SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Best Practices for
Microsoft Workloads
Minoo Duraipandy
Partner Solutions Architect
AWS Partner Team
W I N 3 0 7
Mark Szalkiewicz
Senior Consultant, Identity
AWS Professional Services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Holistic approach to security
AWS-native security controls for Windows in AWS
Monitoring & logging
General guidance
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
End-to-end security controls
AWS Identity & Access
Management (IAM)
AWS Managed
Microsoft AD
AWS Organizations
AWS Secrets Manager
AWS Single Sign-On
Amazon Cognito
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
AWS Systems Manager
AWS Shield
AWS WAF
AWS Firewall Manager
Amazon Inspector
Amazon VPC
AWS KMS
AWS CloudHSM
Amazon Macie
AWS Certificate
Manager
Server-side
encryption
AWS Config rules
AWS Lambda
Identity Data
protection
Preventive
controls
Corrective
controls
Infrastructure
security
Detective
controls
VPC security groups
Network ACLs
IAM password policies
MFA/YubiKey-2FA
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
End-to-end security controls
AWS Identity & Access
Management (IAM)
AWS Managed
Microsoft AD
Organizations
AWS Secrets Manager
AWS Single Sign-On
Amazon Cognito
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
AWS Systems Manager
AWS Shield
AWS WAF – Web
Application Firewall
AWS Firewall Manager
Amazon Inspector
Amazon Virtual Private
Cloud (VPC)
AWS Key
Management Service
(KMS)
AWS CloudHSM
Amazon Macie
AWS Certificate
Manager
Server-Side
Encryption
AWS Config rules
AWS Lambda
Identity Data
protection
Corrective
controls
Infrastructure
security
Preventive
controls
Detective
controls
VPC Security Groups
Network ACLs
IAM Password Policies
MFA/Yubikey-2FA
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Let’s start with securing identities
• AWS Directory Service for
Microsoft Active Directory
• Also known as AWS Managed Microsoft AD
• Active Directory (AD) as a managed service
• Powered by Windows Server 2012 R2
• Available in two editions: Standard and
Enterprise
• Other directories
• AD Connector
• Simple AD
Identity
MS SQL
instance
ClientAWS
Workspaces
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Default directory security group
• Blocks unnecessary traffic to DC
• Attached to DC interfaces accessible from within
your peered or resized VPCs
• Inaccessible from the Internet even with
modified routing tables
• Security group rules can be modified
• To accept traffic from a more restrictive list of IP addresses
• To restrict the destination addresses DCs can communicate with
Identity
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why AWS SSO?
Identity
Centrally manage SSO access to multiple AWS
accounts and business cloud applications
• Cloud-based single sign-on service
• Connect on-premises Microsoft Active Directory
• Access to other SAML-based apps – Dropbox, Salesforce,
Office 365
• Automatic AWS CLI/console access and permissions
based on AD group membership
• Provide and audit user access to multiple AWS accounts
• Integration with other 3P tools like Splunk, Sumo Logic
• Now provides a directory to create users, organize them
in groups, and set permissions across groups for
application access
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Systems Manager improves security posture
Session Manager
Full Interactive-mode PowerShell
Encrypted access without inbound ports
Access control via IAM policies
No cost, browser based
Run Command
Perform administrative tasks
Patch Manager
Establish patch baseline
Manage patch-level compliance
Automation
Repeatable Operations and management
tasks
Maintenance Windows
Works in conjunction with Patch Manager
Distributor
Securely store and distribute software
packages
State Manager
Continuous configuration drift manager
Infrastructure
security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Session Manager
VPC
IAM
permissions Session
Manager
Infrastructure
security
SSM
endpoint
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Run Command
Infrastructure
security
Run
Command
Curated
Document
Curated
Document
Curated
Document
Notifications
Amazon S3
AWS Console
Output
options
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Run Command vs. Session Manager
Commands issued at scale
When Interactive mode isn’t
needed
Concurrency control
Error control
Deeper analysis within an instance
Full Interactive mode available
Session Manager SDK for custom
front-end apps
Infrastructure
security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Microsoft Windows Patch Management
Keeping Windows instances secure using AWS Systems Manager
Maintenance
Windows
Patch
Manager
Outdated
Windows
instances
Patched
Windows
instances
State
Manager
Run
Command
Infrastructure
security
Native DSC
integration
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vulnerability management
Amazon Inspector
• Automatic assessment for known vulnerabilities
• Hundreds of built-in rules mapped to common security best practices
• CIS-specific Microsoft Windows Security benchmark assessments
• Helps build and maintain a hardened Windows Server OS image
Infrastructure
security
Gold AMI Registry
Default AMI
Amazon Inspector
assessment
Gold AMI
Hardened AMI
Decommission
CIS
Windows
benchmarks
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Inspector Network Assessments
• Based on AWS’ Provable Security
Initiative
• Agentless!
• Analyze and identify resources that are
accessible from the internet
• Based on Automated Reasoning
• A formal verification process that
generates and checks mathematical
proofs
• Make sure network security is
implemented as designed
• Catch network configuration drift
• No network packets or port probes to gain
actionable insights
Infrastructure
security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Logs and Windows
Detective
controls
AWS Config
rules
Windows
Event
Logs
IIS Logs
Perf Logs
SQL Logs
AlarmsMonitoring
Auto Scaling
instances
Amazon Glacier
archive
AWS VPC
Flow
Logs
Email
notification
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty
Detective
controls
• Managed threat detection service (think managed IDS)
• Global coverage, with regional results
• Built-in anomaly detection with ML
• No agents, no sensors, no network devices
• Single-click activation for Amazon EC2, IAM, and AWS accounts
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty
Detective
controls
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty example threat detection
Detective
controls
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
When someone opens port 3389 to the world at 3AM
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Or we could avoid security incidents using:
AWS Config rules
• Easy assessment of all your Microsoft resources in AWS
• Automate evaluation of recorded configurations against desired configurations
• Built-in library of 60 different AWS rules
AWS Lambda functions
• Write code in C# or PowerShell using .NET Core 2.1
Corrective
controls
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Lambda functions
Corrective
controls
• Avoid being reactive
• Use over 60 pre-built AWS Config rules
• Gateway service to DevSecOps
• Multi-layer security automation
• AWS WAF automation for L7 security
• AWS Config automation for compliance
• Amazon CloudWatch for event-based
security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Putting it all together
ADFS SAML
token
Microsoft Windows
EC2 instances
Maintenance
Windows
Patch
Manager
Run
Command
State
Manager
Parameter
Store
Users
AMI
Inspector
Golden
AMI
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Before we wrap up here
Thank you!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Minoo Duraipandy
duraipan@amazon.com
Mark Szalkiewicz
marksza@amazon.com
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Amazon Web Services
 
