SlideShare a Scribd company logo
1 of 40
Download to read offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lean and clean SecOps using AWS
native services cloud
Ramesh Adabala
Solutions Architect
Amazon Web Services
S D D 3 0 1
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Security reference architecture
Security baseline using AWS landing zone
Additional security baseline items
Application security
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Layered security on AWS
AWS Compliance
Program
Third-Party
Attestations
Compliance
VPC Configuration
Security Groups
Network
Network & Web App
Firewalls
Encryption
In-Transit
Hardened AMIs
OS and App
Patch Mgmt.
AWS Identity and
Access Management
(IAM) Roles for Amazon
EC2
Bastion Hosts
HostSecurity
Data Classification
Key Management
Encryption
At-Rest
DataSecurity
Identity & Access
Management Security Operations & Audit
Third-Party
Attestations
1
2
3
4
5 6
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Layered security – AWS Services
1
2
3
4
5
6
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is the NIST Cybersecurity Framework?
7
Executive Order
Presidential
Executive Order
13636, “Improving
Critical Infrastructure
Cybersecurity,”
charges NIST in Feb.
2013
Legislation
Cybersecurity
Enhancement Act of
2014 reinforced the
legitimacy and
authority of the CSF
by codifying it and its
voluntary adoption
into law
In February 2014, the National
Institute of Standards and Technology
(NIST) published the “Framework for
Improving Critical Infrastructure
Cybersecurity” (or CSF), a voluntary
framework to help organizations of
any size and sector improve the
cybersecurity, risk management, and
resilience of their systems.
Originally intended for critical
infrastructure, but broader
applicability across all organization
types.
Executive Order
Presidential EO 13800,
“Strengthening the
Cybersecurity of
Federal Networks and
Critical Infrastructure”
mandates the use of
CSF for all federal IT
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Aligning to AWS services
Identify
Protect
DetectRespond
Recover
What processes and
assets need protection?
What safeguards
are available?
What techniques can
identify incidents?
What techniques can
contain impacts of
incidents?
What techniques can
restore capabilities?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
NIST CSF–based security reference architecture
Protect Detect Respond
Automate
Investigate
RecoverIdentify
ArchiveSnapshot
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security baseline reference architecture - checklist
Centralized logging
Centralized VPC management Centralized IAM role management
Centralized Config Rules
Centralized GuardDuty
Centralized WAF
Centralized AMI build
Centralized Macie
Centralized monitoring
Centralized SecurityHub
Network security
Infrastructure security
Centralized Inspector
Centralized patching
Data protection
Identity
Security operations
Compliance
Centralized Access federation
Centralized Config
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS landing zone structure — basic
Amazon S3 Bucket
(manifest file)
AWS CodePipeline
AWS
Service Catalog
Account
Baseline
Core OU
AWS SSOOrganizations
Organizations account
shared services account log archive account
Account
Baseline
security account
Network
Baseline
Account
Baseline
Aggregate
CloudTrail and
AWS Config
Logs
Account
Baseline
Security Cross-
Account Roles
Security
Notifications
Organizations account
• Account provisioning
• Account access (AWS SSO)
Shared services account
• Active directory
• Log analytics
Log archive
• Security logs
Security account
• Audit/Break-glassGuardDuty Master
Parameter
Store
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Account vending machine
AWS
Service Catalog
Account vending machine (AWS Service Catalog)
• Account creation factory
• User interface to create new accounts
• Account baseline versioning
• Launch constraints
Creates/updates AWS account
Apply account baseline stack sets
Create network baseline
Apply account security control policy
Account vending
machine
Organizations
Security
AWS
Log Archive
AWS
Shared Services
AWS
AWS
New AWS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Multi-account approach
Developer
Sandbox
Dev Pre-Prod
Team/Group Accounts
Security
Core Accounts
Organizations
Shared
Services
Network
Log Archive Prod
Team Shared
Services
Optional Network Path
Network Path Log Flow
Data CenterDeveloper Accounts
Orgs: Account management
Log Archive: Security logs
Shared Services: Directory, limit monitoring
Network: AWS Direct Connect
Dev Sandbox: Experiments, learning
Dev: Development
Pre-Prod: Staging
Prod: Production
Team SS: Team shared services, data lake
Security: Security Tooling: GuardDuty, AWS
Firewall Manager, Amazon Inspector, Security
Hub, ELK dashboard
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security baseline reference architecture - checklist
Centralized logging
Centralized VPC management Centralized IAM role management
Centralized Config Rules
Centralized GuardDuty
Centralized WAF
Centralized AMI build
Centralized Macie
Centralized monitoring
Centralized SecurityHub
Network Security
Infrastructure security
Centralized Inspector
Centralized patching
Data protection
Identity
Security Operations
Compliance
Centralized Access federation
Centralized Config
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized AMI management – GoldenAMIPipeline
https://d1.awsstatic.com/whitepapers/aws-building-ami-factory-process-using-ec2-ssm-marketplace-and-service-catalog.pdf
