SlideShare a Scribd company logo
1 of 32
Download to read offline
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Tim Sandage, Senior Security Partner Strategist
Hemanth Jayaraman, Director of DevOps, Rent-A-Center
April 19, 2016
Compliance in the Cloud Using
Security by Design
Problem statement
Increasing complexity (mobility, system connectivity)
causes increasing difficulty in managing risk and security
and demonstrating compliance.
Current state—technology governance
Policies
Procedures and
guidelines
Standards
Issues—technology governance
The majority of technology governance processes relies
predominantly on administrative and operational security
controls with limited technology enforcement.
Assets
ThreatVulnerability
Risk
AWS has an opportunity to innovate and
advance technology governance services.
Flexibility and complexity
What is the regulatory
requirement?
What's in scope or out
of scope?
How to verify the
standards are met?
Security by Design
Security by Design (SbD) is a security
assurance approach that formalizes AWS
account design, automates security controls,
and streamlines auditing.
Instead of relying on auditing security
retroactively, SbD provides security control
built in throughout the AWS IT management
process.
AWS Identity & Access
Management (IAM)
AWS CloudTrail
Amazon
CloudWatch
AWS Config
Rules
AWS Trusted
Advisor
AWS
CloudHSM
AWS Key
Management Service
(AWS KMS)
AWS Directory
Service
SbD—design principles
• Build security in every layer
• Design for failures
• Implement auto-healing
• Think parallel
• Plan for breach
• Don't fear constraints
• Leverage different storage options
• Design for cost
• Treat infrastructure as code
• Modular
• Versioned
• Constrained
Security by Design involves developing new risk mitigation capabilities, which go beyond
global security frameworks by treating risks, eliminating manual processes, and optimizing
evidence and audit ratifications processes through rigid automation.
SbD—ecosystem
Security by Design (SbD)
AWS CloudFormation
AWS Config Rules
Amazon Inspector
SbD—modernizing tech governance (MTG)
Why?
Complexity is growing, making the old way to
govern technology obsolete.
You need automation that AWS offers to manage
security.
Goal—modernizing tech governance
Adopt “prevent” controls; make
“detect” controls more powerful and
comprehensive.
SbD—modernizing tech governance
1.2 Identify your workloads moving to AWS
2.1 Rationalize
security requirements
2.2 Define data
protections and controls
2.3 Document
security architecture
3.1 Build/deploy
security architecture
1. Decide what
to do (strategy)
2. Analyze and
document
(outside of AWS)
1.1 Identify stakeholders
3. Automate,
deploy, and
monitor 3.2 Automate
security operations
4. Certify
3.3 Continuously
monitor
4.1 Audit and certify
3.4 Test and
have game days
SbD—rationalize security requirements
AWS has partnered with CIS Benchmarks to create consensus-based, best-practice security
configuration guides that will align to multiple security frameworks globally.
https://www.cisecurity.org/
The benchmarks are:
• Recommended technical control rules
and values for hardening operating
systems, middleware and software
applications, and network devices.
• Distributed free of charge by CIS in
.PDF format.
• Used by thousands of enterprises as
the basis for security configuration
policies and the de facto standard for
IT configuration best practices.
SbD—AWS CIS benchmark scope
Foundational benchmark
CloudTrail
AWS Config &
Config Rules
AWS KMS
IAM CloudWatch
Amazon S3
Amazon SNS
Three-tier web architecture
Amazon EC2 Elastic Load
Balancing
Amazon VPC
AWS Direct
Connect
Amazon Elastic
Block Store
CloudHSM Amazon Glacier Amazon
Route 53
VPN
Gateway
Amazon
CloudFront
SbD—define data protections and controls
https://aws-poc.allgress.com/allgress/awsgc
SbD—document security architecture
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Hemanth Jayaraman, Director of DevOps, Rent-A-Center
April 19, 2016
Security by Design
Evolution of Cloud Security @ RAC
Business case: Rent-A-Center
• Secure business-to-business (B2B) portal for our
Acceptance Now business unit, which enables our
