SlideShare a Scribd company logo
1 of 56
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Pop-up Loft
Introduction to Threat Detection and Remediation on AWS
Cameron Worrell
Solutions Architect
Amazon Web Services
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Agenda
• Quick Intro to AWS CAF Security Perspective
• Overview of Threat Detection and Remediation on AWS
– AWS WAF
– AWS Shield
– Amazon GuardDuty
– Amazon Macie
– AWS Lambda
– AWS Config
– Amazon Inspector
– AWS Systems Manager
– AWS Secrets Manager
– Amazon CloudWatch Events
• Putting it all together
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Why is security traditionally so hard?
Lack of
visibility
Low degree
of automation
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Cloud Adoption Framework
• Each Perspective provides guidance for
different parts of an organization
• Helps YOU adapt existing practices or
introduce new practices for cloud
computing
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Directive controls establish the governance, risk, and compliance models the
environment will operate within.
Preventive controls protect your workloads and mitigate threats and
vulnerabilities.
Detective controls provide full visibility and transparency over the operation of
your deployments in AWS.
Responsive controls drive remediation of potential deviations from your
security baselines.
The AWS CAF Security Perspective Controls
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
The AWS CAF Security Perspective Epics
5 Core Security Epics
Identity and Access Management
Detective controls
Infrastructure security
Data protection
Incident response
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Threat Detection and Remediation on AWS
“Life Uh, Finds a Way”
– Ian Malcom
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is a WAF?
Web Application Firewall
Monitors HTTP/S requests and protects
web applications from malicious
activities
Layer 7 inspection and mitigation tool
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What is AWS WAF?
Web traffic filtering with
custom rules
• Rate based rules
• IP Match & Geo-IP filters
• Regex & String Match
• Size constraints
• Action: Allow/Block
Malicious request blocking
• SQLi
• XSS
Active monitoring & tuning
• CloudWatch
Metrics/Alarms
• Sampled Logs
• Count Action mode
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Where AWS WAF can help
Application
layer
Bad botsDDoS Application attacks
HTTP floods
Content scrapers
Scanners & probes
CrawlersSQL injection
Application exploits
Social engineering
AWS WAF
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS WAF benefits
Fast incidence
response
Powerful rule
languageEasy to deploy
AffordableSecurity automation Managed
rules
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Firewall Manager is a security management
service to centrally configure and manage web
application firewall rules across your accounts and
applications.
Using Firewall Manager, you can roll out WAF rules
all at once for your Application Load Balancers and
AWS CloudFront distributions across accounts.
AWS Firewall Manager
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Firewall Manager Key Benefits
Simplified Management
of WAF Rules
Integrated with
AWS Organizations
Centrally managed global
rules, and Account-specific
rules
Ensure Compliance
to WAF Rules
Ensure entire Organization
adheres to mandatory set
of rules
Apply protection even when
new Accounts or resources
are created
Central Visibility
Across Organization
Central visibility of WAF threats
across Organization
Compliance Dashboard for audit
firewall status
An organization’s InfoSec team
learns and operates WAF
instead of each Account owner
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Managed rules from security leaders
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS SHIELD
Standard Protection Advanced Protection
Available to ALL AWS customers at
no additional cost
Paid service that provides additional
protections, features, and benefits
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Automatic defense against the most
common network and transport layer DDoS
attacks for any AWS resource, in any AWS
Region
• Comprehensive defense against all known
network and transport layer attacks when
using Amazon CloudFront and Amazon
Route 53
• Application layer defense available when
using AWS WAF
AWS SHIELD
Standard Protection
Automatically provided to all AWS
