SlideShare a Scribd company logo
1 of 58
Download to read offline
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Herman Mak, Solutions Architect
AWS Security Essentials
March 8, 2019
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Schedule
1. AWS Security Model
2. AWS Compliance and Security
3. AWS Security Technologies and Services
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security is Job Zero at AWS
Familiar Security
Model
Validated and driven by
customers’ security experts
Benefits all customers
PEOPLE & PROCESS
SYSTEM
NETWORK
PHYSICAL
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Network Traffic Protection
Encryption / Integrity / Identity
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Platform & Applications Management
Customer content
Customers
AWS Shared Responsibility Model: for Infrastructure Services
Managed by
Managed by
Client-Side Data encryption
& Data Integrity Authentication
AWSIAMCustomerIAM
Operating System, Network & Firewall Configuration
Server-Side Encryption
Fire System and/or Data
APIEndpoints
Mgmt
Protocols
API
Calls
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Infrastructure Service Example – EC2
• Foundation Services — Networking, Compute, Storage
• AWS Global Infrastructure
• AWS API Endpoints
AWS
• Customer Data
• Customer Application
• Operating System
• Network & Firewall
• Customer IAM (Corporate Directory
Service)
• High Availability, Scaling
• Instance Management
• Data Protection (Transit, Rest, Backup)
• AWS IAM (Users, Groups, Roles, Policies)
Customers
RESPONSIBILITIES
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Firewall
Configuration
Platform & Applications Management
Operating System, Network Configuration
Customer content
Customers
AWS Shared Responsibility Model:for Container Services
Managed by
Managed by
Client-Side Data encryption
& Data Integrity Authentication
Network Traffic Protection
Encryption / Integrity / Identity
AWSIAMCustomerIAM
APIEndpoints
Mgmt
Protocols
API
Calls
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Infrastructure Service Example – RDS
• Foundational Services –
Networking, Compute, Storage
• AWS Global Infrastructure
• AWS API Endpoints
• Operating System
• Platform / Application
AWS
• Customer Data
• Firewall (VPC)
• Customer IAM (DB Users, Table
Permissions)
• AWS IAM (Users, Groups, Roles,
Policies)
• High Availability
• Data Protection (Transit, Rest,
Backup)
• Scaling
Customers
RESPONSIBILITIES
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Platform & Applications Management
Operating System, Network & Firewall Configuration
Customer content
Customers
AWS Shared Responsibility Model:
for Abstract Services Managed by
Managed by
Data Protection by the Platform
Protection of Data at Rest
Network Traffic Protection by the Platform
Protection of Data at in Transit
(optional)
Opaque Data: 1’s and 0’s
(in flight / at rest)
Client-Side Data Encryption
& Data Integrity Authentication
APIEndpoints
AWSIAM
API Calls
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Foundational Services
• AWS Global Infrastructure
• AWS API Endpoints
• Operating System
• Platform / Application
• Data Protection (Rest - SSE, Transit)
• High Availability / Scaling
AWS
• Customer Data
• Data Protection (Rest – CSE)
• AWS IAM (Users, Groups, Roles, Policies)
Customers
Infrastructure Service Example – S3
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Summary of Customer Responsibility in the Cloud
Customer IAM
AWS IAM
Firewall
Data
AWS IAM
Data
Applications
Operating System
Networking/Firewall
Data
Customer IAM
AWS IAM
Infrastructure
Services
Container
Services
Abstract
Services
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is Identity Management?
“…the management of individual principals, their
authentication, authorization, and privileges
…with the goal of increasing security and productivity
while decreasing cost, downtime and repetitive tasks.”
(Wikipedia)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Principals
• Access to specific services.
• Access to console and/or APIs.
• Access to Customer Support (Business and Enterprise).
IAM Users, Groups and Roles
• Access to specific services.
• Access to console and/or APIs.
Temporary Security Credentials
• Access to all subscribed services.
• Access to billing.
• Access to console and APIs.
• Access to Customer Support.
Account Owner ID (Root Account)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Identity and Access Management (IAM)
