SlideShare a Scribd company logo
1 of 29
xebia.com
Designing for Privacy
in AWS cloud
Krzysztof Kąkol – Chief of Data Engineering @ Xebia Poland
xebia.com
Krzysztof Kąkol
Chief of Data Engineering and
Solutions Architect in Xebia Poland
AWS Community Builder & AWS Ambassador
https://www.linkedin.com/in/krzysztofkakol/
Other stuff:
Classical and jazz pianist
PhD in AI-driven sound processing
xebia.com
HRM systems store
user personal data and
lots of sensitive data
like salary.
Clients want to know
where the data are
stored, who has access
to it, what we do to
avoid compromising.
Clients have their
checklists with
requirements.
Strong vendor
responsibility comes
with great risk that must
be handled.
HR is about
privacy
Clients want to be
secure
Business
requirements
Vendor’s risk
Data Privacy by Design
in HRM system
xebia.com
Prepare
Theory is King
xebia.com
Privacy by Design is a concept developed by Ann
Cavoukian in 90’s. It advances the view that the
future of privacy cannot be assured solely by
compliance with regulatory frameworks; rather,
privacy assurance must ideally become an
organization’s default mode of operation.
Data Privacy by Design
xebia.com
No action is required on the part
of the individual to protect their
privacy — it is built into the
system, by default.
Privacy as the
Default Setting
The result is that privacy
becomes an essential
component of the core
functionality being delivered.
Privacy Embedded
into Design
Privacy by Design seeks to
accommodate all legitimate
interests and objectives in a
positive-sum “win-win”
manner – without trade-offs.
Full Functionality –
Positive-Sum
Data Privacy by Design
PbD anticipates and
prevents privacy
invasive events before
they happen.
Proactive not
Reactive
Its component parts and
operations remain visible and
transparent, to users and
providers alike.
Visibility and Trans-
parency – Keep it Open
Keeping the interests of the individual uppermost by
offering such measures as strong privacy defaults,
appropriate notice, and empowering user-friendly
options.
Respect for User Privacy –
Keep it User-Centric
Privacy by Design ensures
cradle to grave, secure
lifecycle management of
information, end-to-end.
End-to-End Security – Full
Lifecycle Protection
xebia.com
The Norwegian Data Protection Authority has
developed these guidelines to help organisations
understand and comply with the requirement of data
protection by design and by default in article 25 of
the General Data Protection Regulation.
Data Protection by Design
and by Default
xebia.com
Setting requirements for
data protection and
information security for
the final product.
Requirements
Ensuring that requirements
for data protection and
information security are
reflected in the design.
Design
Writing secure code by
implementing the
requirements for data
protection and security.
Coding
Data Protection by Design
and by Default
Planning specific
trainings for
management and
employees
Training
Comprehensive and final
security review should be
done before the software is
released.
Release
Planning for incident
response handling
(prepared during the release
activity) and following it.
Maintenance
Checking that the requirements
for data protection and
information security have been
implemented as planned.
Testing
xebia.com
Put your shoes on!
Prerequisites
xebia.com
STRIDE is a model for identifying computer
security threats developed by Praerit Garg and Loren
Kohnfelder at Microsoft.
It provides a mnemonic for security threats in six
categories:
• Spoofing
• Tampering
• Repudiation
• Information Disclosure
• Denial of Service
• Elevation of Privileges
Prerequisites – Risk analysis
https://www.eccouncil.org/threat-modeling/
xebia.com
General review of the infrastructure and workload
(including the software architecture used) should be
done.
It should be a high-level review, not a detailed project
review:
• General architecture description
• Security setup (firewalls, network ACLs etc.)
• High-level recommendations
Prerequisites – Workload review
xebia.com
Well-Architected Review (WAR) should be done periodically. It
can be performed using the Well-Architected Tool in AWS
WAR describes key concepts, design principles, and best
practices for creating and running workloads in the cloud.
Most important pillars from Data Privacy perspective: Security
and Reliability.
Prerequisites – Well-Architected Review
xebia.com
• Securely operating workloads
• Managing permissions
• Protecting infrastructure
• Protect data at rest and in transit
• Testing against security issues
• Responding to security incidents
Security Pillar
• Managing workloads
• Designing high-available, resilient and self-healing
infrastructure
• Reliable deployment processes
• Business continuity
• Managing failures, disaster recovery
Reliability Pillar
Prerequisites – Well-Architected Review
xebia.com
 Draw the borders of your "world of concerns" first – model your threats with simple yet comprehensive tools like
STRIDE. Once you have done it, you know what you need to focus on!
 Use available tools and sources to obtain as much knowledge about security and reliability perspectives as
possible. One of the best tools (if not the best) in this area is the AWS Well-Architected Tool.
Prerequisites – Summary
xebia.com