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Amazon Web Services
 
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
Amazon Web Services
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Amazon Web Services
 
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Amazon Web Services
 
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
Amazon Web Services
 
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Amazon Web Services
 
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Amazon Web Services
 
DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3
Amazon Web Services
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
Amazon Web Services
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
Amazon Web Services
 
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
Amazon Web Services
 
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
Amazon Web Services
 
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
Amazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
Amazon Web Services
 
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Amazon Web Services
 
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
Amazon Web Services
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
Amazon Web Services
 
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Amazon Web Services
 
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
Amazon Web Services
 

What's hot (20)

Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
Drive Self-Service & Standardization in the First 100 Days of Your Cloud Migr...
 
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
Hands-On: Automating AWS Infrastructure with PowerShell (WIN308) - AWS re:Inv...
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
Turner’s Journey to Scale Securely on a Lean Budget (SEC357-R1) - AWS re:Inve...
 
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
Leadership Session: Using DevOps, Microservices, and Serverless to Accelerate...
 
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
Drive Customer Value with Data-Driven Decisions (GPSBUS206) - AWS re:Invent 2018
 
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
Improve your Security Posture with AWS CloudFormation (DEV341-R2) - AWS re:In...
 
DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3DEM20 Protecting Your Data in Amazon S3
DEM20 Protecting Your Data in Amazon S3
 
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
AWS Landing Zone Deep Dive (ENT350-R2) - AWS re:Invent 2018
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
 
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
AWS Greengrass & Amazon FreeRTOS: Connectivity & Security at the Edge (IOT356...
 