Securely control access to AWS services and resources for your users.
Username/
User
Manage groups
of users
Centralized Access
Control
• Password for console access.
• Policies for controlling access AWS APIs.
• Two methods to sign API calls:
• X.509 certificate
• Access/Secret Keys
• Multi-factor Authentication (MFA)
Optional Configurations:
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Assurance Programs
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Artifacts - Compliance reports
Provides customers with an easier process to obtain AWS compliance
reports with self-service, on-demand access via the console
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Amazon has been building large-scale data centers for many years.
• Important attributes:
– Non-descript facilities
– Robust perimeter controls
– Strictly controlled physical access
– Two or more levels of two-factor authentication
• Controlled, need-based access.
• All access is logged and reviewed.
• Separation of Duties
– Employees with physical access don’t have logical privileges.
AWS Responsibilities
Physical Security of Data Center
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
From this
To This
One last thing about data sanitization
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Global Infrastructure
20 Regions – 60 Availability Zones – 160 Points of presence Regions and Availability Zones
US East
N. Virginia (6)
Ohio (3)
US West
N. California (3)
Oregon (3)
Asia Pacific
Mumbai (2)
Seoul (2)
Singapore (3)
Sydney (3)
Tokyo (4)
Osaka-Local (1)
Canada
Central (2)
China
Beijing (2)
Ningxia (3)
Europe
Frankfurt (3)
Ireland (3)
London (3)
Paris (3)
Stockholm (3)
South America
São Paulo (3)
GovCloud (US)
US-East (3)
US-West (3)
New Region (coming soon)
Bahrain, Cape Town, Hong Kong SAR, Milan
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC = Virtual Private Cloud
Your virtual data center on AWS
Block of IPs that define your
network (typically RFC 1918)
Can span multiple AZs
Default VPCs
VPC
Availability Zone A Availability Zone B
VPC CIDR: 10.1.0.0 /16
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Range of IPs in your VPC IP
range
Lives inside an AZ
Can provide security at the
subnet or network level with
access control lists (ACLs)
Can route at the subnet level
Default VPC subnets
VPC subnet
Subnet
Availability Zone A
Subnet
Availability Zone B
10.1.1.0/24 10.1.10.0/24
VPC CIDR: 10.1.0.0 /16
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
IGW = Internet gateway
Enables your instances to
connect to the Internet
Default VPC includes an IGW
Internet gateway
Subnet
Availability Zone A
Subnet
Availability Zone B
10.1.1.0/24 10.1.10.0/24
Internet Gateway
VPC CIDR: 10.1.0.0 /16
InternetAWS Public
API Endpoints
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Contains a set of rules, called
routes, that are used to determine
where network traffic is directed
Subnets have one route table
Controls routing for the subnet to
the IGW and VGW
A route table can belong to many
subnets
Route table
Subnet
Availability Zone A
Subnet
Availability Zone B
10.1.1.0/24 10.1.10.0/24
Internet Gateway
VPC CIDR: 10.1.0.0 /16
InternetAWS Public
API Endpoints
Route Table
Destination Target
10.1.0.0/16 local
0.0.0.0/0 igw
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VGW = virtual private gateway
A VPG is the logical construct
representing the VPN endpoint to
terminate connections from your
on-premises network
It is also the endpoint for Direct
Connect
VGW and VPN connection
Subnet
Availability Zone A
Subnet
Availability Zone B
10.1.1.0/24 10.1.10.0/24
VPC CIDR: 10.1.0.0 /16
Internal
User
VGW
Customer Gateway
Corporate Data Center
VPN over
the Internet
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
NACL = network access control
list
An optional layer of security that
acts as a firewall for a subnet
A numbered list of rules that we
evaluate in order
ACLs are stateless and have
separate inbound and outbound
rules
Network access control list
Availability Zone A Availability Zone B
VPC CIDR: 10.1.0.0 /16
EC2 EC2
VPC Subnet with ACL VPC Subnet with ACL
VPC Subnet with ACL
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
A security group acts as a virtual
firewall for your EC2 instance
An EC2 instance can have up to
five security groups
Security groups act at the
instance level, not the subnet
level
Security groups are stateful
Security group
