SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Jim Caggy
Sr. Manager, DoD Solutions, Amazon Web Services
194336
Deploy a DoD Secure Cloud
Computing Architecture Environment in
AWS
• AWS has achieved FedRAMP HIGH in the AWS GovCloud (US) Region
• DoD Provisional Authorizations (PA) for IL5 under the DoD Cloud Security
Requirements Guide
• Connectivity to DODIN on both the East Coast and West Coast
• NIPRNET/DREN-connected Amazon Virtual Private Clouds since 2014
• DoD PA for IL6 for the AWS Secret Region in November 2017 and SIPRNET
connected.
AWS accreditations and authorizations in DoD
DoD Secure Cloud Computing Architecture
• DoD Secure Cloud Computing
Architecture (SCCA) Functional
Requirements Document (FRD)
• Released March 9, 2017
• Provides implementation flexibility
• Freedom to architect and manage
as a shared services enclave
DoD SCCA component functional requirements
Virtual Data Center Security Stack (VDSS)
Provides network and application security capabilities, such as an
application-aware firewall and/or intrusion prevention system.
Virtual Data Center Management Stack (VDMS)
Provides system support services for mission owner environments
(AD/LDAP, DNS, Patch Repos). Potentially CSSP offerings as well.
Trusted Cloud Credential Manager (TCCM)
An individual or entity appointed by the Authorizing Official to establish
policies for controlling privileged user access to connect Virtual Private
Clouds to DISN and for administrating cloud services.
Cloud Access Point (CAP)
Provides network access to the cloud and boundary protection of DISN from
the cloud.
DoD SCCA FRD Detailed Guidance
Virtual Data Center Security Stack (VDSS)
Leveraged network and application security services:
• WAF - application-aware firewall
• Network intrusion prevention/detection system
• Network firewall w/ full packet capture
• Network flow logs
Virtual Data Center Management Stack (VDMS)
Leveraged infrastructure management support services:
• ACAS / Vulnerability scanning
• HBSS / Endpoint protection
• AD / LDAP / SSO / OCSP
• DHCP / DNS / NTP
• Patching services
• Log management
Moving 3-tier web app to AWS
Amazon Virtual Private Cloud (VPC)
AWS Region Production data center
WEB
APP
DB
WEB
LB
FW
COOP data center
WEB
APP
DB
WEB
LB
FW
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
AZ Data Center
Subnet VLAN
EC2 instance Server/VM
Security group FW
ELB Load Balancer
Architectural features & AWS services
AWS Virtual Private Cloud (VPC)
AWS Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
Amazon VPC
• Your private network within AWS
AWS security groups (SG)
• Host firewalls
• Network isolation at the host
AWS network ACLs (NACL)
AWS routing tables
• Network isolation at subnet
Multi-Availability Zones (AZs)
AWS Elastic Load Balancing (ELB)
AWS Auto Scaling Groups (ASG)
• High availability & failover
• Elasticity & scalability
• Synchronous replication capable
AWS storage & database services
AWS Virtual Private Cloud (VPC)
AWS Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
Amazon Simple Storage Service (S3)
• Highly durable object store
Amazon Elastic Block Store (EBS)
• Durable high speed storage for your servers
• 1:1 – EBS:Server/Instance
Amazon Elastic File System (EFS)
• Durable high-speed shared files system
• 1:Many – EFS:Servers/Instances
Amazon Relational Database Service (RDS)
• Fully managed database service
AWS log management & automation services
AWS Virtual Private Cloud (VPC)
AWS Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
Amazon CloudWatch
• CloudWatch Logs – AWS, O/S, & app logs
• CloudWatch Alarms – monitoring & alerting
AWS CloudTrail
• Collection & logging of all AWS API calls
AWS Config
• Point-in-time snapshots of AWS configuration
AWS CloudFormation
• Define & deploy configuration as code
AWS supporting services
AWS Virtual Private Cloud (VPC)
AWS Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
CND
VPG
Direct
Connect
Co-
Location
CAP
CND
DoDIN
IAP
Log management, analysis, & alerting
• AWS CloudTrail
• Amazon CloudWatch
• Amazon VPC Flow Logs
Configuration management & visibility
• AWS Config
• AWS Management Console
Backup
• Amazon Simple Storage Service (S3)
• Amazon Glacier
Identity and access management
• AWS Identity and Access Management
(IAM)
Production data center
Review your existing infrastructure components
WEB
APP
DB
WEB
LB
SERVICES
AD or LDAP
NTP & DNS
Bastion Host
HBSS (AV)
ACAS (VS)
LOG MGMT
SIEM
Backup
COOP data center
WEB
APP
DB
WEB
LB
SERVICES
AD or LDAP
NTP & DNS
Bastion Host
HBSS (AV)
ACAS (VS)
LOG MGMT
SIEM
Backup
FW
FW
In addition to
application & networking
requirements, we need to
address these services!