customers at no additional cost
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Fast escalation to the AWS DDoS
Response Team (DRT) to assist with
complex edge cases
• Attack visibility and enhanced
detection
• Cost Protection to mitigate economic
attack vectors
• AWS WAF for application-layer defense,
at no additional cost
AWS SHIELD
Advanced Protection
Available globally on Amazon
CloudFront, Amazon Route 53, and in
select AWS Regions
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Effective Against:
• HTTP Floods
• Bad Bots
• Suspicious IPs
Effective Against:
• SSL Attacks
• Slowloris
• Malformed HTTP
Effective Against:
• SYN Floods
• Reflection Attacks
• Suspicious
Sources
DEFENSE IN DEPTH
Border Network
Network Layer Mitigations
AWS Services
Web Layer Mitigations
Customer Infrastructure
DDoS
Detection
Internet
Internet-
Layer
Mitigations
DDoS
Effective Against:
• Large-scale
attacks
Effective Against:
• Sophisticated
Layer 7 attacks
DDoS
Response
Team
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
What is Amazon GuardDuty?
• A threat detection service re-imagined for the cloud
• Continuously monitors and protects AWS accounts, along with the
applications and services running within them
• Detects known and unknown threats
• Makes use of artificial intelligence and machine learning
• Integrated threat intelligence
• Operates on CloudTrail, VPC Flow Logs & DNS
• Detailed & Actionable Findings
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Detecting Known Threats
Threat intelligence
• GuardDuty consumes feeds from various sources
• AWS Security
• Commercial feeds
• Open source feeds
• Customer provided threat intel (STIX)
• Known malware infected hosts
• Anonymizing proxies
• Sites hosting malware & hacker tools
• Crypto-currency mining pools and wallets
• Great catch-all for suspicious & malicious activity
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Detecting Unknown Threats
Anomaly detection
• Algorithms to detect unusual behavior
• Inspecting signal patterns for signatures
• Profiling normal and looking at deviations
• Machine learning classifiers
• Larger R&D effort
• Highly skilled data scientists to study data
• Develop theoretical detection models
• Experiment with implementations
• Testing, tuning, and validation
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
What can the service detect?
RDP brute
force
RAT Installed
Exfiltrate
temp IAM
creds over
DNS
Probe API
with temp
creds
Attempt to
compromise
account
Malicious or
suspicious IP
Unusual ports DNS exfiltration
RDP brute force
Unusual traffic volumeConnect to blacklisted site
Recon
Anonymizing proxy
Temp credentials
used off-instance
Unusual ISP caller
Bitcoin activity
Unusual instance launch
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• Recon
• Port Probe on unprotected port
• Outbound port scans
• Callers from anonymizing proxies
• Backdoor
• Spambot or C&C activity detected
• Exfiltration over DNS channel
• Suspicious domain request
• Trojan
• DGA Domain Request
• Blackhole traffic
• DropPoint
• Unauthorized Access
• Unusual ISP caller
• SSH BruteForce
• RDP Brute Force
• Stealth
• Password Policy Change
• CloudTrail Logging Disabled
• GuardDuty Disabled in member account
• CryptoCurrency
• Communication with Bitcoin DNS pools
• CryptoCurrency related DNS calls
• Connections to Bitcoin mining pools
Finding Type Categories
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Demo: Alexa “Ask GuardDuty”
“Get flash briefing”
“Get statistics for Virginia”
“Get medium severity findings for Oregon”
Amazon
Echo
Alexa
Custom
Skill
(Lambda)
GuardDuty
API
Finding Statistics and
Details
“Alexa, Ask GuardDuty”
read only
“Here is your GuardDuty flash
briefing…”
1
2
3
4
5 Alexa
Service
https://github.com/aws-samples/amazon-guardduty-alexa-sample
**Start Demo GuardDuty to ACL Auto Defense
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Demo Part 1: GuardDuty to ACL Auto Defense
EC2
instance
GuardDuty CloudWatch
Events
Lambda
Function
WAF
filtering rule
AWS WAF
VPC Network
Access Control List
Amazon
DynamoDB
172.16.1.x
172.16.1.x
172.16.1.x
172.16.1.x
Blocked
Host
State Data
1
2
3
4
5
Amazon
SNS
6
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• AMAZON MACIE
• ML-POWERED VISIBILITY SERVICE IDENTIFIES
SENSITIVE INFORMATION TO HELP AUTOMATE
SECURITY AND COMPLIANCE
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Macie overview
Understand
your data
Natural Language
Processing (NLP)
Understand data
access
