SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Chris Johnson, Solutions Architect
April, 2018
Security Architectures on AWS
What we’ll cover today …
• Initial considerations before you deploy
• Walk through AWS Shared Responsibility Model
• Practical advice on AWS security controls to deploy
• Practical advice on AWS security audit tooling
But first …
(Initial considerations before you deploy)
Ask yourself some questions:
1. How will your service will be accessed (public or private)?
2. What sort of data are you handling?
3. Are there any regulations you need to be compliant with?
4. Are there any compliance assessments you need to plan for?
5. Who will be administering the application?
6. Who needs to audit the platform (internal or external)?
Answers will lead you to where you put your
data
Availability
Zone A
Availability
Zone B
Availability
Zone C
Each region has at least two Availability Zones
Answers will lead you to AWS Artifact
• Integration with AWS Services
• Identity Federation
• Granular Permissions Model
• Multi-factor Authentication
• Identity information for assurance
Answers will lead you to Identity and Access
Management
Ok - so who manages what?
(The AWS Shared Responsibility Model)
Does one model work for all AWS Services?
Infrastructure
Services
Container
Services
Abstracted
Services
Network Traffic Protection
Encryption / Integrity / Identity
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Platform & Applications Management
Customer content
Customers
AWS Shared Responsibility Model:
for Infrastructure Services
Managed by
Client-Side Data encryption
& Data Integrity Authentication
AWSIAMCustomerIAM
Operating System, Network & Firewall Configuration
Server-Side Encryption
Fire System and/or Data
APIEndpoints
Management
Protocols
API
Calls
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Firewall
Configuration
Platform & Applications Management
Operating System, Network Configuration
Customer content
Customers
AWS Shared Responsibility Model:
for Container Services
Managed by
Client-Side Data encryption
& Data Integrity Authentication
Network Traffic Protection
Encryption / Integrity / Identity
AWSIAMCustomerIAM
APIEndpoints
Management
Protocols
API
Calls
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Platform & Applications Management
Operating System, Network & Firewall Configuration
Customer content
Customers
Managed by
Data Protection by the Platform
Protection of Data at Rest
Network Traffic Protection by the Platform
Protection of Data at in Transit
(optional)
Opaque Data: 1’s and 0’s
(in flight / at rest)
Client-Side Data Encryption
& Data Integrity Authentication
APIEndpoints
AWSIAM
API Calls
AWS Shared Responsibility Model:
forAbstracted Services
What should I consider for my
Application?
(Practical advice on AWS Security Controls to deploy)
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u Malformed Packet Requests
u SYN/ACK or UDP Flood
u Reflection Attacks
u DNS Floods
u Shuffle Sharding (Forced Data Distribution and Isolation)
u Anycast Striping (Ability to advertise IP Scopes from any/all Regions)
myapp.com
Amazon S3
bucket
Route 53
1
www.myapp.com
media.myapp.com
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u Content Caching
u Origin Acceleration
u AWS WAF Integration (Layer-7 Inspection)
u DDoS Shield and Shield Advanced Integration
myapp.com
Amazon S3
bucket
Cloudfront
2
www.myapp.com
media.myapp.com
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u Path Based Routing
u HTTP/HTTPS Only
u SSL/TLS Offload
u AWS WAF Integration (Layer-7 Inspection)
u DDoS Shield and Shield Advanced Integration
myapp.com
Amazon S3
bucket
Application Load
Balancer
3
www.myapp.com
media.myapp.com
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u AWS Macie Integration
u Static HTTP Web Server
u Origin for Cloudfront (use Custom Header for locking down)
u No HTTPS capability (use Cloudfront)
u Object and Bucket Level Logging
myapp.com
Amazon S3
bucket
S3 Bucket
4
www.myapp.com
media.myapp.com
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u RouteTable – Decides which networks can be routed to/from
u NACL – Stateless – Rule Based, Order-Priority [Default OPEN]
u SG – Stateful – Evaluatative [Default CLOSED]
u VPC FlowLogs – Layer 2/3 Logging in a VPC
myapp.com
Amazon S3
bucket
VPC Controls
5
www.myapp.com
media.myapp.com
Availability Zone #1
security group
security group
root volume
data volume
Application Load
Balancer
Amazon S3
Bucket Origin
logs
Amazon EBS
snapshot
CloudFront
distribution
EC2 instance
web app
server
Amazon
Route 53
u Amazon Inspector
u CVE / Best Practices
u CIS Benchmarks / Network Behavioral Monitoring
u AWS Systems Manager Integration – Privileged Command Execution
u AWS Systems Manager Integration – Cloudwatch Logging
myapp.com
Amazon S3
bucket
Amazon Inspector
5
www.myapp.com
media.myapp.com
How do I ensure it is all working as
planned?
(Practical advice on AWS Security audit tooling)
Myapp Production Account Myapp Dev Account Myapp Sandbox Account
Myapp Audit Account myapp Billing Account
CloudTrail
Bucket
Config
Bucket
Amazon ES
Amazon
QuickSight
Amazon
Athena
u CloudTrail (Athena or ElasticSearch)
u Config (Aggregator)
u Guard Duty
u VPC FlowLogs
u CloudTrail
u Config (incl. Config Rules)
u Guard Duty
u VPC Flow Logs
u Inspector
Amazon
GuardDuty
Multi-Account
View
Local-Account
View
Shall we have a look at this in
action?
(Demo time!)
Thank you, any questions?