How do we address these infrastructure needs? → SCCA
AWS Virtual Private Cloud (VPC)
AWS Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
CND
VPG
Direct
Connect
Co-
Location
CAP
CND
DoDIN
IAP
Web application firewall
Network firewall – Full packet capture
Network intrusion detection/prevention
ACAS – Vulnerability scanning
HBSS – Endpoint protection
AD / SSO / LDAP / OCSP
DNS / NTP / DHCP
Log management / SEIM
Patching services
SCCA approach in AWS
GovCloud Region
App Subnet
Availability Zone A
Database Subnet
DMZ Subnet
Web
Server
App
Server
DB
Server
primary
Availability Zone B
Database Subnet
DB
Server
secondary
Web
Server
App
Server
App Subnet
DMZ Subnet
Web
Server
auto scaling group
auto scaling group
security groupsecurity group
synchronous
replication
CND
Direct
Connect
Co-
Location
CAP
CND
DoDIN
IAP
VGW
Mission Owner Virtual Private Cloud (VPC)
Virtual Data Center Security Stack (VDSS)
Availability Zone BAvailability Zone A
Network Firewall Services
Network Intrusion Detection/Prevention Services
Full Packet Capture Services
Web Application Firewall Services
Availability Zone B
ACAS / Vulnerability Scanning Services
HBSS / Endpoint Protection Services
AD / DNS / SSO / OCSP / DCHP Services
Other Shared Services
Availability Zone A
VGW
VGW
Virtual Data Center Management Stack (VDMS)Internet
Infrastructure Security
Inventory & Configuration
Data EncryptionIdentity & Access Control
Monitoring & Logging
AWS Partner Solutions
AWS Security Tools and Features
A full range of capabilities for Mission Owners
Key Management
Service
Manage creation and
control of encryption keys
CloudHSM
Hardware-based key
storage
Server-Side
Encryption
Flexible data encryption
options
Encryption
IAM
Manage user access and
encryption keys
SAML Federation
SAML 2.0 support to
allow on-prem identities
Directory Service
Host and manage
Microsoft Active Directory
Organizations
Manage settings for
multiple accounts
Identity & Access Mgmt
Virtual Private Cloud
Network-isolated cloud
resources
Web Application
Firewall
Filter Malicious Web
Traffic
AWS Shield
DDoS protection
Certificate Manager
Provision, manage, and
deploy SSL/TSL
certificates
Networking
VPC Flow Logs
Comprehensive netflow
data with click of button
AWS Service Catalog
Create and use
standardized products
AWS Config
Track resource inventory
and changes
CloudTrail
Track user activity and
API usage
CloudWatch
Monitor resources and
applications
GuardDuty
Intrusion detection and
analysis
Trusted Advisor
Warning and reports on
proper configuration
Visibility and Control
Unusual Ports
DNS ExfiltrationRDP Brute Force
Temp credentials used off-instance
Unusual Instance Launch
Malicious or Suspicious IP Unusual Traffic Volume
Connect to Blacklisted SiteRecon Anonymizing Proxy
Unusual ISP Caller
Bitcoin Activity
Attempt to
compromise
account
Probe API
with temp
creds
RDP Brute
Force
Exfiltrate temp
IAM creds
over DNS
RAT installed
Amazon GuardDuty – A cloud IDS
Automated API Actions
API calls (CloudTrail) are
logged
Prevent Detect Respond
SSH only from bastion
subnet
Create/Change Firewalls
validate source if port == 22
All instances are patched OS-Level Change and
Cloud Resource Change
No root access
CloudWatch Logs + Syslog
No public objects in Amazon
S3 Data Object level logging in
CloudTrail
Prevent external network
access
Capture Image
Change Firewall/ACL
Patch via AWS Systems
Manager
Isolate and investigate
Make data objects private
AWS Identity and Access Management (IAM)
AWS Identity and Access Management (IAM) enables you to
securely control access to AWS services and resources for your
users
Using IAM, you can create and manage AWS users, groups, and
roles
Use permissions (policies) to allow and deny users, groups, and
roles access to AWS resources
IAM best practices
• Lock away your AWS account (root) access keys
• Create individual IAM users
• Use groups to assign permissions to IAM users
• Configure a strong password policy for your users
• Enable MFA for privileged users
• Delegate by using roles instead of by sharing credentials
• Rotate credentials regularly
IAM best practices
• Grant least privilege with IAM policies
• Use roles for applications that run on Amazon EC2 instances
• Remove unnecessary credentials
• Use policy conditions for extra security
Increase your visibility of what happened in your AWS
environment
• CloudTrail will record API calls and save logs in your S3
buckets, no matter how those API calls were made
• Who did what and when and from what IP address
• Be notified of log file delivery using Amazon Simple Notification
Service
• Support for many AWS services, including Amazon EC2,
