SlideShare a Scribd company logo
SECURING YOUR AWS
FORTRESS
STRATEGIES FOR SECURE IDENTITY,DATA AND INFRASTRUCTURE
By Ellan G
This Photo by Unknown author is licensed under CC BY-SA.
AWS SUMMIT
JOHANNESBURG
AGENDA
• IMPORTANCE OF SECURITY STRATEGIES
• GROWING THREAT LANDSCAPE IN
CLOUD
• IDENTITY STRATEGY
• DATA SECURITY STRATEGY
• INFRASTRUCTURE STRATEGY
• SDLC STRATEGY
• TAKEAWAYS
• THANKS & Q/A
Speaker Profile
Ellan Wambugu
I am a DevOps engineer with experience
across AWS,GCP and Azure. A
cybersecurity professional specializing in
Multi-Cloud Red Teaming . A developer
working mostly with Python and Golang
REST APIs. A stressed Man Utd fan
Importance Of Security Strategies
2023 cloud security statistics from RESMO
Cloud Threat Landscape: The Sneaky
World Of Software Supply Chain Attacks
• Supply Chain Attacks defined
• The Growing Frequency
• Consequences & Lessons from the
Attacks
• Increasing Threat Landscape & Attack
Vectors
• Regulatory & Compliance Implications
• Need for Proactive Defense
• Authentication is the process of confirming
the identity of the principal trying to access an
AWS product.
• Authorization: The identity has to be
configured on what permissions they have
under identity
• Account for the permissions one is given by
using tools such as IAM access analyzer
SECURING YOUR IDENTITY IN AWS
Locking The Front Door:
AWS Identity Best Practices
• Federate Human users using temporary
credentials
• MFA all Accounts
• Rotate Keys Regularly For long term use
cases
• Use Access Analyzer to Implement
Accountability to different Principles
• IAM Cross Account Guard Rails
• Regularly Review Your Roles and
Principles Use Cases
Guarding Your Data Fortress: AWS Data Security
• Proactive Security Response
• Encryption (at rest & in transit) is a
necessary evil
• Access Controls (user & resource level)
• Data Backups (security breach resilience)
• Monitoring (threat detection)
• Data Protection & Compliance
Data Security
Checklist: Check It
Twice
• Data Classification –
• is it public?
internal? Confidential? Tagged?
• Data Encryption & Key
Management
• Access Auditing
• Data Masking &
Anonymization
• Retention and Disposal
Building Fort Knox:
AWS Infrastructure
Security
• Paramount to Implement Defense in Depth
Principles
• Working With Zero Trust Architecture
Mindset
• Proactive rather than Reactive Cybersecurity
Culture
• Security Events can quickly escalate into
disasters
Cure or Chaos:
DevSecOps in SDLC
• Importance of a Secure SDLC
• DevSecOps as a Solution
• Integrated Security Testing
• Continuous Monitoring & Threat
Detection
• Vulnerability Scanning & Patching
• Container Security
• Challenges On Adoption
The Road To Security
Stardom: AWS Security
Maturity RoadMap
• With the growing complexity of
cloud environments, ensuring the
security of your AWS
infrastructure has become more
critical than ever. Developing a
robust security roadmap is
essential to safeguard your data
and protect against potential
threats
FOUNDATIONAL
MAKE AN INVENTORY OF
YOUR AWS
ENVIRONMENT
ANALYZE YOUR DATA
SECURITY POSTURE
TEST YOUR SECURITY
ASSURANCE &
COMPLIANCE
ESTABLISH A SOLID
SECURITY BASELINE
INTEGRATION
• ESTABLISH INCIDENT RESPONSE PROTOCOLS
• INTEGRATE DETECTION AND MONITORING
SYSTEMS
• IMPLEMENT REGULAR VULNERABILITY
ASSESSMENTS
• PRIVILEDGE REVIEW
• CULTURE OF SECURITY AWARENESS
AUTOMATION
INTEGRATE SIEM & SOAR TOOLS
LEVERAGE AWS NATIVE SECURITY SERVICES
AUTOMATE DEVIATION CORRECTION
AUTOMATE CRITICAL & MOST RUN PLAYBOOK
SECURITY CHAMPIONS IN DEVELOPMENT TEAMS
OPTIMIZE
STAY UPDATED ON EMERGING
THREATS & BEST PRACTICES
THREAT INTELLIGENCE &
THREAT HUNTING
REDUCE YOUR BLAST RADIUS
DEMO: DEVSECOPS PIPELINE IN AWS
Thanks / Q&A
Thanks for making time to listen
-Ellan