Predictive User
Behavior Analytics
(UBA)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Macie Content Classification
• PII and personal data
• Source code
• SSL certificates, private keys
• iOS and Android app signing keys
• Database backups
• OAuth and Cloud SAAS API Keys
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automated actions on alerts
• Simplify with Lambda
• Delete the object
• Revoke access—bucket or object
• Perimeter guard
• Update IAM policies
• Suspend user
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cost-effective and
efficient
No infrastructure
to manage
Pay only for what you use
Bring your
own code
Productivity-focused compute service to build powerful, dynamic, modular
applications in the cloud
Run code in standard
languages
Focus on business logic
Benefits of AWS Lambda
1 2 3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Lambda: Run Code in Response to Events
FUNCTION SERVICES (ANYTHING)
Changes in
data state
Requests to
endpoints
Changes in
resource state
Node
Python
Java
C#
EVENT SOURCE
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
• A W S C o n f i g a n d
• A W S C o n f i g R u l e s
• A W S C l o u d T r a i l a n d
• A m a z o n C l o u d W a t c h L o g s
Active Auditing with AWS Lambda
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Config & AWS Config Rules
• A continuous recording and continuous assessment service
Changing resources
AWS Config
Config Rules
History, Snapshot
Notifications
API Access
Normalized
Answer the questions:
How are my resources configured over time?
Is a change that just occurred to a resource, compliant?
Multi-Account, Multi-Region Data Aggregation
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Lambda as Auditor
App Account 1
App Account n
Security Team Account
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Amazon Inspector
• Vulnerability Assessment Service
– Built from the ground up to support DevSecOps
– Automatable via APIs
– Integrates with CI/CD tools
– On-Demand Pricing model
– Static & Dynamic Rules Packages
– Generates Findings
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Amazon Inspector
• Rules Packages
– Common Vulnerabilities & Exposures
– CIS Operating System Security Configuration Benchmarks
– Security Best Practices
– Runtime Behavior Analysis
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automating Remediation
• Findings are JSON formatted and taggable
• Name of assessment target & template
• Start time, end time, status
• Name of rule packages
• Name & severity of the finding
• Description & remediation steps
• Lamd-ify your incident response
• Integrate with Jira-like services
• Integrate with Pagerduty-like services
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Systems Manager
• A set of capabilities that:
• enable automated configuration
• support ongoing management of systems at scale
• work across all of your Windows and Linux workloads
• run in Amazon EC2 or on-premises
• carry no additional charge to use
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Why should I care?
Support for hybrid
Architecture
Cross-platform Scalable
Secure Easy-to-write
automation
Expected Reduction
in Total Cost of
Ownership (TCO)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Systems Manager capabilities
state manager maintenance
window
inventory
automation parameter store
run command
patch manager
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Introducing AWS Secrets Manager
Lifecycle management for secrets such as database
credentials and API keys.
Rotate Secrets
Safely
Pay as you goManage access
with fine-grained
policies
Secure and
audit secrets
centrally
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
AWS Secrets Manager Key Features
Safe rotation of
secrets
Built-in integrations,
extensible with
Lambda
On-demand or
automatic rotation with
versioning
Fine-grained access
policies
Encrypted storage Logging and
monitoring
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
CloudWatch Events
• Delivers a near real-time stream of system events that describe changes in
Amazon Web Services (AWS) resources.
• Using simple rules, you can match events and route them to one or more target
functions or streams.
• CloudWatch Events becomes aware of operational changes as they occur and
responds to these operational changes and takes corrective action as
necessary, by sending messages to respond to the environment, activating
