Crypto-Options on AWS. Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH

Similar documents
Werden Sie ein Teil von Internet der Dinge auf AWS. AWS Enterprise Summit 2015 Dr. Markus Schmidberger -

AWS 101. Patrick Pierson, IonChannel

Amazon Linux: Operating System of the Cloud

Certificate of Registration

Security Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Protecting Your Data in AWS. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

AWS Solution Architect Associate

Microservices on AWS. Matthias Jung, Solutions Architect AWS

Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

What s New at AWS? A selection of some new stuff. Constantin Gonzalez, Principal Solutions Architect, Amazon Web Services

Amazon Web Services Training. Training Topics:

About Intellipaat. About the Course. Why Take This Course?

Mapping traditional security technologies to AWS Dave Walker Specialised Solutions Architect Security and Compliance Amazon Web Services UK Ltd

High School Technology Services myhsts.org Certification Courses

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

Architecting for HIPAA Security and Compliance on Amazon Web Services

Microservices Architekturen aufbauen, aber wie?

2013 AWS Worldwide Public Sector Summit Washington, D.C.

CloudHSM Deep-Dive. Dave Walker Specialised Solutions Architect Security/Compliance Amazon Web Services UK Ltd

Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect. Amazon.com, Inc. and its affiliates. All rights reserved.

What s New at AWS? looking at just a few new things for Enterprise. Philipp Behre, Enterprise Solutions Architect, Amazon Web Services

Deliver High- quality Streaming Media Globally with AWS and Wowza

Simple Security for Startups. Mark Bate, AWS Solutions Architect

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

Amazon Web Services (AWS) Training Course Content

4) An organization needs a data store to handle the following data types and access patterns:

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

How can you implement this through a script that a scheduling daemon runs daily on the application servers?

Getting Started with AWS Security

Enroll Now to Take online Course Contact: Demo video By Chandra sir

AWS Well Architected Framework

Cloud Computing. Amazon Web Services (AWS)

AWS Data Security Security Update

Scaling on AWS. From 1 to 10 Million Users. Matthias Jung, Solutions Architect

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Cloud Computing /AWS Course Content

Training on Amazon AWS Cloud Computing. Course Content

Overview of AWS Security - Database Services

LINUX, WINDOWS(MCSE),

The Orion Papers. AWS Solutions Architect (Associate) Exam Course Manual. Enter

AWS Mobile Services 7/7/2014. Marco Argenti, Vice President

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

AWS Solutions Architect Exam Tips

Oracle WebLogic Server 12c on AWS. December 2018

Startups and Mobile Apps on AWS. Dave Schappell, Startup Business Development Manager, AWS September 11, 2013

AWS Certifications. Columbus Amazon Web Services Meetup - February 2018

TestkingPass. Reliable test dumps & stable pass king & valid test questions

Mid-Atlantic CIO Forum

Amazon AWS-Solution-Architect-Associate Exam

Security & Compliance in the AWS Cloud. Amazon Web Services

AWS Certified Solutions Architect - Associate 2018 (SAA-001)

HPE Digital Learner AWS Certified SysOps Administrator (Intermediate) Content Pack

AWS Solutions Architect Associate (SAA-C01) Sample Exam Questions

AWS Administration. Suggested Pre-requisites Basic IT Knowledge

Cloud Solutions for Mobile Applications

Network Security & Access Control in AWS

AWS Service Drill Downs

ActiveNET. #202, Manjeera Plaza, Opp: Aditya Park Inn, Ameerpetet HYD

Serverless Computing. Redefining the Cloud. Roger S. Barga, Ph.D. General Manager Amazon Web Services

Security by Design Running Compliant workloads in AWS

Additional Security Services on AWS

Better, Faster, Stronger web apps with Amazon Web Services. Senior Technology Evangelist, Amazon Web Services

Introduction to Cloud Computing

Welcome and Introductions. Belegu Rinon Imsand Matthias

Amazon Search Services. Christoph Schmitter

Amazon AWS-DevOps-Engineer-Professional Exam

VMware, SQL Server and Encrypting Private Data Townsend Security

Analytics"in"the"Cloud"from"AWS

AWS cloud terminology

2013 AWS Worldwide Public Sector Summit Washington, D.C.

TECHNICAL WORKBOOK. PCI Compliance in the AWS Cloud A NITIAN. Report Date: October 17, Jordan Wiseman, QSA

Minfy MS Workloads Use Case

Reactive Microservices Architecture on AWS

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

Automate best practices and operational health for your AWS resources with Trusted Advisor and AWS Health

Best Practices and Performance Tuning on Amazon Elastic MapReduce

SAA-C01. AWS Solutions Architect Associate. Exam Summary Syllabus Questions

Expected Learning Outcomes Introduction To AWS

AWS: Basic Architecture Session SUNEY SHARMA Solutions Architect: AWS

AWS CloudHSM. User Guide

What is Cloud Computing? What are the Private and Public Clouds? What are IaaS, PaaS, and SaaS? What is the Amazon Web Services (AWS)?