More Related Content

Similar to DevSecOps AWS.pptx for AWS Summit Johannesburg 2023

Barracuda, AWS & Securosis: Application Security for the Cloud
Barracuda, AWS & Securosis:  Application Security for the CloudBarracuda, AWS & Securosis:  Application Security for the Cloud
Barracuda, AWS & Securosis: Application Security for the Cloud
Amazon Web Services
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
Outpost24
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
Vandana Verma
 
Shared Security in AWS
Shared Security in AWSShared Security in AWS
Shared Security in AWS
PolarSeven Pty Ltd
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Alert Logic
 
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
BsidesNairobiPresentation.pptx for cloud threat intelligence  presentation at...BsidesNairobiPresentation.pptx for cloud threat intelligence  presentation at...
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
ellan12
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
Alert Logic
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
Paulo Renato
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
Amazon Web Services
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
Amazon Web Services
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
Viresh Suri
 
Building a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterBuilding a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data Center
Patrick Sklodowski
 
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise KubernetesDCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
Docker, Inc.
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
RightScale
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
GovCloud Network
 
Aws cloud computing course
Aws cloud computing courseAws cloud computing course
Aws cloud computing course
samyak IT solutions pvt ltd
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
AWS Riyadh User Group
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
CloudExpoEurope
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
Tu Pham
 

Similar to DevSecOps AWS.pptx for AWS Summit Johannesburg 2023 (20)

Barracuda, AWS & Securosis: Application Security for the Cloud
Barracuda, AWS & Securosis:  Application Security for the CloudBarracuda, AWS & Securosis:  Application Security for the Cloud
Barracuda, AWS & Securosis: Application Security for the Cloud
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
 
Incident response in Cloud
Incident response in CloudIncident response in Cloud
Incident response in Cloud
 
Shared Security in AWS
Shared Security in AWSShared Security in AWS
Shared Security in AWS
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
BsidesNairobiPresentation.pptx for cloud threat intelligence  presentation at...BsidesNairobiPresentation.pptx for cloud threat intelligence  presentation at...
BsidesNairobiPresentation.pptx for cloud threat intelligence presentation at...
 
CSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the CloudCSS17: Houston - Introduction to Security in the Cloud
CSS17: Houston - Introduction to Security in the Cloud
 
Azure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure CloudAzure 101: Shared responsibility in the Azure Cloud
Azure 101: Shared responsibility in the Azure Cloud
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
Building a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data CenterBuilding a Secure and Compliant Azure Virtual Data Center
Building a Secure and Compliant Azure Virtual Data Center
 
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise KubernetesDCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
DCSF 19 Zero Trust Networks Come to Enterprise Kubernetes
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
110307 cloud security requirements gourley
110307 cloud security requirements gourley110307 cloud security requirements gourley
110307 cloud security requirements gourley
 
Aws cloud computing course
Aws cloud computing courseAws cloud computing course
Aws cloud computing course
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
System Security on Cloud
System Security on CloudSystem Security on Cloud
System Security on Cloud
 

Recently uploaded

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Malak Abu Hammad
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
Kari Kakkonen
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
shyamraj55
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
Matthew Sinclair
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
Alpen-Adria-Universität
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
Techgropse Pvt.Ltd.
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
Zilliz
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
Safe Software
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
Zilliz
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 

Recently uploaded (20)

Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdfUnlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
Unlock the Future of Search with MongoDB Atlas_ Vector Search Unleashed.pdf
 
Climate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing DaysClimate Impact of Software Testing at Nordic Testing Days
Climate Impact of Software Testing at Nordic Testing Days
 
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with SlackLet's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
Let's Integrate MuleSoft RPA, COMPOSER, APM with AWS IDP along with Slack
 
CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 202420240605 QFM017 Machine Intelligence Reading List May 2024
20240605 QFM017 Machine Intelligence Reading List May 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
Video Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the FutureVideo Streaming: Then, Now, and in the Future
Video Streaming: Then, Now, and in the Future
 
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdfAI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
AI-Powered Food Delivery Transforming App Development in Saudi Arabia.pdf
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
Full-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalizationFull-RAG: A modern architecture for hyper-personalization
Full-RAG: A modern architecture for hyper-personalization
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Essentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FMEEssentials of Automations: The Art of Triggers and Actions in FME
Essentials of Automations: The Art of Triggers and Actions in FME
 
Programming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup SlidesProgramming Foundation Models with DSPy - Meetup Slides
Programming Foundation Models with DSPy - Meetup Slides
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 

