SlideShare a Scribd company logo
1 of 52
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Eduardo Delgado
31 de mayo de 2018
Mejores prácticas para
Administrar operaciones de
seguridad en AWS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
La cuenta de AWS como límite
• El más alto grado de segregación
• Por clasificación de datos
• Unidad de negocio
• Cargas de trabajo
• Funcional
En VPC
• SGs, NACLs
• Restricciones a nivel de
recursos con AWS IAM
VPC como límite (a nivel cuenta AWS)
• Equivalente a separar redes
• Peering, ruteo (+ todo lo de arriba)
• AWS IAM similar a lo anterior
• Flexibilidad
• Innovación
• Tamaño
adecuado
• Radio de la
expansión
• Segregación
• Clasificación
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
App A.1
App B.1
App A.2
App B.2
Registro
Agg.
Otros
(1..N)
SecOps
EquipoBEquipoAComún
Independientemente de
los límites, considere :
- Cómo agregar los
registros (logs)
- Cuenta dedicada para
SecOps
BU A BU B
Registro
Agg.
SecOps
Conf A.2
Pub A.2
App A.1
App A.2
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
De Hacia
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudFormation + AWS Organizations
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Batería de casos de prueba Revisión de
especificaciones
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Fase de creación: Control de cambios en código fuente
• Análisis de código estático: analizar las plantillas de CFN contra un conjunto de reglas de
seguridad
Fase de aceptación: Ambiente de desarrollo
• Análisis dinámico: ejecutar la plantilla en el entorno de pruebas de sandbox/aceptación
Fases de Capacidad/integración/staging: Ambiente pre-producción
• Carga, rendimiento, penetración, y prueba de failover
Fase de producción: Ambiente de producción
• Implementar ...
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Monitoreo AjustesControl
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Señal
Ruido
Recopilar Remediar
Hacer nada
Corregir
Alertar
Enriquece
r
Detener
Medir
Espectro de opciones
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
API calls (AWS CloudTrail)
son registradas
StopTrail/Change Regresar
Control Monitoreo
Ajustar
SSH solo de la subred del
bastion
Crear/cambiar SGs validar
fuente si puerto == 22
Cambiar SG vía
AWS Lambda
Todas las instancias con la
mismas versiones de
parches
AWS Systems Manager +
AWS Config rules
Aplicar parches vía
AWS Systems Manager
No acceso a root AmazongCloudWatch logs +
Syslog
Aislar e investigar
No objetos públicos en
Amazon S3
Registro a nivel objeto con
CloudTrail
Hacer un objeto privado
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
https://aws.amazon.com/blogs/security/how-to-detect-and-
automatically-remediate-unintended-permissions-in-amazon-s3-
object-acls-with-cloudwatch-events/
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Estableciendo la seguridad de la plataforma
• Estableciendo la seguridad de la red
• Estableciendo la seguridad del sistema operativo
• Estableciendo protección de datos
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Estableciendo la seguridad de la plataforma
• Estableciendo la seguridad de la red
• Estableciendo la seguridad del sistema operativo
• Estableciendo protección de datos
Reposo:
- AWS KMS
- AWS
CloudHSM
Tránsito:
- VPN
- ACM
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Estableciendo la seguridad de la plataforma
• Estableciendo la seguridad de la red
• Estableciendo la seguridad del sistema operativo
• Estableciendo protección de datos
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon EC2 Systems Manager
Ejecutar comandos Administrador de
estados
Inventario Ventana de
mantenimiento
Administrador de
parches
Automatización Almacenamiento de
parámetros
Documentos
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comprender los límites
Controles consistentes
Prueba a menudo, falla temprano
Mecanismos de ciclo cerrado
Pila completa (full stack)
Práctica
Visibilidad
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Incident Response
Simulations
SIRS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Arquitectura Visibilidad Auditoria
H e r r a m i e n t a s d e s e g u r i d a d y o p e r a c i o n e s d e
N e t f l i x
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Arquitectura
Visibilidad
Auditoria
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
El centro de operaciones de seguridad de
Netflix no tiene paneles brillantes que se
miran todo el día
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS
CloudTrail
Amazon
CloudWatch
SDKs
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS
CloudTrail
Amazon
CloudWatch
SDKs
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Netflix es ENORME
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
>100,000 instancias
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
>33% del tráfico de internet
de US
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
1,000sde cambios
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
>1,000,000eventos/minuto
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
>1,000,000eventos/minuto
En solo dos cuentas
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Múltiples cuentas
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Awwwdit
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Histórico
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cómo detectar y remediar automáticamente los permisos no deseados en las ACL
de objetos de Amazon S3 con eventos de CloudWatch
https://aws.amazon.com/blogs/security/how-to-detect-and-automatically-remediate-
unintended-permissions-in-amazon-s3-object-acls-with-cloudwatch-events/
Implementación de DevSecOps utilizando AWS CodePipeline
https://aws.amazon.com/blogs/devops/implementing-devsecops-using-aws-
codepipeline/
Automatizando el repositorio de Gobernanza
https://github.com/awslabs/automating-governance-sample
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Gracias

