SlideShare a Scribd company logo
1 of 45
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Jillian Leo
Solutions Architect
Adrian Monza
Chief, Cyber Defense Branch Information Security Division, USCIS
Session Code: 194323
Session: Security@Scale
Track: Products and Solutions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• Challenges and Objectives you Face Everyday
• Security of and in the Cloud
• Overview of AWS Security Services
• A look at
– AWS GuardDuty
– AWS Systems Manger
– AWS Config
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Key Takeaways
• Understanding security of your AWS
environment
• … & security of your workloads
• Understanding how to gain visibility into your
environment and make use of it
• How to automate remediation
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your Challenges
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
NIST Cyber Security Framework (CSF) Core
Identify
Protect
DetectRespond
Recover
What
processes and
assets need
protection?
What
safeguards
are
available?
What techniques
can identify
incidents?
What techniques
can contain
impacts of
incidents?
What techniques
can restore
capabilities?
https://d0.awsstatic.com/whitepapers/complianc
e/NIST_Cybersecurity_Framework_CSF.pdf
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Continuous Diagnostics & Mitigation (CDM)
AWS is
working on
alignment!
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
International Organization for Standardization
• ISO 27103:2018 Cybersecurity and ISO and IEC
Standards
• ISO 27002:2013
Information Technology – Security techniques
Code of Practice
• ISO 27017:2015 Based on ISO 27002:2013
Information technology -- Security techniques --
Code of practice for information security controls
for cloud services
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The AWS Shared Responsibility
Hopefully, you’ve seen this before…
DatabaseStorageCompute Networking
Edge
Locations
Regions
Avail. Zones
AWS Global
Infrastructure
Customers are
responsible for
security ‘in’ the Cloud
AWS is responsible for
security ‘of’ the Cloud
Customer Data
Platform, Applications,
Identity & Access Management
Operating System, Network &
Firewall Configuration
Client-side Data
Encryption & Data
Integrity
Authentication
Server-side Encryption
(File System and/or
Data)
Network Traffic
Protection (Encryption /
Integrity / Identity)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Identity & Access
Management (IAM)
AWS Organizations
Amazon Cognito
AWS Directory Service
AWS Single Sign-On
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
Amazon EC2
Systems Manager
AWS Shield
AWS Web Application
Firewall (WAF)
Amazon Inspector
Amazon Virtual Private
Cloud (VPC)
AWS Key Management
Service (KMS)
AWS CloudHSM
Amazon Macie
AWS Certificate
Manager
Server Side Encryption
Secrets Manager
AWS Config Rules
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS Security Solutions
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Aligning to AWS Services
Identify
Protect
DetectRespond
Recover
What
processes and
assets need
protection?
What
safeguards
are
available?
What techniques
can identify
incidents?
What techniques
can contain
impacts of
incidents?
What techniques
can restore
capabilities?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Identify
Amazon
CloudWatch
Amazon EC2
Systems Manager
AWS
CloudTrail
AWS
Config
Amazon
Inspector
Amazon
Macie
AWS Shield
VPC
Flow logs
Amazon
GuardDuty
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect
Network Access Control List
Security Groups
AWS Shield
Amazon EC2
Systems Manager
AWS WAF
AWS Certificate
Manager
Amazon
CloudFront
IAM Amazon
VPC*
Amazon
EC2
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Detect
Amazon
CloudWatch
Amazon EC2
Systems Manager
AWS
CloudTrail
AWS
Config
Amazon
Inspector
Amazon
MacieAWS Shield
VPC
Flow logsAmazon
GuardDuty
Event
(event-
based)
Amazon
SNS
email
notification
HTTP
notification
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Respond
Rule
AWS
Config
Amazon
CloudWatch
Event
(event-
based)
State
Manager
Maintenance
Windows
InventoryAutomation documents
Parameter
Store
Run
Command
Patch
Manager
Amazon EC2
Systems Manager
AWS WAF
filtering rule
AWS Shield
Advanced
Lambda
function
Lambda
function
Lambda
function
Amazon
GuardDuty
Lambda
function
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudWatch Events
• Events for Services Not Listed
• Auto Scaling
• AWS API Call
• AWS Batch
• AWS CodeBuild
• AWS CodeCommit
• AWS CodeDeploy
• AWS CodePipeline
• AWS Management Console Sign-in
• Amazon EBS
• Amazon EC2
• AWS OpsWorks Stacks
• AWS Systems Manager
• AWS Systems Manager Parameter
Store
• AWS Systems Manager Configuration
Compliance
• Amazon EC2 Maintenance Windows
• Amazon ECS
• Amazon EMR
• Amazon GameLift
• AWS Glue Events
• Amazon GuardDuty
• AWS Health
• AWS KMS
• Amazon Macie
• Scheduled
• AWS Server Migration Service
• AWS Trusted Advisor
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Recover
AWS Step
Functions
Amazon
SNS
email
notification
HTTP
notification
AWS
Lambda
Lambda
function
Amazon
CloudWatch
Event
(event-
based)
Lambda
function
Lambda
function
Lambda
function
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Service Callouts
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty
Threat Detection and Notification
DETECT NOTIFY
RESPOND
Reconnaissance
Instance Compromise
Account Compromise
Amazon
GuardDuty
VPC flow logs
DNS Logs
CloudTrail Events
HIGH
MEDIUM
LOW
FindingsData SourcesThreat DetectionTypes
https://aws.amazon.com/guardduty/
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty: Service Benefits
• Managed Threat Detection Service
• One-Click Activation without Architectural or Performance Impact
• Continuous Monitoring of AWS Accounts and Resources