Amazon EBS, Amazon VPC, Amazon RDS, IAM, AWS STS, and
Amazon RedShift
• Aggregate log information into a single S3 bucket
Out-of-the-box integration with log analysis tools from AWS
partners, including Splunk, Alert Logic, and Sumo Logic
Auditing: Use AWS CloudTrail to track API calls
Amazon VPC
Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically
isolated section of the Amazon Web Services (AWS) Cloud where you can
launch AWS resources in a virtual network that you define.
Use cases enabled by VPC
Extending DODIN: Bring your own NIPRNET/DREN IP space into AWS
Communicate with other Amazon VPCs: Use VPC peering to
communicate across the AWS network infrastructure
Layered security: Use subnets, route tables, and NACLs to control access
to your resources
• VPC adds network access control lists (ACLs):
• (Optional) layer of security that acts as a stateless firewall for
controlling traffic in and out of a subnet
• Port/protocol defined with Action (Allow/Deny)
• Security groups
• Stateful virtual firewall applied to an instance (e.g., EC2, ELB)
• Traffic must be explicitly specified by protocol, port, and
security group
• Can reference other security group(s) in Inbound Source
and/or Outbound Destination
• OS Firewall (e.g., iptables) may be implemented
• Completely user-controlled security layer
• Granular access control of discrete hosts
• Logging network events
EC2
OS Firewall
AWS Security Group
Inbound
traffic
VPC Network ACLs
Region
VPC defense in depth for the endpoint
VPC Flow Logs
• See all of the traffic at
your instances
• Visibility into effects of security
group rules
• Troubleshooting network
connectivity
• Ability to analyze traffic
• At VPC, subnet, and ENI level
SSH traffic allowed
Sample CloudWatch Logs query:
[version, acct, eni, srcaddr, destaddr, srcport, destport=22, prot, packets, bytes, start, end, action=REJECT, status]
2 123456789010 eni-abc123de 172.168.1.12 172.168.1.11 20641 22 6 20 4249 1438530010 1438530070 ACCEPT OK
VPC Flow Logs (Netflow)
VPC Flow Logs
• Amazon
Elasticsearch
Service
• Amazon
CloudWatch
Logs
subscriptions
DoD IL4/5 Web Application Reference Architecture
Co-Location
CAP/
BCD
Direct
Connect
DODIN
NIPRNET
Admin
Access
Static Web
Content,
Logs, and
Snapshots
Region
Virtual
Private
Gateway
VDMS/CSSP Enclave
HBSS
Server
CSSP Managed
ACAS
Server
User
Access
Private S3 Access
MISSION VLAN(S)
IAP
CAP/CSSP
Internal
Routing
VDSS
Pub Pub
Priv Priv
Priv Priv
Internet
Web
Applica
tion
P
u
b
P
u
b
P
r
i
v
P
r
i
v
P
r
i
v
P
r
i
v
Web
Applica
tion
P
u
b
P
u
b
P
r
i
v
P
r
i
v
P
r
i
v
P
r
i
v
AWS –DoD Mission Owner
DoD Mission Owner Application
BCD Managed
Security through automation
Programmable infrastructure means that infrastructure can for the first
time be scripted, code-reviewed, and checked into a source control
system
– “Infrastructure as code” taken seriously can massively improve security
posture
– SDL (secure development lifecycle) now applies to infrastructure
AWS CloudFormation
AWS CloudFormation gives developers and systems administrators a way to
create and manage a collection of related AWS resources, provisioning and
updating them in an orderly and predictable fashion.
Use cases enabled by AWS CloudFormation
• Security templates: Start with a known good security configuration
• Infrastructure management: Manage collections of resources as stacks
• Audit: Compare what you do have to what you should have
Compliance through automation
• How can you get your System ATO faster?
• Answer: Develop automation around your system build, artifact generation,
and documentation.
• Are their any reference architectures available to automate the build
of the DOD SCCA and documentation process?
• Answer: Yes!
How Does AWS simplify this?
The Enterprise Accelerator Compliance Quick Start
https://aws.amazon.com/quickstart
AWS Enterprise Accelerator Quick Start website
Enterprise Accelerator Quick Start Packages:
What’s in the box?
Architecture diagram
Security Controls Matrix (SCM)
AWS CloudFormation
templates
Deployment guide
Security Controls Matrix
AWS Quick Start CloudFormation templates
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Templates
• AWS CloudFormation templates
− Customize and deploy through automation
• Templates deliver infrastructure as code
– Each template deploys a resource stack
– Templates can be managed and version controlled
using source code repositories (e.g., GitHub)
Deployment options
 AWS Management Console
 CLI deployment
− Deployment scripts included with package
 AWS Service Catalog (where available)
− As a Service Catalog “Product”
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank You!
Email: jcaggy@amazon.com