More Related Content

What's hot

雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)
雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)
雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)Amazon Web Services
 
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...Amazon Web Services
 
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...Amazon Web Services
 
AWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAmazon Web Services
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Amazon Web Services
 
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018Amazon Web Services Korea
 
Enhance customer experience with Conversational Interfaces
Enhance customer experience with Conversational InterfacesEnhance customer experience with Conversational Interfaces
Enhance customer experience with Conversational InterfacesAmazon Web Services
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfAmazon Web Services
 
AWS Webinar Series - Innovating the Customer Experience with Cloud and AI
AWS Webinar Series - Innovating the Customer Experience with Cloud and AIAWS Webinar Series - Innovating the Customer Experience with Cloud and AI
AWS Webinar Series - Innovating the Customer Experience with Cloud and AIAmazon Web Services
 
Creating a Machine Learning Factory
Creating a Machine Learning FactoryCreating a Machine Learning Factory
Creating a Machine Learning FactoryAmazon Web Services
 
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018Amazon Web Services Korea
 
Aws Tools for Alexa Skills
Aws Tools for Alexa SkillsAws Tools for Alexa Skills
Aws Tools for Alexa SkillsBoaz Ziniman
 
Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.Amazon Web Services
 

What's hot (20)

雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)
雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)
雲上打造資料湖 (Data Lake):智能化駕馭商機 (Level 300)
 
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...
Iterating Towards a Cloud-Enabled IT Organization (ENT204-R2) - AWS re:Invent...
 
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...
AWS IoT for Frictionless Consumer Experiences in Retail (RET201) - AWS re:Inv...
 
AWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di businessAWS IoT: servizi costruiti per migliorare le performance di business
AWS IoT: servizi costruiti per migliorare le performance di business
 
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
Leadership Session: Cloud Adoption and the Future of Financial Services (FSV2...
 
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018
Data Analytics를 통한 비지니스 혁신::Craig Stries::AWS Summit Seoul 2018
 
Enhance customer experience with Conversational Interfaces
Enhance customer experience with Conversational InterfacesEnhance customer experience with Conversational Interfaces
Enhance customer experience with Conversational Interfaces
 
AWS Analytics Experience Argentina - Intro
AWS Analytics Experience Argentina - IntroAWS Analytics Experience Argentina - Intro
AWS Analytics Experience Argentina - Intro
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdf
 
Democratizing AI
Democratizing AIDemocratizing AI
Democratizing AI
 
Migrating database to cloud
Migrating database to cloudMigrating database to cloud
Migrating database to cloud
 
Journey to Outcomes
Journey to OutcomesJourney to Outcomes
Journey to Outcomes
 
AWS Webinar Series - Innovating the Customer Experience with Cloud and AI
AWS Webinar Series - Innovating the Customer Experience with Cloud and AIAWS Webinar Series - Innovating the Customer Experience with Cloud and AI
AWS Webinar Series - Innovating the Customer Experience with Cloud and AI
 
