AWS Security Overview. Bill Shinn Principal Security Solutions Architect

Similar documents
Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

AWS Well Architected Framework

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Amazon Web Services

Simple Security for Startups. Mark Bate, AWS Solutions Architect

At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

High School Technology Services myhsts.org Certification Courses

BERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

Security Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Getting started with AWS security

Cloud security 2.0: Joko nyt pilveen voi luottaa?

Network Security & Access Control in AWS

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

Architecting for Greater Security in AWS

Security: Michael South Americas Regional Leader, Public Sector Security & Compliance Business Acceleration

Amazon Web Services (AWS) Training Course Content

Amazon Web Services Training. Training Topics:

Introduction to Amazon Cloud & EC2 Overview

Overview of AWS Security - Database Services

Getting started with AWS security

Understanding Perimeter Security

8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop

About Intellipaat. About the Course. Why Take This Course?

Mid-Atlantic CIO Forum

Hackproof Your Cloud Responding to 2016 Threats

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

Netflix OSS Spinnaker on the AWS Cloud

Amazon Web Services. Foundational Services for Research Computing. April Mike Kuentz, WWPS Solutions Architect

Amazon Web Services and Feb 28 outage. Overview presented by Divya

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

AWS Administration. Suggested Pre-requisites Basic IT Knowledge

Cloud and Storage. Transforming IT with AWS and Zadara. Doug Cliche, Storage Solutions Architect June 5, 2018

AWS Solution Architect Associate

Enroll Now to Take online Course Contact: Demo video By Chandra sir

Certificate Certificate number:

Protecting Your Data in AWS. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

AWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect

Introduction to Cloud Computing

Training on Amazon AWS Cloud Computing. Course Content

Scaling on AWS. From 1 to 10 Million Users. Matthias Jung, Solutions Architect

AWS Course Syllabus. Linux Fundamentals. Installation and Initialization:

Getting Started with AWS Security

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Cloudera s Enterprise Data Hub on the Amazon Web Services Cloud: Quick Start Reference Deployment October 2014

Amazon Simple Storage Service. Developer Guide API Version

Expected Learning Outcomes Introduction To AWS

PrepAwayExam. High-efficient Exam Materials are the best high pass-rate Exam Dumps

Amazon AWS-Solution-Architect-Associate Exam

AWS Solutions Architect Associate (SAA-C01) Sample Exam Questions

AWS Data Security Security Update

HashiCorp Vault on the AWS Cloud

HPE Digital Learner AWS Certified SysOps Administrator (Intermediate) Content Pack

How can you implement this through a script that a scheduling daemon runs daily on the application servers?

Cloud Computing /AWS Course Content

ActiveNET. #202, Manjeera Plaza, Opp: Aditya Park Inn, Ameerpetet HYD

AWS Solutions Architect Exam Tips

AWS_SOA-C00 Exam. Volume: 758 Questions

Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect. Amazon.com, Inc. and its affiliates. All rights reserved.

AWS 101. Patrick Pierson, IonChannel

Disclaimer This presentation may contain product features that are currently under development. This overview of new technology represents no commitme

Deep Freeze Cloud. Architecture and Security Overview

IAM Recommended Practices

ARCHITECTING WEB APPLICATIONS FOR THE CLOUD: DESIGN PRINCIPLES AND PRACTICAL GUIDANCE FOR AWS

Better, Faster, Stronger web apps with Amazon Web Services. Senior Technology Evangelist, Amazon Web Services

Amazon ElastiCache. User Guide API Version

Title: Planning AWS Platform Security Assessment?