More Related Content

What's hot

Disaster Recovery with the AWS Cloud
Disaster Recovery with the AWS CloudDisaster Recovery with the AWS Cloud
Disaster Recovery with the AWS Cloud
Amazon Web Services
 

What's hot (20)

AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc Version
 
Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...
Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...
Your Virtual Data Center: VPC Fundamentals and Connectivity Options (NET201) ...
 
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
Module 2: Core AWS Compute and Storage Services - Virtual AWSome Day June 2018
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
AWS Account Best Practices
AWS Account Best PracticesAWS Account Best Practices
AWS Account Best Practices
 
AWS Technical Essentials Day
AWS Technical Essentials DayAWS Technical Essentials Day
AWS Technical Essentials Day
 
Aws 101 A walk-through the aws cloud (2013)
Aws 101  A walk-through the aws cloud (2013)Aws 101  A walk-through the aws cloud (2013)
Aws 101 A walk-through the aws cloud (2013)
 
Disaster Recovery with the AWS Cloud
Disaster Recovery with the AWS CloudDisaster Recovery with the AWS Cloud
Disaster Recovery with the AWS Cloud
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
 
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...
 
Disaster Recovery Options with AWS
Disaster Recovery Options with AWSDisaster Recovery Options with AWS
Disaster Recovery Options with AWS
 
AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019AWS Core Services Overview, Immersion Day Huntsville 2019
AWS Core Services Overview, Immersion Day Huntsville 2019
 

Similar to Deploy a DoD Secure Cloud Computing Architecture Environment in AWS

Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance SeminarHybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
Amazon Web Services Korea
 
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
Amazon Web Services Korea
 

Similar to Deploy a DoD Secure Cloud Computing Architecture Environment in AWS (20)

Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
Palo Alto Networks and AWS: Streamline Your Accreditation with Superior Secur...
 
