SlideShare a Scribd company logo
1 of 19
Download to read offline
July 10-11, 2019
The Conference Center,
Emory University: Building a Secure
and Manageable Cloud Environment
Rich Mendola
Enterprise Chief Information Officer and
Senior Vice Provost for Library Services and Digital Scholarship
Topics
• High level objectives for AWS at Emory Service
• Emory & faculty context
• AWS at Emory – security model
• AWS at Emory – provisioning and management
• RHEDcloud foundation
• Q&A
Objectives
• Mediate access to AWS for Emory
research community:
– Preserve functionality, agility, and
automation of AWS to the greatest possible
extent
– Simplify administrative overhead by
integrating Emory authentication, billing,
network and service desk workflows
– Reduce risks associated with sensitive
research by incorporating AWS and
Emory security controls
“The parts of the stack under customer
control can make public cloud computing
a highly efficient way for inexperienced
users to implement poor practices, which
can easily result in security or compliance
failures”
Clouds are Secure: Are You Using Them Securely?
Gartner Analyst Jay Heiser, January 31, 2018
Emory University
• Located in Atlanta, Georgia
• 33,000+ employees (university: 14,349;
healthcare: 18,328)
• $5.6 billion annual operating budget (university:
$2.1; healthcare: $3.5)
• 10 hospitals, 172 preventative care locations,
496 specialty locations
• $7.31 billion total endowment
• $734 million in research funding awards (fiscal
2018)
Faculty Engagement
• Central research IT group meetings with
investigators and their teams to understand
requirements
• Feasibility pilots
• Research IT governance review
• Many months determining
security approach and
commitment
Security Concerns
• HIPAA and other compliance obligations
• Little understanding of the shared responsibility
model
• IT and cyber security competency of expected
user base varies
• Loss of centralized network security controls
• How to block critical threats
Layered Security Approach
• Service risk assessments
• Network design
• Service control policies
• Identity and access management policies
• Security risk detectors and security risk remediators
• Splunk monitoring of CloudTrail logs
• Rules of behavior
Service Risk Assessments
• For each service, we:
– Identify risks
– Determine how the risks can be addressed
– Document service use guidelines
• The aforementioned assessments inform specifications for the
implementation of detective, preventative, and policy-based
controls.
Network Design and Preventative Controls
• Network topology – VPCs extend Emory’s network through site-to-site
VPN tunnels allowing Emory to leverage existing on-premises network
controls
• Deep integration with Emory network, Emory on-premises Palo Alto
firewalls, Emory Shibboleth (SAML) for authentication, Emory NetIQ
Identity Management for role-based authorization
• Preventative Controls (preferred)
– Service Control Policies
– IAM roles
– IAM policies (attached to roles)
Detective and Remediation Controls
• AWS GuardDuty enabled in each account
– Analyzes Amazon VPC flow logs and CloudTrail logs with machine Learning to
identify and alert on anomalous or malicious activity
– Does not analyze configurations for variance against desired state
• Custom security risk detectors/remediators (64 and counting)
– Emory engineered software that can scale out to overwatch many accounts and
realize short check intervals (10s)
– Our SRD/SRR infrastructure far exceeds AWS platform capabilities for similar
detection and remediation
– Commercial solutions in this space were prohibitively expensive and had
significantly higher latency
Policy Controls
• AWS at Emory: Rules of Behavior
– Account owners and administrators must agree to terms
– Limits cloud based processing of sensitive data to AWS at Emory
– Establishes financial accountability
– Documents additional requirements for electronically protected
health information (ePHI) and Institute for Healthcare Improvement
– Emphasizes the shared responsibility model of AWS
– Prohibits users from attempting to hack or bypass security controls
– Requires prompt remediation of risks identified within customer
accounts
Account Creation Workflow
• Initiated via Emory ServiceNow form
• Highlights include
– Allows user to select HIPAA or non-HIPAA account
– Specifies type of VPC (1 – extend Emory’s network
to AWS/all traffic backhauled to Emory; or 2 –
direct access to public facing internet behind Palo
Alto firewall)
– Creates new AWS account and links it with Emory
IDM system (NetIQ) allowing for SAML SSO
– Links Emory (Peoplesoft) financial account to AWS
account/billing
…
Virtual Private Cloud Provisioning (VPCP) App
• Single pane of glass with Emory specific AWS functions
– Manage account metadata and admin roles
– Create and maintain VPCs
– Manage CIDR ranges for VPCs
– Create and maintain elastic IPs
– Create and maintain firewall rules
– View detailed billing information
Other Important Attributes of Offering
• Over 600k lines of code (web app, provisioning, and security)
• Emory users that adopt our offering also get:
– AWS Enterprise Support plan
– Business Associate Addendum (BAA) that applies to HIPAA-
designated services
– Custom utilities that simplify generation of temporary keys, reducing
security risk
• Offering built using service-oriented architecture with Java,
web services, Python, and PyTest
Custom AWS at Emory Landing Page
https://aws.emory.edu/
Shows a subset of Emory
approved AWS and provides
links to both a different account
creation page and a Virtual
Private Cloud Provisioning app
Note: There is a demo of the AWS at Emory Service under the documentation menu.
RHEDcloud Foundation
• Created the RHEDcloud foundation to open source work
products described in this presentation and extend to other
major cloud platforms. Founding members include Emory,
AWS, Google, Microsoft, Smartronix, Cisco, Palo Alto Networks,
Merck Pharmaceuticals, Duke, Rice, U. of Colorado, U. of North
Carolina, U. of Washington, U. of Minnesota and U. of
Wisconsin
• Goal is to make it financially feasible for all parties to curate a
security model that works on all the major cloud platforms
Have we achieved our objectives?
• AWS @ Emory service launched in June; currently 33 accounts
• In the past 30 days, our SRD/SRRs have detected and
remediated 334 misconfigurations
• GuardDuty alerted us to 7 actionable issues that needed to be
investigated/remediated
• Splunk monitoring of CloudTrail logs alerted us to 18 issues
that needed to be investigated/remediated
Thank you!
Rich Mendola
rich.mendola@emory.edu