Certificate of Registration

Designing Fault-Tolerant Applications

CPM. Quick Start Guide V2.4.0

LINUX, WINDOWS(MCSE),

Leveraging the Security of AWS's Own APIs for Your App. Brian Wagner Solutions Architect Serverless Web Day June 23, 2016

CS15-319: Cloud Computing. Lecture 3 Course Project and Amazon AWS Majd Sakr and Mohammad Hammoud

Standardized Architecture for NIST High-Impact Controls on the AWS Cloud Featuring Trend Micro Deep Security

Emulating Lambda to speed up development. Kevin Epstein CTO CorpInfo AWS Premier Partner

Certificate. Certificate number: Certified by EY CertifyPoint since: February 28, 2017

Cloud Computing. Amazon Web Services (AWS)

SAA-C01. AWS Solutions Architect Associate. Exam Summary Syllabus Questions

The Orion Papers. AWS Solutions Architect (Associate) Exam Course Manual. Enter

Certificate. Certificate number: Certified by EY CertifyPoint since: November 20, 2015

TECHNICAL WORKBOOK. PCI Compliance in the AWS Cloud A NITIAN. Report Date: October 17, Jordan Wiseman, QSA

Confluence Data Center on the AWS Cloud

Cloud Catastrophes. and how to avoid them

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

The Cloud Changes Nothing and Everything! Amazon.com, Inc. and its affiliates. All rights reserved.

Exam Questions AWS-Certified- Developer-Associate

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

AWS Agility + Splunk Visibility = Cloud Success. Splunk App for AWS Demo. Laura Ripans, AWS Alliance Manager

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info

AWS SDK for Node.js. Getting Started Guide Version pre.1 (developer preview)

Identity and Access Management Level 200

VMware Cloud on AWS The Next Generation Hybrid Cloud Architecture

25 Best Practice Tips for architecting Amazon VPC

Best Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ

CloudHealth. AWS and Azure On-Boarding

Swift Web Applications on the AWS Cloud

OnCommand Cloud Manager 3.2 Deploying and Managing ONTAP Cloud Systems

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Amazon AppStream 2.0: SOLIDWORKS Deployment Guide

Look Who s Hiring! AWS Solution Architect AWS Cloud TAM

Transcription:

AWS Security Overview Bill Shinn Principal Security Solutions Architect

Accelerating Security with AWS AWS Overview / Risk Management / Compliance Overview Identity / Privilege Isolation Roles for EC2 / 3 Technical Use Cases 2

AWS Overview 3

What is AWS? Deployment & Management Application Services Compute Storage Database Networking AWS Global Infrastructure 4

AWS Global Infrastructure 9 Regions 25 Availability Zones Continuous Expansion 5

AWS Availability Zones APAC Region (Sydney) US East Region (N. VA) EU Region (Ireland) Availability Zone A Availability Zone B Availability Zone A Availability Zone B Availability Zone A Availability Zone B Availability US Zone West C Region (Oregon) Availability Zone C APAC Region (Singapore) US West Region (N. California) Availability Zone A Availability Zone B Availability Zone A Availability Zone B Availability Zone A Availability Zone B Note: Conceptual drawing only. South America (Sao Paulo), GovCloud & Asia- Pacific (Toyko) not shown. 6

AWS Approach to Risk Management, Security & Compliance 7

Architected for Enterprise Security Requirements The Amazon Virtual Private Cloud [Amazon VPC] was a unique option that offered an additional level of security and an ability to integrate with other aspects of our infrastructure. Dr. Michael Miller, Head of HPC for R&D 8

Security & Compliance Shared Responsibility Customer Facilities Physical Security Compute Infrastructure Storage Infrastructure Network Infrastructure Virtualization Layer Operating System Applications + = Security Groups Firewalls Network Configuration Account Management 9

Benefits of Scale Apply to Security and Compliance Nothing better for the community than a tough set of customers Everyone s Systems and Applications Security Infrastructure Requirements Requirements Requirements Security Infrastructure The entire community benefits from tough scrutiny, the world-class AWS security team, market-leading capabilities, and constant improvements

