Top Banner
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bertram Dorn Specialized Sollutions Architect for Secuirty and Compliance 30. Juni 2016 Security on AWS A Update and Overview
60

Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

May 21, 2020

Download

Documents

dariahiddleston
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Bertram DornSpecialized Sollutions Architect for Secuirty and Compliance

30. Juni 2016

Security on AWSA Update and Overview

Page 2: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Agenda:• AWS• AWS Services• Sicherheits Standards• Technische Compliance• DPA

Page 3: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ConsumerBusiness

Tens of millions of active customer accounts

13 countries:US, UK, Germany, Japan,

France, Canada, China, Italy, Brazil, Mexico, India, Spain,

Australia

SellerBusiness

Sell on Amazon websites

Use Amazon technology for your own retail website

Leverage Amazon’s massive fulfilment centre network

IT InfrastructureBusiness

Web-scale cloud computing infrastructure for developing,

deploying & operating applications

Over 1 million registered customers in over 190 countries

Page 4: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

On demand Pay as you go

Uniform Available

Cloud

Page 5: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Infrastructure

Page 6: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

What is DevOps?

DevOps = efficiencies that speed up this lifecycle

developers customers

releasetestbuild

plan monitor

delivery pipeline

feedback loop

Software development lifecycle

Page 7: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management
Page 8: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Monolith development lifecycle

developers

releasetestbuild

delivery pipelineapp

Page 9: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Microservice development lifecycle

developers delivery pipelinesservices

releasetestbuild

releasetestbuild

releasetestbuild

releasetestbuild

releasetestbuild

releasetestbuild

Page 10: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Service-Oriented Architecture (SOA)

Single-purpose

Connected through APIs

Highly decoupled

“Microservices”

Page 11: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

DevOps Practices

DevOps Best Practices Tools, Methods, Process

Infrastructure as Code • CloudFormation -> Compute/Storrage/Network/Database/Messaging

IT Automation • AutoScaling, Events, Logging

Continuous Integration Code Pipeline

Continuous Deployment • Code Deploy

Version Control Integration

• Code Commit

Monitoring and Logging • CloudTrail, CloudWatch, Elasticsearch, SEIM approaches

Overview of DevOps on AWS Introduction to DevOps on AWS v1.0

Page 12: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

AWS CodeDeploy

• Easy and reliable deployments

• Scale with ease• Deploy to any server

TestCodeDeployv1, v2, v3

Production

Dev

applicationrevisions

deployment groups

Page 13: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

AWS CodePipeline

• Connect to best-of-breed tools

• Accelerate your release process• Consistently verify each release

Build1) Build2) Unit test

1) Deploy2) UI test

Source Beta Production1) Deploy2) Perf test

Gamma1) Deploy canary2) Deploy region 13) Deploy region 2

1) Pull

Page 14: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

AWS CodeCommit

• Use standard Git tools• Scalability, availability, and durability of Amazon S3• Encryption at rest with customer-specific keys

git pull/push CodeCommit

Git objects inAmazon S3

Git index inAmazon DynamoDB

Encryption keyin AWS KMS

SSH or HTTPS

Page 15: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Provision Configure Orchestrate Deploy Report Monitor

DevOps• Continuous Integration• Continuous Deployment• IT Automation• Application Management

Evolution of DevOps from Agile

Business Case Requirements Use Case Features Plan Go to market

Business

Design Code Refactor Unit Test Bug Fix Deploy

Developers(application)

IT Operations(infrastructure)

Agile Development

• Iterative development• Scrum, sprints, stories• Velocity

BusinessAgility

ITAgility

Page 16: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

What is AWS?