AWS re:Invent 2016: Simplifying Microsoft Architectures with AWS services (WI...
AWS re:Invent 2016: Simplifying Microsoft Architectures with AWS services (WI...AWS re:Invent 2016: Simplifying Microsoft Architectures with AWS services (WI...
AWS re:Invent 2016: Simplifying Microsoft Architectures with AWS services (WI...
 
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance SeminarHybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
 
Running your Windows Enterprise Workloads on AWS - Technical 201
Running your Windows Enterprise Workloads on AWS - Technical 201Running your Windows Enterprise Workloads on AWS - Technical 201
Running your Windows Enterprise Workloads on AWS - Technical 201
 
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland  - Running your Enterprise Windows Workload on AWSAWS Summit Auckland  - Running your Enterprise Windows Workload on AWS
AWS Summit Auckland - Running your Enterprise Windows Workload on AWS
 
WIN204-Simplifying Microsoft Architectures with AWS Services
WIN204-Simplifying Microsoft Architectures with AWS ServicesWIN204-Simplifying Microsoft Architectures with AWS Services
WIN204-Simplifying Microsoft Architectures with AWS Services
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
Getting Started with Windows Workloads on Amazon EC2
Getting Started with Windows Workloads on Amazon EC2Getting Started with Windows Workloads on Amazon EC2
Getting Started with Windows Workloads on Amazon EC2
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
Simplifying Microsoft Architectures with AWS - CMP214 - re:Invent 2017
Simplifying Microsoft Architectures with AWS - CMP214 - re:Invent 2017Simplifying Microsoft Architectures with AWS - CMP214 - re:Invent 2017
Simplifying Microsoft Architectures with AWS - CMP214 - re:Invent 2017
 
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
AWS re:Invent 2016: Managing and Supporting the Windows Platform on AWS (GPSS...
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
Deep Dive: Amazon RDS
Deep Dive: Amazon RDSDeep Dive: Amazon RDS
Deep Dive: Amazon RDS
 
Herramientas Cloud Ninja AWS "From Zero to Hero"
Herramientas Cloud Ninja AWS "From Zero to Hero"Herramientas Cloud Ninja AWS "From Zero to Hero"
Herramientas Cloud Ninja AWS "From Zero to Hero"
 
Herramientas Cloud Ninja AWS "From Zero to Hero"
Herramientas Cloud Ninja AWS "From Zero to Hero"Herramientas Cloud Ninja AWS "From Zero to Hero"
Herramientas Cloud Ninja AWS "From Zero to Hero"
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Deploy a DoD Secure Cloud Computing Architecture Environment in AWS