Accreditation & Compliance, Old and New Old world Functionally optional (you can build a secure system without it) Audits done by an in-house team Accountable to yourself Must maintain talent and keep pace Check typically once a year, one location Workload-specific/regulation specific compliance checks New world Functionally necessary high watermark of requirements Audits done by third party experts Accountable to everyone Security drives broad compliance Continuous monitoring, everywhere Compliance approach based on all possible workload scenarios

Identity / Isolation / Trust Boundary Patterns 12

Identity & Access Management IAM enables customers to create and manage users in AWS s identity system Identity Federation with local directory is an option for enterprises Very familiar security model Users, groups, permissions Allows customers to Create users Assign individual passwords, access keys, multifactor authentication devices Grant fine-grained permissions Optionally grant them access to the AWS Console Organize users in groups

IAM Policy Structure Action Effect Resource Condition

IAM / Security Token Service AssumeRole Duration from 15 minutes to one hour Returns access key ID, secret access key, and security token

Privilege Isolation Account IAM User/Group/Role Region Amazon VPC Security Group Resource

Privilege Isolation / Resources Resource Permissions by Service (by API call) http://docs.aws.amazon.com/iam/latest/userguide/using_specificproducts.html Amazon DynamoDB (tables and indexes) Amazon Elastic Beanstalk (application, applicationversion, solutionstack Amazon EC2 (instance, security group, dhcp options, nacl, route table, gateways, volumes) Amazon Glacier (vault) Amazon IAM (signing credentials, group, ) Amazon Redshift (cluster, parameter group, security group, snapshot, subnet group) Amazon RDS Amazon Route53 (hosted zone) Amazon S3 (bucket) Amazon SNS (topic) Amazon SQS (queue)

Privilege Isolation / Resources " Resource-based Permissions for EC2 announced on July 9 th, 2013 " Assign permissions to EC2 & Other Resources " Instance " Snapshot " Volume " Combine with existing permissions and policies based on EC2 Actions to create extremely fine-grained polices for managing AWS resources. " Leverage Tagging and attribute-driven conditions " Tags such as Production or AppName " Overlay organizational structure such as cost centers or departments " Require dedicated tenancy as a condition " Available resources and conditions continue to grow

AWS IAM Credentials require 'rubygems'! require 'aws-sdk'!! s3 = AWS::S3.new(! :access_key_id => 'AKIAIOSFODNN7EXAMPLE',! :secret_access_key => 'wjalrxutnfemi/k7mdeng/bpxrficyexamplekey')!! document = s3.buckets['text-content'].objects[ db-backup-schedule.txt']!! File.open("local-file.txt", "w") do f! f.write(document.read)! end!

IAM Roles / EC2 Role Instance Profile Identity for the instance itself Available to all application and users on host

IAM Roles / Instance Metadata Service Entitlements of credentials => IAM Role Short-life & Expiration Managed rotation No stored credentials!

AWS SDK Credential Chain Static credentials provided to the AWS.config method. For example, AWS.config(:access_key_id => '...', :secret_access_key => '...') Environment Variables ('AWS' prefix): ENV['AWS_ACCESS_KEY'] and ENV['AWS_SECRET_ACCESS_KEY'] Environment Variables ('AMAZON' prefix): ENV['AMAZON_ACCESS_KEY'] and ENV['AMAZON_SECRET_ACCESS_KEY'] Instance Metadata Service, which provides the credentials associated with the IAM role for the EC2 instance