Architecting for Greater Security in AWS

Vom Server bis zum WorkSpace: Windows Anwendungen auf AWS

Manage AWS Services. Cost, Security, Best Practice and Troubleshooting. Principal Software Engineer. September 2017 Washington, DC

Monitoring Serverless Architectures in AWS

DevOps Tooling from AWS

Dyadic Enterprise. Unbound Key Control For Azure Marketplace. The Secure-As-Hardware Software With a Mathematical Proof

Serverless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect

PracticeDump. Free Practice Dumps - Unlimited Free Access of practice exam

Who s Protecting Your Keys? August 2018

AWS Storage Gateway. Not your father s hybrid storage. University of Arizona IT Summit October 23, Jay Vagalatos, AWS Solutions Architect

Amazon Web Services Course Outline

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Deep Dive on Amazon Relational Database Service

Transcription:

Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved.

Agenda Theory Options

The Cryptographic Trinity Key Data Algorithm If you don t own all three parts of the solution, your data is not considered to be hard encrypted

In Region I:

In Region II: AWS DC AWS DC AWS DC AWS DC

Between Regions: Availability Zone Availability Zone Public Availability Zone Availability Zone Region DX Site Customer WAN DX Site Region

Summary Data in transit within an AZ might leave the building Data in transit between AZs will leave the building Data in transit between AWS Regions or between AWS and customer premises needs to be taken care of, too Whatever you do: Encrypt Your Data in Flight What about devices? Device decommissioning is a primary task for AWS This is fully compliant and audited No device leaves our DCs in a functional state People leaving a DC need to pass through a metal detector Let s discuss data at rest

Discussion Points Hard encryption might be excessive, for some purposes Find out where you need which kind of encryption map your view of risk and need Think about the lifetime of your data (example: German expiry of use of 3DES and resulting requirement for bulk data re-encryption with stronger algorithm ) Sometimes encryption is only there for Compliance reasons Work on your data classification Find balance between your obligation for executive care, cost and complexity

But: Getting Data at rest encrypted on AWS is so easy that you should consider a policy: All data need to be encrypted at rest!

AWS services and where we look into today: + Technology Partners Consulting Partners Ecosystem AWS Marketplace Elastic Beanstalk for Java, Node.js, Python, Ruby, PHP and.net Containers & Deployment (PaaS) OpsWorks CloudFormation IAM CloudTrail Cloud HSM CloudWatch Management & Administration Management Console APIs and SDKs Command Line Interface Analytics Application Services EMR Redshift Kinesis Data Pipeline CloudFront SNS SQS SES SWF WorkSpaces AppStream CloudSearch Networking VPC Direct Connect Route 53 Compute Storage MySQL, PostgreSQL Databases Oracle, SQL Server EC2 Elastic Load Balancer Auto Scaling S3 EBS Glacier Storage Gateway Import/Export RDS DynamoDB ElastiCache Regions Availability Zones Content Delivery POPs

AWS Key Management Service I Designed for Scalability and Throughput Uses bespoke AWS hardware + software Is a multi-tenant service Performs AES256 operations API for crypto command: Key Management Encryption / Decryption Customer selects MasterKey Data Key is transported via envelope encryption Data Key 1 Amazon S3 Object Customer Master Key(s) Data Key 2 Data Key 3 Data Key 4 Amazon EBS Volume Amazon Redshift Cluster AWS KMS Custom Application

AWS Key Management Service II Reference Architecture Encrypted Data Application or AWS Service Data Key + Encrypted Data Key AWS Key Management Service Master Key(s) in Customer s Account 1. Application or AWS service client requests an encryption key to use to encrypt data, and passes a reference to a master key under the account. 2. Client request is authenticated based on whether they have access to use the master key. 3. A new data encryption key is created and a copy of it is encrypted under the master key. 4. Both data key and encrypted data key are returned to the client. Data key is used to encrypt customer data and then deleted as soon as is practical. 5. Encrypted data key is stored for later use and sent back to AWS KMS when the source data needs to be decrypted.