AWS Global Infrastructure

Application Services

Networking

Deployment & Administration

DatabaseStorageCompute

Page 17: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ENTERPRISE APPS

DEVELOPMENT & OPERATIONSMOBILE SERVICESAPP SERVICESANALYTICS

DataWarehousing

Hadoop/Spark

Streaming Data Collection

Machine Learning

Elastic Search

Virtual Desktops

Sharing & Collaboration

Corporate Email

Backup

Queuing & Notifications

Workflow

Search

Email

Transcoding

One-click App Deployment

Identity

Sync

Single Integrated Console

PushNotifications

DevOps Resource Management

Application Lifecycle Management

Containers

Triggers

Resource Templates

TECHNICAL & BUSINESS SUPPORT

Account Management

Support

Professional Services

Training & Certification

Security & Pricing Reports

Partner Ecosystem

Solutions Architects

MARKETPLACE

Business Apps

Business Intelligence DatabasesDevOps

Tools NetworkingSecurity Storage

Regions Availability Zones

Points of Presence

INFRASTRUCTURE

CORE SERVICES

ComputeVMs, Auto-scaling, & Load Balancing

StorageObject, Blocks, Archival, Import/Export

DatabasesRelational, NoSQL, Caching, Migration

NetworkingVPC, DX, DNS

CDN

Access Control

Identity Management

Key Management & Storage

Monitoring & Logs

Assessment and reporting

Resource & Usage Auditing

SECURITY & COMPLIANCE

Configuration Compliance

Web application firewall

HYBRID ARCHITECTURE

Data Backups

Integrated App Deployments

DirectConnect

IdentityFederation

IntegratedResource Management

Integrated Networking

API Gateway

IoT

Rules Engine

Device Shadows

Device SDKs

Registry

Device Gateway

Streaming Data Analysis

Business Intelligence

MobileAnalytics

Page 18: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ENTERPRISE APPS

DEVELOPMENT & OPERATIONSMOBILE SERVICESAPP SERVICESANALYTICS

DataWarehousing

Hadoop/Spark

Streaming Data Collection

Machine Learning

Elastic Search

Virtual Desktops

Sharing & Collaboration

Corporate Email

Backup

Queuing & Notifications

Workflow

Search

Email

Transcoding

One-click App Deployment

Identity

Sync

Single Integrated Console

PushNotifications

DevOps Resource Management

Application Lifecycle Management

Containers

Triggers

Resource Templates

TECHNICAL & BUSINESS SUPPORT

Account Management

Support

Professional Services

Training & Certification

Security & Pricing Reports

Partner Ecosystem

Solutions Architects

MARKETPLACE

Business Apps

Business Intelligence DatabasesDevOps

Tools NetworkingSecurity Storage

Regions Availability Zones

Points of Presence

INFRASTRUCTURE

CORE SERVICES

ComputeVMs, Auto-scaling, & Load Balancing

StorageObject, Blocks, Archival, Import/Export

DatabasesRelational, NoSQL, Caching, Migration

NetworkingVPC, DX, DNS

CDN

Access Control

Identity Management

Key Management & Storage

Monitoring & Logs

Assessment and reporting

Resource & Usage Auditing

SECURITY & COMPLIANCE

Configuration Compliance

Web application firewall

HYBRID ARCHITECTURE

Data Backups

Integrated App Deployments

DirectConnect

IdentityFederation

IntegratedResource Management

Integrated Networking

API Gateway

IoT

Rules Engine

Device Shadows

Device SDKs

Registry

Device Gateway

Streaming Data Analysis

Business Intelligence

MobileAnalytics

Page 19: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ENTERPRISE APPS

DEVELOPMENT & OPERATIONSMOBILE SERVICESAPP SERVICESANALYTICS

DataWarehousing

Hadoop/Spark

Streaming Data Collection

Machine Learning

Elastic Search

Virtual Desktops

Sharing & Collaboration

Corporate Email

Backup

Queuing & Notifications

Workflow

Search

Email

Transcoding

One-click App Deployment

Identity

Sync

Single Integrated Console

PushNotifications

DevOps Resource Management

Application Lifecycle Management

Containers

Triggers

Resource Templates

TECHNICAL & BUSINESS SUPPORT

Account Management

Support

Professional Services

Training & Certification

Security & Pricing Reports

Partner Ecosystem

Solutions Architects

MARKETPLACE

Business Apps

Business Intelligence DatabasesDevOps

Tools NetworkingSecurity Storage

Regions Availability Zones

Points of Presence

INFRASTRUCTURE

CORE SERVICES

ComputeVMs, Auto-scaling, & Load Balancing

StorageObject, Blocks, Archival, Import/Export

DatabasesRelational, NoSQL, Caching, Migration

NetworkingVPC, DX, DNS

CDN

Identity Management

Key Management & Storage

Monitoring & Logs

Assessment and reporting

Resource & Usage Auditing

SECURITY & COMPLIANCE

Configuration Compliance

Web application firewall

HYBRID ARCHITECTURE

Data Backups

Integrated App Deployments

DirectConnect

IdentityFederation

IntegratedResource Management

Integrated Networking

API Gateway

IoT

Rules Engine

Device Shadows

Device SDKs

Registry

Device Gateway

Streaming Data Analysis

Business Intelligence

MobileAnalytics

Access Control

Page 20: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

AWS Global Footprint

US West (N.California)

US West (Oregon)

GovCloud

US East (Virginia)

EU West (Ireland)

Asia Pacific (Tokyo)

Asia Pacific (Singapore)