More Related Content

What's hot

AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
CloudHesive
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
Amazon Web Services
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
Knoldus Inc.
 
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Amazon Web Services
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
Amazon Web Services
 
Aws VPC
Aws VPCAws VPC
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
Erik Paulsson
 
AWS 101
AWS 101AWS 101
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
Amazon Web Services
 
AWS Cloud trail
AWS Cloud trailAWS Cloud trail
AWS Cloud trail
zekeLabs Technologies
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon Web Services
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Amazon Web Services
 
Overview of AWS by Andy Jassy - SVP, AWS
Overview of AWS by Andy Jassy - SVP, AWSOverview of AWS by Andy Jassy - SVP, AWS
Overview of AWS by Andy Jassy - SVP, AWS
Amazon Web Services
 
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Amazon Web Services
 
AWS Cloud Watch
AWS Cloud WatchAWS Cloud Watch
AWS Cloud Watch
zekeLabs Technologies
 
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
Amazon Web Services
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
Amazon Web Services
 
AWS EC2
AWS EC2AWS EC2
AWS EC2
Mahesh Raj
 

What's hot (20)

AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Aws VPC
Aws VPCAws VPC
Aws VPC
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
AWS 101
AWS 101AWS 101
AWS 101
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
AWS Cloud trail
AWS Cloud trailAWS Cloud trail
AWS Cloud trail
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
Overview of AWS by Andy Jassy - SVP, AWS
Overview of AWS by Andy Jassy - SVP, AWSOverview of AWS by Andy Jassy - SVP, AWS
Overview of AWS by Andy Jassy - SVP, AWS
 
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
 
AWS Cloud Watch
AWS Cloud WatchAWS Cloud Watch
AWS Cloud Watch
 
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
(DEV203) Amazon API Gateway & AWS Lambda to Build Secure APIs
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
AWS EC2
AWS EC2AWS EC2
AWS EC2
 

Similar to Security Architectures on AWS

The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWSThe AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
Alert Logic
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
Alert Logic
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
Amazon Web Services
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
Amazon Web Services
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
Scott Arveseth
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
Amazon Web Services
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
Amazon Web Services
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
Amazon Web Services
 
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
shared-responsibilitysecurity-roadshowlondon-160317131610.pptxshared-responsibilitysecurity-roadshowlondon-160317131610.pptx
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
aalshrif
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
MohammadEnnab4
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
himanipatel524244
 
Getting Started on AWS
Getting Started on AWSGetting Started on AWS
Getting Started on AWS
Amazon Web Services
 
Getting Started with AWS
Getting Started with AWSGetting Started with AWS
Getting Started with AWS
Amazon Web Services
 
Technical Track
Technical TrackTechnical Track
Technical Track
Amazon Web Services
 
AWSome Day | Tech Track
AWSome Day | Tech TrackAWSome Day | Tech Track
AWSome Day | Tech Track
Amazon Web Services
 
01 aws track 1
01 aws track 101 aws track 1
01 aws track 1
JoaoSeverino2
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
Amazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
AWS Germany
 

Similar to Security Architectures on AWS (20)

The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWSThe AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
shared-responsibilitysecurity-roadshowlondon-160317131610.pptxshared-responsibilitysecurity-roadshowlondon-160317131610.pptx
shared-responsibilitysecurity-roadshowlondon-160317131610.pptx
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
 
Getting Started on AWS
Getting Started on AWSGetting Started on AWS
Getting Started on AWS
 
Getting Started with AWS
Getting Started with AWSGetting Started with AWS
Getting Started with AWS
 
Technical Track
Technical TrackTechnical Track
Technical Track
 
AWSome Day | Tech Track
AWSome Day | Tech TrackAWSome Day | Tech Track
AWSome Day | Tech Track
 
01 aws track 1
01 aws track 101 aws track 1
01 aws track 1
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security Architectures on AWS