More Related Content

What's hot

Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)Moises Navarro
 
Cloud computing and education
Cloud computing and educationCloud computing and education
Cloud computing and educationmaster student
 
Cloud Computing for Elearning
Cloud Computing for ElearningCloud Computing for Elearning
Cloud Computing for ElearningRoryMcGreal
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case StudyCitrix
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Dr. Trilok Kumar Jain
 
IRJET- Advanced Cloud in E-Libraries
IRJET- Advanced Cloud in E-LibrariesIRJET- Advanced Cloud in E-Libraries
IRJET- Advanced Cloud in E-LibrariesIRJET Journal
 
Horizon scanning and future trends
Horizon scanning and future trendsHorizon scanning and future trends
Horizon scanning and future trendsMartin Hamilton
 
Owens Community College adds Single Sign-On and Meets FERPA
Owens Community College adds Single Sign-On and Meets FERPAOwens Community College adds Single Sign-On and Meets FERPA
Owens Community College adds Single Sign-On and Meets FERPANetIQ
 
Tom's River Case Study
Tom's River Case StudyTom's River Case Study
Tom's River Case StudySecurly
 

What's hot (11)

Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)Cloud Computing (Brief Client Briefing   Research & Univ   Oct 2009   en UK)
Cloud Computing (Brief Client Briefing Research & Univ Oct 2009 en UK)
 
Cloud computing and education
Cloud computing and educationCloud computing and education
Cloud computing and education
 
Cloud Computing for Elearning
Cloud Computing for ElearningCloud Computing for Elearning
Cloud Computing for Elearning
 
Brief Cloud Computing
Brief Cloud ComputingBrief Cloud Computing
Brief Cloud Computing
 
Cloud computing
Cloud computing Cloud computing
Cloud computing
 
University of South Florida Case Study
University of South Florida Case StudyUniversity of South Florida Case Study
University of South Florida Case Study
 
Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...Elucidating the impact of cloud computing in education sector Benefits and Ch...
Elucidating the impact of cloud computing in education sector Benefits and Ch...
 
