Using Security to Build with Confidence in AWS - Trend Micro

66
Using Security To Build With Confidence In AWS Sasha Pavlovic Director, Cloud and Datacenter Security | APAC

Transcript of Using Security to Build with Confidence in AWS - Trend Micro

Page 1: Using Security to Build with Confidence in AWS - Trend Micro

Using Security To Build With Confidence In AWS Sasha Pavlovic Director, Cloud and Datacenter Security | APAC

Page 2: Using Security to Build with Confidence in AWS - Trend Micro

The Story

More at aws.trendmicro.com

2012 re:Invent SPR203 : Cloud Security is a Shared Responsibility http://bit.ly/2012-spr203

2013 re:Invent SEC208: How to Meet Strict Security & Compliance Requirements in the Cloud http://bit.ly/2013-sec208

SEC307: How Trend Micro Build their Enterprise Security Offering on AWS http://bit.ly/2013-sec307

2014 re:Invent SEC313: Updating Security Operations for the Cloud http://bit.ly/2014-sec313

SEC314: Customer Perspectives on Implementing Security Controls with AWS http://bit.ly/2014-sec314

Page 3: Using Security to Build with Confidence in AWS - Trend Micro

Shared Responsibility Model

AWS

Physical

Infrastructure

Network

Virtualisation

You

Operating System

Applications

Data

Service Configuration

More at aws.amazon.com/security

Page 4: Using Security to Build with Confidence in AWS - Trend Micro

Shared Responsibility Model

AWS

Physical

Infrastructure

Network

Virtualisation

You

Operating System

Applications

Data

Service Configuration

More at aws.amazon.com/security

Page 5: Using Security to Build with Confidence in AWS - Trend Micro

Vulnerability Respond Repair

Page 6: Using Security to Build with Confidence in AWS - Trend Micro

Vulnerability

©2015,  Amazon  Web  Services,  Inc.  or  its  affiliates.  All  rights  reserved

Page 7: Using Security to Build with Confidence in AWS - Trend Micro

by Andreas Lindh (@addelindh)

Page 8: Using Security to Build with Confidence in AWS - Trend Micro

bash is a common command line interpreter

Page 9: Using Security to Build with Confidence in AWS - Trend Micro

a:() { b; } | attack

10 | 10 vulnerability. Widespread & easy to exploit

Page 10: Using Security to Build with Confidence in AWS - Trend Micro

Shellshock Impact

Page 11: Using Security to Build with Confidence in AWS - Trend Micro

1989 Fantastic summary by David A. Wheeler at http://www.dwheeler.com/essays/shellshock.html#timeline

Page 12: Using Security to Build with Confidence in AWS - Trend Micro

"MicroTAC" by Redrum0486 at English Wikipedia

12.3oz

Page 13: Using Security to Build with Confidence in AWS - Trend Micro

Time Since Last Event Event Action Action Timeline

1989-­‐08-­‐05  8:32   Added  to  codebase  

27  days,  10:20:00   Released  to  public  

9141  days,  21:18:35   Ini?al  report   React   Clock  starts  

1  day,  22:19:13   More  details   React  

2 days, 7:30:12 Official patch :: CVE-2014-6271 Patch 4 days, 5:49:25

5  days,  9:16:35   Limited  disclosure  ::  CVE-­‐2014-­‐6271   React  

2  days,  4:37:25   More  details   React  

3:44:00   More  details   React  

0:27:51   Public  disclosure   React  

0:36:30   More  details   React  

0:34:39   Public  disclosure  ::  CVE-­‐2014-­‐7169   React  

1:19:16   More  details   React  

15:15:44   More  details   React  

4:45:26   More  details   React  

3:03:34   More  details   React  

11:34:00   Mi?ga?on  ::  CVE-­‐2014-­‐7169   React  

4:58:00   More  details   React  

3:34:51   More  details   React  

3:29:09 Official patch :: CVE-2014-7169 Patch 9 days, 19:17:00

1:09:00   More  details   React  

2:07:00   Mi?ga?on  ::  CVE-­‐2014-­‐7169   React  

2:27:00   More  details   React  

23:50:00   More  details   React  

17:46:00   More  details   React  

7:24:00   More  details   React  

2  days,  7:21:00   Public  disclosure  ::  CVE-­‐2014-­‐6277  &  CVE-­‐2014-­‐6278   React  

0:11:00   More  details   React  

3:15:00 Official  patch  ::  CVE-­‐2014-­‐7186,  CVE-­‐2014-­‐7187   Patch   4  days,  17:30:00  