Asia Pacific (Sydney)

China (Beijing)

São Paulo

EU Central (Frankfurt)

Korea (Seul)

RegionAn independent collection of AWS resources in a defined geography

A solid foundation for meeting location-dependent privacy and compliance requirements

Page 21: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ExampleAWSRegion

AZ

AZ

AZ AZ AZ

Transit

Transit• MeshofAvailabilityZones(AZ)andTransitCenters

• Redundantpathstotransitcenters

• Transitcentersconnectto:– PrivatelinkstootherAWSregions

– Privatelinkstocustomers

– Internetthroughpeering&paidtransit

• Metro-areaDWDMlinks betweenAZs

• 82,864 fiberstrandsinregion

• AZs<2msapart&usually <1ms

• 25Tbps peakinter-AZstraffic

Page 22: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

AWS Global Footprint

Availability ZoneDesigned as independent failure zones

Physically separated within a typical metropolitan region

Page 23: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ExampleAWSAvailabilityZone

• 1of33AZsworld-wide• Allregionshave2ormoreAZs• EachAZis1ormoreDC

– NodatacenterisintwoAZs– SomeAZshaveasmanyas6DCs

• DCsinAZlessthan¼ms apart

AZ

AZ

AZ AZ AZ

Transit

Transit

Page 24: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

ExampleAWSDataCenter

• SingleDCtypicallyover50,000servers&oftenover80,000

• LargerDCsundesirable (blastradius)• Upto102Tbpsprovisioned toasingleDC(interDCnotintra)

Page 25: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Shared Responsibility

Cross-service Controls

Service-specific Controls

Managed by AWS

Managed by Customer

Security of the Cloud

Security in the Cloud

Cloud Service Provider Controls

Optimized Network/OS/App Controls

Request reports at:aws.amazon.com/compliance/#contact

ISO27000

ISO9001

Page 26: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

The main AWS Compliance Frameworks of todayCertificates: Programmes:

ISO9001

ISO27000

MPAA

Page 27: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Point-in-time, or continuous compliance assessments?

ISO27001/27017

270189001

Page 28: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Scope

• By Service (not only Datacenter)

• By Region• By Certification• Global• Scalable

Page 29: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Dedicated Security Services

§ Tennant Isolation§ Deep Network Security§ Scaling Crypto Services§ Detailed Monitoring§ Access Control

§ Mandatory§ Fine Grade§ MFA Possible

AWS Global Infrastructure

Application Services

Networking

Deployment & Administration

DatabaseStorageCompute

Inherit

Control

Identity Management

Key Management & Storage

Monitoring & Logs

Assessment and reporting

Resource & Usage Auditing

SECURITY & COMPLIANCE

Configuration Compliance

Web application firewall

Access Control

Page 30: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Setup

AuftragsdatenvereinbahrungInclusive

Technische und Organisatorische Massnahmen

Page 31: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Mapping

Page 32: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Security Possibilities

Lift and Shift§ Integrate standards§ Replicate§ Automate§ Federate

Transparency§ Monitor Every Activity§ Transparent Data Flows§ No Hidden IT§ Cost Driven Awareness § Automatic Alarming

Scale and Innovate§ Use Cloud Security

Functions§ Scale Out § Services as Code§ Continuous Deployment§ Continuous Security

Permanent Monitoring/Audit§ Automatic Reaction§ Permanent Monitoring§ Integrated Audit§ Security - DevOps

Page 33: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Certifications/Audits: Scope

Page 34: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Features Overview

Page 35: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

©2015,AmazonWebServices,Inc.oritsAffiliates.Allrightsreserved.

NetworkSecurity Chooseandcombineabunchofbuild innetworkrelatedoptions:

ü Buildinfirewallfeatures(SecurityGroupsandNACL’s)ü VirtualPrivateCloudü TransportEncryption (IPsecandTLS)ü DedicatedNetworkConnection (DirectConnect)ü CypherSuiteswithPerfectForwardSecrecyü ManagedNATGatewaysü WebApplicationFilters

Page 36: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Virtual Private Cloud Security Layers

Security Group

Subnet 10.0.0.0/24

Routing Table

Network ACL

Subnet 10.0.1.0/24

Routing Table

Network ACL

Virtual Private Gateway Internet Gateway

Lockdown at instance level

Isolate network functions

Lockdown at network level

Route restrictively

Router

Availability Zone A Availability Zone B

Security Group

Security Group

Page 37: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

©2015,AmazonWebServices,Inc.oritsAffiliates.Allrightsreserved.