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vulnerability assessment and patch management
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized patch management using SSM
https://aws.amazon.com/blogs/mt/tcs-hybrid-cloud-patch-management-at-scale-using-aws-systems-manager/
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized Macie
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Centralized WAF
Users
Dynamic web
application
Amazon S3 Bucket
for staticcontent
Amazon
CloudFront
Amazon
Route 53
Amazon VPC
Amazon
CloudFront
Amazon
Route 53
AWS
WAF
AWS Firewall Manager
AWS
WAF
AWS Shield
AWS Shield
Dynamic web
application
Amazon S3 Bucket
for staticcontent
Amazon VPC
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security baseline reference architecture - checklist
Centralized logging
Centralized VPC management Centralized IAM role management
Centralized Config Rules
Centralized GuardDuty
Centralized WAF
Centralized AMI build
Centralized Macie
Centralized monitoring
Centralized SecurityHub
Network Security
Infrastructure security
Centralized Inspector
Centralized patching
Data protection
Identity
Security Operations
Compliance
Centralized Access federation
Centralized Config
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Monitoring
Amazon
Inspector
Macie
GuardDuty
Security Hub
AWS
Shield
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
√
AWS
WAF
AWS
Firewall
Manager
Perimeter Protection External Security Services
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security baseline reference architecture - checklist
Centralized logging
Centralized VPC management Centralized IAM role management
Centralized Config Rules
Centralized GuardDuty
Centralized WAF
Centralized AMI build
Centralized Macie
Centralized monitoring
Centralized SecurityHub
Network Security
Infrastructure security
Centralized Inspector
Centralized patching
Data protection
Identity
Security Operations
Compliance
Centralized Access federation
Centralized Config
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Foundational VPC
Public Web Subnet
Availability Zone 1 Availability Zone 2
Public Web Subnet
Private Database Subnet
Private Application SubnetPrivate Application Subnet
Private Database Subnet
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Compute services for your workloads
• VMs
• Machine as the unit of scale
• Abstracts the hardware
• Containers
• Application as the unit of scale
• Abstracts the OS
• Serverless
• Functions as the unit of scale
• Abstracts the language runtime
Amazon ECS/EKS
Amazon EC2
AWS Lambda
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sample infrastructure/ application deployed VPC
Public web subnet
Availability zone 1 Availability zone 2
Public web subnet
Private database subnet
Private application subnetPrivate application subnet
Private database subnet
Amazon
Route 53User
Amazon
CloudFront
AWS WAF
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical application/API layers
Mobile apps
Websites
Services
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical application/API Security requirements
Mobile apps
Websites
Services
(CloudFront,
ALB/ELB/API
Gateway)
(RDS/Aurora/Dyna
moDB/S3)
(EC2/Containers/La
mbda)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Typical application/API Security – AWS Services
Mobile apps
Websites
Services
(CloudFront,
ALB/ELB/API
Gateway)
(RDS/Aurora/Dyna
moDB/S3)
(EC2/Containers/La
mbda)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Continuousdeliverypipeline
Application
Infrastructure
Code
Production
QA
Development
Version
Control
Testing
Tools & processes
Security
ArtifactsBuild Deployment
- Blue / Green (app)
- Automation (infra)
Pipeline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Source Build Deploy Test/Monitor
Release Steps
CodeCommit
CodeBuild CodeDeploy
AWS CodePipeline
Application
Infrastructure
Systems manager
Automation
CloudFormation Inspector Lambda
DevSecOps CI/CD pipeline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementation references
Acceptance
(Engineering)
Commit
(Github)
Capacity
(Test)
Production
Static code analysis:
• Stelligent: CFN-NAG
• AWS re:Invent 2016: 5 Security
Automation Improvements
Dynamic analysis:
CIS controls:
https://d0.awsstatic.com/whitepapers/co
mpliance/AWS_CIS_Foundations_Bench
mark.pdf
IAM policy validations:
• Critical resources
• Powerful Actions
Unit tests and Integration tests:
• Sample tests blog
Network testing:
• SSH testing
• Pen testing
• OS validations
Ongoing monitoring:
CIS controls:
https://d0.awsstatic.com/whitepapers/c
ompliance/AWS_CIS_Foundations_Benc
hmark.pdf
IAM policy validations:
• Critical resources
• Powerful Actions
• https://d0.awsstatic.com/whitepap
ers/compliance/AWS_Auditing_Sec
urity_Checklist.pdf
• Security self-healing:
http://docs.aws.amazon.com/AWSE
C2/latest/WindowsGuide/systems-
manager-state.html
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Sample infrastructure/ application deployed VPC
Public web subnet
Availability zone 1 Availability zone 2
Public web subnet
Private database subnet
Private application subnetPrivate application subnet
Private database subnet
Amazon
Route 53User
Amazon
CloudFront
AWS WAF
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018
Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018
Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018Amazon Web Services
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance John Varghese
 