functions, making changes, and capturing state information.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Supported Services
• AWS CodeStar
• AWS Console Sign-In
• Auto Scaling
• Batch
• Certificate Manager
• Chime
• Cloud Directory
• CloudFormation
• CloudFront
• CloudHSM
• CloudSearch
• CloudTrail
• CloudWatch Events
• CloudWatch Logs
• CodeBuild
• CodeCommit
• CodeDeploy
• CodePipeline
• Cognito Identity
• Cognito Sync
• Cognito User Pool
• Config
• Data Pipeline
• Database Migration Service
• Direct Connect
• Directory Service
• DynamoDB
• EC2
• EC2 Container Registry
• EC2 Container Service (ECS)
• EC2 Simple Systems Manager (SSM)
• EMR
• ElastiCache
• Elastic Beanstalk
• Elastic File System (EFS)
• Elastic Load Balancing
• Elastic Map Reduce (EMR)
• Elastic Transcoder
• Elasticsearch
• Gamelift
• Glacier
• Glue
• GuardDuty
• Health
• IAM
• Inspector
• IoT
• Key Management Service (KMS)
• Kinesis
• Kinesis Firehose
• Lambda
• Machine Learning
• Macie
• Managed Services
• MediaConvert
• MediaLive
• Metering Marketplace
• Monitoring
• OpsWorks
• OpsWorks for Chef Automate
• Organizations
• Polly
• RedShift
• Relational Database Service (RDS)
• Route 53
• Security Token Service (STS)
• Server Migration Service (SMS)
• Service Catalog
• Simple Email Service (SES)
• Simple Notification Service (SNS)
• Simple Queue Service (SQS)
• Simple Storage Service (S3)
• Simple Workflow Service (SWF)
• Step Functions
• Storage Gateway
• Support
• Trusted Advisor
• WAF Regional
• Web Application Firewall (WAF)
• WorkDocs
• WorkSpaces
* As of 2/20/18
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Supported Targets
• Amazon EC2 instances
• AWS Lambda functions
• Streams in Amazon Kinesis Data Streams
• Delivery streams in Amazon Kinesis Data Firehose
• Amazon ECS tasks
• AWS Batch Jobs
• SSM Run Command
• SSM Automation
• Step Functions state machines
• Pipelines in AWS CodePipeline
• AWS CodeBuild projects
• Amazon Inspector assessment templates
• Amazon SNS topics
• Amazon SQS queues
• Built-in targets
• The default event bus of another AWS account
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Not just API
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Putting it all together
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Service Outputs
Service Outputs
WAF CloudWatch Metrics
Shield CloudWatch Metrics
GuardDuty CloudWatch Events
Macie CloudWatch Events
Lambda CloudWatch Logs
Config Config Rules
Inspector CloudWatch Events
Systems Manager CloudWatch Events
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Remediation through CloudWatch Events and LambdaA
Macie Finding
Remediation
Lambda
function
CloudWatch
Event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Remediation through CloudWatch Events and Lambda
Remediation
Lambda
function
GuardDuty
Finding
CloudWatch
Event
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Demo Part 2: GuardDuty to ACL Auto Defense
EC2
instance
GuardDuty CloudWatch
Events
Lambda
Function
WAF
filtering rule
AWS WAF
VPC Network
Access Control List
Amazon
DynamoDB
172.16.1.x
172.16.1.x
172.16.1.x
172.16.1.x
Blocked
Host
State Data
1
2
3
4
5
Amazon
SNS
6
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Multiple Accounts and Aggregation
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Threat Detection and Remediation in Multiple Accounts
• GuardDuty and Macie Support Master / Member accounts
– Centralized Console for many accounts, per region
• CloudWatch Events supports receiving events from multiple accounts through
the Event Bus feature
– All CloudWatch Events across your organization can be sent to an Event Bus owned
by your InfoSec team
• CloudFormation
– All services discussed today support CloudFormation directly or through custom
Lambda resources
– CloudFormation allows you to deploy services discussed today as code
– CloudFormation StackSets allows you to centrally deploy templates across accounts
and regions
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Automation and Aggregation
AWS Lambda
Amazon
CloudWatch Events
GuardDuty
Finding
Amazon
Kinesis Firehose
Amazon ES
Macie
Finding
Inspector
Finding
Amazon S3
Amazon
Athena
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Security Event Pipeline
Kinesis Firehose
Amazon ES
Security
Analysis
SNS Topic
Central Processing
Lambda
Central
CloudWatch
EventBus
Account C
Account B
Account A
Amazon S3
Notification
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Pop-up Loft
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