partners to help grow their business by increasing sales
and expanding their customer base.
• Personally identifiable information (PII) and
payment card industry (PCI) compliance requirements.
Prod
Security
Apac
he
Apac
he
Web
Amazon RDS
CloudFormationS3
Jump
Log
Manager
Jenkins
Threat
Manager
HQ
Note: All tiers are designed for
automated Multi-AZ failover.
Apac
he
Apac
he
App
Shared SVC
Apac
he
Apac
he
AWS
WAF
Prod
Security
Apac
he
Apac
he
Web
Amazon RDS
CloudFormationS3
Jump
Log
Manager
Jenkins
Threat
Manager
HQ
Note: All tiers are designed for
automated Multi-AZ failover.
Apac
he
Apac
he
App
Shared SVC
Apac
he
Apac
he
AWS
WAF
Security:
1. Amazon RDS patching
2. Centralized logging
3. Threat management
Prod
Security
Apac
he
Apac
he
Web
Amazon RDS
CloudFormationS3
Jump
Log
Manager
Jenkins
Threat
Manager
HQ
Note: All tiers are designed for
automated multi-AZ failover.
Apac
he
Apac
he
App
Shared SVC
Apac
he
Apac
he
AWS
WAF
Availability:
1. No single point of failure
2. Minimal human intervention
3. Designed to auto-scale
Prod
Security
Apac
he
Apac
he
Web
Amazon RDS
CloudFormationS3
Jump
Log
Manager
Jenkins
Threat
Manager
HQ
Note: All tiers are designed for
automated Multi-AZ failover.
Apac
he
Apac
he
App
Shared SVC
Apac
he
Apac
he
AWS
WAF
Innovation:
1. Templated environments
2. Scripted configurations
3. Automated deployments
Benefits
• Security is not production mindset: no last-minute
surprises before go live.
• Least privilege access.
• Centralized logging.
• Encryption at rest and in motion.
• Infrastructure as code.
• Ansible playbooks as build docs.
Next steps
• Continue Security by Design approach—use AWS
CloudTrail and AWS WAF
• CIS-benchmarked Amazon Machine Image (AMI)
• Amazon EC2 Container Service for Docker
• Amazon Aurora with AWS Key Management Service for
encryption
• Content delivery network (CDN) for distributed denial-of-
service (DDoS)
SbD—automate security operations
Automate deployments, provisioning, and configurations of
the AWS customer environments.
CloudFormation AWS Service CatalogStack
Template
Instances AppsResources Stack
Stack
Design Package
Products Portfolios
DeployConstrain
IAM
Set Permissions
AWS CloudTrail
Amazon
EMR
Amazon
Kinesis
Amazon
VPC
Elastic Load
Balancing
Amazon
S3
AWS
Lambda
AWS ConfigAWS CloudWatch
AWS IoT
Other
Services
Add-on for AWS
Splunk app for AWS
Explore Analyze Dashboard Alert
Use cases for AWS:
Security intelligence (CloudTrail, CloudWatch, VPC)
Operational intelligence (CloudWatch, ELB, etc.)
DevOps intelligence (CloudWatch, Lambda)
Big data insights (Amazon Kinesis, EMR, IoT, S3)
SbD—continuously monitor—Splunk
AWS CloudTrail
resource activity
Splunk app for AWS—visualize and monitor
AWS CloudTrail
user activity
SbD—modernizing technology governance (MTG)
Automate
governance
Automate
deployments
Automate security
operations
Continuous
compliance
Closing the loop
SbD—modernizing technology governance
Result: Reliable technical implementation and enforcement
of operational and administrative controls
AWS resources
Amazon Web Services Cloud Compliance
• https://aws.amazon.com/compliance/
SbD website and whitepaper—to wrap your head around this
• https://aws.amazon.com/compliance/security-by-design/
Allgress—getting started
1. Engage with Allgress in the field: Contact sales
2. Get started with the Allgress GetCompliant Portal to easily
pull compliance configurations from AWS customer accounts
3. Download the Allgress Module Breakdown
Splunk—Getting started
1. Engage with Splunk in the field: aws-splunk-team@amazon.com can
point you in the right direction, and you can request the Splunk
Playbook.
2. Download Splunk>Enterprise.
3. Download and set up the Splunk App for AWS (and supporting TA) to
easily configure Splunk for Config, CloudTrail, CloudWatch metrics,
VPC flog logging, S3, and Billing.
4. Take the self-paced Using Splunk tutorial and look at Splunk>Docs and
Splunk>Apps for more.
5. You can get started quickly with the Splunk search commands, and
then use supporting documentation to advance your skill. Our Quick
Reference Guide becomes an essential tool and cheat sheet. Other
search reference documentation is posted also.
Compliance in the Cloud Using Security by Design