Availability Zone A Availability Zone B
Subnet: 10.1.1.0/24
VPC CIDR: 10.1.0.0 /16
Subnet: 10.1.10.0/24
EC2
Security Group
EC2
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC security
controls
EC2
Instance 1
10.1.1.6
Route
Table
Route
Table
Internet
Gateway
Virtual Private
Gateway
Virtual Router
VPC 10.1.0.0/16
EC2
Instance 2
10.1.1.7
EC2
Instance 3
10.1.10.20
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Groups = stateful firewall
In English: Hosts in this group are reachable
from the Internet on port 80 (HTTP)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Web Layer
Application Layer
Database Layer
Only 80 and 443 open
to Internet
Open access only to Web
Layer and ssh open to
management bastion
By default, all ports are
closed
Amazon EC2
Security Group
Firewall
Multi-tier architecture using Security Groups
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Network ACLs = Stateless Firewall Rules
English translation: Allow all traffic in
Can be applied on a subnet basis
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is DDoS Attack?
Distributed Denial Of Service
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of DDoS attacks
State-exhaustion DDoS attacks
Abuse protocols to stress systems like
firewalls, IPS, or load balancers (e.g., TCP
SYN flood)
Volumetric DDoS attacks
Congest networks by flooding them with more
traffic than they are able to handle (e.g., UDP
reflection attacks)
Application-layer DDoS attacks
Use well-formed but malicious requests to
circumvent mitigation and consume
application resources (e.g., HTTP GET, DNS
query floods)
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Standard protections
Layer 3/4 protection
ü Protect from most common attacks
(SYN/UDP Floods, Reflection Attacks,
etc.)
ü Automatically detect & mitigate
ü Built into AWS services
Layer 7 protection
ü AWS WAF for Layer 7 DDoS attack
mitigation
ü Self-service & pay-as-you-go
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shield Advanced
Always-on monitoring &
detection
Advanced L3/4 & L7 DDoS
protection
Attack notification and
reporting
24x7 access to DDoS
Response Team
AWS bill protection
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF – Layer 7 application protection
HTTP floods Scanners and
probes
SQL injection
Bots and
scrapers
IP reputation
lists
Cross-site
scripting
AWS WAF Security Automations
https://aws.amazon.com/answers/security/aws-waf-security-automations/
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Trusted Advisor – Real time guidance
Security configuration checks of your AWS environment:
• Open ports
• Unrestricted access
• CloudTrail Logging
• S3 Bucket Permissions
• Multi-factor auth
• Password Policy
• DB Access Risk
• DNS Records
• Load Balancer config
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Trusted Advisor Demo
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
CloudWatch Logs – Centralization of logs
CloudWatch Logs provides a centralized service to
absorb, store, analyze, and take action on a variety
of log sources.
• Operating system logs
• Webserver logs
• Application logs
Use cases
• Centralized log store
• Prevent log modification on instances
• Notifications on events
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC Flow Logs
• Agentless
• Enable per ENI, per subnet, or per VPC
• Logged to AWS CloudWatch Logs
• Create CloudWatch metrics from log data
• Alarm on those metrics
AWS
account
Source IP
Destination IP
Source port
Destination port
Interface Protocol Packets
Bytes Start/end time
Accept or
reject
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC Flow Logs – CloudWatch Alarms
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC Flow Logs
• Amazon
Elasticsearch
Service
• Amazon
CloudWatch
Logs
subscriptions
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Full visibility of your AWS environment
• CloudTrail will record access to API calls and save logs in your S3
buckets, no matter how those API calls were made
Who did what and when and from where (IP address)
• CloudTrail/Config support for many AWS services and growing -
includes EC2, EBS, VPC, RDS, IAM and RedShift
• Edge/CDN, WAF, ELB,VPC/Network FlowLogs
• Easily Aggregate all log information
• CloudWatch Alarms
Out of the box integration with log analysis tools from AWS
partners including Splunk, AlertLogic and SumoLogic
Full visibility and logging features
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudTrail example