IRJET- Advanced Cloud in E-Libraries
IRJET- Advanced Cloud in E-LibrariesIRJET- Advanced Cloud in E-Libraries
IRJET- Advanced Cloud in E-Libraries
 
Horizon scanning and future trends
Horizon scanning and future trendsHorizon scanning and future trends
Horizon scanning and future trends
 
Owens Community College adds Single Sign-On and Meets FERPA
Owens Community College adds Single Sign-On and Meets FERPAOwens Community College adds Single Sign-On and Meets FERPA
Owens Community College adds Single Sign-On and Meets FERPA
 
Tom's River Case Study
Tom's River Case StudyTom's River Case Study
Tom's River Case Study
 

Similar to Building a Secure and Manageable Cloud Environment at Emory University

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 
(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and AutomationAmazon Web Services
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Standards Customer Council
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23Rolf Koski
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyCloud Standards Customer Council
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeCloudHesive
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practicesSundeep Roxx
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresAmazon Web Services
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAmazon Web Services
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...Amazon Web Services
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Standards Customer Council
 

Similar to Building a Secure and Manageable Cloud Environment at Emory University (20)

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation(ISM206) Modern IT Governance Through Transparency and Automation
(ISM206) Modern IT Governance Through Transparency and Automation
 
Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0Cloud Security Standards: What to Expect and What to Negotiate V2.0
Cloud Security Standards: What to Expect and What to Negotiate V2.0
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Latest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and PrivacyLatest Developments in Cloud Security Standards and Privacy
Latest Developments in Cloud Security Standards and Privacy
 
Governance at Scale
Governance at Scale Governance at Scale
Governance at Scale
 
Winning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our TimeWinning Governance Strategies for the Technology Disruptions of our Time
Winning Governance Strategies for the Technology Disruptions of our Time
 
Security and compliance
Security and complianceSecurity and compliance
Security and compliance
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 
Cloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud ServicesCloud Customer Architecture for Securing Workloads on Cloud Services
Cloud Customer Architecture for Securing Workloads on Cloud Services
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Building a Secure and Manageable Cloud Environment at Emory University

