SlideShare a Scribd company logo
1 of 35
Download to read offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
How FINRA achieves DevOps agility while
securing its AWS environments
Daniel Koo
Senior Director
DevOps Products & Engineering
FINRA
G R C 3 3 9
Stephen Mele
Lead Developer
DevOps Products
FINRA
Jason Garbis
Vice President
Products
Cyxtera Technologies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
• FINRA introduction
• Secure development and DevOps practice at FINRA
• Gatekeeper and AppGate SDP integration
• Demo
• Cyxtera introduction
• Cyxtera’s AppGate SDP solution for AWS
• Q&A
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Mission
Investor
protection
Market
integrity
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Volume
brokers
12 634,000
markets/
exchanges
firms
3,800
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Big data
FINRA maintains
150+
applications running in AWS
FINRA processes up to
135 billion
market events per day
FINRA processes and analyzes
trillions
of nodes and edges
FINRA manages
approximately
30 petabytes
of storage
FINRA runs up to
50,000
compute nodes
per day
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Challenges
TransparencyGovernance
DevOps
Access control
Compliance
Transient platform
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevOps practice
ReleasedDev/testInception
Integrated
security
Standardization
Architecture
pattern
Self-service
Integrated
ops
Compliance
Kickstart
FINRA Images
Jenkins/F3
Jenkins/
F3
Fidelius
CloudPass Gatekeeper Aphelion
Nagios
FINRA
Images
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Temporary access to
Amazon EC2 and
Amazon RDS
Gatekeeper
Secrets management in
AWS
Fidelius
Create resources in
AWS
Provision
Temporary token for
AWS
CloudPass
Security group
manager
Portus
Go API for uploading
RPM to yum
yum-nginx-api
Monitor AWS service
limits
Aphelion
Available
Coming soon
Open source
http://technology.finra.org/opensource.html
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Compliance: Consistency, transparency
FINRA Provision
Compliant stack
configs
FINRA Portus
Approved security
groups
FINRA IAMUS
IAM role templates
Info and
application
security
Enterprise
architecture
Policies and
standards
Dev
teams
Automated
deploy
Automated
deploy
Configs/change events
Configs/change events
Configs/change events
Amazon
CloudWatch
AWS
CloudTrail
Reg SCI SOX SOC 2SEC
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cloud security
AWS KMS
Amazon EMR security
configurations
In transit
At rest
Encryption
Role-based access
Active Directory
integration (applications)
Group membership
AuthN and
AuthZ
*****
VPC isolation
Security groups
VPC endpoints
SDLC isolation (accounts)
Micro-segmentation
Isolation
AWS CloudTrail
Amazon CloudWatch
Splunk
Monitoring
IAM ADFS federation
Temporary STS token
Gatekeeper (temporary access
to Amazon EC2
and Amazon RDS)
Access
control
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
User M3Application
Load
Balancer
(ALB)
VPC
Gatekeeper UI
(AngularJS)
ALB M3
Gatekeeper services,
Amazon EC2 +
Amazon RDS
(Spring Boot)
Amazon RDS
Active Directory
Amazon EC2
C3 M3 M4SSM
Amazon RDS
VPC
Amazon EC2
C3 M3 M4SSM
Amazon RDS
VPC
Amazon EC2
C3 M3 M4SSM
Amazon RDS
Authenticate users
and search for
users
Connect to
Amazon RDS,
create/remove users
Call SSM to create
users on Amazon
EC2 instances
Store
requests
Gatekeeper architecture VPC
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
AppGate
controller
VPC
AppGate
gateway
AWS Cloud
MTLS
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
AppGate
controller
VPC
AppGate
gateway
AWS Cloud
MTLS
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
AppGate
controller
VPC
AppGate
gateway
Identity
management
AWS Cloud
MTLS
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
AppGate
controller
VPC
AppGate
gateway
Identity
management
AWS Cloud
MTLS
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
User logs into
AppGate
1
3
2
Secure MTLS
connection
to gateway
AppGate
controller
VPC
AppGate
gateway
AWS Cloud
User logs into
Gatekeeper and
requests access to
AWS resources
Gatekeeper
5 Gateway enforces access policies
based on user groups
4
Gatekeeper creates
temporary users/key pairs
on selected resources
Instance: 67890
IP: 10.17.123.2
Gatekeeper + AppGate SDP: Current state