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Amazon
CloudWatch
Amazon
Lambda
Amazon SNS
Automate actions on events
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config
Managed service for tracking AWS inventory and configuration, and configuration
change notification.
AWSConfig
EC2
VPC
EBS
CloudTrail
Change
Management
Audit
Compliance
Security
Analysis
Troubleshooting Discovery
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Config Demo
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Encryption At-Rest
AWS CloudHSM AWS Key Management Service
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key handling questions for any solution
Where are keys generated and stored?
• Hardware you own?
• Hardware the cloud provider owns?
Where are keys used?
• Client software you control?
• Server software the cloud provider controls?
Who can use the keys?
• Users and applications that have permissions?
• Cloud provider applications you give permissions?
What assurances are there for proper security around keys?
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Options for using encryption in AWS
Client-side encryption
• You encrypt your data before data submitted to service
• You supply encryption keys OR use keys in your AWS account
• Available clients:
• S3, EMR File System (EMRFS), DynamoDB, AWS Encryption SDK
Server-side encryption
• AWS encrypts data on your behalf after data is received by service
• 19 integrated services including S3, Snowball, EBS, RDS, Amazon Redshift, WorkSpaces,
Amazon Kinesis Firehose, CloudTrail
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Key Management Service (AWS KMS)
• Managed service that simplifies creation, control, rotation,
deletion, and use of encryption keys in your applications
• Integrated with many AWS services for server-side encryption
• Integrated with AWS service clients/SDKs
• S3, EMRFS, DynamoDB, AWS Encryption SDK
• Integrated with CloudTrail to provide auditable logs of key usage
for regulatory and compliance activities
• Available in all commercial regions except China
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS is fully integrated with AWS IAM
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS KMS integration with AWS services
* Supports only AWS managed KMS keys
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Bring Your Own Key
Import encrypted key material
under the KMS CMK key ID;
set optional expiration period
Import
Your key material
protected in KMS
Download a public
wrapping key
KMS
Download
RSA public key
Create customer master key
(CMK) container
Empty CMK container
with unique key ID
KMS
Creates
Export your key material
encrypted under the public
wrapping key Your key
management
infrastructure
Export
Your 256-bit key
material encrypted
under KMS public key
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudHSM
• Dedicated access to HSM appliances
• HSMs located in AWS data centers
• Managed and monitored by AWS
• Only you have access to your keys
and operations on the keys
• HSMs are inside your Amazon VPC,
isolated from the rest of the network
• Setup right from the console
CloudHSM
AWS administrator—
Manages the appliance
You—Control keys and
crypto operations
Amazon VPC
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS CloudHSM
Available in multiple AWS regions worldwide
Compliance
• Included in AWS PCI DSS and SOC compliance packages
• FIPS 140-2 level 3 (AWS CloudHSM)
• FIPS 140-2 level 2 (AWS CloudHSM Classic)
Typical use cases
• Electronic invoicing and document signing
• Use with Amazon Redshift and RDS for Oracle
• Integrate with third-party software (Oracle, Microsoft SQL Server,
Apache, SafeNet, OpenSSL)
• Build your own custom applications
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Key handling solutions from AWS Marketplace
• Browse, test, and buy encryption and key management solutions
• Pay by the hour, monthly, or annually
• Software fees added to AWS bill
• Bring Your Own License
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Marketplace Security Partners
Logs and
monitoring
Identity and Access
control
Configuration &
Vulnerability Analysis
Protección de
datos
Infrastructure security
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Marketplace Demo
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank You
Herman Mak
Solutions Architect
Twitter: @hermanmakHK
Github: hermanmak
Submit your Feedback to get
25$ AWS Credit