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
Optimizing Costs as You Scale on AWS (ENT302) - AWS re:Invent 2018
 
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
HOT Lanes to the AWS Cloud: Optimize Network Design for AWS GovCloud (US) (WP...
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
Solving for Identity and Authentication with .NET Apps on AWS (GPSWS408) - AW...
 
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
Implement a Modern Flash-to-Flash-to-Cloud Backup Environment (DEV205-S) - AW...
 
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
A Practitioner's Guide to Securing Your Cloud (Like an Expert) (SEC203-R1) - ...
 
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
Mastering Identity at Every Layer of the Cake (SEC401-R1) - AWS re:Invent 2018
 
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
Analyze Slide Images and Process Phenotypic Assays at Scale on AWS (CMP358) -...
 

Similar to Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018

AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
Amazon Web Services
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
Amazon Web Services
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
Amazon Web Services
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
Amazon Web Services
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
Amazon Web Services
 
Enterprise Security
Enterprise SecurityEnterprise Security
Enterprise Security
Amazon Web Services
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Amazon Web Services
 
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Amazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
Amazon Web Services
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDay
Amazon Web Services
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
Amazon Web Services
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
Amazon Web Services LATAM
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
Amazon Web Services
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
Amazon Web Services
 
Monitorización de seguridad y detección de amenazas con AWS
Monitorización de seguridad y detección de amenazas con AWSMonitorización de seguridad y detección de amenazas con AWS
Monitorización de seguridad y detección de amenazas con AWS
javier ramirez
 

Similar to Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018 (20)

AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Enterprise Security
Enterprise SecurityEnterprise Security
Enterprise Security
 
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
Operational Excellence for Identity & Access Management (SEC334) - AWS re:Inv...
 
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
MongoDB World 2018: Tutorial - How to Build Applications with MongoDB Atlas &...
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
SecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDaySecuringYourCustomersDataFromDayOne_SFStartupDay
SecuringYourCustomersDataFromDayOne_SFStartupDay
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
Securing Your Customers Data From Day One
Securing Your Customers Data From Day OneSecuring Your Customers Data From Day One
Securing Your Customers Data From Day One
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOneAWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
AWS18_StartupDayToronto_SecuringYourCustomersDataFromDayOne
 
How AI is disrupting the world
How AI is disrupting the world How AI is disrupting the world
How AI is disrupting the world
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
Monitorización de seguridad y detección de amenazas con AWS
Monitorización de seguridad y detección de amenazas con AWSMonitorización de seguridad y detección de amenazas con AWS
Monitorización de seguridad y detección de amenazas con AWS
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018

