aws summit barcelona - security keynote

84
AWS Summit 2013 Barcelona Oct 24 Barcelona, Spain Bill Shinn AWS Principal Security Solutions Architect AWS CLOUD SECURITY

Upload: amazon-web-services

Post on 15-Jan-2015

533 views

Category:

Technology


0 download

DESCRIPTION

 

TRANSCRIPT

Page 1: AWS Summit Barcelona - Security Keynote

AWS Summit 2013 Barcelona Oct 24 – Barcelona, Spain

Bill Shinn

AWS Principal Security Solutions Architect

AWS CLOUD SECURITY

Page 2: AWS Summit Barcelona - Security Keynote

SECURITY IS UNIVERSAL

Page 3: AWS Summit Barcelona - Security Keynote

EVERY CUSTOMER HAS ACCESS

TO THE SAME SECURITY

CAPABILITIES CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS

Page 4: AWS Summit Barcelona - Security Keynote

AWS GOV CLOUD

ITAR COMPLIANT

Page 5: AWS Summit Barcelona - Security Keynote

SECURITY IS VISIBLE

Page 6: AWS Summit Barcelona - Security Keynote

CAN YOU MAP YOUR NETWORK?

WHAT IS IN YOUR ENVIRONMENT

RIGHT NOW?

Page 7: AWS Summit Barcelona - Security Keynote
Page 8: AWS Summit Barcelona - Security Keynote
Page 9: AWS Summit Barcelona - Security Keynote

AWS API + CLOUDFORMATION ENVIRONMENT ARCHITECTURE DEFINITION

AND CHANGE DETECTION

Page 10: AWS Summit Barcelona - Security Keynote

SECURITY IS TRANSPARENT

Page 11: AWS Summit Barcelona - Security Keynote

SOC 1 SOC 2 SOC 3 PCI DSS L1 ISO 27001

ITAR FIPS FedRAMP HIPAA

Page 12: AWS Summit Barcelona - Security Keynote

SECURITY IS FAMILIAR

Page 13: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 14: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 15: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 16: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 17: AWS Summit Barcelona - Security Keynote

LEAST PRIVILEGE PRINCIPLE CONFINE ROLES ONLY TO THE MATERIAL

REQUIRED TO DO A SPECIFIC WORK

Page 18: AWS Summit Barcelona - Security Keynote

USE AWS IAM IDENTITY & ACCESS MANAGEMENT

Page 19: AWS Summit Barcelona - Security Keynote

CONTROL WHO CAN DO WHAT IN

YOUR AWS ACCOUNT

Page 20: AWS Summit Barcelona - Security Keynote
Page 21: AWS Summit Barcelona - Security Keynote
Page 22: AWS Summit Barcelona - Security Keynote
Page 23: AWS Summit Barcelona - Security Keynote

IAM USERS & ROLES

Page 24: AWS Summit Barcelona - Security Keynote

ACCESS TO

SERVICE APIs

Page 25: AWS Summit Barcelona - Security Keynote

NO PASSWORDS

Page 26: AWS Summit Barcelona - Security Keynote

USE SEPARATE SETS OF

CREDENTIALS

Page 27: AWS Summit Barcelona - Security Keynote

ROTATE YOUR AWS SECURITY

CREDENTIALS

Page 28: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 29: AWS Summit Barcelona - Security Keynote

YOUR DATA IS YOUR

MOST IMPORTANT ASSET

Page 30: AWS Summit Barcelona - Security Keynote
Page 31: AWS Summit Barcelona - Security Keynote

Page 32: AWS Summit Barcelona - Security Keynote

MFA DELETE PROTECTION

Page 33: AWS Summit Barcelona - Security Keynote
Page 34: AWS Summit Barcelona - Security Keynote

ENCRYPT YOUR DATA

AMAZON S3 SSE DATA AT REST

AWS CloudHSM

Page 35: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 36: AWS Summit Barcelona - Security Keynote

NEED TO KNOW

+

CCTV, GUARDS, MAN TRAPS,

FENCES, ETC…

Page 37: AWS Summit Barcelona - Security Keynote

Page 38: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 39: AWS Summit Barcelona - Security Keynote

CHANGES IN PRODUCTION

HAVE TO BE AUTHORIZED

Page 40: AWS Summit Barcelona - Security Keynote

DEV & TEST ENVIRONMENT

AWS ACCOUNT A

PRODUCTION ENVIRONMENT

AWS ACCOUNT B

Page 41: AWS Summit Barcelona - Security Keynote

DEPLOYMENT PROCESS

HAS TO BE CONSTRAINED

Page 42: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 43: AWS Summit Barcelona - Security Keynote