DevSecOps AWS.pptx for AWS Summit Johannesburg 2023

  • 1. SECURING YOUR AWS FORTRESS STRATEGIES FOR SECURE IDENTITY,DATA AND INFRASTRUCTURE By Ellan G This Photo by Unknown author is licensed under CC BY-SA.
  • 2. AWS SUMMIT JOHANNESBURG AGENDA • IMPORTANCE OF SECURITY STRATEGIES • GROWING THREAT LANDSCAPE IN CLOUD • IDENTITY STRATEGY • DATA SECURITY STRATEGY • INFRASTRUCTURE STRATEGY • SDLC STRATEGY • TAKEAWAYS • THANKS & Q/A
  • 3. Speaker Profile Ellan Wambugu I am a DevOps engineer with experience across AWS,GCP and Azure. A cybersecurity professional specializing in Multi-Cloud Red Teaming . A developer working mostly with Python and Golang REST APIs. A stressed Man Utd fan
  • 4. Importance Of Security Strategies 2023 cloud security statistics from RESMO
  • 5. Cloud Threat Landscape: The Sneaky World Of Software Supply Chain Attacks • Supply Chain Attacks defined • The Growing Frequency • Consequences & Lessons from the Attacks • Increasing Threat Landscape & Attack Vectors • Regulatory & Compliance Implications • Need for Proactive Defense
  • 6. • Authentication is the process of confirming the identity of the principal trying to access an AWS product. • Authorization: The identity has to be configured on what permissions they have under identity • Account for the permissions one is given by using tools such as IAM access analyzer SECURING YOUR IDENTITY IN AWS
  • 7. Locking The Front Door: AWS Identity Best Practices • Federate Human users using temporary credentials • MFA all Accounts • Rotate Keys Regularly For long term use cases • Use Access Analyzer to Implement Accountability to different Principles • IAM Cross Account Guard Rails • Regularly Review Your Roles and Principles Use Cases
  • 8. Guarding Your Data Fortress: AWS Data Security • Proactive Security Response • Encryption (at rest & in transit) is a necessary evil • Access Controls (user & resource level) • Data Backups (security breach resilience) • Monitoring (threat detection) • Data Protection & Compliance
  • 9. Data Security Checklist: Check It Twice • Data Classification – • is it public? internal? Confidential? Tagged? • Data Encryption & Key Management • Access Auditing • Data Masking & Anonymization • Retention and Disposal
  • 10. Building Fort Knox: AWS Infrastructure Security • Paramount to Implement Defense in Depth Principles • Working With Zero Trust Architecture Mindset • Proactive rather than Reactive Cybersecurity Culture • Security Events can quickly escalate into disasters
  • 11. Cure or Chaos: DevSecOps in SDLC • Importance of a Secure SDLC • DevSecOps as a Solution • Integrated Security Testing • Continuous Monitoring & Threat Detection • Vulnerability Scanning & Patching • Container Security • Challenges On Adoption
  • 12. The Road To Security Stardom: AWS Security Maturity RoadMap • With the growing complexity of cloud environments, ensuring the security of your AWS infrastructure has become more critical than ever. Developing a robust security roadmap is essential to safeguard your data and protect against potential threats
  • 13. FOUNDATIONAL MAKE AN INVENTORY OF YOUR AWS ENVIRONMENT ANALYZE YOUR DATA SECURITY POSTURE TEST YOUR SECURITY ASSURANCE & COMPLIANCE ESTABLISH A SOLID SECURITY BASELINE
  • 14. INTEGRATION • ESTABLISH INCIDENT RESPONSE PROTOCOLS • INTEGRATE DETECTION AND MONITORING SYSTEMS • IMPLEMENT REGULAR VULNERABILITY ASSESSMENTS • PRIVILEDGE REVIEW • CULTURE OF SECURITY AWARENESS
  • 15. AUTOMATION INTEGRATE SIEM & SOAR TOOLS LEVERAGE AWS NATIVE SECURITY SERVICES AUTOMATE DEVIATION CORRECTION AUTOMATE CRITICAL & MOST RUN PLAYBOOK SECURITY CHAMPIONS IN DEVELOPMENT TEAMS
  • 16. OPTIMIZE STAY UPDATED ON EMERGING THREATS & BEST PRACTICES THREAT INTELLIGENCE & THREAT HUNTING REDUCE YOUR BLAST RADIUS
  • 18. Thanks / Q&A Thanks for making time to listen -Ellan