More Related Content

What's hot

Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Amazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWSAmazon Web Services
 
AWS Security Webinar: The Key to Effective Cloud Encryption
AWS Security Webinar: The Key to Effective Cloud EncryptionAWS Security Webinar: The Key to Effective Cloud Encryption
AWS Security Webinar: The Key to Effective Cloud EncryptionAmazon Web Services
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Amazon Web Services
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveJason Chan
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAmazon Web Services
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAmazon Web Services
 
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...Amazon Web Services
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at RestAmazon Web Services
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityAmazon Web Services
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes EverywhereAmazon Web Services
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSAmazon Web Services
 

What's hot (20)

AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
Module 3: Security, Identity and Access Management - AWSome Day Online Confer...
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWS
 
AWS Security Webinar: The Key to Effective Cloud Encryption
AWS Security Webinar: The Key to Effective Cloud EncryptionAWS Security Webinar: The Key to Effective Cloud Encryption
AWS Security Webinar: The Key to Effective Cloud Encryption
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
Federation & Access Management
Federation & Access ManagementFederation & Access Management
Federation & Access Management
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
Module 3: Security, Architecting Best Practices, Pricing, Partner Solutions, ...
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWS
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 

Similar to AWS_Security_Essentials

AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAmazon Web Services
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAmazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCAmazon Web Services
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCAmazon Web Services
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewEagleDream Technologies
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWSAWS Summits
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)Amazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfAmazon Web Services
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksAmazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudAmazon Web Services
 
Virtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesVirtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesAmazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAmazon Web Services
 
AWS-Service.pptx
AWS-Service.pptxAWS-Service.pptx
AWS-Service.pptxkrnaween
 

Similar to AWS_Security_Essentials (20)

AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdf
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
AWS-Education-Day-for-HKMA-FCAS
AWS-Education-Day-for-HKMA-FCASAWS-Education-Day-for-HKMA-FCAS
AWS-Education-Day-for-HKMA-FCAS
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
Virtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesVirtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web Services
 
AWS Outposts Update
AWS Outposts UpdateAWS Outposts Update
AWS Outposts Update
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
 
AWS-Service.pptx
AWS-Service.pptxAWS-Service.pptx
AWS-Service.pptx
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS_Security_Essentials