• Discover Threats Related to EC2 and IAM
• Instant On Provides Findings in Minutes
• No Agents, no Sensors, no Network Appliances
• Global Coverage, Regional Results
• Built In Anomaly Detection with Machine Learning
• Partner Integrations for Additional Protections
• Cost Effective Simple Pricing
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Remediate a Compromised Instance
• Remediate Compromised AWS Credentials
Automatic Remediation
GuardDuty CloudWatch Events Lambda
Amazon
GuardDuty
Amazon
CloudWatch
CloudWatch
Events
Lambda
Function
AWS Lambda
Responding to Findings: Remediation
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Systems Manager
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Systems Manager
• A set of capabilities that provide...
• insight and compliance
• safe and secure operations
• automated configuration with granular control
• ...across all of your Windows and Linux workloads...
• ...running on Amazon EC2 or on-premises…
• ...at no additional charge
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why should I care?
Manage hybrid
Architecture
Cross-platform
(Windows/Linux)
Scalable and
auditable
Improve security
and compliance
Automate
repetitive tasks
Reduce TCO
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Systems Manager
Run Command State Manager Inventory Maintenance Window
Patch Manager Automation Parameter StoreParameter Store Documents
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config & AWS Config Rules
Continuously record and assess service configurations
Changing resources
AWS Config
AWS Config Rules
History, Snapshot
Notifications
API Access
Normalized
How are my resources configured over time?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Security Best Practices – Core Principles
• Shared Responsibility Model
• Visibility/Insight
• Consistency
• Automation & Infrastructure-as-Code
• Audit / Actionable /Automation
• Separation of Concerns
• Least Privilege
• Secure Data – In Transit, @ Rest
• Game Days
• Defense in Depth
Ingrained in the
DNA of a Well
Architected
Enterprise
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using Cloud Monitor to Migrate to
DevSecOps
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Our Story
• Rapid Adoption
• Migration and Innovation
• Results: Speed, Features, Success
• But also:
– Scale
– Sprawl
– Snowflakes
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The Beginning
• Started with one AWS Account
• Another to separate dev and prod
• Two more for the next system
• Centralized services, Networking
Prod Dev
System 2
Prod
System 2
Dev
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The number of accounts quickly outgrew our ability to
monitor them
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Options
• Deploy a standardized, centrally managed solution
– Slow, resource intensive to design and deploy
– Too restrictive - not a good cultural fit
– Migration path and support for current use cases?
• Establish enterprise standards
– Limited success and adoption
– Large communication challenges
– Not scalable
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Our Solution
WHEN A PROBLEM COMES ALONG,
YOU MUST AUTOMATE IT,
AUTOMATE IT GOOD
(With apologies to Devo)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
USCIS Cloud Monitor
• Automated enforcement of key security & ops policies
• Automated comparison and reporting vis best practices
• Cloud-native using Lambda – No infrastructure required
• Native multi-account support via Cross-Account roles
• Extensible Plugin Model:
DETECT REPORT REMEDIATE
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Initial Use Case
• EC2 Tagging Policy
– What is it?
– Who administers it?
– What system is it in?
• Less than ideal compliance rates
– Security concern
– Unneeded instances a major expense
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Tagging Policy Solution
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Tagging Policy Solution
• “Fix the glitch”
– Stop non-compliant instances
– CloudWatch Events: Check when instances change
state
• Gradual rollout
– Extensive communications to teams
– Started with detection and reporting via SNS
– Enforcement in non-production first
– Then production
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Results
• 100% compliance
• Provides immediate feedback to developers/engineers
• Significant cost savings from identifying unneeded
instances
• Extended to Amazon RDS and on-premises
• Some hiccups:
– Developer forgot a tag during a Blue/Green deployment
– Auto-scaling won the fight
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Current Capabilities
• EC2 Tagging Policy
• Standardized, Enforced Logging Configuration
• S3 Public Bucket and Object Check
• Required Security Groups
• Environment “Light Switch” (EC2 Scheduler)
• IAM Best Practices: Access Key Age, MFA,
Password Policies, etc.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Future Plans
• Enforce encryption of Amazon S3, Amazon SQS,
Amazon EBS, Amazon RDS, Amazon EFS,
DynamoDB, all the things
• Enforce KMS CMK rotation
• Automated Amazon RDS configuration checks
• Automated snapshot deletion
• Remove unused EBS volumes
• Remove unused ELBs, NLBs, ALBs
• Block Internet Gateway deployment
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Other @Scale Sessions to Catch
• 194319 Governance@Scale
• 194324 Management@Scale
• 194321 CICD@Scale
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete the session survey in
the summit mobile app.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAmazon Web Services
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...Amazon Web Services
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignAmazon Web Services
 