Let’s dance!
Implementation
xebia.com
Confidentiality
Integrity
Accessibility
Resilience
Traceability
xebia.com
Limited access to
production infra and DB
Using IaaC to manage
infrastructure
Managed access to
codebase
Secrets stored in vault
(eg. Secrets Manager)
Good password policy
2FA used and enforced
wherever possible
Access restriction
policies (like bastion
hosts, VPNs etc.)
Resources encryption
(EBS, RDS, S3 etc.)
Content encryption
Communication
encryption
Control of the key – KMS
CMK
Permission model must
be flexible enough
Sensitive data – special
behavior
Elevating privileges
should be impossible
Tested permission model
Principle of least
privilege
Authentication
policies
Encryption Well-designed
features
Confidentiality
Confidentiality refers to protecting sensitive data from unauthorized access
xebia.com
Versioning is a default
setting
Used for all files,
including contracts,
internal documents,
agreements etc.
No long-living AWS
credentials
Only roles applied to
resources
Semantic roles
Validation for all
incoming data
Defined allowed values
for most fields (eg.
min/max for numeric
fields)
Cloud Trail for API
activity
Logs for S3, database,
workload – sent to
Cloudwatch
Audit trail in the
application
S3 object
versioning
IAM roles Data validation Monitoring and
logging
Integrity
Integrity means that data is protected against unwanted alteration, destruction, or loss.
xebia.com
Using landing zones or
Identity Center
Managing access
through IaaC
Limited and defined
access to production
resources
Flexible permission
model
Using RBAC, ABAC, ACL
and access levels
Data and infrastructure
redundancy
Access to data during
contingency plans
Data lifecycle policies
(eg. in S3)
Documentation of the
incident management
process
Well-described scenarios
for potential incidents
(STRIDE)
Access to
infrastructure
Permission model Availability of data Incident
management
Accessibility
Personal data must be available to authorised personnel who require it for their work.
xebia.com
Workload in multiple AZs
Self-healing
infrastructure
All components highly-
available: ALB, multi-AZ
RDS, EKS nodes in
ASG, replicated NATs
Using managed services
Well-chosen strategy for
DR (B&R, pilot light,
warm standby, multisite)
Preparing DR plan – pilot
light
Testing DR plan
Backup for database –
automatic snapshots,
PITR, manual snapshots
Object replication in S3
(multi-region)
Backup retention
Using DDoS protection
(CDN)
Resources firewall setup
– using semantic
Security Groups
Application firewalls –
WAF
Workload in private
subnets
High availability Disaster recovery Backup strategy Resilience to
attacks
Resilience
Software that is processing personal data must be able to resist vulnerabilities, attacks, and
accidents.
xebia.com
VPC flow logs, S3 logs,
ALB logs etc.
Meaningful application
logs
Request tracking (X-Ray)
Analyze logs –
Cloudwatch Logs
Insights
Notify when something is
detected (SNS)
History of inserts,
updates and deletes
Every trail record
contains ”before” and
„after” state
Who and when made the
change
Some data have
historical changes and
planned changes (eg.
employees)
Implementing SCD is
difficult but builds a
history of the record
Log everything Analyse & notify Audit trail Slowly Changing
Dimensions
Traceability
Traceability is documentation of changes made within the software, infrastructure and to personal
data.
xebia.com
Record the memories
Documentation
xebia.com
Security documentation
• OWASP Top 10 review
• Personal Data Access – document describing the processes to access personal/private data, who has access
to it, where they are stored etc.
• Personal Data Management rules, based on Requirements from NDPA checklist – generally speaking, what is
the reason of storing personal data, what is the legal basis of storing them, what preventive measures have
been implemented in terms of securing the data, how the data should be accessed, what are the
requirements of data backup etc.
Documentation
xebia.com
Implementation practices documentation
• Coding practices – describing the current coding practices in the project, including libraries used,
vulnerability scanning, code review process, branching model and all other components mentioned in NDPA
checklist.
• Testing practices – describing the current testing implemented in the project – testing frameworks, unit,
integration, end-to-end, system, performance testing practices etc. (NDPA checklist).
Documentation
xebia.com
Maintenance practices documentation
• Disaster Recovery plan (with test)
• Backup strategy
• Incident management plan - what to do after an incident occurs in terms of formal and implementation
practices
• Release management – what are the rules of release process, who’s responsible for it, how the process is
generally handled, since it usually implies accessing personal data directly or indirectly
• Maintenance process – what are the rules of accessing production environment in case of failure or hotfix.
Documentation
xebia.com
Summary
xebia.com
• Prepare well – define your world of concerns
• Analyse the risks
• Recognize best practices
• Document everything
• Evolution over revolution
Key takeaways
xebia.com
Questions?
https://www.linkedin.com/in/krzysztofkakol/
xebia.com
Thank you!
kkakol@xebia.com