More Related Content

Viewers also liked

Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 
Testing Mobile Services on AWS - Pop-up Loft Tel Aviv
Testing Mobile Services on AWS - Pop-up Loft Tel AvivTesting Mobile Services on AWS - Pop-up Loft Tel Aviv
Testing Mobile Services on AWS - Pop-up Loft Tel AvivAmazon Web Services
 
AWS ML and SparkML on EMR to Build Recommendation Engine
AWS ML and SparkML on EMR to Build Recommendation Engine AWS ML and SparkML on EMR to Build Recommendation Engine
AWS ML and SparkML on EMR to Build Recommendation Engine Amazon Web Services
 
Big data with amazon EMR - Pop-up Loft Tel Aviv
Big data with amazon EMR - Pop-up Loft Tel AvivBig data with amazon EMR - Pop-up Loft Tel Aviv
Big data with amazon EMR - Pop-up Loft Tel AvivAmazon Web Services
 
February 2016 Webinar Series - EC2 Container Service Deep Dive
February 2016 Webinar Series - EC2 Container Service Deep Dive February 2016 Webinar Series - EC2 Container Service Deep Dive
February 2016 Webinar Series - EC2 Container Service Deep Dive Amazon Web Services
 
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance Framework
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance FrameworkFrom Zero to ATO: A Step-by-Step Guide on the DoD Compliance Framework
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance FrameworkAmazon Web Services
 
Mission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesMission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesAmazon Web Services
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsXPLAIN
 

Viewers also liked (9)

Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
Testing Mobile Services on AWS - Pop-up Loft Tel Aviv
Testing Mobile Services on AWS - Pop-up Loft Tel AvivTesting Mobile Services on AWS - Pop-up Loft Tel Aviv
Testing Mobile Services on AWS - Pop-up Loft Tel Aviv
 
AWS ML and SparkML on EMR to Build Recommendation Engine
AWS ML and SparkML on EMR to Build Recommendation Engine AWS ML and SparkML on EMR to Build Recommendation Engine
AWS ML and SparkML on EMR to Build Recommendation Engine
 
Big data with amazon EMR - Pop-up Loft Tel Aviv
Big data with amazon EMR - Pop-up Loft Tel AvivBig data with amazon EMR - Pop-up Loft Tel Aviv
Big data with amazon EMR - Pop-up Loft Tel Aviv
 
February 2016 Webinar Series - EC2 Container Service Deep Dive
February 2016 Webinar Series - EC2 Container Service Deep Dive February 2016 Webinar Series - EC2 Container Service Deep Dive
February 2016 Webinar Series - EC2 Container Service Deep Dive
 
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance Framework
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance FrameworkFrom Zero to ATO: A Step-by-Step Guide on the DoD Compliance Framework
From Zero to ATO: A Step-by-Step Guide on the DoD Compliance Framework
 
Big Data Architectural Patterns
Big Data Architectural PatternsBig Data Architectural Patterns
Big Data Architectural Patterns
 
Mission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web ServicesMission Critical Applications Workloads on Amazon Web Services
Mission Critical Applications Workloads on Amazon Web Services
 
The Seven Deadly Social Media Sins
The Seven Deadly Social Media SinsThe Seven Deadly Social Media Sins
The Seven Deadly Social Media Sins
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii SoldatenkoFwdays
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersNicole Novielli
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsPixlogix Infotech
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demoHarshalMandlekar2
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 

Recently uploaded (20)

A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko"Debugging python applications inside k8s environment", Andrii Soldatenko
"Debugging python applications inside k8s environment", Andrii Soldatenko
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
A Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software DevelopersA Journey Into the Emotions of Software Developers
A Journey Into the Emotions of Software Developers
 
The Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and ConsThe Ultimate Guide to Choosing WordPress Pros and Cons
The Ultimate Guide to Choosing WordPress Pros and Cons
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Sample pptx for embedding into website for demo
Sample pptx for embedding into website for demoSample pptx for embedding into website for demo
Sample pptx for embedding into website for demo
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 

Compliance in the Cloud Using Security by Design

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tim Sandage, Senior Security Partner Strategist Hemanth Jayaraman, Director of DevOps, Rent-A-Center April 19, 2016 Compliance in the Cloud Using Security by Design
  • 2. Problem statement Increasing complexity (mobility, system connectivity) causes increasing difficulty in managing risk and security and demonstrating compliance.
  • 4. Issues—technology governance The majority of technology governance processes relies predominantly on administrative and operational security controls with limited technology enforcement. Assets ThreatVulnerability Risk AWS has an opportunity to innovate and advance technology governance services.
  • 5. Flexibility and complexity What is the regulatory requirement? What's in scope or out of scope? How to verify the standards are met?
  • 6. Security by Design Security by Design (SbD) is a security assurance approach that formalizes AWS account design, automates security controls, and streamlines auditing. Instead of relying on auditing security retroactively, SbD provides security control built in throughout the AWS IT management process. AWS Identity & Access Management (IAM) AWS CloudTrail Amazon CloudWatch AWS Config Rules AWS Trusted Advisor AWS CloudHSM AWS Key Management Service (AWS KMS) AWS Directory Service
  • 7. SbD—design principles • Build security in every layer • Design for failures • Implement auto-healing • Think parallel • Plan for breach • Don't fear constraints • Leverage different storage options • Design for cost • Treat infrastructure as code • Modular • Versioned • Constrained Security by Design involves developing new risk mitigation capabilities, which go beyond global security frameworks by treating risks, eliminating manual processes, and optimizing evidence and audit ratifications processes through rigid automation.
  • 8. SbD—ecosystem Security by Design (SbD) AWS CloudFormation AWS Config Rules Amazon Inspector
  • 9. SbD—modernizing tech governance (MTG) Why? Complexity is growing, making the old way to govern technology obsolete. You need automation that AWS offers to manage security.
  • 10. Goal—modernizing tech governance Adopt “prevent” controls; make “detect” controls more powerful and comprehensive.
  • 11. SbD—modernizing tech governance 1.2 Identify your workloads moving to AWS 2.1 Rationalize security requirements 2.2 Define data protections and controls 2.3 Document security architecture 3.1 Build/deploy security architecture 1. Decide what to do (strategy) 2. Analyze and document (outside of AWS) 1.1 Identify stakeholders 3. Automate, deploy, and monitor 3.2 Automate security operations 4. Certify 3.3 Continuously monitor 4.1 Audit and certify 3.4 Test and have game days
  • 12. SbD—rationalize security requirements AWS has partnered with CIS Benchmarks to create consensus-based, best-practice security configuration guides that will align to multiple security frameworks globally. https://www.cisecurity.org/ The benchmarks are: • Recommended technical control rules and values for hardening operating systems, middleware and software applications, and network devices. • Distributed free of charge by CIS in .PDF format. • Used by thousands of enterprises as the basis for security configuration policies and the de facto standard for IT configuration best practices.
  • 13. SbD—AWS CIS benchmark scope Foundational benchmark CloudTrail AWS Config & Config Rules AWS KMS IAM CloudWatch Amazon S3 Amazon SNS Three-tier web architecture Amazon EC2 Elastic Load Balancing Amazon VPC AWS Direct Connect Amazon Elastic Block Store CloudHSM Amazon Glacier Amazon Route 53 VPN Gateway Amazon CloudFront
  • 16. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Hemanth Jayaraman, Director of DevOps, Rent-A-Center April 19, 2016 Security by Design Evolution of Cloud Security @ RAC