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...Amazon Web Services
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...Amazon Web Services
 
Automating Incident Response and Forensics
Automating Incident Response and ForensicsAutomating Incident Response and Forensics
Automating Incident Response and ForensicsAmazon Web Services
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAmazon Web Services
 
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Amazon Web Services
 
Incident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesIncident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesAmazon Web Services
 
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018Amazon Web Services
 

What's hot (20)

Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps Pipelines
 
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
A DIY Guide to Runbooks, Security Incident Reports, & Incident Response (SEC3...
 
Federation & Access Management
Federation & Access ManagementFederation & Access Management
Federation & Access Management
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018
Using AWS Lambda as a Security Team (SEC322-R1) - AWS re:Invent 2018
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...
Architecting for Enterprise Identity Across Multiple Operating Models (ENT413...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Automating Incident Response and Forensics
Automating Incident Response and ForensicsAutomating Incident Response and Forensics
Automating Incident Response and Forensics
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
 
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
How Nubank Automates Fine-Grained Security with IAM, AWS Lambda, and CI/CD (F...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
Evolve Your Incident Response Process and Powers for AWS - SID306 - Chicago A...
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Incident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of NeedlesIncident Response - Finding a Needle in a Stack of Needles
Incident Response - Finding a Needle in a Stack of Needles
 
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
Detecting Credential Compromise in AWS (SEC389) - AWS re:Invent 2018
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

Similar to Security@Scale

How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfAmazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionAmazon Web Services
 
Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Amazon Web Services
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Amazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsAmazon Web Services
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Amazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftAmazon Web Services
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneAmazon Web Services
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Amazon Web Services
 

Similar to Security@Scale (20)

How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS Evolve Your Incident Response Process and Powers for AWS
Evolve Your Incident Response Process and Powers for AWS
 
Enterprise Security
Enterprise SecurityEnterprise Security
Enterprise Security
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
Building the Technical Foundation for Your Security Practice (GPSCT205) - AWS...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security@Scale