S3 (normal mode) Data is sent to S3 encrypted S3 stores the data unencrypted Data travels unencrypted between AZs Enforce https: { } "Statement": [{ "Effect": "Deny, "Action": "s3:*", "Condition": { "Bool": { "aws:securetransport": false } }, "Resource": "arn:aws:s3:::bucket/*" ]}

S3 (server-side encryption) Data is sent to S3 encrypted S3 encrypts data with AWS owned key Data travels encrypted between AZs Data at rest is encrypted with AWS-owned key Enforce at-rest encryption: { "Statement":[{ "Sid":"DenyUnEncryptedObjectUploads", "Effect":"Deny", "Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::YourBucket/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption":"aes256" } } } ] }

S3 (server-side, user key) Data is sent to S3 encrypted S3 encrypts data with customer key sent in request The key will be forgotten by AWS immediately Data travels encrypted between AZs Data at rest is encrypted with customer-owned key Customer needs to send key in GET request

IAM S3 (server-side, user key + KMS) Data is sent to S3 encrypted S3 encrypts data with key sent in request Data travels encrypted between AZs Data at rest is encrypted with customer-owned key Key remains in KMS KMS Object

S3 (client-side encryption) Client encrypts the data locally with local held key Data is sent to S3 encrypted Data travels encrypted between AZs Data at rest is encrypted with customer-owned key AWS never sees the key

EBS (normal mode) Instance sends data to volume via hypervisor module Module can encrypt or not, depending on customer choice Data travels to the disks and between datacentres, potentially unencrypted Data lives unencrypted on Disk

IAM EBS (server-side encryption) Instance sends encrypted data over hypervisor to volume Instance OS needs to support encryption Data travels encrypted to the disks and between datacentres Data lives encrypted on Disk AWS owns key/algorithm/data Included in scope of AWS SOC1 report KMS Volume

CloudHSM Tamper-Proof and Tamper-Evident Destroys its stored keys if under attack FIPS 140-2 Level 2 certified Base position is to be a Keystore Can also be used to timestamp documents You can send data for encrypt / decrypt Key never leaves the HSM as cleartext Can be used by several commercial software products Can be used by API to access the HSM Needs to be backed-up (ideally to HSM on customer premises) Can (and should) be combined in HA clusters Is NOT a key management system but can work with some third-party ones Communicates via: PKCS#11 JCE Some applications need a plugin

Redshift can use CloudHSM When using CloudHSM Redshift gets cluster key from HSM Redshift generates a database key and encrypts it with the cluster key from the CloudHSM Redshift encrypts data with the database key Redshift supports re-encryption

RDS Crypto Support RDS / Oracle can use CloudHSM to store keys for Oracle Wallet So TDE can be HSM-backed RDS / MySQL, RDS / Postgres can use KMS to manage keys used to encrypt underlying EBS volumes So all tables are encrypted at rest Note that in-memory database contents (once the database has been unlocked) are cleartext RAM encryption is not something AWS has today, but it has been done in other contexts

VPC VGW Hardware IPsec termination points Data on the VPC side of the VGW is unprotected by the VGW (no re-encryption) If you need VPN termination with onward re-encryption, use EC2 instances with OpenSWAN or Cisco CRSs instead Uses pre-shared symmetric key The Key is a shared one between AWS and the customer Customer

Between Regions Public Availability Zone Availability Zone Availability Zone Region Customer WAN Custome r DC Availability Zone Region DX Site DX Site

Others Glacier Archives have always been encrypted this is entirely transparent to the user Glacier keys are AES256 AWS holds key/algorithm/data Route53 Supports signed zones ELB Supports SSL termination including onward re-encryption and customer choice of cipher suite (useful post-poodle) AWS holds keys/algorithm/data Unidirectional trust only (no certificate-based authentication of client to server) Import/Export Currently relies on Truecrypt shared secret between customer and AWS for exporting data Truecrypt has not been broken, but it is not longer maintained. Therefore import/export will choose another option

Bertram Dorn Amazon Web Services Germany GmbH bedorn@amazon.de Additional Ressources: http://aws.amazon.com/documentation http://aws.amazon.com/compliance http://aws.amazon.com/security