More Related Content

What's hot

AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Amazon Web Services
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsAmazon Web Services
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWSAmazon Web Services
 
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Amazon Web Services
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Amazon Web Services
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Amazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Amazon Web Services
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Amazon Web Services
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
 
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...Amazon Web Services
 
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...Amazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeAmazon Web Services
 

What's hot (20)

AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
Introducing Managed Rules for AWS WAF (with a Customer Story) - AWS Online Te...
 
Maturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOpsMaturing your organization from DevOps to DevSecOps
Maturing your organization from DevOps to DevSecOps
 
Introduction to DevSecOps on AWS
Introduction to DevSecOps on AWSIntroduction to DevSecOps on AWS
Introduction to DevSecOps on AWS
 
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017Moving from the Shadows to the Throne - SID310 - re:Invent 2017
Moving from the Shadows to the Throne - SID310 - re:Invent 2017
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
A Self-Defending Border: Protect Your Web-Facing Workloads with AWS Security ...
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record Change
 

Similar to Introduction to Threat Detection and Remediation

Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsBela Sojina MBA, PMP
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Amazon Web Services
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksAmazon Web Services
 
Introduction to Serverless Computing and AWS Lambda - AWS IL Meetup
Introduction to Serverless Computing and AWS Lambda - AWS IL MeetupIntroduction to Serverless Computing and AWS Lambda - AWS IL Meetup
Introduction to Serverless Computing and AWS Lambda - AWS IL MeetupBoaz Ziniman
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsAmazon Web Services
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsAmazon Web Services
 
AWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAmazon Web Services
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineAmazon Web Services
 

Similar to Introduction to Threat Detection and Remediation (20)

Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
Living on the Edge, It’s Safer Than You Think! Building Strong with Amazon Cl...
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech TalksCloud-Native DDoS Mitigation - AWS Online Tech Talks
Cloud-Native DDoS Mitigation - AWS Online Tech Talks
 
Introduction to Serverless Computing and AWS Lambda - AWS IL Meetup
Introduction to Serverless Computing and AWS Lambda - AWS IL MeetupIntroduction to Serverless Computing and AWS Lambda - AWS IL Meetup
Introduction to Serverless Computing and AWS Lambda - AWS IL Meetup
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
 
AWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAFAWS reInvent 2017 recap - Managed Rules on AWS WAF
AWS reInvent 2017 recap - Managed Rules on AWS WAF
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Introduction to Threat Detection and Remediation