More Related Content

Similar to Designing for Privacy in AWS cloud

#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWSAlert Logic
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignAmazon Web Services
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfInfosec Train
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfinfosec train
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreJoel Oleson
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...kanimozhin
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshopkanimozhin
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105 Thomas Treml
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...Amazon Web Services
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsTechcello
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23Rolf Koski
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applicationskanimozhin
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspectivejmcdaniel650
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxGenericName6
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on CloudTu Pham
 

Similar to Designing for Privacy in AWS cloud (20)

#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
Cloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdfCloud Security Engineer Interview Questions.pdf
Cloud Security Engineer Interview Questions.pdf
 
Securely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure ScoreSecurely Harden Microsoft 365 with Secure Score
Securely Harden Microsoft 365 with Secure Score
 
Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...Building multi tenant highly secured applications on .net for any cloud - dem...
Building multi tenant highly secured applications on .net for any cloud - dem...
 
Techcello hp-arch workshop
Techcello hp-arch workshopTechcello hp-arch workshop
Techcello hp-arch workshop
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Zero Trust 20211105
Zero Trust 20211105 Zero Trust 20211105
Zero Trust 20211105
 
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
(ENT202) Four Critical Things to Consider When Moving Your Core Business Appl...
 
Security Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS ApplicationsSecurity Architecture Best Practices for SaaS Applications
Security Architecture Best Practices for SaaS Applications
 
Security and Compliance
Security and ComplianceSecurity and Compliance
Security and Compliance
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future IBM Relay 2015: Securing the Future
IBM Relay 2015: Securing the Future
 
Security architecture best practices for saas applications
Security architecture best practices for saas applicationsSecurity architecture best practices for saas applications
Security architecture best practices for saas applications
 
Boot camp - Migration to AWS
Boot camp - Migration to AWSBoot camp - Migration to AWS
Boot camp - Migration to AWS
 
Cloud Ecosystems A Perspective
Cloud Ecosystems A PerspectiveCloud Ecosystems A Perspective
Cloud Ecosystems A Perspective
 
microsoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptxmicrosoft-cybersecurity-reference-architectures (1).pptx
microsoft-cybersecurity-reference-architectures (1).pptx
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 