1 day, 11:55:00 Official  patch  ::  CVE-­‐2014-­‐6277   Patch   1  day,  11:55:00  

2  days,  20:24:00   Official  patch  ::  CVE-­‐2014-­‐6278   Patch   2  days,  20:24:00  

Page 14: Using Security to Build with Confidence in AWS - Trend Micro

Important Shellshock Events Time Since Last Event Event Action Action Timeline

1989-­‐08-­‐05  8:32   Added  to  codebase  

27  days,  10:20:00   Released  to  public  

9141  days,  21:18:35   Ini?al  report   React   Clock  starts  

2 days, 7:30:12 Official patch :: CVE-2014-6271 Patch 4 days, 5:49:25

3:29:09 Official patch :: CVE-2014-7169 Patch 9 days, 19:17:00

3:15:00 Official  patch  ::  CVE-­‐2014-­‐7186,  CVE-­‐2014-­‐7187   Patch   4  days,  17:30:00  

1 day, 11:55:00 Official  patch  ::  CVE-­‐2014-­‐6277   Patch   1  day,  11:55:00  

2  days,  20:24:00   Official  patch  ::  CVE-­‐2014-­‐6278   Patch   2  days,  20:24:00  

Page 15: Using Security to Build with Confidence in AWS - Trend Micro

Respond

©2015,  Amazon  Web  Services,  Inc.  or  its  affiliates.  All  rights  reserved

Day 1

Page 16: Using Security to Build with Confidence in AWS - Trend Micro

aws.amazon.com/architecture : Web application hosting

Page 17: Using Security to Build with Confidence in AWS - Trend Micro

aws.amazon.com/architecture : Web application hosting

Page 18: Using Security to Build with Confidence in AWS - Trend Micro

TCP : 443 TCP : 443 TCP : 4433 TCP : 4433

Primary workflow for our deployment

Page 19: Using Security to Build with Confidence in AWS - Trend Micro

AWS VPC Review

Page 20: Using Security to Build with Confidence in AWS - Trend Micro

AWS VPC Checklist

Review

IAM roles

Security groups

Network segmentation

Network access control lists (NACL)

More in the Auditing Security Checklist for Use of AWS, media.amazonwebservices.com/AWS_Auditing_Security_Checklist.pdf

Page 21: Using Security to Build with Confidence in AWS - Trend Micro

TCP : 443 TCP : 443 TCP : 4433 TCP : 4433

Primary workflow for our deployment

Page 22: Using Security to Build with Confidence in AWS - Trend Micro

HTTPS HTTPS HTTPS SQLi SSH

Intrusion prevention can look at each packet and then take action depending on what it finds

Page 23: Using Security to Build with Confidence in AWS - Trend Micro

aws.amazon.com/architecture : Web application hosting

Page 24: Using Security to Build with Confidence in AWS - Trend Micro

Intrusion Prevention in Action

Page 25: Using Security to Build with Confidence in AWS - Trend Micro

Review

All instances covered

Workload appropriate rules

Centrally managed

Security controls must scale out automatically with the deployment

Page 26: Using Security to Build with Confidence in AWS - Trend Micro

Repair

©2015,  Amazon  Web  Services,  Inc.  or  its  affiliates.  All  rights  reserved

Day 2

Page 27: Using Security to Build with Confidence in AWS - Trend Micro

aws.amazon.com/architecture : Web application hosting

Page 28: Using Security to Build with Confidence in AWS - Trend Micro

All instances deployment from task-specific AMI

TCP : 443 TCP : 443 TCP : 4433 TCP : 4433

Page 29: Using Security to Build with Confidence in AWS - Trend Micro

Workflow should be completely automated

Instantiate Destroy Configure

AMI Creation Workflow

Bake Instantiate Test

Page 30: Using Security to Build with Confidence in AWS - Trend Micro

AMI Creation

Page 31: Using Security to Build with Confidence in AWS - Trend Micro

aws.amazon.com/architecture : Web application hosting

Page 32: Using Security to Build with Confidence in AWS - Trend Micro

Instances tend to drift from the known good state, monitoring key files & processes is important