Day 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesDay 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesAmazon Web Services
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Ravindra Dastikop
 
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンス
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンスAWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンス
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンスAmazon Web Services Japan
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingAmazon Web Services
 
An Introduction to AWS
An Introduction to AWSAn Introduction to AWS
An Introduction to AWSIan Massingham
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Amazon Web Services
 
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Amazon Web Services
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityOry Segal
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecuritySounil Yu
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and ComplianceKarina Matos
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...Amazon Web Services Korea
 

What's hot (20)

Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018
Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018
Oracle to Amazon Aurora Migration, Step by Step (DAT435-R1) - AWS re:Invent 2018
 
Fundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWSFundamentals of Cloud Computing & AWS
Fundamentals of Cloud Computing & AWS
 
cloud computing Multi cloud
cloud computing Multi cloudcloud computing Multi cloud
cloud computing Multi cloud
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 
Day 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesDay 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web Services
 
Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)Infrastructure as a Service ( IaaS)
Infrastructure as a Service ( IaaS)
 
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンス
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンスAWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンス
AWS Black Belt Techシリーズ リザーブドインスタンス & スポットインスタンス
 
Data Design for Microservices
Data Design for MicroservicesData Design for Microservices
Data Design for Microservices
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud Computing
 
An Introduction to AWS
An Introduction to AWSAn Introduction to AWS
An Introduction to AWS
 
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
Introduction to the Well-Architected Framework and Tool - SVC212 - Chicago AW...
 
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
Automated Solution for Deploying AWS Landing Zone (GPSWS407) - AWS re:Invent ...
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
 
Realizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application SecurityRealizing the Full Potential of Cloud-Native Application Security
Realizing the Full Potential of Cloud-Native Application Security
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of SecurityDistributed Immutable Ephemeral - New Paradigms for the Next Era of Security
Distributed Immutable Ephemeral - New Paradigms for the Next Era of Security
 
Azure security and Compliance
Azure security and ComplianceAzure security and Compliance
Azure security and Compliance
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
 
Cost Optimization on AWS
Cost Optimization on AWSCost Optimization on AWS
Cost Optimization on AWS
 

Similar to Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Inforce 2019

AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & LearnAmazon Web Services
 
Landing Zone: Como ter certeza que sua Fundação está preparada
Landing Zone: Como ter certeza que sua Fundação está preparadaLanding Zone: Como ter certeza que sua Fundação está preparada
Landing Zone: Como ter certeza que sua Fundação está preparadaAmazon Web Services LATAM
 
AWS Initiate - Landing Zone: Como saber se sua base está preparada
AWS Initiate - Landing Zone: Como saber se sua base está preparadaAWS Initiate - Landing Zone: Como saber se sua base está preparada
AWS Initiate - Landing Zone: Como saber se sua base está preparadaAmazon Web Services LATAM
 
Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Amazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWSNathan Case
 
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...Amazon Web Services
 
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019 Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019 Amazon Web Services
 
Architecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentArchitecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentAmazon Web Services
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Amazon Web Services
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftAmazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Amazon Web Services LATAM
 

Similar to Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Inforce 2019 (20)

AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
AWS PROTECTED Certification - Lunch & Learn
  AWS PROTECTED Certification - Lunch & Learn  AWS PROTECTED Certification - Lunch & Learn
AWS PROTECTED Certification - Lunch & Learn
 
Landing Zone: Como ter certeza que sua Fundação está preparada
Landing Zone: Como ter certeza que sua Fundação está preparadaLanding Zone: Como ter certeza que sua Fundação está preparada
Landing Zone: Como ter certeza que sua Fundação está preparada
 
AWS Initiate - Landing Zone: Como saber se sua base está preparada
AWS Initiate - Landing Zone: Como saber se sua base está preparadaAWS Initiate - Landing Zone: Como saber se sua base está preparada
AWS Initiate - Landing Zone: Como saber se sua base está preparada
 
Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019 Implementing your landing zone - FND210 - AWS re:Inforce 2019
Implementing your landing zone - FND210 - AWS re:Inforce 2019
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
In the cloud, the name of the game is securability! - SEP303 - AWS re:Inforce...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019 Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
Leadership session: Aspirational security - SEP318-L - AWS re:Inforce 2019
 
Architecting security & governance across your AWS environment
Architecting security & governance across your AWS environmentArchitecting security & governance across your AWS environment
Architecting security & governance across your AWS environment
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Lean and clean SecOps using AWS native services cloud Ramesh Adabala Solutions Architect Amazon Web Services S D D 3 0 1
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Security reference architecture Security baseline using AWS landing zone Additional security baseline items Application security
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Layered security on AWS AWS Compliance Program Third-Party Attestations Compliance VPC Configuration Security Groups Network Network & Web App Firewalls Encryption In-Transit Hardened AMIs OS and App Patch Mgmt. AWS Identity and Access Management (IAM) Roles for Amazon EC2 Bastion Hosts HostSecurity Data Classification Key Management Encryption At-Rest DataSecurity Identity & Access Management Security Operations & Audit Third-Party Attestations 1 2 3 4 5 6
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Layered security – AWS Services 1 2 3 4 5 6
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. What is the NIST Cybersecurity Framework? 7 Executive Order Presidential Executive Order 13636, “Improving Critical Infrastructure Cybersecurity,” charges NIST in Feb. 2013 Legislation Cybersecurity Enhancement Act of 2014 reinforced the legitimacy and authority of the CSF by codifying it and its voluntary adoption into law In February 2014, the National Institute of Standards and Technology (NIST) published the “Framework for Improving Critical Infrastructure Cybersecurity” (or CSF), a voluntary framework to help organizations of any size and sector improve the cybersecurity, risk management, and resilience of their systems. Originally intended for critical infrastructure, but broader applicability across all organization types. Executive Order Presidential EO 13800, “Strengthening the Cybersecurity of Federal Networks and Critical Infrastructure” mandates the use of CSF for all federal IT
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Aligning to AWS services Identify Protect DetectRespond Recover What processes and assets need protection? What safeguards are available? What techniques can identify incidents? What techniques can contain impacts of incidents? What techniques can restore capabilities?
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. NIST CSF–based security reference architecture Protect Detect Respond Automate Investigate RecoverIdentify ArchiveSnapshot
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security baseline reference architecture - checklist Centralized logging Centralized VPC management Centralized IAM role management Centralized Config Rules Centralized GuardDuty Centralized WAF Centralized AMI build Centralized Macie Centralized monitoring Centralized SecurityHub Network security Infrastructure security Centralized Inspector Centralized patching Data protection Identity Security operations Compliance Centralized Access federation Centralized Config
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS landing zone structure — basic Amazon S3 Bucket (manifest file) AWS CodePipeline AWS Service Catalog Account Baseline Core OU AWS SSOOrganizations Organizations account shared services account log archive account Account Baseline security account Network Baseline Account Baseline Aggregate CloudTrail and AWS Config Logs Account Baseline Security Cross- Account Roles Security Notifications Organizations account • Account provisioning • Account access (AWS SSO) Shared services account • Active directory • Log analytics Log archive • Security logs Security account • Audit/Break-glassGuardDuty Master Parameter Store
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Account vending machine AWS Service Catalog Account vending machine (AWS Service Catalog) • Account creation factory • User interface to create new accounts • Account baseline versioning • Launch constraints Creates/updates AWS account Apply account baseline stack sets Create network baseline Apply account security control policy Account vending machine Organizations Security AWS Log Archive AWS Shared Services AWS AWS New AWS
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Multi-account approach Developer Sandbox Dev Pre-Prod Team/Group Accounts Security Core Accounts Organizations Shared Services Network Log Archive Prod Team Shared Services Optional Network Path Network Path Log Flow Data CenterDeveloper Accounts Orgs: Account management Log Archive: Security logs Shared Services: Directory, limit monitoring Network: AWS Direct Connect Dev Sandbox: Experiments, learning Dev: Development Pre-Prod: Staging Prod: Production Team SS: Team shared services, data lake Security: Security Tooling: GuardDuty, AWS Firewall Manager, Amazon Inspector, Security Hub, ELK dashboard
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security baseline reference architecture - checklist Centralized logging Centralized VPC management Centralized IAM role management Centralized Config Rules Centralized GuardDuty Centralized WAF Centralized AMI build Centralized Macie Centralized monitoring Centralized SecurityHub Network Security Infrastructure security Centralized Inspector Centralized patching Data protection Identity Security Operations Compliance Centralized Access federation Centralized Config