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Pop-up Loft Introduction to Threat Detection and Remediation on AWS Cameron Worrell Solutions Architect Amazon Web Services
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Agenda • Quick Intro to AWS CAF Security Perspective • Overview of Threat Detection and Remediation on AWS – AWS WAF – AWS Shield – Amazon GuardDuty – Amazon Macie – AWS Lambda – AWS Config – Amazon Inspector – AWS Systems Manager – AWS Secrets Manager – Amazon CloudWatch Events • Putting it all together
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Why is security traditionally so hard? Lack of visibility Low degree of automation
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Cloud Adoption Framework • Each Perspective provides guidance for different parts of an organization • Helps YOU adapt existing practices or introduce new practices for cloud computing
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Directive controls establish the governance, risk, and compliance models the environment will operate within. Preventive controls protect your workloads and mitigate threats and vulnerabilities. Detective controls provide full visibility and transparency over the operation of your deployments in AWS. Responsive controls drive remediation of potential deviations from your security baselines. The AWS CAF Security Perspective Controls
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved The AWS CAF Security Perspective Epics 5 Core Security Epics Identity and Access Management Detective controls Infrastructure security Data protection Incident response
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Threat Detection and Remediation on AWS “Life Uh, Finds a Way” – Ian Malcom
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is a WAF? Web Application Firewall Monitors HTTP/S requests and protects web applications from malicious activities Layer 7 inspection and mitigation tool
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What is AWS WAF? Web traffic filtering with custom rules • Rate based rules • IP Match & Geo-IP filters • Regex & String Match • Size constraints • Action: Allow/Block Malicious request blocking • SQLi • XSS Active monitoring & tuning • CloudWatch Metrics/Alarms • Sampled Logs • Count Action mode
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Where AWS WAF can help Application layer Bad botsDDoS Application attacks HTTP floods Content scrapers Scanners & probes CrawlersSQL injection Application exploits Social engineering AWS WAF
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS WAF benefits Fast incidence response Powerful rule languageEasy to deploy AffordableSecurity automation Managed rules
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Firewall Manager is a security management service to centrally configure and manage web application firewall rules across your accounts and applications. Using Firewall Manager, you can roll out WAF rules all at once for your Application Load Balancers and AWS CloudFront distributions across accounts. AWS Firewall Manager
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Firewall Manager Key Benefits Simplified Management of WAF Rules Integrated with AWS Organizations Centrally managed global rules, and Account-specific rules Ensure Compliance to WAF Rules Ensure entire Organization adheres to mandatory set of rules Apply protection even when new Accounts or resources are created Central Visibility Across Organization Central visibility of WAF threats across Organization Compliance Dashboard for audit firewall status An organization’s InfoSec team learns and operates WAF instead of each Account owner
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Managed rules from security leaders
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS SHIELD Standard Protection Advanced Protection Available to ALL AWS customers at no additional cost Paid service that provides additional protections, features, and benefits
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Automatic defense against the most common network and transport layer DDoS attacks for any AWS resource, in any AWS Region • Comprehensive defense against all known network and transport layer attacks when using Amazon CloudFront and Amazon Route 53 • Application layer defense available when using AWS WAF AWS SHIELD Standard Protection Automatically provided to all AWS customers at no additional cost
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Fast escalation to the AWS DDoS Response Team (DRT) to assist with complex edge cases • Attack visibility and enhanced detection • Cost Protection to mitigate economic attack vectors • AWS WAF for application-layer defense, at no additional cost AWS SHIELD Advanced Protection Available globally on Amazon CloudFront, Amazon Route 53, and in select AWS Regions
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Effective Against: • HTTP Floods • Bad Bots • Suspicious IPs Effective Against: • SSL Attacks • Slowloris • Malformed HTTP Effective Against: • SYN Floods • Reflection Attacks • Suspicious Sources DEFENSE IN DEPTH Border Network Network Layer Mitigations AWS Services Web Layer Mitigations Customer Infrastructure DDoS Detection Internet Internet- Layer Mitigations DDoS Effective Against: • Large-scale attacks Effective Against: • Sophisticated Layer 7 attacks DDoS Response Team
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved What is Amazon GuardDuty? • A threat detection service re-imagined for the cloud • Continuously monitors and protects AWS accounts, along with the applications and services running within them • Detects known and unknown threats • Makes use of artificial intelligence and machine learning • Integrated threat intelligence • Operates on CloudTrail, VPC Flow Logs & DNS • Detailed & Actionable Findings
