t4 – understanding aws security

70
AWS Summit 2014 Understanding AWS Security Carlos Conde Head of EMEA Evangelism @caarlco

Upload: amazon-web-services

Post on 13-Jan-2015

410 views

Category:

Technology


2 download

DESCRIPTION

The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. In this session, we’ll provide a practical understanding of the assurance programs that AWS provides; such as HIPAA, FedRAMP(SM), PCI DSS Level 1, MPAA and many others. We’ll also address the types of business solutions that these certifications enable you to deploy on the AWS Cloud, the tools and services AWS makes available to customers to secure and manage their resources and best practices on how to use them. This session is recommended for anyone with questions about how AWS can meet the compliance requirements of their applications.

TRANSCRIPT

Page 1: T4 – Understanding aws security

AWS Summit 2014

Understanding AWS Security

Carlos Conde Head of EMEA Evangelism @caarlco

Page 2: T4 – Understanding aws security

Different customer viewpoints on security

PR exec keep out of the news

CEO protect shareholder

value

CI{S}O preserve the

confidentiality, integrity and availability of data

Page 3: T4 – Understanding aws security

Security is Our No.1 Priority Comprehensive Security Capabilities to Support Virtually Any Workload

PEOPLE & PROCEDURES

NETWORK SECURITY

PHYSICAL SECURITY

PLATFORM SECURITY

Page 4: T4 – Understanding aws security

SECURITY IS SHARED

Page 5: T4 – Understanding aws security

WHAT NEEDS TO BE DONE TO KEEP THE SYSTEM SAFE

Page 6: T4 – Understanding aws security

WHAT WE DO

WHAT YOU HAVE TO DO

Page 7: T4 – Understanding aws security

SOC CONTROL OBJECTIVES

1. SECURITY ORGANIZATION 2. AMAZON USER ACCESS 3. LOGICAL SECURITY 4. SECURE DATA HANDLING 5. PHYSICAL SECURITY AND ENV. SAFEGUARDS 6. CHANGE MANAGEMENT 7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY 8. INCIDENT HANDLING

Page 8: T4 – Understanding aws security

YOUR DATA IS YOUR MOST IMPORTANT ASSET

IF YOUR DATA IS NOT SECURE, YOU’RE NOT SECURE

Page 9: T4 – Understanding aws security
Page 10: T4 – Understanding aws security

NETWORK SECURITY

Page 11: T4 – Understanding aws security

“GAME DAYS” INSERT ARTIFICIAL SECURITY INCIDENTS.

MEASURE SPEED OF DETECTION AND EXECUTION.

Page 12: T4 – Understanding aws security
Page 13: T4 – Understanding aws security

EVERY CUSTOMER HAS ACCESS TO THE SAME SECURITY

CAPABILITIES

CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS

Page 14: T4 – Understanding aws security

AWS SECURITY OFFERS MORE

VISIBILITY AUDITABILITY

CONTROL

Page 15: T4 – Understanding aws security

MORE VISIBILITY

Page 16: T4 – Understanding aws security

CAN YOU MAP YOUR NETWORK?

WHAT IS IN YOUR ENVIRONMENT RIGHT NOW?

Page 17: T4 – Understanding aws security
Page 18: T4 – Understanding aws security
Page 19: T4 – Understanding aws security

TRUSTED ADVISOR

Page 20: T4 – Understanding aws security
Page 21: T4 – Understanding aws security
Page 22: T4 – Understanding aws security
Page 23: T4 – Understanding aws security

MORE AUDITABILITY

Page 24: T4 – Understanding aws security
Page 25: T4 – Understanding aws security
Page 26: T4 – Understanding aws security

AWS CLOUDTRAIL

Page 27: T4 – Understanding aws security

You are making API calls...

On a growing set of services around the

world…

CloudTrail is continuously recording API

calls…

And delivering log files to you

Page 28: T4 – Understanding aws security

Security Analysis Use log files as an input into log management and analysis solutions to perform security analysis and to detect user behavior patterns.

Track Changes to AWS Resources Track creation, modification, and deletion of AWS resources such as Amazon EC2 instances, Amazon VPC security groups and Amazon EBS volumes.

Troubleshoot Operational Issues Quickly identify the most recent changes made to resources in your environment.

Compliance Aid Easier to demonstrate compliance with internal policies and regulatory standards.