Recently uploaded

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsstephieert
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Sheetaleventcompany
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝soniya singh
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024APNIC
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Roomgirls4nights
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607dollysharma2066
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Delhi Call girls
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of indiaimessage0108
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...APNIC
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Roomdivyansh0kumar0
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkataanamikaraghav4
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts servicevipmodelshub1
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...SofiyaSharma5
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts servicesonalikaur4
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...Diya Sharma
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)Damian Radcliffe
 

Recently uploaded (20)

Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Samaira 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Samaira 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Radiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girlsRadiant Call girls in Dubai O56338O268 Dubai Call girls
Radiant Call girls in Dubai O56338O268 Dubai Call girls
 
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
Call Girls Service Chandigarh Lucky ❤️ 7710465962 Independent Call Girls In C...
 
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
Call Girls In Defence Colony Delhi 💯Call Us 🔝8264348440🔝
 
On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024On Starlink, presented by Geoff Huston at NZNOG 2024
On Starlink, presented by Geoff Huston at NZNOG 2024
 
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls KolkataVIP Call Girls Kolkata Ananya 🤌  8250192130 🚀 Vip Call Girls Kolkata
VIP Call Girls Kolkata Ananya 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With RoomVIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
VIP Kolkata Call Girls Salt Lake 8250192130 Available With Room
 
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
FULL ENJOY Call Girls In Mayur Vihar Delhi Contact Us 8377087607
 
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
Best VIP Call Girls Noida Sector 75 Call Me: 8448380779
 
Gram Darshan PPT cyber rural in villages of india
Gram Darshan PPT cyber rural  in villages of indiaGram Darshan PPT cyber rural  in villages of india
Gram Darshan PPT cyber rural in villages of india
 
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
'Future Evolution of the Internet' delivered by Geoff Huston at Everything Op...
 
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130  Available With RoomVIP Kolkata Call Girl Alambazar 👉 8250192130  Available With Room
VIP Kolkata Call Girl Alambazar 👉 8250192130 Available With Room
 
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls KolkataRussian Call Girls in Kolkata Ishita 🤌  8250192130 🚀 Vip Call Girls Kolkata
Russian Call Girls in Kolkata Ishita 🤌 8250192130 🚀 Vip Call Girls Kolkata
 
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Alwarpet Phone 🍆 8250192130 👅 celebrity escorts service
 
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
Low Rate Young Call Girls in Sector 63 Mamura Noida ✔️☆9289244007✔️☆ Female E...
 
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts serviceChennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
Chennai Call Girls Porur Phone 🍆 8250192130 👅 celebrity escorts service
 
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
₹5.5k {Cash Payment}New Friends Colony Call Girls In [Delhi NIHARIKA] 🔝|97111...
 
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 26 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 
How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)How is AI changing journalism? (v. April 2024)
How is AI changing journalism? (v. April 2024)
 
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No AdvanceRohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
Rohini Sector 6 Call Girls Delhi 9999965857 @Sabina Saikh No Advance
 

