Top Banner
Architecting for Greater Security Carlos Conde Technology Evangelist
74

Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

May 21, 2018

Download

Documents

truongkhue
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Architecting for Greater Security

Carlos Conde – Technology Evangelist

Page 2: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

5 WHYs

Page 3: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

1. Why does security come first in

enterprise cloud adoption?

New territory Security is hardAWS job zero

Page 4: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

2. Why is enterprise security

traditionally so hard?

Change controlCompliance planning

Page 5: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

3. Why so much planning which

takes so long?

So many processes Built-in pausesSo many hand-offs

Page 6: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Processes detect

unwanted change

Reduce impact

of failure

Visibility & control

are essential

4. Why so many processes?

Page 7: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

No stimulus

and response

Low degree

of automation

Lack of

visibility

5. Why are change detection and low-risk

changes are so difficult?

Page 8: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

So where does AWS come in?

AWS makes

security faster

Lets you move fast

but stay safe

Page 9: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

LEAST PRIVILEGE PRINCIPLE

Confine roles only to the material

required to do specific work

Page 10: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

AWS IAM

Identity & Access Management.

Control who does what in your AWS account with

fine-grained policies.

Page 11: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 12: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 13: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 14: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 15: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

LEAST PRIVILEGE PRINCIPLE

Confine network access only to the nodes

required to do specific work

Page 16: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 17: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 18: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 19: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 20: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 21: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 22: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 23: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 24: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 25: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 26: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

DATA PROTECTION PRINCIPLE

Protect data in transit & at rest

Page 27: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

ENCRYPT YOUR DATAAMAZON EMR

AMAZON S3 SSE

AMAZON GLACIER

AMAZON REDSHIFT

AMAZON RDS

Page 28: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

CHOOSE THE RIGHT MODEL

FOR YOUR NEEDS

Automated – AWS manages encryption

Enabled – user manages encryption using AWS

Client-side – user manages encryption using their own mean

Page 29: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

AWS Private Key Management Capabilities

AWS CloudHSMDedicated HSM appliances

Managed and monitored by

AWS, but you control the keys

Increase performance for

applications that use HSMs for

key storage or encryption

Comply with stringent

regulatory and contractual

requirements for key protection

EC2 InstanceAWS CloudHSM

Page 30: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

VISIBILITY PRINCIPLE

You can’t protect what you don’t know about

Page 31: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 32: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 33: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

LOG FILES

Obtained, Analysed, Retained

Page 34: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 35: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 36: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

AWS CloudWatch Logs

Page 37: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

You are making

API calls...On a growing set of

services around the

world…

CloudTrail is

continuously

recording API

calls…

And delivering

log files to you

AWS CloudTrail

Page 38: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 39: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

PROTECT YOUR LOGS WITH IAM

ARCHIVE YOUR LOGS

Page 40: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 41: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 42: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

AWS Config

System change deltas time series

Page 43: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Continuous ChangeRecordingChanging

Resources

AWS Config

History

Stream

Snapshot (ex. 2014-11-05)

AWS Config

Page 44: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 45: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 46: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 47: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 48: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

MAKE SECURITY ACTIONABLE

Automate log reviews with AWS Lambda.

Automatically shutdown non-compliant instances.

Validate changes.

Rollback unapproved changes.

Page 49: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 50: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 51: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

CONTINUOUS DEPLOYMENT

FOR SECURITY

Automated deployments are more secure.

Enables “SSH-less” production environments.

Rapid deployment of security fixes.

Use AWS CodeDeploy.

Page 52: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

AWS Assurance Programs

aws.amazon.com / compliance

Page 53: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

“… We’ll also see organizations adopt cloud

services for the improved security protections

and compliance controls that they otherwise

could not provide as efficiently or effectively

themselves.”

Security’s Cloud Revolution is Upon Us

Forrester Research, Inc., August 2, 2013

Page 54: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Co-Founder

Page 55: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 56: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Ohpen is a platform ‘out-of-the-box’ and offers financial service providers a fully integrated, multilingual, web-, front-, mid- and back-end solution for mutual funds and savings accounts.

Page 57: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Ohpen enabled the first bank in the world to go to

the cloud. All-in!

Page 58: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

We are extinguishing legacy software by developing the best mutual fund and savings platform in the world.

The financial services industry shall be freed from on premise legacy software by cloud based administration factories, where you just plug in.

Page 59: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

59

Page 60: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

60

Page 61: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 62: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

62

Page 63: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 64: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Page 65: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 66: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 67: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Page 68: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored
Page 69: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

@

Page 70: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

“Based on our experience,

I believe that we can be even

more secure in the AWS cloud

than in our own data centers”

Tom Soderstrom – CTO – NASA JPL

Page 71: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

MORE AUDITABILITY

MORE VISIBILITY

MORE CONTROL

Page 72: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

aws.amazon.com/security

Page 73: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

Please rate this session & provide your feedback

Download the AWS Summit App

AWS Summit 2015

#AWSSummit@AWS_UKI

Page 74: Architecting for Greater Security - Cloud Object Storage | …€¦ ·  · 2015-04-30AWS Private Key Management Capabilities AWS CloudHSM Dedicated HSM appliances Managed and monitored

LONDON