AWS Summit Tel Aviv - Security Keynote

85
AWS Summit 2013 Tel Aviv Oct 16 Tel Aviv, Israel Carlos Conde Sr. Mgr. Solutions Architecture AWS CLOUD SECURITY

Transcript of AWS Summit Tel Aviv - Security Keynote

Page 1: AWS Summit Tel Aviv - Security Keynote

AWS Summit 2013 Tel Aviv Oct 16 – Tel Aviv, Israel

Carlos Conde

Sr. Mgr. Solutions Architecture

AWS CLOUD SECURITY

Page 2: AWS Summit Tel Aviv - Security Keynote

SECURITY IS UNIVERSAL

Page 3: AWS Summit Tel Aviv - Security Keynote

EVERY CUSTOMER HAS ACCESS

TO THE SAME SECURITY

CAPABILITIES CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS

Page 4: AWS Summit Tel Aviv - Security Keynote

AWS GOV CLOUD

ITAR COMPLIANT

Page 5: AWS Summit Tel Aviv - Security Keynote

SECURITY IS VISIBLE

Page 6: AWS Summit Tel Aviv - Security Keynote

CAN YOU MAP YOUR NETWORK?

WHAT IS IN YOUR ENVIRONMENT

RIGHT NOW?

Page 7: AWS Summit Tel Aviv - Security Keynote
Page 8: AWS Summit Tel Aviv - Security Keynote
Page 9: AWS Summit Tel Aviv - Security Keynote

AWS API + CLOUDFORMER ENVIRONMENT ARCHITECTURE DEFINITION

AND CHANGE DETECTION

Page 10: AWS Summit Tel Aviv - Security Keynote

SECURITY IS TRANSPARENT

Page 11: AWS Summit Tel Aviv - Security Keynote

SOC 1 SOC 2 SOC 3 PCI DSS L1 ISO 27001

ITAR FIPS FedRAMP HIPAA

Page 12: AWS Summit Tel Aviv - Security Keynote

SECURITY IS FAMILIAR

Page 13: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 14: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 15: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 16: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 17: AWS Summit Tel Aviv - Security Keynote

LEAST PRIVILEGE PRINCIPLE CONFINE ROLES ONLY TO THE MATERIAL

REQUIRED TO DO A SPECIFIC WORK

Page 18: AWS Summit Tel Aviv - Security Keynote

USE AWS IAM IDENTITY & ACCESS MANAGEMENT

Page 19: AWS Summit Tel Aviv - Security Keynote

CONTROL WHO CAN DO WHAT IN

YOUR AWS ACCOUNT

Page 20: AWS Summit Tel Aviv - Security Keynote
Page 21: AWS Summit Tel Aviv - Security Keynote
Page 22: AWS Summit Tel Aviv - Security Keynote
Page 23: AWS Summit Tel Aviv - Security Keynote

IAM USERS & ROLES

Page 24: AWS Summit Tel Aviv - Security Keynote

ACCESS TO

SERVICE APIs

Page 25: AWS Summit Tel Aviv - Security Keynote

NO PASSWORDS

Page 26: AWS Summit Tel Aviv - Security Keynote

USE SEPARATE SETS OF

CREDENTIALS

Page 27: AWS Summit Tel Aviv - Security Keynote

ROTATE YOUR AWS SECURITY

CREDENTIALS

Page 28: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 29: AWS Summit Tel Aviv - Security Keynote

YOUR DATA IS YOUR

MOST IMPORTANT ASSET IF YOUR DATA IS NOT SECURE, YOU’RE NOT SECURE

Page 30: AWS Summit Tel Aviv - Security Keynote
Page 31: AWS Summit Tel Aviv - Security Keynote

Page 32: AWS Summit Tel Aviv - Security Keynote

MFA DELETE PROTECTION

Page 33: AWS Summit Tel Aviv - Security Keynote
Page 34: AWS Summit Tel Aviv - Security Keynote

ENCRYPT YOUR DATA

AMAZON S3 SSE DATA AT REST

AWS CLOUDHSM

Page 35: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 36: AWS Summit Tel Aviv - Security Keynote

NEED TO KNOW

+

CCTV, GUARDS, MAN TRAPS,

FENCES, ETC…

Page 37: AWS Summit Tel Aviv - Security Keynote

Page 38: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 39: AWS Summit Tel Aviv - Security Keynote

CHANGES IN PRODUCTION

HAVE TO BE AUTHORIZED

Page 40: AWS Summit Tel Aviv - Security Keynote

DEV & TEST ENVIRONMENT

AWS ACCOUNT A

PRODUCTION ENVIRONMENT

AWS ACCOUNT B

Page 41: AWS Summit Tel Aviv - Security Keynote

DEPLOYMENT PROCESS

HAS TO BE CONSTRAINED

Page 42: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 43: AWS Summit Tel Aviv - Security Keynote

CONTINUOUS DELIVERY MODEL

Page 44: AWS Summit Tel Aviv - Security Keynote

CONTINUOUS DEPLOYMENT

SESSION 13:30 START-UP TRACK

Page 45: AWS Summit Tel Aviv - Security Keynote

REDUNDANCY & INTEGRITY

CHECKS

Page 46: AWS Summit Tel Aviv - Security Keynote

USE MULTIPLE AZs AMAZON S3

AMAZON DYNAMODB

AMAZON RDS MULTI-AZ

AMAZON EBS SNAPSHOTS

Page 47: AWS Summit Tel Aviv - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 48: AWS Summit Tel Aviv - Security Keynote

“GAME DAYS” INSERT ARTIFICIAL SECURITY INCIDENTS.