AWS IAM Credentials / EC2 Roles require 'rubygems'! require 'aws-sdk'!! #s3 = AWS::S3.new()! # :access_key_id => 'AKIAIOSFODNN7EXAMPLE',! # :secret_access_key => 'wjalrxutnfemi/k7mdeng/bpxrficyexamplekey )!! s3 = AWS::S3.new()!! document = s3.buckets['text-content'].objects[ db-backup-schedule.txt']! [ec2-user@ip-172-16-1-153 ~]$ curl http://169.254.169.254/latest/meta-data/iam/securitycredentials/dba/!! File.open("local-file.txt", {! "w") do f! "Code" f.write(document.read)! : "Success",! end! "LastUpdated" : "2013-10-09T04:20:10Z",! "Type" : "AWS-HMAC",! "AccessKeyId" : EXAMPLEACCESSID12345",! "SecretAccessKey" : "/1e2x3a4m5p6l7esecretAccessK3y+321987",! "Token" : "AQoDYXdzEIX//////////wEaoAJJ2rZZJat9wVl3Hub/ ALObuZoLeOxLs48WqL0D0muqK9iMRrfAWQlhOtVzygfuRkLzAbKj3FUcNez6kqy/ ljzkr461omlbvt1lurmgkzhgww8iqks1owrv1k3vebbk6ippjjnvzxgt0x9o8maomh989ejnwuzq6w6qq9ufopczc9dcvgbo8 7b5Lo1yOJTnghyQI6XDqyImrUx+NMgQU2bOGiXyQ7RiWyhdkUXgBh4tuipsO4Q6XUE189NM0EKkeSDsKdzl/H+WX +IihSnYjjaLWHr6wSBVbmudoLb8RqE/urMGWhEolZuiXMGYvWOdau9MBkXF +4ciqlGx7mff6rOQoLqMzAhz4hWbEMOciVD7oUo3HvG/lLo4JOUyBEBHkJwglrPTkgU=",! "Expiration" : "2013-10-09T10:24:32Z"! }[ec2-user@ip-172-16-1-153 ~]$!

Roles for EC2 / 3 Use Cases 24

Bastion Host Role Eliminates need for individual IAM credentials Reduces or eliminates need for federation Combine with auditing of shell commands Control access by host / purpose

Web Application Access Role Eliminates need for storing IAM credentials in config files, Addresses key distribution and app deployment/bootstrap patterns (get secrets for database access, private keys for mutual auth, etc.) Can t check secrets into GitHub or Perforce if there aren t any Easier coding, faster coding, more features

Security Auditing Role Read-only access to AWS assets Census picture of all assets (feed scanning & SIEM reconciliation) RDS & RedShift query and connection auditing Change detection of vital objects

Security Auditing Role / EC2 Read-only Policy {! "Version": "2012-10-17",! "Statement": [! {! "Action": [!!!"ec2:describeaddresses",!!!"ec2:describeimageattribute",! "ec2:describeimages",! "ec2:describeinstanceattribute",! "ec2:describeinstancestatus",! "ec2:describeinstances",!!!"ec2:describenetworkacls",! "ec2:describenetworkinterfaceattribute",! "ec2:describenetworkinterfaces",! "ec2:describeroutetables",! "ec2:describesecuritygroups",! "ec2:describesubnets",!!!"ec2:describevpcs"! ],! }!! ]! "Resource": [! "*"! ],! "Effect": "Allow"! }!

Security Auditing Role / RDS Read-only Policy {! "Version": "2012-10-17",! "Statement": [! {! }! ]! }! "Action": [! "rds:describedbinstances",! "rds:describedblogfiles",! "rds:describedbparametergroups",! "rds:describedbparameters",! "rds:downloaddblogfileportion"! ],!! "Resource": [! "*"! ],! "Effect": "Allow",! "Condition": {! }! }! "streq": {! "rds:db-tag/environment": [! "prod",! "dr"! ]!

Security Auditing Role / RDS Read-only Policy #!/usr/bin/env ruby!! require 'rubygems'! require 'aws-sdk!! rds = AWS::RDS.new(:region => 'us-east-1').client!! general = "general/mysql-general.log"! logdata = rds.download_db_log_file_portion(:db_instance_identifier => "rdsexample", :log_file_name => general)!! puts logdata[:log_file_data]!!

Security Auditing Role / RDS Read-only Policy

Thank You! Bill Shinn Principal Security Solutions Architect