  • 17. Business case: Rent-A-Center • Secure business-to-business (B2B) portal for our Acceptance Now business unit, which enables our partners to help grow their business by increasing sales and expanding their customer base. • Personally identifiable information (PII) and payment card industry (PCI) compliance requirements.
  • 18. Prod Security Apac he Apac he Web Amazon RDS CloudFormationS3 Jump Log Manager Jenkins Threat Manager HQ Note: All tiers are designed for automated Multi-AZ failover. Apac he Apac he App Shared SVC Apac he Apac he AWS WAF
  • 19. Prod Security Apac he Apac he Web Amazon RDS CloudFormationS3 Jump Log Manager Jenkins Threat Manager HQ Note: All tiers are designed for automated Multi-AZ failover. Apac he Apac he App Shared SVC Apac he Apac he AWS WAF Security: 1. Amazon RDS patching 2. Centralized logging 3. Threat management
  • 20. Prod Security Apac he Apac he Web Amazon RDS CloudFormationS3 Jump Log Manager Jenkins Threat Manager HQ Note: All tiers are designed for automated multi-AZ failover. Apac he Apac he App Shared SVC Apac he Apac he AWS WAF Availability: 1. No single point of failure 2. Minimal human intervention 3. Designed to auto-scale
  • 21. Prod Security Apac he Apac he Web Amazon RDS CloudFormationS3 Jump Log Manager Jenkins Threat Manager HQ Note: All tiers are designed for automated Multi-AZ failover. Apac he Apac he App Shared SVC Apac he Apac he AWS WAF Innovation: 1. Templated environments 2. Scripted configurations 3. Automated deployments
  • 22. Benefits • Security is not production mindset: no last-minute surprises before go live. • Least privilege access. • Centralized logging. • Encryption at rest and in motion. • Infrastructure as code. • Ansible playbooks as build docs.
  • 23. Next steps • Continue Security by Design approach—use AWS CloudTrail and AWS WAF • CIS-benchmarked Amazon Machine Image (AMI) • Amazon EC2 Container Service for Docker • Amazon Aurora with AWS Key Management Service for encryption • Content delivery network (CDN) for distributed denial-of- service (DDoS)
  • 24. SbD—automate security operations Automate deployments, provisioning, and configurations of the AWS customer environments. CloudFormation AWS Service CatalogStack Template Instances AppsResources Stack Stack Design Package Products Portfolios DeployConstrain IAM Set Permissions
  • 25. AWS CloudTrail Amazon EMR Amazon Kinesis Amazon VPC Elastic Load Balancing Amazon S3 AWS Lambda AWS ConfigAWS CloudWatch AWS IoT Other Services Add-on for AWS Splunk app for AWS Explore Analyze Dashboard Alert Use cases for AWS: Security intelligence (CloudTrail, CloudWatch, VPC) Operational intelligence (CloudWatch, ELB, etc.) DevOps intelligence (CloudWatch, Lambda) Big data insights (Amazon Kinesis, EMR, IoT, S3) SbD—continuously monitor—Splunk
  • 26. AWS CloudTrail resource activity Splunk app for AWS—visualize and monitor AWS CloudTrail user activity
  • 27. SbD—modernizing technology governance (MTG) Automate governance Automate deployments Automate security operations Continuous compliance
  • 28. Closing the loop SbD—modernizing technology governance Result: Reliable technical implementation and enforcement of operational and administrative controls
  • 29. AWS resources Amazon Web Services Cloud Compliance • https://aws.amazon.com/compliance/ SbD website and whitepaper—to wrap your head around this • https://aws.amazon.com/compliance/security-by-design/
  • 30. Allgress—getting started 1. Engage with Allgress in the field: Contact sales 2. Get started with the Allgress GetCompliant Portal to easily pull compliance configurations from AWS customer accounts 3. Download the Allgress Module Breakdown
  • 31. Splunk—Getting started 1. Engage with Splunk in the field: aws-splunk-team@amazon.com can point you in the right direction, and you can request the Splunk Playbook. 2. Download Splunk>Enterprise. 3. Download and set up the Splunk App for AWS (and supporting TA) to easily configure Splunk for Config, CloudTrail, CloudWatch metrics, VPC flog logging, S3, and Billing. 4. Take the self-paced Using Splunk tutorial and look at Splunk>Docs and Splunk>Apps for more. 5. You can get started quickly with the Splunk search commands, and then use supporting documentation to advance your skill. Our Quick Reference Guide becomes an essential tool and cheat sheet. Other search reference documentation is posted also.