Designing for Privacy in AWS cloud

  • 1. xebia.com Designing for Privacy in AWS cloud Krzysztof Kąkol – Chief of Data Engineering @ Xebia Poland
  • 2. xebia.com Krzysztof Kąkol Chief of Data Engineering and Solutions Architect in Xebia Poland AWS Community Builder & AWS Ambassador https://www.linkedin.com/in/krzysztofkakol/ Other stuff: Classical and jazz pianist PhD in AI-driven sound processing
  • 3. xebia.com HRM systems store user personal data and lots of sensitive data like salary. Clients want to know where the data are stored, who has access to it, what we do to avoid compromising. Clients have their checklists with requirements. Strong vendor responsibility comes with great risk that must be handled. HR is about privacy Clients want to be secure Business requirements Vendor’s risk Data Privacy by Design in HRM system
  • 5. xebia.com Privacy by Design is a concept developed by Ann Cavoukian in 90’s. It advances the view that the future of privacy cannot be assured solely by compliance with regulatory frameworks; rather, privacy assurance must ideally become an organization’s default mode of operation. Data Privacy by Design
  • 6. xebia.com No action is required on the part of the individual to protect their privacy — it is built into the system, by default. Privacy as the Default Setting The result is that privacy becomes an essential component of the core functionality being delivered. Privacy Embedded into Design Privacy by Design seeks to accommodate all legitimate interests and objectives in a positive-sum “win-win” manner – without trade-offs. Full Functionality – Positive-Sum Data Privacy by Design PbD anticipates and prevents privacy invasive events before they happen. Proactive not Reactive Its component parts and operations remain visible and transparent, to users and providers alike. Visibility and Trans- parency – Keep it Open Keeping the interests of the individual uppermost by offering such measures as strong privacy defaults, appropriate notice, and empowering user-friendly options. Respect for User Privacy – Keep it User-Centric Privacy by Design ensures cradle to grave, secure lifecycle management of information, end-to-end. End-to-End Security – Full Lifecycle Protection
  • 7. xebia.com The Norwegian Data Protection Authority has developed these guidelines to help organisations understand and comply with the requirement of data protection by design and by default in article 25 of the General Data Protection Regulation. Data Protection by Design and by Default
  • 8. xebia.com Setting requirements for data protection and information security for the final product. Requirements Ensuring that requirements for data protection and information security are reflected in the design. Design Writing secure code by implementing the requirements for data protection and security. Coding Data Protection by Design and by Default Planning specific trainings for management and employees Training Comprehensive and final security review should be done before the software is released. Release Planning for incident response handling (prepared during the release activity) and following it. Maintenance Checking that the requirements for data protection and information security have been implemented as planned. Testing
  • 9. xebia.com Put your shoes on! Prerequisites
  • 10. xebia.com STRIDE is a model for identifying computer security threats developed by Praerit Garg and Loren Kohnfelder at Microsoft. It provides a mnemonic for security threats in six categories: • Spoofing • Tampering • Repudiation • Information Disclosure • Denial of Service • Elevation of Privileges Prerequisites – Risk analysis https://www.eccouncil.org/threat-modeling/
  • 11. xebia.com General review of the infrastructure and workload (including the software architecture used) should be done. It should be a high-level review, not a detailed project review: • General architecture description • Security setup (firewalls, network ACLs etc.) • High-level recommendations Prerequisites – Workload review
  • 12. xebia.com Well-Architected Review (WAR) should be done periodically. It can be performed using the Well-Architected Tool in AWS WAR describes key concepts, design principles, and best practices for creating and running workloads in the cloud. Most important pillars from Data Privacy perspective: Security and Reliability. Prerequisites – Well-Architected Review
  • 13. xebia.com • Securely operating workloads • Managing permissions • Protecting infrastructure • Protect data at rest and in transit • Testing against security issues • Responding to security incidents Security Pillar • Managing workloads • Designing high-available, resilient and self-healing infrastructure • Reliable deployment processes • Business continuity • Managing failures, disaster recovery Reliability Pillar Prerequisites – Well-Architected Review
  • 14. xebia.com  Draw the borders of your "world of concerns" first – model your threats with simple yet comprehensive tools like STRIDE. Once you have done it, you know what you need to focus on!  Use available tools and sources to obtain as much knowledge about security and reliability perspectives as possible. One of the best tools (if not the best) in this area is the AWS Well-Architected Tool. Prerequisites – Summary