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
User logs into
AppGate
1
2
Secure MTLS
connection
to gateway
AppGate
controller
VPC
AppGate
gateway
AWS Cloud
Gatekeeper
5 Gateway enforces access policies based on
IPs provided by Gatekeeper request
Instance: 67890
IP: 10.17.123.2
Gatekeeper provides request data to
AppGate API (Amazon SNS, Amazon
SQS, AWS Lambda)
3
User logs into
Gatekeeper and
requests access to
AWS resources
Gatekeeper creates
temporary users/key pairs
on selected resources
4a
4b
Gatekeeper + AppGate SDP: Future state
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Goals achieved
Self-service
Automated grant/removal
Leveraging of existing group membership
No hard users on instances, only temporary access
Multi-layer protection (AuthN/AuthZ, approval, security group, AppGate SDP)
Auditability and transparency
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cyxtera Essential Defense
Proactive,
online threat
identification and
mitigation aimed at
minimizing
enterprise
digital risk
Digital threat protection
Threat management and analytics
Software-defined perimeter & micro-segmentation
Identity-centric, network-enforced perimeter able to
secure any application, on any platform, in any location
Multi-factor authentication
Unified authentication for entire enterprise user population
through a comprehensive range of authentication factors
Reduce
Your attack surface
Secure
Your access
Neutralize
Your adversaries
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
2. Connect 3. Authenticate1. All resources
visible
TCP/IP
Connect first,
authenticate second
1. TCP/IP is a weak security foundation (implicit trust)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Should 192.168.4.11 have access to 10.5.0.3?
Yes or no?
2. TCP/IP has a poor policy language
192.168.4.11 10.5.0.3
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
1
Identity-centric
User- or device-based access control
Integration with directory services and IAM
Context sensitivity
Zero-trust model
Authentication before connection
Dynamically provisioned 1:1 connectivity
Completely dark unauthorized resources
2
Built like cloud, for cloud
Distributed, stateless, and highly scalable
Programmable and adaptive
Dynamic and on-demand
3
“By 2021, 60% of enterprises will phase out network VPNs for digital business communications in
favor of software-defined perimeters.”
A better approach to network security:
Software-defined perimeter
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
2. Connect 3. Authenticate1. All resources
visible
TCP/IP
Connect first,
authenticate second
1. Authenticate 2. Connect 3. Only authorized
resources are visible
Software-defined
perimeter
Authenticate first,
Connect second
AppGate SDP compensates for TCP/IP weaknesses
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Should Jim have access to the SAP production server?
It depends
AppGate SDP has a rich policy language
Jim SAP production server
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
What’sourcurrent
securityposture?
Isthereanopenservice
deskticket?
WhereisJimconnecting
from?
Whattimeisit?
IsJim’smachinepatched?WhatprojectisJimworkingon?
Jim SAP production server
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AppGate
client
AppGate
controller
VPC
AppGate
gateway
Policy model
Graphical admin console & APIs
Integration with IT/security Systems
(SIEM, IDS/IPS)
Identity management system
(SAML, LDAP, AD)
VPC
VPC
Instance: 67890
Tag: State=Dev
Tag: App=App3
MTLS AWS Cloud
Simple security group:
Allow all from Gateway,
deny all other traffic
Instance: 12345
Tag: State=Dev
Tag: App=App1
Instance: 33445
Tag: State=Dev
Tag: App=App1
Instance: 677889
Tag: State=Prod
Tag: App=App2
MTLS
AWS
Cloud
AppGate
gateway
SPA packet
MTLS
AppGate SDP primer
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Software-defined perimeter for AWS
• Use cases
• Concurrent and transparent access across regions and accounts
• Dynamic, policy-based access
• Automatic access control based on metadata
• Additional scenarios
• Multi-factor authentication and step-up authentication
• ITSM integration
• Give it a try: Free trial in AWS Marketplace
https://aws.amazon.com/marketplace/pp/B01IWQFEHM
• More information
https://Cyxtera.com
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Daniel Koo Stephen Mele Jason Garbis

