Top Banner
November 14, 2014 | Las Vegas, NV Travell Perkins, Fidelity
42

(FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Jun 29, 2015

Download

Technology

Data security is a paramount concern for financial services firms. This session discusses how Fidelity Investments use Amazon S3 with server-side encryption with customer-provided keys (SSE-C) to protect critical information and the firm's use of other AWS services, which include AWS Elastic Beanstalk, Elastic Load Balancer, and Amazon DynamoDB. Fidelity Investments is one of the largest mutual fund and financial services groups in the world. Fidelity manages a large family of mutual funds, provides fund distribution and investment advice services, and also provides discount brokerage services, retirement services,wealth management, securities execution and clearance, life insurance and a number of other services.
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

November 14, 2014 | Las Vegas, NV

Travell Perkins, Fidelity

Page 2: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 3: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 4: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 5: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 6: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 7: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 8: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

•Virtual asset transfer (inheritance)

Page 9: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 10: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 11: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Amazon

Amazon ELB

Twilio Server

DSM DSMCloudant Cloudant

CloudFiles Twilio Server

S3 S3

EC2 Auto Scaling Group

Application Server

Application Server

Application Server

Page 12: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 13: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Generates encryption keys using AES-256 Cipher. The keys are used to

encrypt/decrypt files.

(DynamicSecurityModule - PHP Service/FidelityVDC)

Documents and data are encrypted for persistent storage and decrypted for

presentation layer

(Core Service/Node.JS/AWS EC2)

Customer facing interface to upload/

download documents

(Javascript, EC2)

Sends emails for Account Signup,

Password Resets, File Sharing Notices etc.

(Simple Email Service)

Register new users, password resets, user profile management

(Core Service/Node.JS/AWS EC2)

Get Encryption Key

Encrypted documents

(S3)

Store Encrypted Documents and meta- Data

Notify users

Redundant document

storage

(CloudFiles)

Document Meta-data is stored. Customer accounts info is also

stored.(Cloudant)

Add a new user, manage users

Register User, Authenticate users

Admin interface to manage system users

(Javascript, EC2)

SMS/Voice for multi-factor authentication

(Twilio)

Authenticate & Authorize

(Core Service/Node.JS/AWS EC2)

Is the user a valid user?

Manage Users/Admins

Customers Admins

Encrypt and Store Documents, Get Customer Documents

Send Email to users

Send Email to users

Upload/DownloadDocuments

Manage Admin Users

Page 14: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 15: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 16: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 17: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 18: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 19: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 20: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 21: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 22: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 23: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 24: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 25: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 26: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 27: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 28: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 29: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Component Threat Protocol A.S. Mitigation

All data flows TID HTTPS Various SSL/TLS everywhere

Page 30: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Component Threat Mitigation

EndUser S Form Authentication; Multi-factor Authentication

RD Not Applicable

Admin (Jump

Box)

S SSH UserName/Password; Multi-factor Authentication

RD Not Applicable

Twilio S Shared Access Key

RD No fallback SMS service. But Fidsafe Auth falls back to

Security Questions.

SES (Email) S Shared Access Key

RD No fallback. Messages are sent async.

Page 31: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Component Threat Mitigation

DSM S HTTPS SSL Server Authentication

E Low Privileged Account

TRID All PHP files are read only (for non-root) and owned by root

Core Service S HTTPS SSL/TLS Server Authentication

E Low Privileged Account, Node (Non-root user)

TRID Permissions on Node.JS application files 644

Web UI S Forms Authentication over HTTPS; SMS or Preference Based Security Question

E Running as logged-in user

TRID Default permissions (User has no permissions to Framework binaries)

Mobile App S Digital Signature provides authenticity and tamper detection

E Default container defenses provide least privilege

TRID Digital Signature provides authenticity and tamper detection

Page 32: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Component Threat Mitigation

Cloudant TID Database Permission (Read, Write, Delete) for CRUD

operations.

CloudFiles TID Shared Access Key; All data bits are encrypted; Hashes

stored separately in Cloudant

S3 TID Shared Access Key; All data bits are encrypted; Hashes

stored separately in Cloudant

Page 33: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 34: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

Request Processing Stack

HTTPS Transport

IP Filtering

HMAC SHA256 Signing

JSON XSS Filtering

Authentication

Authorization

Exception Handling

Execution

Page 35: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 36: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 37: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 38: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 39: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 40: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 41: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014
Page 42: (FIN202) Addressing Data Security Concerns in Financial Services: Fidelity Investment's Use of SSE-C | AWS re:Invent 2014

http://bit.ly/awsevals