AMI Instance

Alert Integrity Monitoring

Page 33: Using Security to Build with Confidence in AWS - Trend Micro

Integrity Monitoring

Page 34: Using Security to Build with Confidence in AWS - Trend Micro

Keys

Respond

Review configuration

Apply intrusion prevention Repair

Patch vulnerability in new AMI

Leverage integrity monitoring

Page 35: Using Security to Build with Confidence in AWS - Trend Micro

Keys

Automation

Page 36: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

MatchMove Wallet’s Cloud journey

Presented by: Paul Hidalgo Cloud Architect, MatchMove Pay Pte Ltd

Page 37: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

•  Founded  in  2009  

•  Investors  are  Vickers  Group,  Credit  Saison  and  GMO  

•  6  Countries  in  ASEAN  

•  PAAS  /  Gaming  Company  

Page 38: Using Security to Build with Confidence in AWS - Trend Micro

Issuer of American Express and MasterCard across Asia

www.mmvpay.com

Page 39: Using Security to Build with Confidence in AWS - Trend Micro

Secure Payment

Accepted Everywhere

Good for small/micro-transactions

Page 40: Using Security to Build with Confidence in AWS - Trend Micro

No Age Limit No Minimum Income

No Risks of overspending

Page 41: Using Security to Build with Confidence in AWS - Trend Micro

Loyalty Deals

Remittance

Page 42: Using Security to Build with Confidence in AWS - Trend Micro

View Card 3 minute Sign Up Easy Top-Up Transactions

Page 43: Using Security to Build with Confidence in AWS - Trend Micro

Notifications Easy Menu Promotions AML/Compliance (KYC)

Page 44: Using Security to Build with Confidence in AWS - Trend Micro

B2B Model

Page 45: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Promo

•  First 50 Signups from this event will get $5 worth of top-up Free.

•  You can use this to pay your AWS Bills! No Bill Shock!

Page 46: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

How ?

•  Sign up on this URL:

•  matchmove.cards/paul5

Page 47: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Our Journey

Page 48: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Our challenge

•  Industry  Credibility  

•  Scalability  

•  World  Class  Security  

•  Cost  

•  Delivery  Speed  

Page 49: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Our Plan

•  All-­‐Cloud  

•  PCI-­‐DSS    

•  Automated  Security  

•  Modular    

Page 50: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Our ecosystem

MatchMove Network

Banks

Regulatory and Compliance

Payment Providers

Processor

Page 51: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Cloud design

AWS cloud / VPC

Internet instances

Page 52: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

What we Needed •  Our instances needs to

get the latest updates without going online

•  Anti-Malware Patching

•  New Configurations

•  New Threats

•  Centralized Security Logging

Page 53: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Our implementation

VPC

Internet Web Servers

Private Subnet Public Subnet

Deep Security Manager

Page 54: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Compliance

• 33/202 •  PCI-DSS 3.0 Requirements

Page 55: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Not Just AV/IPS/Malware

•  Source Code Monitoring

•  Configuration File Monitoring

•  Log Checks

Page 56: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Not Just AV/IPS/Malware

•  Logins

•  Web 500 Errors

•  Memory Issues

Page 57: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Automated Testing

•  Weekly Scans even we are not on audit period

Page 58: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Shared Security

Infrastructure Level!

DDOS  &  DDOS  Security  Groups  (Firewall)  CPU  Usage  Memory  Cloud  Logs  

MatchMove  Trend  Micro  AWS    

OS And Application Level!

Malware  File  Integrity  Server  Hardening  VPN  and  Encryp?on  Vulnerabili?es    

MatchMove  Trend  Micro  AWS    

Page 59: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Shared Security

User Access Controls and Security!

Access  Responsibility  2FA  Secure  Passwords  User  Data  Encryp?on  

MatchMove  End  User  Partner  

Monitoring and Alerts!Vigilante  24/7  Monitoring  Cloud  /  Intrusion  Alerts    

MatchMove  Trend  Micro  AWS  Partner  

Page 60: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Instant-on Security

Web Server

Web Servers

Elastic Load Balancing

Web Servers

Web Servers

Deep Security Manager

Page 61: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Continuous Security

Testing

DSM

MySQL

Production

DSM

MySQL

Policies Rules Rollouts

Page 62: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Real Life ddos Analysis Detection

Location

Page 63: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

lessons •  We saved money and time

because instead of hiring a security team

•  We didn’t know attacks happen THAT frequently even on our test environments

Page 64: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

lessons •  Building a secure cloud

infrastructure can be challenging to begin with but it all works out in the end

•  Cloudformation / Opsworks / Beanstalk is your friend

•  Better know Account Limits (ie LB) so you can better plan ahead

Page 65: Using Security to Build with Confidence in AWS - Trend Micro

Safe. Easy. Fast.™

Page 66: Using Security to Build with Confidence in AWS - Trend Micro

aws.trendmicro.com

Singapore