More Related Content

What's hot

What's hot (20)

Build security into CI/CD pipelines for effective security automation on AWS ...
Build security into CI/CD pipelines for effective security automation on AWS ...Build security into CI/CD pipelines for effective security automation on AWS ...
Build security into CI/CD pipelines for effective security automation on AWS ...
 
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Integrating security testing into your container build pipeline - SDD308 - AW...
Integrating security testing into your container build pipeline - SDD308 - AW...Integrating security testing into your container build pipeline - SDD308 - AW...
Integrating security testing into your container build pipeline - SDD308 - AW...
 
How Pokémon’s SecOps team enables its business - SDD328 - AWS re:Inforce 2019
How Pokémon’s SecOps team enables its business - SDD328 - AWS re:Inforce 2019 How Pokémon’s SecOps team enables its business - SDD328 - AWS re:Inforce 2019
How Pokémon’s SecOps team enables its business - SDD328 - AWS re:Inforce 2019
 
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
 
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019 Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
Cryptography in the next cycle - SEP304 - AWS re:Inforce 2019
 
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
 
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
 
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
Build end-to-end IT lifecycle management on AWS - FND301-R - AWS re:Inforce 2...
 
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
 
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
 
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
 
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019 Securing serverless and container services - SDD306 - AWS re:Inforce 2019
Securing serverless and container services - SDD306 - AWS re:Inforce 2019
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
 

Similar to How FINRA achieves DevOps agility while securing its AWS environments - GRC339 - AWS re:Inforce 2019

Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Amazon Web Services
 

Similar to How FINRA achieves DevOps agility while securing its AWS environments - GRC339 - AWS re:Inforce 2019 (20)

AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & Learn
 
AWS_Security_Essentials
AWS_Security_EssentialsAWS_Security_Essentials
AWS_Security_Essentials
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's AccountsLock it Down: How to Secure your AWS Account and your Organization's Accounts
Lock it Down: How to Secure your AWS Account and your Organization's Accounts
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)How to Architect and Bring to Market SaaS on AWS GovCloud (US)
How to Architect and Bring to Market SaaS on AWS GovCloud (US)
 
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Serverless applications with AWS
Serverless applications with AWSServerless applications with AWS
Serverless applications with AWS
 
Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...Integrating network and API security into your application lifecycle - DEM07 ...
Integrating network and API security into your application lifecycle - DEM07 ...
 