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Detecting Known Threats Threat intelligence • GuardDuty consumes feeds from various sources • AWS Security • Commercial feeds • Open source feeds • Customer provided threat intel (STIX) • Known malware infected hosts • Anonymizing proxies • Sites hosting malware & hacker tools • Crypto-currency mining pools and wallets • Great catch-all for suspicious & malicious activity
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Detecting Unknown Threats Anomaly detection • Algorithms to detect unusual behavior • Inspecting signal patterns for signatures • Profiling normal and looking at deviations • Machine learning classifiers • Larger R&D effort • Highly skilled data scientists to study data • Develop theoretical detection models • Experiment with implementations • Testing, tuning, and validation
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved What can the service detect? RDP brute force RAT Installed Exfiltrate temp IAM creds over DNS Probe API with temp creds Attempt to compromise account Malicious or suspicious IP Unusual ports DNS exfiltration RDP brute force Unusual traffic volumeConnect to blacklisted site Recon Anonymizing proxy Temp credentials used off-instance Unusual ISP caller Bitcoin activity Unusual instance launch
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • Recon • Port Probe on unprotected port • Outbound port scans • Callers from anonymizing proxies • Backdoor • Spambot or C&C activity detected • Exfiltration over DNS channel • Suspicious domain request • Trojan • DGA Domain Request • Blackhole traffic • DropPoint • Unauthorized Access • Unusual ISP caller • SSH BruteForce • RDP Brute Force • Stealth • Password Policy Change • CloudTrail Logging Disabled • GuardDuty Disabled in member account • CryptoCurrency • Communication with Bitcoin DNS pools • CryptoCurrency related DNS calls • Connections to Bitcoin mining pools Finding Type Categories
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Demo: Alexa “Ask GuardDuty” “Get flash briefing” “Get statistics for Virginia” “Get medium severity findings for Oregon” Amazon Echo Alexa Custom Skill (Lambda) GuardDuty API Finding Statistics and Details “Alexa, Ask GuardDuty” read only “Here is your GuardDuty flash briefing…” 1 2 3 4 5 Alexa Service https://github.com/aws-samples/amazon-guardduty-alexa-sample **Start Demo GuardDuty to ACL Auto Defense
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Demo Part 1: GuardDuty to ACL Auto Defense EC2 instance GuardDuty CloudWatch Events Lambda Function WAF filtering rule AWS WAF VPC Network Access Control List Amazon DynamoDB 172.16.1.x 172.16.1.x 172.16.1.x 172.16.1.x Blocked Host State Data 1 2 3 4 5 Amazon SNS 6
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • AMAZON MACIE • ML-POWERED VISIBILITY SERVICE IDENTIFIES SENSITIVE INFORMATION TO HELP AUTOMATE SECURITY AND COMPLIANCE
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Macie overview Understand your data Natural Language Processing (NLP) Understand data access Predictive User Behavior Analytics (UBA)
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Macie Content Classification • PII and personal data • Source code • SSL certificates, private keys • iOS and Android app signing keys • Database backups • OAuth and Cloud SAAS API Keys
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automated actions on alerts • Simplify with Lambda • Delete the object • Revoke access—bucket or object • Perimeter guard • Update IAM policies • Suspend user
  • 30. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cost-effective and efficient No infrastructure to manage Pay only for what you use Bring your own code Productivity-focused compute service to build powerful, dynamic, modular applications in the cloud Run code in standard languages Focus on business logic Benefits of AWS Lambda 1 2 3
  • 31. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Lambda: Run Code in Response to Events FUNCTION SERVICES (ANYTHING) Changes in data state Requests to endpoints Changes in resource state Node Python Java C# EVENT SOURCE
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved • A W S C o n f i g a n d • A W S C o n f i g R u l e s • A W S C l o u d T r a i l a n d • A m a z o n C l o u d W a t c h L o g s Active Auditing with AWS Lambda
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Config & AWS Config Rules • A continuous recording and continuous assessment service Changing resources AWS Config Config Rules History, Snapshot Notifications API Access Normalized Answer the questions: How are my resources configured over time? Is a change that just occurred to a resource, compliant? Multi-Account, Multi-Region Data Aggregation
  • 34. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Lambda as Auditor App Account 1 App Account n Security Team Account
  • 35. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Amazon Inspector • Vulnerability Assessment Service – Built from the ground up to support DevSecOps – Automatable via APIs – Integrates with CI/CD tools – On-Demand Pricing model – Static & Dynamic Rules Packages – Generates Findings
  • 36. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Amazon Inspector • Rules Packages – Common Vulnerabilities & Exposures – CIS Operating System Security Configuration Benchmarks – Security Best Practices – Runtime Behavior Analysis
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automating Remediation • Findings are JSON formatted and taggable • Name of assessment target & template • Start time, end time, status • Name of rule packages • Name & severity of the finding • Description & remediation steps • Lamd-ify your incident response • Integrate with Jira-like services • Integrate with Pagerduty-like services
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Systems Manager • A set of capabilities that: • enable automated configuration • support ongoing management of systems at scale • work across all of your Windows and Linux workloads • run in Amazon EC2 or on-premises • carry no additional charge to use