MEASURE SPEED OF DETECTION AND EXECUTION.

Page 49: AWS Summit Tel Aviv - Security Keynote

GAME DAYS !! INSERT ARTIFICIAL SECURITY INCIDENTS.

MEASURE SPEED OF DETECTION AND EXECUTION.

Page 50: AWS Summit Tel Aviv - Security Keynote
Page 51: AWS Summit Tel Aviv - Security Keynote

SECURITY IS AUDITABLE

Page 52: AWS Summit Tel Aviv - Security Keynote
Page 53: AWS Summit Tel Aviv - Security Keynote

VULNERABILITY / PENETRATION

TESTING

Page 54: AWS Summit Tel Aviv - Security Keynote

VULNERABILITY / PENETRATION

TESTING

Page 55: AWS Summit Tel Aviv - Security Keynote

LOGS

OBTAINED, RETAINED, ANALYZED

Page 56: AWS Summit Tel Aviv - Security Keynote

OBTAIN, RETAIN, ANALYSE

YOUR LOGS

Page 57: AWS Summit Tel Aviv - Security Keynote
Page 58: AWS Summit Tel Aviv - Security Keynote
Page 59: AWS Summit Tel Aviv - Security Keynote

PROTECT YOUR LOGS WITH IAM

ARCHIVE YOUR LOGS

Page 60: AWS Summit Tel Aviv - Security Keynote
Page 61: AWS Summit Tel Aviv - Security Keynote
Page 62: AWS Summit Tel Aviv - Security Keynote

TRUSTED ADVISOR

Page 63: AWS Summit Tel Aviv - Security Keynote
Page 64: AWS Summit Tel Aviv - Security Keynote
Page 65: AWS Summit Tel Aviv - Security Keynote
Page 66: AWS Summit Tel Aviv - Security Keynote

SECURITY IS SHARED

Page 67: AWS Summit Tel Aviv - Security Keynote

NETWORK SECURITY:

DDOS

Page 68: AWS Summit Tel Aviv - Security Keynote

NETWORK SECURITY:

SSL

Page 69: AWS Summit Tel Aviv - Security Keynote

NETWORK SECURITY:

SPOOFING

Page 70: AWS Summit Tel Aviv - Security Keynote

NETWORK SECURITY:

PORT SCANNING

Page 71: AWS Summit Tel Aviv - Security Keynote

AMAZON EC2 SECURITY:

HOST OS SSH KEYED LOGINS VIA BASTION HOST

ALL ACCESSES LOGGED AND AUDITED

Page 72: AWS Summit Tel Aviv - Security Keynote

AMAZON EC2 SECURITY:

GUEST OS CUSTOMER CONTROLLED AT ROOT LEVEL

AWS ADMINS CANNOT LOG IN

CUSTOMER-GENERATED KEYPAIRS

Page 73: AWS Summit Tel Aviv - Security Keynote

“If you need to SSH into your

instance, your deployment process

is broken.”

Page 74: AWS Summit Tel Aviv - Security Keynote

AMAZON EC2 SECURITY:

STATEFUL & STATELESS FIREWALL MANDATORY INBOUND

DEFAULT DENY MODE

Page 75: AWS Summit Tel Aviv - Security Keynote
Page 76: AWS Summit Tel Aviv - Security Keynote
Page 77: AWS Summit Tel Aviv - Security Keynote
Page 78: AWS Summit Tel Aviv - Security Keynote
Page 79: AWS Summit Tel Aviv - Security Keynote
Page 80: AWS Summit Tel Aviv - Security Keynote

SECURITY IS

UNIVERSAL

VISIBLE

TRANSPARENT

FAMILIAR

AUDITABLE

SHARED

Page 81: AWS Summit Tel Aviv - Security Keynote

AWS.AMAZON.COM / SECURITY

Page 82: AWS Summit Tel Aviv - Security Keynote
Page 83: AWS Summit Tel Aviv - Security Keynote

AWS SECURITY WHITEPAPERS

RISK & COMPLIANCE

AUDITING SECURITY CHECKLIST

SECURITY PROCESSES

SECURITY BEST PRACTICES

Page 84: AWS Summit Tel Aviv - Security Keynote

AWS MARKETPLACE

SECURITY SOLUTIONS

Page 85: AWS Summit Tel Aviv - Security Keynote