  • 1. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Herman Mak, Solutions Architect AWS Security Essentials March 8, 2019
  • 2. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Schedule 1. AWS Security Model 2. AWS Compliance and Security 3. AWS Security Technologies and Services
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security is Job Zero at AWS Familiar Security Model Validated and driven by customers’ security experts Benefits all customers PEOPLE & PROCESS SYSTEM NETWORK PHYSICAL
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Network Traffic Protection Encryption / Integrity / Identity AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Platform & Applications Management Customer content Customers AWS Shared Responsibility Model: for Infrastructure Services Managed by Managed by Client-Side Data encryption & Data Integrity Authentication AWSIAMCustomerIAM Operating System, Network & Firewall Configuration Server-Side Encryption Fire System and/or Data APIEndpoints Mgmt Protocols API Calls
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Infrastructure Service Example – EC2 • Foundation Services — Networking, Compute, Storage • AWS Global Infrastructure • AWS API Endpoints AWS • Customer Data • Customer Application • Operating System • Network & Firewall • Customer IAM (Corporate Directory Service) • High Availability, Scaling • Instance Management • Data Protection (Transit, Rest, Backup) • AWS IAM (Users, Groups, Roles, Policies) Customers RESPONSIBILITIES
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Firewall Configuration Platform & Applications Management Operating System, Network Configuration Customer content Customers AWS Shared Responsibility Model:for Container Services Managed by Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity AWSIAMCustomerIAM APIEndpoints Mgmt Protocols API Calls
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Infrastructure Service Example – RDS • Foundational Services – Networking, Compute, Storage • AWS Global Infrastructure • AWS API Endpoints • Operating System • Platform / Application AWS • Customer Data • Firewall (VPC) • Customer IAM (DB Users, Table Permissions) • AWS IAM (Users, Groups, Roles, Policies) • High Availability • Data Protection (Transit, Rest, Backup) • Scaling Customers RESPONSIBILITIES
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Platform & Applications Management Operating System, Network & Firewall Configuration Customer content Customers AWS Shared Responsibility Model: for Abstract Services Managed by Managed by Data Protection by the Platform Protection of Data at Rest Network Traffic Protection by the Platform Protection of Data at in Transit (optional) Opaque Data: 1’s and 0’s (in flight / at rest) Client-Side Data Encryption & Data Integrity Authentication APIEndpoints AWSIAM API Calls
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Foundational Services • AWS Global Infrastructure • AWS API Endpoints • Operating System • Platform / Application • Data Protection (Rest - SSE, Transit) • High Availability / Scaling AWS • Customer Data • Data Protection (Rest – CSE) • AWS IAM (Users, Groups, Roles, Policies) Customers Infrastructure Service Example – S3
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Summary of Customer Responsibility in the Cloud Customer IAM AWS IAM Firewall Data AWS IAM Data Applications Operating System Networking/Firewall Data Customer IAM AWS IAM Infrastructure Services Container Services Abstract Services
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is Identity Management? “…the management of individual principals, their authentication, authorization, and privileges …with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks.” (Wikipedia)
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Principals • Access to specific services. • Access to console and/or APIs. • Access to Customer Support (Business and Enterprise). IAM Users, Groups and Roles • Access to specific services. • Access to console and/or APIs. Temporary Security Credentials • Access to all subscribed services. • Access to billing. • Access to console and APIs. • Access to Customer Support. Account Owner ID (Root Account)
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Identity and Access Management (IAM) Securely control access to AWS services and resources for your users. Username/ User Manage groups of users Centralized Access Control • Password for console access. • Policies for controlling access AWS APIs. • Two methods to sign API calls: • X.509 certificate • Access/Secret Keys • Multi-factor Authentication (MFA) Optional Configurations:
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Assurance Programs
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Artifacts - Compliance reports Provides customers with an easier process to obtain AWS compliance reports with self-service, on-demand access via the console
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Amazon has been building large-scale data centers for many years. • Important attributes: – Non-descript facilities – Robust perimeter controls – Strictly controlled physical access – Two or more levels of two-factor authentication • Controlled, need-based access. • All access is logged and reviewed. • Separation of Duties – Employees with physical access don’t have logical privileges. AWS Responsibilities Physical Security of Data Center
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. From this To This One last thing about data sanitization
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Global Infrastructure 20 Regions – 60 Availability Zones – 160 Points of presence Regions and Availability Zones US East N. Virginia (6) Ohio (3) US West N. California (3) Oregon (3) Asia Pacific Mumbai (2) Seoul (2) Singapore (3) Sydney (3) Tokyo (4) Osaka-Local (1) Canada Central (2) China Beijing (2) Ningxia (3) Europe Frankfurt (3) Ireland (3) London (3) Paris (3) Stockholm (3) South America São Paulo (3) GovCloud (US) US-East (3) US-West (3) New Region (coming soon) Bahrain, Cape Town, Hong Kong SAR, Milan