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Why should I care? Support for hybrid Architecture Cross-platform Scalable Secure Easy-to-write automation Expected Reduction in Total Cost of Ownership (TCO)
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Systems Manager capabilities state manager maintenance window inventory automation parameter store run command patch manager
  • 41. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Introducing AWS Secrets Manager Lifecycle management for secrets such as database credentials and API keys. Rotate Secrets Safely Pay as you goManage access with fine-grained policies Secure and audit secrets centrally
  • 42. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved AWS Secrets Manager Key Features Safe rotation of secrets Built-in integrations, extensible with Lambda On-demand or automatic rotation with versioning Fine-grained access policies Encrypted storage Logging and monitoring
  • 43. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved CloudWatch Events • Delivers a near real-time stream of system events that describe changes in Amazon Web Services (AWS) resources. • Using simple rules, you can match events and route them to one or more target functions or streams. • CloudWatch Events becomes aware of operational changes as they occur and responds to these operational changes and takes corrective action as necessary, by sending messages to respond to the environment, activating functions, making changes, and capturing state information.
  • 44. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Supported Services • AWS CodeStar • AWS Console Sign-In • Auto Scaling • Batch • Certificate Manager • Chime • Cloud Directory • CloudFormation • CloudFront • CloudHSM • CloudSearch • CloudTrail • CloudWatch Events • CloudWatch Logs • CodeBuild • CodeCommit • CodeDeploy • CodePipeline • Cognito Identity • Cognito Sync • Cognito User Pool • Config • Data Pipeline • Database Migration Service • Direct Connect • Directory Service • DynamoDB • EC2 • EC2 Container Registry • EC2 Container Service (ECS) • EC2 Simple Systems Manager (SSM) • EMR • ElastiCache • Elastic Beanstalk • Elastic File System (EFS) • Elastic Load Balancing • Elastic Map Reduce (EMR) • Elastic Transcoder • Elasticsearch • Gamelift • Glacier • Glue • GuardDuty • Health • IAM • Inspector • IoT • Key Management Service (KMS) • Kinesis • Kinesis Firehose • Lambda • Machine Learning • Macie • Managed Services • MediaConvert • MediaLive • Metering Marketplace • Monitoring • OpsWorks • OpsWorks for Chef Automate • Organizations • Polly • RedShift • Relational Database Service (RDS) • Route 53 • Security Token Service (STS) • Server Migration Service (SMS) • Service Catalog • Simple Email Service (SES) • Simple Notification Service (SNS) • Simple Queue Service (SQS) • Simple Storage Service (S3) • Simple Workflow Service (SWF) • Step Functions • Storage Gateway • Support • Trusted Advisor • WAF Regional • Web Application Firewall (WAF) • WorkDocs • WorkSpaces * As of 2/20/18
  • 45. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Supported Targets • Amazon EC2 instances • AWS Lambda functions • Streams in Amazon Kinesis Data Streams • Delivery streams in Amazon Kinesis Data Firehose • Amazon ECS tasks • AWS Batch Jobs • SSM Run Command • SSM Automation • Step Functions state machines • Pipelines in AWS CodePipeline • AWS CodeBuild projects • Amazon Inspector assessment templates • Amazon SNS topics • Amazon SQS queues • Built-in targets • The default event bus of another AWS account
  • 46. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Not just API
  • 47. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Putting it all together
  • 48. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Service Outputs Service Outputs WAF CloudWatch Metrics Shield CloudWatch Metrics GuardDuty CloudWatch Events Macie CloudWatch Events Lambda CloudWatch Logs Config Config Rules Inspector CloudWatch Events Systems Manager CloudWatch Events
  • 49. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Remediation through CloudWatch Events and LambdaA Macie Finding Remediation Lambda function CloudWatch Event
  • 50. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Remediation through CloudWatch Events and Lambda Remediation Lambda function GuardDuty Finding CloudWatch Event
  • 51. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Demo Part 2: GuardDuty to ACL Auto Defense EC2 instance GuardDuty CloudWatch Events Lambda Function WAF filtering rule AWS WAF VPC Network Access Control List Amazon DynamoDB 172.16.1.x 172.16.1.x 172.16.1.x 172.16.1.x Blocked Host State Data 1 2 3 4 5 Amazon SNS 6
  • 52. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Multiple Accounts and Aggregation
  • 53. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Threat Detection and Remediation in Multiple Accounts • GuardDuty and Macie Support Master / Member accounts – Centralized Console for many accounts, per region • CloudWatch Events supports receiving events from multiple accounts through the Event Bus feature – All CloudWatch Events across your organization can be sent to an Event Bus owned by your InfoSec team • CloudFormation – All services discussed today support CloudFormation directly or through custom Lambda resources – CloudFormation allows you to deploy services discussed today as code – CloudFormation StackSets allows you to centrally deploy templates across accounts and regions
  • 54. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Automation and Aggregation AWS Lambda Amazon CloudWatch Events GuardDuty Finding Amazon Kinesis Firehose Amazon ES Macie Finding Inspector Finding Amazon S3 Amazon Athena
  • 55. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Security Event Pipeline Kinesis Firehose Amazon ES Security Analysis SNS Topic Central Processing Lambda Central CloudWatch EventBus Account C Account B Account A Amazon S3 Notification
  • 56. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Pop-up Loft aws.amazon.com/activate Everything and Anything Startups Need to Get Started on AWS