CONTINUOUS DELIVERY MODEL

Page 44: AWS Summit Barcelona - Security Keynote

CONTINUOUS DEPLOYMENT

SESSION 13:30 START-UP TRACK

Page 45: AWS Summit Barcelona - Security Keynote

REDUNDANCY & INTEGRITY

CHECKS

Page 46: AWS Summit Barcelona - Security Keynote

USE MULTIPLE AZs AMAZON S3

AMAZON DYNAMODB

AMAZON RDS MULTI-AZ

AMAZON EBS SNAPSHOTS

Page 47: AWS Summit Barcelona - Security Keynote

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION

2. AMAZON USER ACCESS

3. LOGICAL SECURITY

4. SECURE DATA HANDLING

5. PHYSICAL SECURITY AND ENV. SAFEGUARDS

6. CHANGE MANAGEMENT

7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY

8. INCIDENT HANDLING

Page 48: AWS Summit Barcelona - Security Keynote

“GAME DAYS” INSERT ARTIFICIAL SECURITY INCIDENTS.

MEASURE SPEED OF DETECTION AND EXECUTION.

Page 49: AWS Summit Barcelona - Security Keynote

GAME DAYS !! INSERT ARTIFICIAL SECURITY INCIDENTS.

MEASURE SPEED OF DETECTION AND EXECUTION.

Page 50: AWS Summit Barcelona - Security Keynote

SECURITY IS AUDITABLE

Page 51: AWS Summit Barcelona - Security Keynote
Page 52: AWS Summit Barcelona - Security Keynote

VULNERABILITY / PENETRATION

TESTING

Page 53: AWS Summit Barcelona - Security Keynote

VULNERABILITY / PENETRATION

TESTING

Page 54: AWS Summit Barcelona - Security Keynote

LOGS

OBTAINED, RETAINED, ANALYZED

Page 55: AWS Summit Barcelona - Security Keynote

OBTAIN, RETAIN, ANALYSE

YOUR LOGS

Page 56: AWS Summit Barcelona - Security Keynote
Page 57: AWS Summit Barcelona - Security Keynote
Page 58: AWS Summit Barcelona - Security Keynote

PROTECT YOUR LOGS WITH IAM

ARCHIVE YOUR LOGS

Page 59: AWS Summit Barcelona - Security Keynote
Page 60: AWS Summit Barcelona - Security Keynote
Page 61: AWS Summit Barcelona - Security Keynote

TRUSTED ADVISOR

Page 62: AWS Summit Barcelona - Security Keynote
Page 63: AWS Summit Barcelona - Security Keynote
Page 64: AWS Summit Barcelona - Security Keynote
Page 65: AWS Summit Barcelona - Security Keynote

SECURITY IS SHARED

Page 66: AWS Summit Barcelona - Security Keynote

NETWORK SECURITY:

DDOS

Page 67: AWS Summit Barcelona - Security Keynote

NETWORK SECURITY:

SSL

Page 68: AWS Summit Barcelona - Security Keynote

NETWORK SECURITY:

SPOOFING

Page 69: AWS Summit Barcelona - Security Keynote

NETWORK SECURITY:

PORT SCANNING

Page 70: AWS Summit Barcelona - Security Keynote

AMAZON EC2 SECURITY:

HOST OS SSH KEYED LOGINS VIA BASTION HOST

ALL ACCESSES LOGGED AND AUDITED

Page 71: AWS Summit Barcelona - Security Keynote

AMAZON EC2 SECURITY:

GUEST OS CUSTOMER CONTROLLED AT ROOT LEVEL

AWS ADMINS CANNOT LOG IN

CUSTOMER-GENERATED KEYPAIRS

Page 72: AWS Summit Barcelona - Security Keynote

“If you need to SSH into your

instance, improve your deployment

process.”

Page 73: AWS Summit Barcelona - Security Keynote

AMAZON EC2 SECURITY:

STATEFUL & STATELESS FIREWALL MANDATORY INBOUND

DEFAULT DENY MODE

Page 74: AWS Summit Barcelona - Security Keynote
Page 75: AWS Summit Barcelona - Security Keynote
Page 76: AWS Summit Barcelona - Security Keynote
Page 77: AWS Summit Barcelona - Security Keynote
Page 78: AWS Summit Barcelona - Security Keynote
Page 79: AWS Summit Barcelona - Security Keynote

SECURITY IS

UNIVERSAL

VISIBLE

TRANSPARENT

FAMILIAR

AUDITABLE

SHARED

Page 80: AWS Summit Barcelona - Security Keynote

AWS.AMAZON.COM / SECURITY

AWS.AMAZON.COM/COMPLIANCE

BLOGS.AWS.AMAZON.COM/SECURITY

Page 81: AWS Summit Barcelona - Security Keynote
Page 82: AWS Summit Barcelona - Security Keynote

AWS SECURITY WHITEPAPERS

RISK & COMPLIANCE

AUDITING SECURITY CHECKLIST

SECURITY PROCESSES

SECURITY BEST PRACTICES

Page 83: AWS Summit Barcelona - Security Keynote

AWS MARKETPLACE

SECURITY SOLUTIONS