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Jim Caggy Sr. Manager, DoD Solutions, Amazon Web Services 194336 Deploy a DoD Secure Cloud Computing Architecture Environment in AWS
  • 2. • AWS has achieved FedRAMP HIGH in the AWS GovCloud (US) Region • DoD Provisional Authorizations (PA) for IL5 under the DoD Cloud Security Requirements Guide • Connectivity to DODIN on both the East Coast and West Coast • NIPRNET/DREN-connected Amazon Virtual Private Clouds since 2014 • DoD PA for IL6 for the AWS Secret Region in November 2017 and SIPRNET connected. AWS accreditations and authorizations in DoD
  • 3. DoD Secure Cloud Computing Architecture • DoD Secure Cloud Computing Architecture (SCCA) Functional Requirements Document (FRD) • Released March 9, 2017 • Provides implementation flexibility • Freedom to architect and manage as a shared services enclave
  • 4. DoD SCCA component functional requirements Virtual Data Center Security Stack (VDSS) Provides network and application security capabilities, such as an application-aware firewall and/or intrusion prevention system. Virtual Data Center Management Stack (VDMS) Provides system support services for mission owner environments (AD/LDAP, DNS, Patch Repos). Potentially CSSP offerings as well. Trusted Cloud Credential Manager (TCCM) An individual or entity appointed by the Authorizing Official to establish policies for controlling privileged user access to connect Virtual Private Clouds to DISN and for administrating cloud services. Cloud Access Point (CAP) Provides network access to the cloud and boundary protection of DISN from the cloud.
  • 5. DoD SCCA FRD Detailed Guidance Virtual Data Center Security Stack (VDSS) Leveraged network and application security services: • WAF - application-aware firewall • Network intrusion prevention/detection system • Network firewall w/ full packet capture • Network flow logs Virtual Data Center Management Stack (VDMS) Leveraged infrastructure management support services: • ACAS / Vulnerability scanning • HBSS / Endpoint protection • AD / LDAP / SSO / OCSP • DHCP / DNS / NTP • Patching services • Log management
  • 6. Moving 3-tier web app to AWS Amazon Virtual Private Cloud (VPC) AWS Region Production data center WEB APP DB WEB LB FW COOP data center WEB APP DB WEB LB FW App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication AZ Data Center Subnet VLAN EC2 instance Server/VM Security group FW ELB Load Balancer
  • 7. Architectural features & AWS services AWS Virtual Private Cloud (VPC) AWS Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication Amazon VPC • Your private network within AWS AWS security groups (SG) • Host firewalls • Network isolation at the host AWS network ACLs (NACL) AWS routing tables • Network isolation at subnet Multi-Availability Zones (AZs) AWS Elastic Load Balancing (ELB) AWS Auto Scaling Groups (ASG) • High availability & failover • Elasticity & scalability • Synchronous replication capable
  • 8. AWS storage & database services AWS Virtual Private Cloud (VPC) AWS Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication Amazon Simple Storage Service (S3) • Highly durable object store Amazon Elastic Block Store (EBS) • Durable high speed storage for your servers • 1:1 – EBS:Server/Instance Amazon Elastic File System (EFS) • Durable high-speed shared files system • 1:Many – EFS:Servers/Instances Amazon Relational Database Service (RDS) • Fully managed database service
  • 9. AWS log management & automation services AWS Virtual Private Cloud (VPC) AWS Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication Amazon CloudWatch • CloudWatch Logs – AWS, O/S, & app logs • CloudWatch Alarms – monitoring & alerting AWS CloudTrail • Collection & logging of all AWS API calls AWS Config • Point-in-time snapshots of AWS configuration AWS CloudFormation • Define & deploy configuration as code
  • 10. AWS supporting services AWS Virtual Private Cloud (VPC) AWS Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication CND VPG Direct Connect Co- Location CAP CND DoDIN IAP Log management, analysis, & alerting • AWS CloudTrail • Amazon CloudWatch • Amazon VPC Flow Logs Configuration management & visibility • AWS Config • AWS Management Console Backup • Amazon Simple Storage Service (S3) • Amazon Glacier Identity and access management • AWS Identity and Access Management (IAM)
  • 11. Production data center Review your existing infrastructure components WEB APP DB WEB LB SERVICES AD or LDAP NTP & DNS Bastion Host HBSS (AV) ACAS (VS) LOG MGMT SIEM Backup COOP data center WEB APP DB WEB LB SERVICES AD or LDAP NTP & DNS Bastion Host HBSS (AV) ACAS (VS) LOG MGMT SIEM Backup FW FW In addition to application & networking requirements, we need to address these services!
