Securing AWS KiranKuppa MaitreyaRanganath
Securing AWS KiranKuppa MaitreyaRanganath
Securing AWS KiranKuppa MaitreyaRanganath
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
What to expect from this Session
• Security and Compliance in AWS
• AWS Assurance Programs
• AWS Security Enablers
• Security by Design
• DevSecOps
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Why - Modernize Technology Governance
The majority of technology governance relies predominantly on administrative and
operational security controls with LIMITED technology enforcement.
Assets
Risk
Vulnerability Threat
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Why is this important?
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
5
1500+ 3600+
11,200+
190 Governme Education
Nonprofit
Countries nt Institution
s
Agencies s
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
6
Global Infrastructure
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
The most sensitive workloads run on AWS
“We determined that security in AWS is superior to our on-premises data center
across several dimensions, including patching,
encryption, auditing and logging, entitlements, and compliance.”
—John Brady, CISO, FINRA (Financial Industry Regulatory Authority)
“The fact that we can rely on the AWS security posture to boost our own
security is really important for our business. AWS does a much better job at
security than we could ever do running a cage in a data center.”
— Richard Crowley, Director of Operations, Slack
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Security and Compliance in AWS
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS foundational security applies to every customer
AWS maintains a formal control environment
• SOC 1 (SSAE 16 & ISAE 3402) Type II (was SAS70)
•
Auditor
SOC 2 Type II and public SOC 3 report AWS is responsible for
• ISO 27001 Certification the security OF the
• Certified PCI DSS Level 1 Service Provider Cloud
• FedRAMP Authorization
• HIPAA and MPAA capable
Experts auditors test and validate 360° of the cloud
AWS Foundation Services
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
10
• Agility
• Automation
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Who owns Security in a Cloud Environment?
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Shared Security Responsibility
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Shared Responsibility:
for Infrastructure Services
Customer Data
Customer
Platform & Application Management
Managed by
IAM
Operating system, network, and firewall configuration customers
Foundation
AWS IAM
Endpoints
AWS
AWS Global
Infrastructure Regions Availability Edge
Zones Locations
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Infrastructure Services – Example Amazon EC2
• Customer
• AWS
• Customer Data
• Network, Compute, Storage • Customer Application
• AWS Global Infrastructure • Operating System
• AWS Endpoints • Network & Firewall (VPC)
• Customer Identity & Access Mgmt
• AWS Identity & Access Mgmt
(Users, Groups, Roles, Policies)
• High-Availability / Scaling
• Instance Management
• Data Protection
(In-transit, At-rest, Backup)
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Shared Responsibility:
for Platform Services
Customer Data
Customer
IAM
Client-side data encryption & data Network traffic protection
Configuration
integrity authentication encryption / integrity / identity Managed by
Firewall
customers
AWS IAM
Foundation
Compute Storage Databases Networking
Endpoints
Services
AWS
Managed by AWS
AWS Global
Availability Edge
Infrastructure Regions
Zones Locations
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Platform Services – Example RDS
• AWS • Customer
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Shared Responsibility:
for Abstracted Services
AWS IAM
Network traffic encryption provided by platform (protection of data in-transit)
Foundation
Endpoints
Managed by
AWS Global AWS
Availability Edge
Infrastructure Regions
Zones Locations
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Abstracted Services – Example S3
• AWS • Customer
• Network, Compute, Storage • Customer Data
• AWS Global Infrastructure • Data Protection
(In-transit, At-rest)
• AWS Endpoints
• AWS Identity & Access Mgmt
• Platform / Application (Users, Groups, Roles, Policies)
• Data Protection (In-transit, At-rest)
• High-Availability / Scaling
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
19
Customer
Storage infrastructure
Network infrastructure
Virtualization layer (EC2)
+ Operating systems
Application security
Service configuration
=
Hardened service endpoints Account management
Rich IAM capabilities Authorization policies
Customers get to choose the right level of security for their business.