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC = Virtual Private Cloud Your virtual data center on AWS Block of IPs that define your network (typically RFC 1918) Can span multiple AZs Default VPCs VPC Availability Zone A Availability Zone B VPC CIDR: 10.1.0.0 /16
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Range of IPs in your VPC IP range Lives inside an AZ Can provide security at the subnet or network level with access control lists (ACLs) Can route at the subnet level Default VPC subnets VPC subnet Subnet Availability Zone A Subnet Availability Zone B 10.1.1.0/24 10.1.10.0/24 VPC CIDR: 10.1.0.0 /16
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. IGW = Internet gateway Enables your instances to connect to the Internet Default VPC includes an IGW Internet gateway Subnet Availability Zone A Subnet Availability Zone B 10.1.1.0/24 10.1.10.0/24 Internet Gateway VPC CIDR: 10.1.0.0 /16 InternetAWS Public API Endpoints
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Contains a set of rules, called routes, that are used to determine where network traffic is directed Subnets have one route table Controls routing for the subnet to the IGW and VGW A route table can belong to many subnets Route table Subnet Availability Zone A Subnet Availability Zone B 10.1.1.0/24 10.1.10.0/24 Internet Gateway VPC CIDR: 10.1.0.0 /16 InternetAWS Public API Endpoints Route Table Destination Target 10.1.0.0/16 local 0.0.0.0/0 igw
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VGW = virtual private gateway A VPG is the logical construct representing the VPN endpoint to terminate connections from your on-premises network It is also the endpoint for Direct Connect VGW and VPN connection Subnet Availability Zone A Subnet Availability Zone B 10.1.1.0/24 10.1.10.0/24 VPC CIDR: 10.1.0.0 /16 Internal User VGW Customer Gateway Corporate Data Center VPN over the Internet
  • 24. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. NACL = network access control list An optional layer of security that acts as a firewall for a subnet A numbered list of rules that we evaluate in order ACLs are stateless and have separate inbound and outbound rules Network access control list Availability Zone A Availability Zone B VPC CIDR: 10.1.0.0 /16 EC2 EC2 VPC Subnet with ACL VPC Subnet with ACL VPC Subnet with ACL
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. A security group acts as a virtual firewall for your EC2 instance An EC2 instance can have up to five security groups Security groups act at the instance level, not the subnet level Security groups are stateful Security group Availability Zone A Availability Zone B Subnet: 10.1.1.0/24 VPC CIDR: 10.1.0.0 /16 Subnet: 10.1.10.0/24 EC2 Security Group EC2
  • 26. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC security controls EC2 Instance 1 10.1.1.6 Route Table Route Table Internet Gateway Virtual Private Gateway Virtual Router VPC 10.1.0.0/16 EC2 Instance 2 10.1.1.7 EC2 Instance 3 10.1.10.20
  • 27. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Groups = stateful firewall In English: Hosts in this group are reachable from the Internet on port 80 (HTTP)
  • 28. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Web Layer Application Layer Database Layer Only 80 and 443 open to Internet Open access only to Web Layer and ssh open to management bastion By default, all ports are closed Amazon EC2 Security Group Firewall Multi-tier architecture using Security Groups
  • 29. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Network ACLs = Stateless Firewall Rules English translation: Allow all traffic in Can be applied on a subnet basis
  • 30. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is DDoS Attack? Distributed Denial Of Service
  • 31. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of DDoS attacks State-exhaustion DDoS attacks Abuse protocols to stress systems like firewalls, IPS, or load balancers (e.g., TCP SYN flood) Volumetric DDoS attacks Congest networks by flooding them with more traffic than they are able to handle (e.g., UDP reflection attacks) Application-layer DDoS attacks Use well-formed but malicious requests to circumvent mitigation and consume application resources (e.g., HTTP GET, DNS query floods)
  • 32. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Standard protections Layer 3/4 protection ü Protect from most common attacks (SYN/UDP Floods, Reflection Attacks, etc.) ü Automatically detect & mitigate ü Built into AWS services Layer 7 protection ü AWS WAF for Layer 7 DDoS attack mitigation ü Self-service & pay-as-you-go
  • 33. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Shield Advanced Always-on monitoring & detection Advanced L3/4 & L7 DDoS protection Attack notification and reporting 24x7 access to DDoS Response Team AWS bill protection
  • 34. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF – Layer 7 application protection HTTP floods Scanners and probes SQL injection Bots and scrapers IP reputation lists Cross-site scripting AWS WAF Security Automations https://aws.amazon.com/answers/security/aws-waf-security-automations/
  • 35. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Trusted Advisor – Real time guidance Security configuration checks of your AWS environment: • Open ports • Unrestricted access • CloudTrail Logging • S3 Bucket Permissions • Multi-factor auth • Password Policy • DB Access Risk • DNS Records • Load Balancer config
  • 36. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Trusted Advisor Demo
  • 37. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. CloudWatch Logs – Centralization of logs CloudWatch Logs provides a centralized service to absorb, store, analyze, and take action on a variety of log sources. • Operating system logs • Webserver logs • Application logs Use cases • Centralized log store • Prevent log modification on instances • Notifications on events