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Chris Johnson, Solutions Architect April, 2018 Security Architectures on AWS
  • 2. What we’ll cover today … • Initial considerations before you deploy • Walk through AWS Shared Responsibility Model • Practical advice on AWS security controls to deploy • Practical advice on AWS security audit tooling
  • 3. But first … (Initial considerations before you deploy)
  • 4. Ask yourself some questions: 1. How will your service will be accessed (public or private)? 2. What sort of data are you handling? 3. Are there any regulations you need to be compliant with? 4. Are there any compliance assessments you need to plan for? 5. Who will be administering the application? 6. Who needs to audit the platform (internal or external)?
  • 5. Answers will lead you to where you put your data Availability Zone A Availability Zone B Availability Zone C Each region has at least two Availability Zones
  • 6. Answers will lead you to AWS Artifact
  • 7. • Integration with AWS Services • Identity Federation • Granular Permissions Model • Multi-factor Authentication • Identity information for assurance Answers will lead you to Identity and Access Management
  • 8. Ok - so who manages what? (The AWS Shared Responsibility Model)
  • 9. Does one model work for all AWS Services? Infrastructure Services Container Services Abstracted Services
  • 10. Network Traffic Protection Encryption / Integrity / Identity AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Platform & Applications Management Customer content Customers AWS Shared Responsibility Model: for Infrastructure Services Managed by Client-Side Data encryption & Data Integrity Authentication AWSIAMCustomerIAM Operating System, Network & Firewall Configuration Server-Side Encryption Fire System and/or Data APIEndpoints Management Protocols API Calls
  • 11. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Firewall Configuration Platform & Applications Management Operating System, Network Configuration Customer content Customers AWS Shared Responsibility Model: for Container Services Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity AWSIAMCustomerIAM APIEndpoints Management Protocols API Calls
  • 12. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Platform & Applications Management Operating System, Network & Firewall Configuration Customer content Customers Managed by Data Protection by the Platform Protection of Data at Rest Network Traffic Protection by the Platform Protection of Data at in Transit (optional) Opaque Data: 1’s and 0’s (in flight / at rest) Client-Side Data Encryption & Data Integrity Authentication APIEndpoints AWSIAM API Calls AWS Shared Responsibility Model: forAbstracted Services
  • 13. What should I consider for my Application? (Practical advice on AWS Security Controls to deploy)
  • 14. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u Malformed Packet Requests u SYN/ACK or UDP Flood u Reflection Attacks u DNS Floods u Shuffle Sharding (Forced Data Distribution and Isolation) u Anycast Striping (Ability to advertise IP Scopes from any/all Regions) myapp.com Amazon S3 bucket Route 53 1 www.myapp.com media.myapp.com
  • 15. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u Content Caching u Origin Acceleration u AWS WAF Integration (Layer-7 Inspection) u DDoS Shield and Shield Advanced Integration myapp.com Amazon S3 bucket Cloudfront 2 www.myapp.com media.myapp.com
  • 16. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u Path Based Routing u HTTP/HTTPS Only u SSL/TLS Offload u AWS WAF Integration (Layer-7 Inspection) u DDoS Shield and Shield Advanced Integration myapp.com Amazon S3 bucket Application Load Balancer 3 www.myapp.com media.myapp.com
  • 17. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u AWS Macie Integration u Static HTTP Web Server u Origin for Cloudfront (use Custom Header for locking down) u No HTTPS capability (use Cloudfront) u Object and Bucket Level Logging myapp.com Amazon S3 bucket S3 Bucket 4 www.myapp.com media.myapp.com
  • 18. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u RouteTable – Decides which networks can be routed to/from u NACL – Stateless – Rule Based, Order-Priority [Default OPEN] u SG – Stateful – Evaluatative [Default CLOSED] u VPC FlowLogs – Layer 2/3 Logging in a VPC myapp.com Amazon S3 bucket VPC Controls 5 www.myapp.com media.myapp.com
  • 19. Availability Zone #1 security group security group root volume data volume Application Load Balancer Amazon S3 Bucket Origin logs Amazon EBS snapshot CloudFront distribution EC2 instance web app server Amazon Route 53 u Amazon Inspector u CVE / Best Practices u CIS Benchmarks / Network Behavioral Monitoring u AWS Systems Manager Integration – Privileged Command Execution u AWS Systems Manager Integration – Cloudwatch Logging myapp.com Amazon S3 bucket Amazon Inspector 5 www.myapp.com media.myapp.com
  • 20. How do I ensure it is all working as planned? (Practical advice on AWS Security audit tooling)
  • 21. Myapp Production Account Myapp Dev Account Myapp Sandbox Account Myapp Audit Account myapp Billing Account CloudTrail Bucket Config Bucket Amazon ES Amazon QuickSight Amazon Athena u CloudTrail (Athena or ElasticSearch) u Config (Aggregator) u Guard Duty u VPC FlowLogs u CloudTrail u Config (incl. Config Rules) u Guard Duty u VPC Flow Logs u Inspector Amazon GuardDuty Multi-Account View Local-Account View
  • 22. Shall we have a look at this in action? (Demo time!)
  • 23. Thank you, any questions?