As an AWS customer you can focus on your business and not be distracted by the muck.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
20
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
21
▪ Customers benefit from an environment built for the most security sensitive organizations
▪ AWS manages and validates testing against more than 3000 security controls so you don’t have to
▪ You get to define the right security controls for your workload sensitivity
▪ You always have full ownership and control of your data
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Security & Compliance Resources
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
23 Comprehensive security and compliance profile
Certifications / Attestations Laws / Regulations / Privacy Alignments / Frameworks
DoD SRG DNB [Netherlands] CIS
FedRAMP EAR CLIA
FIPS EU Model Clauses CJIS
IRAP EU Data Protection Directive CMS EDGE
ISO 9001 FERPA CMSR
ISO 27001 GLBA CSA
ISO 27017 HIPAA FDA
ISO 27018 HITECH FedRAMP TIC
MLPS Level 3 IRS 1075 FISC
MTCS ITAR FISMA
PCI DSS Level 1 My Number Act [Japan] G-Cloud
SEC Rule 17-a-4(f) Privacy Act [Australia] GxP (FDA CFR 21 Part 11)
SOC 1 Privacy Act [New Zealand] IT Grundschutz
SOC 2 PDPA - 2010 [Malaysia] MITA 3.0
SOC 3 PDPA - 2012 [Singapore] MPAA
UK Cyber Essentials U.K. DPA - 1988 NERC
VPAT / Section 508 NIST
EU-US Privacy Shield PHR
Spanish DPA Authorization UK Cloud Security Principles
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Inherit global security and compliance controls
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
25
PCI-DSS
Payment Card Industry (PCI) Data Security Standard (DSS)
▪AWS is Level 1 compliant (highest level).
▪Validated by an authorized independent QSA.
▪You can run applications on our PCI-compliant technology infrastructure for storing,
processing, and transmitting credit card information in the cloud.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS security and compliance resources
▪ AWS Artifact
▪ Introduction to AWS Security
▪ AWS Security Overview
▪ AWS Security Best Practices
▪ AWS Risk & Compliance
▪ Security at Scale Whitepapers
▪ Customer penetration testing requests
▪ Security Partner Solutions
▪ Request more information by contacting us
• aws.amazon.com/security
aws.amazon.com/compliance
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Security Enablers
Manage, secure and audit the use of AWS services
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Identity and Access Management (IAM)
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Organizations
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
30
Multiple VPCs vs Multiple Accounts
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
31
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
32
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Compute & Network Security
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Amazon VPC
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
35
Amazon VPC Security
• VPC Security Groups (mandatory)
▪ Instance level, stateful
▪ Supports ALLOW rules only VPC
▪ Default deny inbound, allow outbound
▪ Use as “whitelist” – least privilege
• VPC NACLs (optional)
▪ Subnet level, stateless
▪ Supports ALLOW and DENY NACLs
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
36
▪ Agentless
▪ Enable per ENI, per subnet, or per VPC
▪ Logged to AWS CloudWatch Logs
▪ Create alarms from log data
Accept
or reject
Interface Source IP Source port Protocol Packets
AWS
account
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
37
• For protection against most common DDoS • For additional protection against larger and more
attacks, and access to tools and best practices to sophisticated attacks, visibility into attacks, and
build a DDoS resilient architecture on AWS. 24X7 access to DDoS experts for complex cases.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
38
Attack monitoring
and detection
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
39
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
0
4
AWS WAF
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
41
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
43
AWS CloudTrail
• Track changes made to your AWS resources
• Records all API calls made on your account
• Enabled on a per-region basis
Integration with 3rd party solutions (ex. Splunk)
• Benefits:
What is recorded?
▪ Resource change tracking ✓ The identity of the API caller
▪ Security analysis ✓ The time of the API call
▪ Demonstrate Compliance ✓ The request parameters
✓ The response elements
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
44
Amazon CloudWatch
• AWS managed service providing a reliable, scalable, and flexible monitoring
solution that you can start using within minutes.
• You no longer need to set up, manage, and scale your own monitoring
systems and infrastructure.
▪ CloudWatch - monitor AWS resources and applications you run on AWS in real time
▪ CloudWatch Events - send system events from AWS resources to AWS Lambda functions,
Amazon SNS topics, streams in Amazon Kinesis, and other target types
▪ CloudWatch Logs - monitor, store, and access your log files from Amazon EC2 instances, AWS
CloudTrail, or other sources
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
45
• Publish messages from an application and immediately deliver them to subscribers or other applications.