  • 38. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC Flow Logs • Agentless • Enable per ENI, per subnet, or per VPC • Logged to AWS CloudWatch Logs • Create CloudWatch metrics from log data • Alarm on those metrics AWS account Source IP Destination IP Source port Destination port Interface Protocol Packets Bytes Start/end time Accept or reject
  • 39. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC Flow Logs – CloudWatch Alarms
  • 40. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC Flow Logs • Amazon Elasticsearch Service • Amazon CloudWatch Logs subscriptions
  • 41. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Full visibility of your AWS environment • CloudTrail will record access to API calls and save logs in your S3 buckets, no matter how those API calls were made Who did what and when and from where (IP address) • CloudTrail/Config support for many AWS services and growing - includes EC2, EBS, VPC, RDS, IAM and RedShift • Edge/CDN, WAF, ELB,VPC/Network FlowLogs • Easily Aggregate all log information • CloudWatch Alarms Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic and SumoLogic Full visibility and logging features
  • 42. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudTrail example
  • 43. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Amazon CloudWatch Amazon Lambda Amazon SNS Automate actions on events
  • 44. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Managed service for tracking AWS inventory and configuration, and configuration change notification. AWSConfig EC2 VPC EBS CloudTrail Change Management Audit Compliance Security Analysis Troubleshooting Discovery
  • 45. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Config Demo
  • 46. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Encryption At-Rest AWS CloudHSM AWS Key Management Service
  • 47. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key handling questions for any solution Where are keys generated and stored? • Hardware you own? • Hardware the cloud provider owns? Where are keys used? • Client software you control? • Server software the cloud provider controls? Who can use the keys? • Users and applications that have permissions? • Cloud provider applications you give permissions? What assurances are there for proper security around keys?
  • 48. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Options for using encryption in AWS Client-side encryption • You encrypt your data before data submitted to service • You supply encryption keys OR use keys in your AWS account • Available clients: • S3, EMR File System (EMRFS), DynamoDB, AWS Encryption SDK Server-side encryption • AWS encrypts data on your behalf after data is received by service • 19 integrated services including S3, Snowball, EBS, RDS, Amazon Redshift, WorkSpaces, Amazon Kinesis Firehose, CloudTrail
  • 49. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Key Management Service (AWS KMS) • Managed service that simplifies creation, control, rotation, deletion, and use of encryption keys in your applications • Integrated with many AWS services for server-side encryption • Integrated with AWS service clients/SDKs • S3, EMRFS, DynamoDB, AWS Encryption SDK • Integrated with CloudTrail to provide auditable logs of key usage for regulatory and compliance activities • Available in all commercial regions except China
  • 50. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS is fully integrated with AWS IAM
  • 51. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS KMS integration with AWS services * Supports only AWS managed KMS keys
  • 52. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bring Your Own Key Import encrypted key material under the KMS CMK key ID; set optional expiration period Import Your key material protected in KMS Download a public wrapping key KMS Download RSA public key Create customer master key (CMK) container Empty CMK container with unique key ID KMS Creates Export your key material encrypted under the public wrapping key Your key management infrastructure Export Your 256-bit key material encrypted under KMS public key
  • 53. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudHSM • Dedicated access to HSM appliances • HSMs located in AWS data centers • Managed and monitored by AWS • Only you have access to your keys and operations on the keys • HSMs are inside your Amazon VPC, isolated from the rest of the network • Setup right from the console CloudHSM AWS administrator— Manages the appliance You—Control keys and crypto operations Amazon VPC
  • 54. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS CloudHSM Available in multiple AWS regions worldwide Compliance • Included in AWS PCI DSS and SOC compliance packages • FIPS 140-2 level 3 (AWS CloudHSM) • FIPS 140-2 level 2 (AWS CloudHSM Classic) Typical use cases • Electronic invoicing and document signing • Use with Amazon Redshift and RDS for Oracle • Integrate with third-party software (Oracle, Microsoft SQL Server, Apache, SafeNet, OpenSSL) • Build your own custom applications
  • 55. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Key handling solutions from AWS Marketplace • Browse, test, and buy encryption and key management solutions • Pay by the hour, monthly, or annually • Software fees added to AWS bill • Bring Your Own License
  • 56. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Marketplace Security Partners Logs and monitoring Identity and Access control Configuration & Vulnerability Analysis Protección de datos Infrastructure security
  • 57. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Marketplace Demo
  • 58. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank You Herman Mak Solutions Architect Twitter: @hermanmakHK Github: hermanmak Submit your Feedback to get 25$ AWS Credit