  • 17. xebia.com Limited access to production infra and DB Using IaaC to manage infrastructure Managed access to codebase Secrets stored in vault (eg. Secrets Manager) Good password policy 2FA used and enforced wherever possible Access restriction policies (like bastion hosts, VPNs etc.) Resources encryption (EBS, RDS, S3 etc.) Content encryption Communication encryption Control of the key – KMS CMK Permission model must be flexible enough Sensitive data – special behavior Elevating privileges should be impossible Tested permission model Principle of least privilege Authentication policies Encryption Well-designed features Confidentiality Confidentiality refers to protecting sensitive data from unauthorized access
  • 18. xebia.com Versioning is a default setting Used for all files, including contracts, internal documents, agreements etc. No long-living AWS credentials Only roles applied to resources Semantic roles Validation for all incoming data Defined allowed values for most fields (eg. min/max for numeric fields) Cloud Trail for API activity Logs for S3, database, workload – sent to Cloudwatch Audit trail in the application S3 object versioning IAM roles Data validation Monitoring and logging Integrity Integrity means that data is protected against unwanted alteration, destruction, or loss.
  • 19. xebia.com Using landing zones or Identity Center Managing access through IaaC Limited and defined access to production resources Flexible permission model Using RBAC, ABAC, ACL and access levels Data and infrastructure redundancy Access to data during contingency plans Data lifecycle policies (eg. in S3) Documentation of the incident management process Well-described scenarios for potential incidents (STRIDE) Access to infrastructure Permission model Availability of data Incident management Accessibility Personal data must be available to authorised personnel who require it for their work.
  • 20. xebia.com Workload in multiple AZs Self-healing infrastructure All components highly- available: ALB, multi-AZ RDS, EKS nodes in ASG, replicated NATs Using managed services Well-chosen strategy for DR (B&R, pilot light, warm standby, multisite) Preparing DR plan – pilot light Testing DR plan Backup for database – automatic snapshots, PITR, manual snapshots Object replication in S3 (multi-region) Backup retention Using DDoS protection (CDN) Resources firewall setup – using semantic Security Groups Application firewalls – WAF Workload in private subnets High availability Disaster recovery Backup strategy Resilience to attacks Resilience Software that is processing personal data must be able to resist vulnerabilities, attacks, and accidents.
  • 21. xebia.com VPC flow logs, S3 logs, ALB logs etc. Meaningful application logs Request tracking (X-Ray) Analyze logs – Cloudwatch Logs Insights Notify when something is detected (SNS) History of inserts, updates and deletes Every trail record contains ”before” and „after” state Who and when made the change Some data have historical changes and planned changes (eg. employees) Implementing SCD is difficult but builds a history of the record Log everything Analyse & notify Audit trail Slowly Changing Dimensions Traceability Traceability is documentation of changes made within the software, infrastructure and to personal data.
  • 23. xebia.com Security documentation • OWASP Top 10 review • Personal Data Access – document describing the processes to access personal/private data, who has access to it, where they are stored etc. • Personal Data Management rules, based on Requirements from NDPA checklist – generally speaking, what is the reason of storing personal data, what is the legal basis of storing them, what preventive measures have been implemented in terms of securing the data, how the data should be accessed, what are the requirements of data backup etc. Documentation
  • 24. xebia.com Implementation practices documentation • Coding practices – describing the current coding practices in the project, including libraries used, vulnerability scanning, code review process, branching model and all other components mentioned in NDPA checklist. • Testing practices – describing the current testing implemented in the project – testing frameworks, unit, integration, end-to-end, system, performance testing practices etc. (NDPA checklist). Documentation
  • 25. xebia.com Maintenance practices documentation • Disaster Recovery plan (with test) • Backup strategy • Incident management plan - what to do after an incident occurs in terms of formal and implementation practices • Release management – what are the rules of release process, who’s responsible for it, how the process is generally handled, since it usually implies accessing personal data directly or indirectly • Maintenance process – what are the rules of accessing production environment in case of failure or hotfix. Documentation
  • 27. xebia.com • Prepare well – define your world of concerns • Analyse the risks • Recognize best practices • Document everything • Evolution over revolution Key takeaways