Open Data on AWS
Open Data on AWSOpen Data on AWS
Open Data on AWS
 
Creating a Machine Learning Factory
Creating a Machine Learning FactoryCreating a Machine Learning Factory
Creating a Machine Learning Factory
 
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018
글로벌 미디어 고객사의 AWS 활용 사례-워싱턴 포스트 ::지정아::AWS Summit Seoul 2018
 
CurrencyCloud and AWS
CurrencyCloud and AWSCurrencyCloud and AWS
CurrencyCloud and AWS
 
New Tools for a New World
New Tools for a New WorldNew Tools for a New World
New Tools for a New World
 
Aws Tools for Alexa Skills
Aws Tools for Alexa SkillsAws Tools for Alexa Skills
Aws Tools for Alexa Skills
 
Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.
 

Similar to AWS Security Best Practices for Managing Operations

New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadAmazon Web Services
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your FirewallAmazon Web Services
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Amazon Web Services
 
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...Amazon Web Services
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Amazon Web Services
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Amazon Web Services
 
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Amazon Web Services
 
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...Designing for Operability: Getting the Last Nines in Five-Nines Availability ...
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...Amazon Web Services
 
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...Amazon Web Services
 
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Amazon Web Services
 
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...Amazon Web Services
 
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...Amazon Web Services
 
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...Amazon Web Services
 
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Amazon Web Services
 
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...Amazon Web Services
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...Amazon Web Services
 
AWS Lambda use cases and best practices - Builders Day Israel
AWS Lambda use cases and best practices - Builders Day IsraelAWS Lambda use cases and best practices - Builders Day Israel
AWS Lambda use cases and best practices - Builders Day IsraelAmazon Web Services
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountAmazon Web Services
 

Similar to AWS Security Best Practices for Managing Operations (20)

New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your Firewall
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
How LogMeIn Automates Governance and Empowers Developers at Scale (SEC302) - ...
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
 
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
Configure Your Cloud to Make It Rain on Threats (SEC335-R1) - AWS re:Invent 2018
 
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...Designing for Operability: Getting the Last Nines in Five-Nines Availability ...
Designing for Operability: Getting the Last Nines in Five-Nines Availability ...
 
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...
Closing Loops and Opening Minds: How to Take Control of Systems, Big and Smal...
 
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
Build Your Own Log Analytics Solutions on AWS (ANT323-R) - AWS re:Invent 2018
 
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...
Getting Started with Serverless Architectures with Microservices_AWSPSSummit_...
 
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...
Operational Excellence with Containerized Workloads Using AWS Fargate (CON320...
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
Breaking Containers: Chaos Engineering for Modern Applications on AWS (CON310...
 
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
Architecting for Real-Time Insights with Amazon Kinesis (ANT310) - AWS re:Inv...
 
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
The Theory and Math Behind Data Privacy and Security Assurance (SEC301) - AWS...
 
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
How to Perform Forensics on AWS Using Serverless Infrastructure (SEC416-R1) -...
 
AWS Lambda use cases and best practices - Builders Day Israel
AWS Lambda use cases and best practices - Builders Day IsraelAWS Lambda use cases and best practices - Builders Day Israel
AWS Lambda use cases and best practices - Builders Day Israel
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Security Best Practices for Managing Operations