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Jillian Leo Solutions Architect Adrian Monza Chief, Cyber Defense Branch Information Security Division, USCIS Session Code: 194323 Session: Security@Scale Track: Products and Solutions
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • Challenges and Objectives you Face Everyday • Security of and in the Cloud • Overview of AWS Security Services • A look at – AWS GuardDuty – AWS Systems Manger – AWS Config
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Key Takeaways • Understanding security of your AWS environment • … & security of your workloads • Understanding how to gain visibility into your environment and make use of it • How to automate remediation
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Your Challenges
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. NIST Cyber Security Framework (CSF) Core Identify Protect DetectRespond Recover What processes and assets need protection? What safeguards are available? What techniques can identify incidents? What techniques can contain impacts of incidents? What techniques can restore capabilities? https://d0.awsstatic.com/whitepapers/complianc e/NIST_Cybersecurity_Framework_CSF.pdf
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Continuous Diagnostics & Mitigation (CDM) AWS is working on alignment!
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. International Organization for Standardization • ISO 27103:2018 Cybersecurity and ISO and IEC Standards • ISO 27002:2013 Information Technology – Security techniques Code of Practice • ISO 27017:2015 Based on ISO 27002:2013 Information technology -- Security techniques -- Code of practice for information security controls for cloud services
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The AWS Shared Responsibility Hopefully, you’ve seen this before… DatabaseStorageCompute Networking Edge Locations Regions Avail. Zones AWS Global Infrastructure Customers are responsible for security ‘in’ the Cloud AWS is responsible for security ‘of’ the Cloud Customer Data Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System and/or Data) Network Traffic Protection (Encryption / Integrity / Identity)
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Identity & Access Management (IAM) AWS Organizations Amazon Cognito AWS Directory Service AWS Single Sign-On AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs Amazon EC2 Systems Manager AWS Shield AWS Web Application Firewall (WAF) Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service (KMS) AWS CloudHSM Amazon Macie AWS Certificate Manager Server Side Encryption Secrets Manager AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection AWS Security Solutions
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Aligning to AWS Services Identify Protect DetectRespond Recover What processes and assets need protection? What safeguards are available? What techniques can identify incidents? What techniques can contain impacts of incidents? What techniques can restore capabilities?
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Identify Amazon CloudWatch Amazon EC2 Systems Manager AWS CloudTrail AWS Config Amazon Inspector Amazon Macie AWS Shield VPC Flow logs Amazon GuardDuty
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Protect Network Access Control List Security Groups AWS Shield Amazon EC2 Systems Manager AWS WAF AWS Certificate Manager Amazon CloudFront IAM Amazon VPC* Amazon EC2
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Detect Amazon CloudWatch Amazon EC2 Systems Manager AWS CloudTrail AWS Config Amazon Inspector Amazon MacieAWS Shield VPC Flow logsAmazon GuardDuty Event (event- based) Amazon SNS email notification HTTP notification
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Respond Rule AWS Config Amazon CloudWatch Event (event- based) State Manager Maintenance Windows InventoryAutomation documents Parameter Store Run Command Patch Manager Amazon EC2 Systems Manager AWS WAF filtering rule AWS Shield Advanced Lambda function Lambda function Lambda function Amazon GuardDuty Lambda function
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudWatch Events • Events for Services Not Listed • Auto Scaling • AWS API Call • AWS Batch • AWS CodeBuild • AWS CodeCommit • AWS CodeDeploy • AWS CodePipeline • AWS Management Console Sign-in • Amazon EBS • Amazon EC2 • AWS OpsWorks Stacks • AWS Systems Manager • AWS Systems Manager Parameter Store • AWS Systems Manager Configuration Compliance • Amazon EC2 Maintenance Windows • Amazon ECS • Amazon EMR • Amazon GameLift • AWS Glue Events • Amazon GuardDuty • AWS Health • AWS KMS • Amazon Macie • Scheduled • AWS Server Migration Service • AWS Trusted Advisor
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Recover AWS Step Functions Amazon SNS email notification HTTP notification AWS Lambda Lambda function Amazon CloudWatch Event (event- based) Lambda function Lambda function Lambda function
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Service Callouts
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty Threat Detection and Notification DETECT NOTIFY RESPOND Reconnaissance Instance Compromise Account Compromise Amazon GuardDuty VPC flow logs DNS Logs CloudTrail Events HIGH MEDIUM LOW FindingsData SourcesThreat DetectionTypes https://aws.amazon.com/guardduty/
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty: Service Benefits • Managed Threat Detection Service • One-Click Activation without Architectural or Performance Impact • Continuous Monitoring of AWS Accounts and Resources • Discover Threats Related to EC2 and IAM • Instant On Provides Findings in Minutes • No Agents, no Sensors, no Network Appliances • Global Coverage, Regional Results • Built In Anomaly Detection with Machine Learning • Partner Integrations for Additional Protections • Cost Effective Simple Pricing