  • 12. How do we address these infrastructure needs? → SCCA AWS Virtual Private Cloud (VPC) AWS Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication CND VPG Direct Connect Co- Location CAP CND DoDIN IAP Web application firewall Network firewall – Full packet capture Network intrusion detection/prevention ACAS – Vulnerability scanning HBSS – Endpoint protection AD / SSO / LDAP / OCSP DNS / NTP / DHCP Log management / SEIM Patching services
  • 13. SCCA approach in AWS GovCloud Region App Subnet Availability Zone A Database Subnet DMZ Subnet Web Server App Server DB Server primary Availability Zone B Database Subnet DB Server secondary Web Server App Server App Subnet DMZ Subnet Web Server auto scaling group auto scaling group security groupsecurity group synchronous replication CND Direct Connect Co- Location CAP CND DoDIN IAP VGW Mission Owner Virtual Private Cloud (VPC) Virtual Data Center Security Stack (VDSS) Availability Zone BAvailability Zone A Network Firewall Services Network Intrusion Detection/Prevention Services Full Packet Capture Services Web Application Firewall Services Availability Zone B ACAS / Vulnerability Scanning Services HBSS / Endpoint Protection Services AD / DNS / SSO / OCSP / DCHP Services Other Shared Services Availability Zone A VGW VGW Virtual Data Center Management Stack (VDMS)Internet
  • 14. Infrastructure Security Inventory & Configuration Data EncryptionIdentity & Access Control Monitoring & Logging AWS Partner Solutions AWS Security Tools and Features
  • 15. A full range of capabilities for Mission Owners Key Management Service Manage creation and control of encryption keys CloudHSM Hardware-based key storage Server-Side Encryption Flexible data encryption options Encryption IAM Manage user access and encryption keys SAML Federation SAML 2.0 support to allow on-prem identities Directory Service Host and manage Microsoft Active Directory Organizations Manage settings for multiple accounts Identity & Access Mgmt Virtual Private Cloud Network-isolated cloud resources Web Application Firewall Filter Malicious Web Traffic AWS Shield DDoS protection Certificate Manager Provision, manage, and deploy SSL/TSL certificates Networking VPC Flow Logs Comprehensive netflow data with click of button AWS Service Catalog Create and use standardized products AWS Config Track resource inventory and changes CloudTrail Track user activity and API usage CloudWatch Monitor resources and applications GuardDuty Intrusion detection and analysis Trusted Advisor Warning and reports on proper configuration Visibility and Control
  • 16. Unusual Ports DNS ExfiltrationRDP Brute Force Temp credentials used off-instance Unusual Instance Launch Malicious or Suspicious IP Unusual Traffic Volume Connect to Blacklisted SiteRecon Anonymizing Proxy Unusual ISP Caller Bitcoin Activity Attempt to compromise account Probe API with temp creds RDP Brute Force Exfiltrate temp IAM creds over DNS RAT installed Amazon GuardDuty – A cloud IDS
  • 17. Automated API Actions API calls (CloudTrail) are logged Prevent Detect Respond SSH only from bastion subnet Create/Change Firewalls validate source if port == 22 All instances are patched OS-Level Change and Cloud Resource Change No root access CloudWatch Logs + Syslog No public objects in Amazon S3 Data Object level logging in CloudTrail Prevent external network access Capture Image Change Firewall/ACL Patch via AWS Systems Manager Isolate and investigate Make data objects private
  • 18. AWS Identity and Access Management (IAM) AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users Using IAM, you can create and manage AWS users, groups, and roles Use permissions (policies) to allow and deny users, groups, and roles access to AWS resources
  • 19. IAM best practices • Lock away your AWS account (root) access keys • Create individual IAM users • Use groups to assign permissions to IAM users • Configure a strong password policy for your users • Enable MFA for privileged users • Delegate by using roles instead of by sharing credentials • Rotate credentials regularly
  • 20. IAM best practices • Grant least privilege with IAM policies • Use roles for applications that run on Amazon EC2 instances • Remove unnecessary credentials • Use policy conditions for extra security