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Eduardo Delgado 31 de mayo de 2018 Mejores prácticas para Administrar operaciones de seguridad en AWS
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. La cuenta de AWS como límite • El más alto grado de segregación • Por clasificación de datos • Unidad de negocio • Cargas de trabajo • Funcional En VPC • SGs, NACLs • Restricciones a nivel de recursos con AWS IAM VPC como límite (a nivel cuenta AWS) • Equivalente a separar redes • Peering, ruteo (+ todo lo de arriba) • AWS IAM similar a lo anterior • Flexibilidad • Innovación • Tamaño adecuado • Radio de la expansión • Segregación • Clasificación
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. App A.1 App B.1 App A.2 App B.2 Registro Agg. Otros (1..N) SecOps EquipoBEquipoAComún Independientemente de los límites, considere : - Cómo agregar los registros (logs) - Cuenta dedicada para SecOps BU A BU B Registro Agg. SecOps Conf A.2 Pub A.2 App A.1 App A.2
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. De Hacia
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudFormation + AWS Organizations
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Batería de casos de prueba Revisión de especificaciones
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Fase de creación: Control de cambios en código fuente • Análisis de código estático: analizar las plantillas de CFN contra un conjunto de reglas de seguridad Fase de aceptación: Ambiente de desarrollo • Análisis dinámico: ejecutar la plantilla en el entorno de pruebas de sandbox/aceptación Fases de Capacidad/integración/staging: Ambiente pre-producción • Carga, rendimiento, penetración, y prueba de failover Fase de producción: Ambiente de producción • Implementar ...
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Monitoreo AjustesControl
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Señal Ruido Recopilar Remediar Hacer nada Corregir Alertar Enriquece r Detener Medir Espectro de opciones
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. API calls (AWS CloudTrail) son registradas StopTrail/Change Regresar Control Monitoreo Ajustar SSH solo de la subred del bastion Crear/cambiar SGs validar fuente si puerto == 22 Cambiar SG vía AWS Lambda Todas las instancias con la mismas versiones de parches AWS Systems Manager + AWS Config rules Aplicar parches vía AWS Systems Manager No acceso a root AmazongCloudWatch logs + Syslog Aislar e investigar No objetos públicos en Amazon S3 Registro a nivel objeto con CloudTrail Hacer un objeto privado
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. https://aws.amazon.com/blogs/security/how-to-detect-and- automatically-remediate-unintended-permissions-in-amazon-s3- object-acls-with-cloudwatch-events/
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Estableciendo la seguridad de la plataforma • Estableciendo la seguridad de la red • Estableciendo la seguridad del sistema operativo • Estableciendo protección de datos
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Estableciendo la seguridad de la plataforma • Estableciendo la seguridad de la red • Estableciendo la seguridad del sistema operativo • Estableciendo protección de datos Reposo: - AWS KMS - AWS CloudHSM Tránsito: - VPN - ACM
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Estableciendo la seguridad de la plataforma • Estableciendo la seguridad de la red • Estableciendo la seguridad del sistema operativo • Estableciendo protección de datos
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon EC2 Systems Manager Ejecutar comandos Administrador de estados Inventario Ventana de mantenimiento Administrador de parches Automatización Almacenamiento de parámetros Documentos
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Comprender los límites Controles consistentes Prueba a menudo, falla temprano Mecanismos de ciclo cerrado Pila completa (full stack) Práctica Visibilidad
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Incident Response Simulations SIRS
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Arquitectura Visibilidad Auditoria H e r r a m i e n t a s d e s e g u r i d a d y o p e r a c i o n e s d e N e t f l i x
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Arquitectura Visibilidad Auditoria
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. El centro de operaciones de seguridad de Netflix no tiene paneles brillantes que se miran todo el día
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail Amazon CloudWatch SDKs
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail Amazon CloudWatch SDKs
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Netflix es ENORME
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. >100,000 instancias
  • 38. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. >33% del tráfico de internet de US
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. 1,000sde cambios
  • 40. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. >1,000,000eventos/minuto
  • 41. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. >1,000,000eventos/minuto En solo dos cuentas
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Múltiples cuentas
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 44. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 45. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 46. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 47. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 48. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Awwwdit
  • 49. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 50. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Histórico
  • 51. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Cómo detectar y remediar automáticamente los permisos no deseados en las ACL de objetos de Amazon S3 con eventos de CloudWatch https://aws.amazon.com/blogs/security/how-to-detect-and-automatically-remediate- unintended-permissions-in-amazon-s3-object-acls-with-cloudwatch-events/ Implementación de DevSecOps utilizando AWS CodePipeline https://aws.amazon.com/blogs/devops/implementing-devsecops-using-aws- codepipeline/ Automatizando el repositorio de Gobernanza https://github.com/awslabs/automating-governance-sample
  • 52. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Gracias