azure News - 2018 May
Microsoft Azure News - 2018 May
 
GoGrid February 2010 Webinar on New Features
GoGrid February 2010 Webinar on New FeaturesGoGrid February 2010 Webinar on New Features
GoGrid February 2010 Webinar on New Features
 

Similar to Cloud Security and some preferred practices

Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Evident.io
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
Amazon Web Services
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
Raj Sarode
 
How to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
How to Secure your Hybrid Enviroment - Pop-up Loft Tel AvivHow to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
How to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
Amazon Web Services
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
Amazon Web Services
 
In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15
Intuit Inc.
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
Akash Mahajan
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
Lalit Rawat
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
John Varghese
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Jisc
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
STO STRATEGY
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
Amazon Web Services
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Adnene Guabtni
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
Andy Powell
 
Cloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdfCloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdf
Christopher Doman
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
Amazon Web Services
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
centralohioissa
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
Druva
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
Amazon Web Services
 

Similar to Cloud Security and some preferred practices (20)

Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
How to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
How to Secure your Hybrid Enviroment - Pop-up Loft Tel AvivHow to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
How to Secure your Hybrid Enviroment - Pop-up Loft Tel Aviv
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15In Cloud We Encrypt #GHC15
In Cloud We Encrypt #GHC15
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Tour to Azure Security Center
Tour to Azure Security CenterTour to Azure Security Center
Tour to Azure Security Center
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
AWS Security Challenges
AWS Security ChallengesAWS Security Challenges
AWS Security Challenges
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...Architecting Data Services for the Cloud: Security Considerations and Best Pr...
Architecting Data Services for the Cloud: Security Considerations and Best Pr...
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
Shared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud securityShared responsibility - a model for good cloud security
Shared responsibility - a model for good cloud security
 
Cloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdfCloud Forensics and Incident Response Training.pdf
Cloud Forensics and Incident Response Training.pdf
 
Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption Cisco + AWS Stronger Security & Greater AWS Adoption
Cisco + AWS Stronger Security & Greater AWS Adoption
 
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection FrameworkAlex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
Alex Hanway - Securing the Breach: Using a Holistic Data Protection Framework
 
Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)Security and privacy of cloud data: what you need to know (Interop)
Security and privacy of cloud data: what you need to know (Interop)
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
 

More from Michael Pearce

MLOps - Getting Machine Learning Into Production
MLOps - Getting Machine Learning Into ProductionMLOps - Getting Machine Learning Into Production
MLOps - Getting Machine Learning Into Production
Michael Pearce
 
Linux CLI Primer
Linux CLI PrimerLinux CLI Primer
Linux CLI Primer
Michael Pearce
 
IaC: Tools of the trade
IaC: Tools of the tradeIaC: Tools of the trade
IaC: Tools of the trade
Michael Pearce
 
Sage Advice: Getting started with Amazon SageMaker
Sage Advice: Getting started with Amazon SageMakerSage Advice: Getting started with Amazon SageMaker
Sage Advice: Getting started with Amazon SageMaker
Michael Pearce
 
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time aroundLearning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
Michael Pearce
 
Git Primer
Git PrimerGit Primer
Git Primer
Michael Pearce
 
Building Scalable Data Ingestion
Building Scalable Data Ingestion Building Scalable Data Ingestion
Building Scalable Data Ingestion
Michael Pearce
 
Infrastructure as Code (IaC): Introduction to scripted infrastructure
Infrastructure as Code (IaC): Introduction to scripted infrastructureInfrastructure as Code (IaC): Introduction to scripted infrastructure
Infrastructure as Code (IaC): Introduction to scripted infrastructure
Michael Pearce
 
Cloudphrase: AWS basics
Cloudphrase: AWS basicsCloudphrase: AWS basics
Cloudphrase: AWS basics
Michael Pearce
 
Introduction to AWS VPC & Networking
Introduction to AWS VPC & NetworkingIntroduction to AWS VPC & Networking
Introduction to AWS VPC & Networking
Michael Pearce
 
Alexa, call SageMaker!
Alexa, call SageMaker!Alexa, call SageMaker!
Alexa, call SageMaker!
Michael Pearce
 

More from Michael Pearce (11)

MLOps - Getting Machine Learning Into Production
MLOps - Getting Machine Learning Into ProductionMLOps - Getting Machine Learning Into Production
MLOps - Getting Machine Learning Into Production
 
Linux CLI Primer
Linux CLI PrimerLinux CLI Primer
Linux CLI Primer
 
IaC: Tools of the trade
IaC: Tools of the tradeIaC: Tools of the trade
IaC: Tools of the trade
 
Sage Advice: Getting started with Amazon SageMaker
Sage Advice: Getting started with Amazon SageMakerSage Advice: Getting started with Amazon SageMaker
Sage Advice: Getting started with Amazon SageMaker
 
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time aroundLearning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
Learning, Losing & Lessons Learnt: Cloud Certification the 2nd time around
 