  • 1.
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Best Practices for Microsoft Workloads Minoo Duraipandy Partner Solutions Architect AWS Partner Team W I N 3 0 7 Mark Szalkiewicz Senior Consultant, Identity AWS Professional Services
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Holistic approach to security AWS-native security controls for Windows in AWS Monitoring & logging General guidance
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. End-to-end security controls AWS Identity & Access Management (IAM) AWS Managed Microsoft AD AWS Organizations AWS Secrets Manager AWS Single Sign-On Amazon Cognito AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs AWS Systems Manager AWS Shield AWS WAF AWS Firewall Manager Amazon Inspector Amazon VPC AWS KMS AWS CloudHSM Amazon Macie AWS Certificate Manager Server-side encryption AWS Config rules AWS Lambda Identity Data protection Preventive controls Corrective controls Infrastructure security Detective controls VPC security groups Network ACLs IAM password policies MFA/YubiKey-2FA
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. End-to-end security controls AWS Identity & Access Management (IAM) AWS Managed Microsoft AD Organizations AWS Secrets Manager AWS Single Sign-On Amazon Cognito AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs AWS Systems Manager AWS Shield AWS WAF – Web Application Firewall AWS Firewall Manager Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service (KMS) AWS CloudHSM Amazon Macie AWS Certificate Manager Server-Side Encryption AWS Config rules AWS Lambda Identity Data protection Corrective controls Infrastructure security Preventive controls Detective controls VPC Security Groups Network ACLs IAM Password Policies MFA/Yubikey-2FA
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Let’s start with securing identities • AWS Directory Service for Microsoft Active Directory • Also known as AWS Managed Microsoft AD • Active Directory (AD) as a managed service • Powered by Windows Server 2012 R2 • Available in two editions: Standard and Enterprise • Other directories • AD Connector • Simple AD Identity MS SQL instance ClientAWS Workspaces
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Default directory security group • Blocks unnecessary traffic to DC • Attached to DC interfaces accessible from within your peered or resized VPCs • Inaccessible from the Internet even with modified routing tables • Security group rules can be modified • To accept traffic from a more restrictive list of IP addresses • To restrict the destination addresses DCs can communicate with Identity
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why AWS SSO? Identity Centrally manage SSO access to multiple AWS accounts and business cloud applications • Cloud-based single sign-on service • Connect on-premises Microsoft Active Directory • Access to other SAML-based apps – Dropbox, Salesforce, Office 365 • Automatic AWS CLI/console access and permissions based on AD group membership • Provide and audit user access to multiple AWS accounts • Integration with other 3P tools like Splunk, Sumo Logic • Now provides a directory to create users, organize them in groups, and set permissions across groups for application access
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Systems Manager improves security posture Session Manager Full Interactive-mode PowerShell Encrypted access without inbound ports Access control via IAM policies No cost, browser based Run Command Perform administrative tasks Patch Manager Establish patch baseline Manage patch-level compliance Automation Repeatable Operations and management tasks Maintenance Windows Works in conjunction with Patch Manager Distributor Securely store and distribute software packages State Manager Continuous configuration drift manager Infrastructure security
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Session Manager VPC IAM permissions Session Manager Infrastructure security SSM endpoint
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Run Command Infrastructure security Run Command Curated Document Curated Document Curated Document Notifications Amazon S3 AWS Console Output options
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Run Command vs. Session Manager Commands issued at scale When Interactive mode isn’t needed Concurrency control Error control Deeper analysis within an instance Full Interactive mode available Session Manager SDK for custom front-end apps Infrastructure security
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Microsoft Windows Patch Management Keeping Windows instances secure using AWS Systems Manager Maintenance Windows Patch Manager Outdated Windows instances Patched Windows instances State Manager Run Command Infrastructure security Native DSC integration
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Vulnerability management Amazon Inspector • Automatic assessment for known vulnerabilities • Hundreds of built-in rules mapped to common security best practices • CIS-specific Microsoft Windows Security benchmark assessments • Helps build and maintain a hardened Windows Server OS image Infrastructure security Gold AMI Registry Default AMI Amazon Inspector assessment Gold AMI Hardened AMI Decommission CIS Windows benchmarks
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Inspector Network Assessments • Based on AWS’ Provable Security Initiative • Agentless! • Analyze and identify resources that are accessible from the internet • Based on Automated Reasoning • A formal verification process that generates and checks mathematical proofs • Make sure network security is implemented as designed • Catch network configuration drift • No network packets or port probes to gain actionable insights Infrastructure security
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Logs and Windows Detective controls AWS Config rules Windows Event Logs IIS Logs Perf Logs SQL Logs AlarmsMonitoring Auto Scaling instances Amazon Glacier archive AWS VPC Flow Logs Email notification
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty Detective controls • Managed threat detection service (think managed IDS) • Global coverage, with regional results • Built-in anomaly detection with ML • No agents, no sensors, no network devices • Single-click activation for Amazon EC2, IAM, and AWS accounts
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty Detective controls
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty example threat detection Detective controls
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. When someone opens port 3389 to the world at 3AM
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Or we could avoid security incidents using: AWS Config rules • Easy assessment of all your Microsoft resources in AWS • Automate evaluation of recorded configurations against desired configurations • Built-in library of 60 different AWS rules AWS Lambda functions • Write code in C# or PowerShell using .NET Core 2.1 Corrective controls
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Lambda functions Corrective controls • Avoid being reactive • Use over 60 pre-built AWS Config rules • Gateway service to DevSecOps • Multi-layer security automation • AWS WAF automation for L7 security • AWS Config automation for compliance • Amazon CloudWatch for event-based security
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Putting it all together ADFS SAML token Microsoft Windows EC2 instances Maintenance Windows Patch Manager Run Command State Manager Parameter Store Users AMI Inspector Golden AMI
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Before we wrap up here
  • 28. Thank you! © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Minoo Duraipandy duraipan@amazon.com Mark Szalkiewicz marksza@amazon.com
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.