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Remediate a Compromised Instance • Remediate Compromised AWS Credentials Automatic Remediation GuardDuty CloudWatch Events Lambda Amazon GuardDuty Amazon CloudWatch CloudWatch Events Lambda Function AWS Lambda Responding to Findings: Remediation
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Systems Manager
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Systems Manager • A set of capabilities that provide... • insight and compliance • safe and secure operations • automated configuration with granular control • ...across all of your Windows and Linux workloads... • ...running on Amazon EC2 or on-premises… • ...at no additional charge
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why should I care? Manage hybrid Architecture Cross-platform (Windows/Linux) Scalable and auditable Improve security and compliance Automate repetitive tasks Reduce TCO
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Systems Manager Run Command State Manager Inventory Maintenance Window Patch Manager Automation Parameter StoreParameter Store Documents
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config & AWS Config Rules Continuously record and assess service configurations Changing resources AWS Config AWS Config Rules History, Snapshot Notifications API Access Normalized How are my resources configured over time?
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Security Best Practices – Core Principles • Shared Responsibility Model • Visibility/Insight • Consistency • Automation & Infrastructure-as-Code • Audit / Actionable /Automation • Separation of Concerns • Least Privilege • Secure Data – In Transit, @ Rest • Game Days • Defense in Depth Ingrained in the DNA of a Well Architected Enterprise
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Using Cloud Monitor to Migrate to DevSecOps
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Our Story • Rapid Adoption • Migration and Innovation • Results: Speed, Features, Success • But also: – Scale – Sprawl – Snowflakes
  • 32. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The Beginning • Started with one AWS Account • Another to separate dev and prod • Two more for the next system • Centralized services, Networking Prod Dev System 2 Prod System 2 Dev
  • 33. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The number of accounts quickly outgrew our ability to monitor them
  • 34. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Options • Deploy a standardized, centrally managed solution – Slow, resource intensive to design and deploy – Too restrictive - not a good cultural fit – Migration path and support for current use cases? • Establish enterprise standards – Limited success and adoption – Large communication challenges – Not scalable
  • 35. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Our Solution WHEN A PROBLEM COMES ALONG, YOU MUST AUTOMATE IT, AUTOMATE IT GOOD (With apologies to Devo)
  • 36. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. USCIS Cloud Monitor • Automated enforcement of key security & ops policies • Automated comparison and reporting vis best practices • Cloud-native using Lambda – No infrastructure required • Native multi-account support via Cross-Account roles • Extensible Plugin Model: DETECT REPORT REMEDIATE
  • 37. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Initial Use Case • EC2 Tagging Policy – What is it? – Who administers it? – What system is it in? • Less than ideal compliance rates – Security concern – Unneeded instances a major expense
  • 38. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Tagging Policy Solution
  • 39. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Tagging Policy Solution • “Fix the glitch” – Stop non-compliant instances – CloudWatch Events: Check when instances change state • Gradual rollout – Extensive communications to teams – Started with detection and reporting via SNS – Enforcement in non-production first – Then production
  • 40. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Results • 100% compliance • Provides immediate feedback to developers/engineers • Significant cost savings from identifying unneeded instances • Extended to Amazon RDS and on-premises • Some hiccups: – Developer forgot a tag during a Blue/Green deployment – Auto-scaling won the fight
  • 41. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Current Capabilities • EC2 Tagging Policy • Standardized, Enforced Logging Configuration • S3 Public Bucket and Object Check • Required Security Groups • Environment “Light Switch” (EC2 Scheduler) • IAM Best Practices: Access Key Age, MFA, Password Policies, etc.
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Future Plans • Enforce encryption of Amazon S3, Amazon SQS, Amazon EBS, Amazon RDS, Amazon EFS, DynamoDB, all the things • Enforce KMS CMK rotation • Automated Amazon RDS configuration checks • Automated snapshot deletion • Remove unused EBS volumes • Remove unused ELBs, NLBs, ALBs • Block Internet Gateway deployment
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Other @Scale Sessions to Catch • 194319 Governance@Scale • 194324 Management@Scale • 194321 CICD@Scale
  • 44. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey in the summit mobile app.
  • 45. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Editor's Notes

  1. Add slide on Organizations