Git Primer
Git PrimerGit Primer
Git Primer
 
Building Scalable Data Ingestion
Building Scalable Data Ingestion Building Scalable Data Ingestion
Building Scalable Data Ingestion
 
Infrastructure as Code (IaC): Introduction to scripted infrastructure
Infrastructure as Code (IaC): Introduction to scripted infrastructureInfrastructure as Code (IaC): Introduction to scripted infrastructure
Infrastructure as Code (IaC): Introduction to scripted infrastructure
 
Cloudphrase: AWS basics
Cloudphrase: AWS basicsCloudphrase: AWS basics
Cloudphrase: AWS basics
 
Introduction to AWS VPC & Networking
Introduction to AWS VPC & NetworkingIntroduction to AWS VPC & Networking
Introduction to AWS VPC & Networking
 
Alexa, call SageMaker!
Alexa, call SageMaker!Alexa, call SageMaker!
Alexa, call SageMaker!
 

Recently uploaded

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
Neo4j
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
Neo4j
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
DianaGray10
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
Adtran
 

Recently uploaded (20)

Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024GraphSummit Singapore | The Art of the  Possible with Graph - Q2 2024
GraphSummit Singapore | The Art of the Possible with Graph - Q2 2024
 
TrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy SurveyTrustArc Webinar - 2024 Global Privacy Survey
TrustArc Webinar - 2024 Global Privacy Survey
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
GraphSummit Singapore | Enhancing Changi Airport Group's Passenger Experience...
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5UiPath Test Automation using UiPath Test Suite series, part 5
UiPath Test Automation using UiPath Test Suite series, part 5
 
Pushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 daysPushing the limits of ePRTC: 100ns holdover for 100 days
Pushing the limits of ePRTC: 100ns holdover for 100 days
 

Cloud Security and some preferred practices

  • 1. Cloud Security And some preferred practices
  • 2. “”Werner Vogels - CTO & VP, Amazon Web Services Dance like nobody's watching… Encrypt like everyone is! 2
  • 3. Contents 1. Why Security Matters 2. Why Me? 3. Security vs Compliance 4. Encryption 5. Data Storage 6. Version Control 7. Environment Variables, Vaults, Encryption Utils 8. Vaults 9. Staying In The Network 10. Reducing Attack Vectors 11. Separating The Data
  • 4. Costs of a breach Including but not limited to... Monetary Legal / Regulatory Reputation Crisis Services
  • 5. Shared Responsibility AWS responsible for “Security of the Cloud” Vs Customer responsible for “Security in the Cloud” 5
  • 6. Security vs Compliance Compliance isn’t enough - it should be the outcome, not the driver! Compliance can’t cover everything, and often isn’t enough. Threat Actors Don't Care if You're Compliant.
  • 7. ● Sum of processes and features safeguarding your data ● Threat identification through proactive risk assessment ● Threat intelligence ● Active monitoring Security Cloud Security | peak.ai
  • 8. (Generic blueprint for the security of certain kinds of data - governmental, non-profit, industry groups etc. Compliance ● Regulatory Orgs. provide standards set a minimum standard ● Enforced with Audits or Assessments (Only a snapshot!) ● Responsive opposed to Proactive, creating lag ● It should be the outcome, not the driver! Cloud Security | peak.ai
  • 9. Security is inherently risk-based. Instead of measuring effectiveness based on adherence to prescribed controls, its success is defined by the ability to protect against and respond to threats. Protection as a metric isn’t always easy to track, but can’t be underappreciated – especially when a single data breach can ruin an organisation. Security vs Compliance
  • 10. Encryption Basics Convert the data in some unreadable form Helps in protecting the privacy while sending the data from sender to receiver The Key The concept of encryption and decryption requires some extra information for encrypting and decrypting the data. Decryption On the receiver side, the data can be decrypted and can be brought back to its original form. The reverse of encryption is called as decryption. Asymmetric Encryption There may be cases when same key can be used for both encryption and decryption while in certain cases, encryption and decryption may require different keys.
  • 11. Data Storage & Encryption Data (encryption) at Rest Data (encryption) in Transit
  • 12. “”Don’t share them with your neighbours Don’t use the same key for your house as every other house on the street! 12
  • 13. Don’t but keys and tokens in git! (Even private repositories) More common than you would think.. Always in the history But if you do… Revoke the key immediately Check audit trails for any malicious activity Create a new key and don’t make the same mistake! The same goes for passwords and other secret values Version Control Cloud Security | peak.ai
  • 14. Environment Variables “Env Var” = Key/Value pair usually set outside of the program Used to decouple configuration from the application Dynamic variables, instead of hard coding and/or storing in git Not always secure (often stored in plain text), but a step forward Cloud Security | peak.ai
  • 15. Vaults & Encryption Utilities There are many ‘vault’ services that can be used to store secrets ● Hashicorp Vault ● AWS Secrets Manager ● AWS Parameter Store (Secret Text) ● Key Vault for Azure Used for Infra As Code, Applications and more Encryption Utilities also help manage credentials and other secrets ● Credstash ● Git-crypt ● Java Keystore Cloud Security | peak.ai
  • 16. Virtual Private Cloud Keep traffic in the boundaries, not out and back Service endpoints Specify as a target to route traffic directly to a service. E.g. S3, DynamoDB etc. Use Endpoint Policies to define access Often quicker and cheaper! Cloud Security | peak.ai
  • 17. Reducing the Attack Vectors Network Security ● WAF ● Shield ● CloudFront ● Route 53 ● NACL / Security Groups Monitoring and Alerting ● Guard Duty ● CloudWatch Scaling in and out fast ● Load Balancers ● Autoscaling Cloud Security | peak.ai
  • 18. Separating the Data Keeping people away from the data, and the data from the data AIS is a multi tenant platform (shared access to an interface), but ● Separated Data Storage and Processing ● Separate AWS accounts (Federated access and MFA) ● Role Based Access Control (RBAC) ● Separated Development Environments ● Abstraction layers Cloud Security | peak.ai
  • 19. Design Principles (Review) Cloud Security | peak.ai ● Principle of least privileges (roles and not just users!) ● Enable traceability ● Security at all layers - firewalls, app security etc. ● Automate best practices - threat detection, response etc. ● Protect data in transit and at rest - confidentiality and integrity of the data ● Keep people away from the data - No prod data for dev! Use abstraction layers etc. ● Prepare for security events - priorities, who to contact, what to do to remediate etc.
  • 20. “” Tools alone won’t transform and organisation, you need to change the mindset of the team. 20