▪ Messages published to topic.
▪ Topic subscribers receive message.
Subscriber
SQS
HTTP/S
Email
Publisher
SMS
SNS Topic Mobile Push
Lambda
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Amazon Macie
• Amazon Macie is an AI-powered security service that helps you prevent data loss by
automatically discovering, classifying, and protecting sensitive data stored in AWS.
• Amazon Macie uses machine learning to recognize sensitive data such as personally
identifiable information (PII) or intellectual property, assigns a business value, and provides
visibility into where this data is stored and how it is being used in your organization.
• Amazon Macie continuously monitors data access activity for anomalies, and delivers alerts
when it detects risk of unauthorized access or inadvertent data leaks.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Amazon Guard Duty
• Threat detection service
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Encryption Services
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
49 AWS Key Management Service (KMS)
Managed service to securely create, control, rotate, and use encryption keys.
Customer Master
Key(s)
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
51
KMS vs CloudHSM
KMS CloudHSM
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Configuration Management
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
53
AWS CloudFormation
Allows you to define a “template” which is composed of different
“resources” and then provision that template into repeatable, live, “stacks”.
Infrastructure as Code
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
54
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
55
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
56
AWS Config
▪ Managed service that provides AWS resource inventory, configuration history, and
configuration change notifications.
▪ Provides continuous details on all configuration changes associated with AWS
resources.
▪ Combines with CloudTrail for full visibility into what contributed to the change.
▪ Enables compliance auditing, security analysis, resource change tracking, and
troubleshooting.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
AWS Config Rules
Continuously monitors the configuration of existing and new AWS resources to
assess compliance with desired configurations
• Features Benefits
• Flexible rules evaluated continuously and • Continuous monitoring for unexpected changes
retroactively • Shared compliance across your organization
• Dashboard and reports for common goals • Simplified management of configuration changes
• Customizable remediation
• API automation
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Amazon Inspector
Security assessment tool analyzing end-to-end application configuration and
activity
• Features • Benefits
• Configuration scanning engine • Common Vulnerabilities and Exposures (CVE)
• Activity monitoring • Network Security Best Practices
• Built-in content library • Authentication Best Practices
• Automatable via API • Operating System Best Practices
• Fully auditable • Application Security Best Practices
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Security by Design
Automating Security, Compliance, and Governance in AWS
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
What is Security by Design (SbD)?
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Security by Design Four Phase Approach
1 2 3 4
Understand your Build a “secure Enforce the use of Perform validation
requirements environment” that fits the templates activities
your requirements
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#1: Understand your requirements
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#2: Build a “secure environment”
• What are the different options for securing your environment?
▪ Service selection
▪ Encryption
▪ Network segmentation
▪ User permissions
▪ Authorized OS images
▪ Resource protection
▪ Logging / monitoring
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#3: Enforce the use of templates
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#4: Perform Validation Activities
• 100% Audit-Ready
▪ Environments deployed from templates are audit-ready
▪ Rules defined within the templates are the baseline for comparison
• 100% Audit Coverage
▪ Auditing itself is configured and enabled via template
▪ Auditing it performed continuously and in real-time
▪ Properly scoped permissions prevent and detect attempts to tamper with
or disable auditing
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Security by Design Deployment
AWS Template
CloudFormation AWS
Constrained
Admins Service Catalog
Permissions Users
Amazon
VPC
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
67
• Result
• Automated environment enabling enforcement of security and compliance
polices and a functionally reliable governance model.
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
68
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
69
Amazon
S3 Lambda parses logs
2
Amazon
Good
CloudFront
users
Counts requests per
3
minute from same IP
4 AWS
Lambda
AWS WAF IP added to Auto
Bad Block rule
guys 6
Notification
Amazon
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM SNS
70
Bad guys
Notification Amazon
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM SNS
71
Console
Devs 4
Elevated
Privileges
5
1
SDK
Notification Amazon
SNS
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
DevSecOps
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM
Thank you!
Q&A
#ITDEVCONNECTIONS | ITDEVCONNECTIONS.COM