  • 1. July 10-11, 2019 The Conference Center,
  • 2. Emory University: Building a Secure and Manageable Cloud Environment Rich Mendola Enterprise Chief Information Officer and Senior Vice Provost for Library Services and Digital Scholarship
  • 3. Topics • High level objectives for AWS at Emory Service • Emory & faculty context • AWS at Emory – security model • AWS at Emory – provisioning and management • RHEDcloud foundation • Q&A
  • 4. Objectives • Mediate access to AWS for Emory research community: – Preserve functionality, agility, and automation of AWS to the greatest possible extent – Simplify administrative overhead by integrating Emory authentication, billing, network and service desk workflows – Reduce risks associated with sensitive research by incorporating AWS and Emory security controls “The parts of the stack under customer control can make public cloud computing a highly efficient way for inexperienced users to implement poor practices, which can easily result in security or compliance failures” Clouds are Secure: Are You Using Them Securely? Gartner Analyst Jay Heiser, January 31, 2018
  • 5. Emory University • Located in Atlanta, Georgia • 33,000+ employees (university: 14,349; healthcare: 18,328) • $5.6 billion annual operating budget (university: $2.1; healthcare: $3.5) • 10 hospitals, 172 preventative care locations, 496 specialty locations • $7.31 billion total endowment • $734 million in research funding awards (fiscal 2018)
  • 6. Faculty Engagement • Central research IT group meetings with investigators and their teams to understand requirements • Feasibility pilots • Research IT governance review • Many months determining security approach and commitment
  • 7. Security Concerns • HIPAA and other compliance obligations • Little understanding of the shared responsibility model • IT and cyber security competency of expected user base varies • Loss of centralized network security controls • How to block critical threats
  • 8. Layered Security Approach • Service risk assessments • Network design • Service control policies • Identity and access management policies • Security risk detectors and security risk remediators • Splunk monitoring of CloudTrail logs • Rules of behavior
  • 9. Service Risk Assessments • For each service, we: – Identify risks – Determine how the risks can be addressed – Document service use guidelines • The aforementioned assessments inform specifications for the implementation of detective, preventative, and policy-based controls.
  • 10. Network Design and Preventative Controls • Network topology – VPCs extend Emory’s network through site-to-site VPN tunnels allowing Emory to leverage existing on-premises network controls • Deep integration with Emory network, Emory on-premises Palo Alto firewalls, Emory Shibboleth (SAML) for authentication, Emory NetIQ Identity Management for role-based authorization • Preventative Controls (preferred) – Service Control Policies – IAM roles – IAM policies (attached to roles)
  • 11. Detective and Remediation Controls • AWS GuardDuty enabled in each account – Analyzes Amazon VPC flow logs and CloudTrail logs with machine Learning to identify and alert on anomalous or malicious activity – Does not analyze configurations for variance against desired state • Custom security risk detectors/remediators (64 and counting) – Emory engineered software that can scale out to overwatch many accounts and realize short check intervals (10s) – Our SRD/SRR infrastructure far exceeds AWS platform capabilities for similar detection and remediation – Commercial solutions in this space were prohibitively expensive and had significantly higher latency
  • 12. Policy Controls • AWS at Emory: Rules of Behavior – Account owners and administrators must agree to terms – Limits cloud based processing of sensitive data to AWS at Emory – Establishes financial accountability – Documents additional requirements for electronically protected health information (ePHI) and Institute for Healthcare Improvement – Emphasizes the shared responsibility model of AWS – Prohibits users from attempting to hack or bypass security controls – Requires prompt remediation of risks identified within customer accounts
  • 13. Account Creation Workflow • Initiated via Emory ServiceNow form • Highlights include – Allows user to select HIPAA or non-HIPAA account – Specifies type of VPC (1 – extend Emory’s network to AWS/all traffic backhauled to Emory; or 2 – direct access to public facing internet behind Palo Alto firewall) – Creates new AWS account and links it with Emory IDM system (NetIQ) allowing for SAML SSO – Links Emory (Peoplesoft) financial account to AWS account/billing …
  • 14. Virtual Private Cloud Provisioning (VPCP) App • Single pane of glass with Emory specific AWS functions – Manage account metadata and admin roles – Create and maintain VPCs – Manage CIDR ranges for VPCs – Create and maintain elastic IPs – Create and maintain firewall rules – View detailed billing information
  • 15. Other Important Attributes of Offering • Over 600k lines of code (web app, provisioning, and security) • Emory users that adopt our offering also get: – AWS Enterprise Support plan – Business Associate Addendum (BAA) that applies to HIPAA- designated services – Custom utilities that simplify generation of temporary keys, reducing security risk • Offering built using service-oriented architecture with Java, web services, Python, and PyTest
  • 16. Custom AWS at Emory Landing Page https://aws.emory.edu/ Shows a subset of Emory approved AWS and provides links to both a different account creation page and a Virtual Private Cloud Provisioning app Note: There is a demo of the AWS at Emory Service under the documentation menu.
  • 17. RHEDcloud Foundation • Created the RHEDcloud foundation to open source work products described in this presentation and extend to other major cloud platforms. Founding members include Emory, AWS, Google, Microsoft, Smartronix, Cisco, Palo Alto Networks, Merck Pharmaceuticals, Duke, Rice, U. of Colorado, U. of North Carolina, U. of Washington, U. of Minnesota and U. of Wisconsin • Goal is to make it financially feasible for all parties to curate a security model that works on all the major cloud platforms
  • 18. Have we achieved our objectives? • AWS @ Emory service launched in June; currently 33 accounts • In the past 30 days, our SRD/SRRs have detected and remediated 334 misconfigurations • GuardDuty alerted us to 7 actionable issues that needed to be investigated/remediated • Splunk monitoring of CloudTrail logs alerted us to 18 issues that needed to be investigated/remediated