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

How FINRA achieves DevOps agility while securing its AWS environments - GRC339 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. How FINRA achieves DevOps agility while securing its AWS environments Daniel Koo Senior Director DevOps Products & Engineering FINRA G R C 3 3 9 Stephen Mele Lead Developer DevOps Products FINRA Jason Garbis Vice President Products Cyxtera Technologies
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda • FINRA introduction • Secure development and DevOps practice at FINRA • Gatekeeper and AppGate SDP integration • Demo • Cyxtera introduction • Cyxtera’s AppGate SDP solution for AWS • Q&A
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Mission Investor protection Market integrity
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Volume brokers 12 634,000 markets/ exchanges firms 3,800
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Big data FINRA maintains 150+ applications running in AWS FINRA processes up to 135 billion market events per day FINRA processes and analyzes trillions of nodes and edges FINRA manages approximately 30 petabytes of storage FINRA runs up to 50,000 compute nodes per day
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Challenges TransparencyGovernance DevOps Access control Compliance Transient platform
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevOps practice ReleasedDev/testInception Integrated security Standardization Architecture pattern Self-service Integrated ops Compliance Kickstart FINRA Images Jenkins/F3 Jenkins/ F3 Fidelius CloudPass Gatekeeper Aphelion Nagios FINRA Images
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Temporary access to Amazon EC2 and Amazon RDS Gatekeeper Secrets management in AWS Fidelius Create resources in AWS Provision Temporary token for AWS CloudPass Security group manager Portus Go API for uploading RPM to yum yum-nginx-api Monitor AWS service limits Aphelion Available Coming soon Open source http://technology.finra.org/opensource.html
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Compliance: Consistency, transparency FINRA Provision Compliant stack configs FINRA Portus Approved security groups FINRA IAMUS IAM role templates Info and application security Enterprise architecture Policies and standards Dev teams Automated deploy Automated deploy Configs/change events Configs/change events Configs/change events Amazon CloudWatch AWS CloudTrail Reg SCI SOX SOC 2SEC
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cloud security AWS KMS Amazon EMR security configurations In transit At rest Encryption Role-based access Active Directory integration (applications) Group membership AuthN and AuthZ ***** VPC isolation Security groups VPC endpoints SDLC isolation (accounts) Micro-segmentation Isolation AWS CloudTrail Amazon CloudWatch Splunk Monitoring IAM ADFS federation Temporary STS token Gatekeeper (temporary access to Amazon EC2 and Amazon RDS) Access control
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. User M3Application Load Balancer (ALB) VPC Gatekeeper UI (AngularJS) ALB M3 Gatekeeper services, Amazon EC2 + Amazon RDS (Spring Boot) Amazon RDS Active Directory Amazon EC2 C3 M3 M4SSM Amazon RDS VPC Amazon EC2 C3 M3 M4SSM Amazon RDS VPC Amazon EC2 C3 M3 M4SSM Amazon RDS Authenticate users and search for users Connect to Amazon RDS, create/remove users Call SSM to create users on Amazon EC2 instances Store requests Gatekeeper architecture VPC
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate SDP primer
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client AppGate controller VPC AppGate gateway AWS Cloud MTLS AppGate SDP primer
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client AppGate controller VPC AppGate gateway AWS Cloud MTLS AppGate SDP primer
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client AppGate controller VPC AppGate gateway Identity management AWS Cloud MTLS AppGate SDP primer
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client AppGate controller VPC AppGate gateway Identity management AWS Cloud MTLS AppGate SDP primer
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client User logs into AppGate 1 3 2 Secure MTLS connection to gateway AppGate controller VPC AppGate gateway AWS Cloud User logs into Gatekeeper and requests access to AWS resources Gatekeeper 5 Gateway enforces access policies based on user groups 4 Gatekeeper creates temporary users/key pairs on selected resources Instance: 67890 IP: 10.17.123.2 Gatekeeper + AppGate SDP: Current state
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client User logs into AppGate 1 2 Secure MTLS connection to gateway AppGate controller VPC AppGate gateway AWS Cloud Gatekeeper 5 Gateway enforces access policies based on IPs provided by Gatekeeper request Instance: 67890 IP: 10.17.123.2 Gatekeeper provides request data to AppGate API (Amazon SNS, Amazon SQS, AWS Lambda) 3 User logs into Gatekeeper and requests access to AWS resources Gatekeeper creates temporary users/key pairs on selected resources 4a 4b Gatekeeper + AppGate SDP: Future state
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Goals achieved Self-service Automated grant/removal Leveraging of existing group membership No hard users on instances, only temporary access Multi-layer protection (AuthN/AuthZ, approval, security group, AppGate SDP) Auditability and transparency
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Cyxtera Essential Defense Proactive, online threat identification and mitigation aimed at minimizing enterprise digital risk Digital threat protection Threat management and analytics Software-defined perimeter & micro-segmentation Identity-centric, network-enforced perimeter able to secure any application, on any platform, in any location Multi-factor authentication Unified authentication for entire enterprise user population through a comprehensive range of authentication factors Reduce Your attack surface Secure Your access Neutralize Your adversaries
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 2. Connect 3. Authenticate1. All resources visible TCP/IP Connect first, authenticate second 1. TCP/IP is a weak security foundation (implicit trust)
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Should 192.168.4.11 have access to 10.5.0.3? Yes or no? 2. TCP/IP has a poor policy language 192.168.4.11 10.5.0.3
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 1 Identity-centric User- or device-based access control Integration with directory services and IAM Context sensitivity Zero-trust model Authentication before connection Dynamically provisioned 1:1 connectivity Completely dark unauthorized resources 2 Built like cloud, for cloud Distributed, stateless, and highly scalable Programmable and adaptive Dynamic and on-demand 3 “By 2021, 60% of enterprises will phase out network VPNs for digital business communications in favor of software-defined perimeters.” A better approach to network security: Software-defined perimeter
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 2. Connect 3. Authenticate1. All resources visible TCP/IP Connect first, authenticate second 1. Authenticate 2. Connect 3. Only authorized resources are visible Software-defined perimeter Authenticate first, Connect second AppGate SDP compensates for TCP/IP weaknesses
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Should Jim have access to the SAP production server? It depends AppGate SDP has a rich policy language Jim SAP production server
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. What’sourcurrent securityposture? Isthereanopenservice deskticket? WhereisJimconnecting from? Whattimeisit? IsJim’smachinepatched?WhatprojectisJimworkingon? Jim SAP production server
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AppGate client AppGate controller VPC AppGate gateway Policy model Graphical admin console & APIs Integration with IT/security Systems (SIEM, IDS/IPS) Identity management system (SAML, LDAP, AD) VPC VPC Instance: 67890 Tag: State=Dev Tag: App=App3 MTLS AWS Cloud Simple security group: Allow all from Gateway, deny all other traffic Instance: 12345 Tag: State=Dev Tag: App=App1 Instance: 33445 Tag: State=Dev Tag: App=App1 Instance: 677889 Tag: State=Prod Tag: App=App2 MTLS AWS Cloud AppGate gateway SPA packet MTLS AppGate SDP primer
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Software-defined perimeter for AWS • Use cases • Concurrent and transparent access across regions and accounts • Dynamic, policy-based access • Automatic access control based on metadata • Additional scenarios • Multi-factor authentication and step-up authentication • ITSM integration • Give it a try: Free trial in AWS Marketplace https://aws.amazon.com/marketplace/pp/B01IWQFEHM • More information https://Cyxtera.com
  • 35. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Daniel Koo Stephen Mele Jason Garbis