Page 29: T4 – Understanding aws security

LOGS OBTAINED, RETAINED, ANALYZED

Page 30: T4 – Understanding aws security
Page 31: T4 – Understanding aws security
Page 32: T4 – Understanding aws security

PROTECT YOUR LOGS WITH IAM ARCHIVE YOUR LOGS

Page 33: T4 – Understanding aws security
Page 34: T4 – Understanding aws security
Page 35: T4 – Understanding aws security

VULNERABILITY & PENETRATION TESTING

Page 36: T4 – Understanding aws security

VULNERABILITY & PENETRATION TESTING

Page 37: T4 – Understanding aws security

MORE CONTROL

Page 38: T4 – Understanding aws security

LEAST PRIVILEGE PRINCIPLE CONFINE ROLES ONLY TO THE MATERIAL

REQUIRED TO DO A SPECIFIC WORK

Page 39: T4 – Understanding aws security

AWS STAFF ACCESS

‣  Staff vetting ‣  Staff has no logical access to customer instances ‣  Staff control-plane access limited & monitored

Bastion hosts, Least privileged model, Zoned data center access ‣  Business needs ‣  Separate PAMS

Page 40: T4 – Understanding aws security
Page 41: T4 – Understanding aws security
Page 42: T4 – Understanding aws security
Page 43: T4 – Understanding aws security
Page 44: T4 – Understanding aws security
Page 45: T4 – Understanding aws security
Page 46: T4 – Understanding aws security

USE SEPARATE SETS OF CREDENTIALS

Page 47: T4 – Understanding aws security

USE AWS IAM IDENTITY & ACCESS MANAGEMENT

Page 48: T4 – Understanding aws security

CONTROL WHO CAN DO WHAT IN YOUR AWS ACCOUNT

Page 49: T4 – Understanding aws security
Page 50: T4 – Understanding aws security
Page 51: T4 – Understanding aws security
Page 52: T4 – Understanding aws security

ACCESS TO SERVICE APIs

Page 53: T4 – Understanding aws security

Amazon DynamoDB Fine Grained Access Control

Directly and securely access application data in Amazon DynamoDB Specify access permissions at table, item and attribute levels With Web Identity Federation, completely remove the need for proxy servers to perform authorization

Page 54: T4 – Understanding aws security

DEPLOYMENT PROCESS HAS TO BE CONSTRAINED

Page 55: T4 – Understanding aws security

DEV & TEST ENVIRONMENT

AWS ACCOUNT A

PRODUCTION ENVIRONMENT

AWS ACCOUNT B

Page 56: T4 – Understanding aws security

“If you need to SSH into your instance, your deployment process is broken.”

Page 57: T4 – Understanding aws security

VERSIONED AWS CLOUDFORMATION SCRIPTS

+ AWS OPSWORKS

Page 58: T4 – Understanding aws security
Page 59: T4 – Understanding aws security

MORE CONTROL ON YOUR DATA

Page 60: T4 – Understanding aws security

MFA PROTECTION

Page 61: T4 – Understanding aws security
Page 62: T4 – Understanding aws security

YOUR DATA STAYS WHERE YOU PUT IT

Page 63: T4 – Understanding aws security

USE MULTIPLE AZs AMAZON S3

AMAZON DYNAMODB AMAZON RDS MULTI-AZ

AMAZON EBS SNAPSHOTS

Page 64: T4 – Understanding aws security

DATA ENCRYPTION

CHOOSE WHAT’S RIGHT FOR YOU: Automated – AWS manages encryption

Enabled – user manages encryption using AWS Client-side – user manages encryption using their own mean

Page 65: T4 – Understanding aws security

ENCRYPT YOUR DATA AWS CLOUDHSM AMAZON S3 SSE

AMAZON GLACIER AMAZON REDSHIFT

AMAZON RDS …

Page 66: T4 – Understanding aws security

MORE AUDITABILITY MORE VISIBILITY MORE CONTROL

Page 67: T4 – Understanding aws security

“Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers”

Tom Soderstrom – CTO – NASA JPL

Page 68: T4 – Understanding aws security

AWS.AMAZON.COM / SECURITY

Page 69: T4 – Understanding aws security

AWS SECURITY WHITEPAPERS

RISK & COMPLIANCE

AUDITING SECURITY CHECKLIST

SECURITY PROCESSES

SECURITY BEST PRACTICES

Page 70: T4 – Understanding aws security

Thank You!

AWS EXPERT? GET CERTIFIED! aws.amazon.com/certification

Carlos Conde Head of EMEA Evangelism @caarlco