Editor's Notes

  1. The Mantra
  2. There will be lots of cross overs!
  3. Why Me? AWS doesn’t do it for us. They give us the tools but we are still responsible for configuring things properly - shared responsibility model.
  4. We often refer to compliance, regarding the “rules we should comply with”. But there is a difference between Security and Compliance. But it shouldn’t be the only thing, outcome not driver! Can’t cover everything, threat actors don’t care if you’re compliant! But it can also be a bit subjective e.g. changing passwords every 90 days.
  5. Security is the sum of processes and features safeguarding your data. Effective security requires threat identification through proactive risk assessment and threat intelligence as well as active monitoring and analysis of your network environment.
  6. Determined by governmental, non-profit or industry groups and serves as a generic blueprint for the security of certain kinds of data. The regulatory organizations that govern compliance standards issue them as a minimum bar for security. Enforcement is established through audits or assessments that are either self-administered or coordinated by a third party. Audits act as a snapshot of how your organization fared at one moment in time. And, as is common with regulatory standards, organizations that mandate compliance standards are often responsive as opposed to proactive – creating a lag time between when a threat emerges and when the prescribed solution is codified. For these reasons, organizations that let compliance drive their cloud security strategy (i.e. only focusing on passing their audits) ultimately limit their ability to remain secure long-term.
  7. In a simplest form, encryption is to convert the data in some unreadable form. This helps in protecting the privacy while sending the data from sender to receiver. On the receiver side, the data can be decrypted and can be brought back to its original form. The reverse of encryption is called as decryption. This information is known as key. The concept of encryption and decryption requires some extra information for encrypting and decrypting the data. There may be cases when same key can be used for both encryption and decryption while in certain cases, encryption and decryption may require different keys.
  8. Manage Confidentiality and integrity of the data
  9. Encryption Keys - just like passwords, tokens etc. Set a policy for who can access, who can use the key, and what the key can be used for.
  10. Internal endpoints instead of external dns names where possible
  11. We use a few different services for network security, mostly managed by AWS. WAF (web application firewall) Shield (DDoS protection) CloudFront (for content delivery and caching, but also an extra layer of highly scalable protection such as field-level encryption, enforced https etc). We also monitor and alert using Guard Duty that provides intelligent threat detection by monitoring and alerting for issues and anomalies on audit logs, vpc flow logs and dns logs.
  12. Keep people away from the data - no prod data for dev! And abstraction layers etc. Although AIS is a multi tenant platform which provides the tenants which shared access to an interface, all data storage and processing is separated by tenant on separate resources with no direct access between each other. PepsiCo have their own separate AWS account/environment for storing and processing data. Access to the resources to the resources is restricted only to employees at Peak that are conducting work relating to the project and use access is done using Federated access using Multi Factor Authentication. Development environments are also separated from the production environment, only authorised administrators have any access to the underlying infrastructure of the production environment for monitoring and debugging purposes where required.
  13. Strong identity foundation - least privileged (roles and not just users!) Enable traceability Security at all layers - firewalls, app security etc. Automate best practices - threat detection, response etc. Protect data in transit and at rest - confidentiality and integrity of the data Keep people away from the data - no prod data for dev! And abstraction layers etc. Prepare for security events - priorities, who to contact, what to do to remediate
  14. A repeat.. But still true!