  • 21. Increase your visibility of what happened in your AWS environment • CloudTrail will record API calls and save logs in your S3 buckets, no matter how those API calls were made • Who did what and when and from what IP address • Be notified of log file delivery using Amazon Simple Notification Service • Support for many AWS services, including Amazon EC2, Amazon EBS, Amazon VPC, Amazon RDS, IAM, AWS STS, and Amazon RedShift • Aggregate log information into a single S3 bucket Out-of-the-box integration with log analysis tools from AWS partners, including Splunk, Alert Logic, and Sumo Logic Auditing: Use AWS CloudTrail to track API calls
  • 22. Amazon VPC Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define.
  • 23. Use cases enabled by VPC Extending DODIN: Bring your own NIPRNET/DREN IP space into AWS Communicate with other Amazon VPCs: Use VPC peering to communicate across the AWS network infrastructure Layered security: Use subnets, route tables, and NACLs to control access to your resources
  • 24. • VPC adds network access control lists (ACLs): • (Optional) layer of security that acts as a stateless firewall for controlling traffic in and out of a subnet • Port/protocol defined with Action (Allow/Deny) • Security groups • Stateful virtual firewall applied to an instance (e.g., EC2, ELB) • Traffic must be explicitly specified by protocol, port, and security group • Can reference other security group(s) in Inbound Source and/or Outbound Destination • OS Firewall (e.g., iptables) may be implemented • Completely user-controlled security layer • Granular access control of discrete hosts • Logging network events EC2 OS Firewall AWS Security Group Inbound traffic VPC Network ACLs Region VPC defense in depth for the endpoint
  • 25. VPC Flow Logs • See all of the traffic at your instances • Visibility into effects of security group rules • Troubleshooting network connectivity • Ability to analyze traffic • At VPC, subnet, and ENI level
  • 26. SSH traffic allowed Sample CloudWatch Logs query: [version, acct, eni, srcaddr, destaddr, srcport, destport=22, prot, packets, bytes, start, end, action=REJECT, status] 2 123456789010 eni-abc123de 172.168.1.12 172.168.1.11 20641 22 6 20 4249 1438530010 1438530070 ACCEPT OK VPC Flow Logs (Netflow)
  • 27. VPC Flow Logs • Amazon Elasticsearch Service • Amazon CloudWatch Logs subscriptions
  • 28. DoD IL4/5 Web Application Reference Architecture Co-Location CAP/ BCD Direct Connect DODIN NIPRNET Admin Access Static Web Content, Logs, and Snapshots Region Virtual Private Gateway VDMS/CSSP Enclave HBSS Server CSSP Managed ACAS Server User Access Private S3 Access MISSION VLAN(S) IAP CAP/CSSP Internal Routing VDSS Pub Pub Priv Priv Priv Priv Internet Web Applica tion P u b P u b P r i v P r i v P r i v P r i v Web Applica tion P u b P u b P r i v P r i v P r i v P r i v AWS –DoD Mission Owner DoD Mission Owner Application BCD Managed
  • 29. Security through automation Programmable infrastructure means that infrastructure can for the first time be scripted, code-reviewed, and checked into a source control system – “Infrastructure as code” taken seriously can massively improve security posture – SDL (secure development lifecycle) now applies to infrastructure
  • 30. AWS CloudFormation AWS CloudFormation gives developers and systems administrators a way to create and manage a collection of related AWS resources, provisioning and updating them in an orderly and predictable fashion.
  • 31. Use cases enabled by AWS CloudFormation • Security templates: Start with a known good security configuration • Infrastructure management: Manage collections of resources as stacks • Audit: Compare what you do have to what you should have
  • 32. Compliance through automation • How can you get your System ATO faster? • Answer: Develop automation around your system build, artifact generation, and documentation. • Are their any reference architectures available to automate the build of the DOD SCCA and documentation process? • Answer: Yes!
  • 33. How Does AWS simplify this? The Enterprise Accelerator Compliance Quick Start https://aws.amazon.com/quickstart
  • 34. AWS Enterprise Accelerator Quick Start website
  • 35. Enterprise Accelerator Quick Start Packages: What’s in the box? Architecture diagram Security Controls Matrix (SCM) AWS CloudFormation templates Deployment guide
  • 37. AWS Quick Start CloudFormation templates © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Templates • AWS CloudFormation templates − Customize and deploy through automation • Templates deliver infrastructure as code – Each template deploys a resource stack – Templates can be managed and version controlled using source code repositories (e.g., GitHub)
  • 38. Deployment options  AWS Management Console  CLI deployment − Deployment scripts included with package  AWS Service Catalog (where available) − As a Service Catalog “Product”
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank You! Email: jcaggy@amazon.com