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Centralized AMI management – GoldenAMIPipeline https://d1.awsstatic.com/whitepapers/aws-building-ami-factory-process-using-ec2-ssm-marketplace-and-service-catalog.pdf
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vulnerability assessment and patch management
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Centralized patch management using SSM https://aws.amazon.com/blogs/mt/tcs-hybrid-cloud-patch-management-at-scale-using-aws-systems-manager/
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Centralized Macie
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Centralized WAF Users Dynamic web application Amazon S3 Bucket for staticcontent Amazon CloudFront Amazon Route 53 Amazon VPC Amazon CloudFront Amazon Route 53 AWS WAF AWS Firewall Manager AWS WAF AWS Shield AWS Shield Dynamic web application Amazon S3 Bucket for staticcontent Amazon VPC
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security baseline reference architecture - checklist Centralized logging Centralized VPC management Centralized IAM role management Centralized Config Rules Centralized GuardDuty Centralized WAF Centralized AMI build Centralized Macie Centralized monitoring Centralized SecurityHub Network Security Infrastructure security Centralized Inspector Centralized patching Data protection Identity Security Operations Compliance Centralized Access federation Centralized Config
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Monitoring Amazon Inspector Macie GuardDuty Security Hub AWS Shield √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ √ AWS WAF AWS Firewall Manager Perimeter Protection External Security Services
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security baseline reference architecture - checklist Centralized logging Centralized VPC management Centralized IAM role management Centralized Config Rules Centralized GuardDuty Centralized WAF Centralized AMI build Centralized Macie Centralized monitoring Centralized SecurityHub Network Security Infrastructure security Centralized Inspector Centralized patching Data protection Identity Security Operations Compliance Centralized Access federation Centralized Config
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Foundational VPC Public Web Subnet Availability Zone 1 Availability Zone 2 Public Web Subnet Private Database Subnet Private Application SubnetPrivate Application Subnet Private Database Subnet
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Compute services for your workloads • VMs • Machine as the unit of scale • Abstracts the hardware • Containers • Application as the unit of scale • Abstracts the OS • Serverless • Functions as the unit of scale • Abstracts the language runtime Amazon ECS/EKS Amazon EC2 AWS Lambda
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Sample infrastructure/ application deployed VPC Public web subnet Availability zone 1 Availability zone 2 Public web subnet Private database subnet Private application subnetPrivate application subnet Private database subnet Amazon Route 53User Amazon CloudFront AWS WAF
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical application/API layers Mobile apps Websites Services
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical application/API Security requirements Mobile apps Websites Services (CloudFront, ALB/ELB/API Gateway) (RDS/Aurora/Dyna moDB/S3) (EC2/Containers/La mbda)
  • 35. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Typical application/API Security – AWS Services Mobile apps Websites Services (CloudFront, ALB/ELB/API Gateway) (RDS/Aurora/Dyna moDB/S3) (EC2/Containers/La mbda)
  • 36. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Continuousdeliverypipeline Application Infrastructure Code Production QA Development Version Control Testing Tools & processes Security ArtifactsBuild Deployment - Blue / Green (app) - Automation (infra) Pipeline
  • 37. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Source Build Deploy Test/Monitor Release Steps CodeCommit CodeBuild CodeDeploy AWS CodePipeline Application Infrastructure Systems manager Automation CloudFormation Inspector Lambda DevSecOps CI/CD pipeline
  • 38. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementation references Acceptance (Engineering) Commit (Github) Capacity (Test) Production Static code analysis: • Stelligent: CFN-NAG • AWS re:Invent 2016: 5 Security Automation Improvements Dynamic analysis: CIS controls: https://d0.awsstatic.com/whitepapers/co mpliance/AWS_CIS_Foundations_Bench mark.pdf IAM policy validations: • Critical resources • Powerful Actions Unit tests and Integration tests: • Sample tests blog Network testing: • SSH testing • Pen testing • OS validations Ongoing monitoring: CIS controls: https://d0.awsstatic.com/whitepapers/c ompliance/AWS_CIS_Foundations_Benc hmark.pdf IAM policy validations: • Critical resources • Powerful Actions • https://d0.awsstatic.com/whitepap ers/compliance/AWS_Auditing_Sec urity_Checklist.pdf • Security self-healing: http://docs.aws.amazon.com/AWSE C2/latest/WindowsGuide/systems- manager-state.html
  • 39. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Sample infrastructure/ application deployed VPC Public web subnet Availability zone 1 Availability zone 2 Public web subnet Private database subnet Private application subnetPrivate application subnet Private database subnet Amazon Route 53User Amazon CloudFront AWS WAF
  • 40. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.