AccessControl AllowonlyauthorizedadministratorsandapplicationsaccessonAWSresources

ü Multi-Factor-Authentication (MFA)ü FinegranularaccesstoAWSobjectinS3-Buckets/SQS/SNS

andothersü API-RequestAuthenticationü Geo-Restrictionsü Temporaryaccesstokensthrough STS

Page 38: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

©2015,AmazonWebServices,Inc.oritsAffiliates.Allrightsreserved.

MonitoringandLogging GetanoverviewaboutactivitiesonyourAWSressources

ü Asset-Managementand-Configuration withAWSConfigü ComplianceAuditing andsecurityanalyticswithAWS

CloudTrailü Identificationsofconfiguration challengesthrough

TrustedAdvisorü Finegranularlogging ofaccesstoS3objectsü Detailedinformations aboutflowsinthenetwork through

VPC-FlowLogsü Rulebasedconfig checksandactionswithAWSConfig Rulesü Filterandmonitoring ofHTTPaccesstoapplicationswith

WAFfunctions inCloudFront

Page 39: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

©2015,AmazonWebServices,Inc.oritsAffiliates.Allrightsreserved.

Encryption Securityisthefirstpriority forAWS

ü EncryptionofyourdataatrestwithAES256(EBS/S3/Glacier/RDS)

ü Centralized(byRegion)managedKey-Managementü IPsectunnels intoAWSwiththeVPN-Gatewaysü Deicated HSMmodules inthecloudwithCloudHSM

Page 40: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

IAM Overview

Page 41: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups

Page 42: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups• Unique Security Credentials

Page 43: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups• Unique Security Credentials• Temporary Security

Credentials

Page 44: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups• Unique Security Credentials• Temporary Security

Credentials• Policies & Permissions

Page 45: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups• Unique Security Credentials• Temporary Security

Credentials• Policies & Permissions• Roles

Page 46: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Identity and Access Management

• Users & Groups• Unique Security Credentials• Temporary Security

Credentials• Policies & Permissions• Roles• Multi-factor Authentication

Page 47: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

IAM Best Practices

Page 48: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Vielen Dank

Bertram Dorn

Page 49: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Root Accounts Do Not Need Access Keys

Root Accounts Do Normally Not Log In

Page 50: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Best PracticesLock away your AWS account access keys

Create individual IAM users

Use groups to assign permissions to IAM users

Grant least privilege

Configure a strong password policy for your users

Enable MFA for privileged users

Use roles for applications that run on Amazon EC2 instances

Delegate by using roles instead of by sharing credentials

Rotate credentials regularly

Remove unnecessary credentials

Use policy conditions

Keep a history of activity

Page 51: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

What type of events should I monitor for?

v You can monitor any specific event recorded by CloudTrail and receive notification from CloudWatch

v Monitor for security or network related events that are likely to have a high blast radius

v Popular examples based on customer feedback

1. Creation, deletion and modification of security groups and VPCs2. Changes to IAM policies or S3 bucket policies3. Failed AWS Management Console sign-in events4. API calls that resulted in authorization failures5. Launching, terminating, stopping, starting and rebooting EC2 instances

v Fully defined and pre-built CloudFormation template to get started

Page 52: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Receive email notifications of specific API activity

Page 53: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Demo: Kibana

Page 54: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Data at Rest: Simplified

Page 55: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Securing Data at Rest

Amazon RDS Redshift

Amazon S3GlacierAmazon EBS

> AES-256 key

> KMS integration

> Easy one-click encryption

Page 56: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Securing Data at Rest

Amazon S3 Glacier

> AES-256 key

> Each object is encrypted

> Each key is encrypted with a master key

> Master key is rotated regularly

> KMS integration

Page 57: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Amazon EBS

Securing Data at Rest

> AES-256 key

> Performed on EC2 host

> Snapshots

> KMS integrated

> Each Volume gets it‘s DataKey

> DataKey is encrypted withMasterKey

Page 58: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Amazon RDS

Securing Data at Rest

> AES-256 key

> Logs, backups, and snapshots

> Read replicas

> Active and backup

> CloudHSM (Oracle TDE only)

> KMS integration

Page 59: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Redshift

Securing Data at Rest

> AES-256 key

> Data blocks

> Metadata

> Active and backup

> CloudHSM integration

> 4-tier encryption architecture

Page 60: Security on AWS€¦ · Security is the first priority for AWS ü Encryption of your data at rest with AES256 (EBS/S3/Glacier/RDS) ü Centralized (by Region) managed Key-Management

Securing Data at Rest

CloudHSM

> Hardware Security Module

> Single tenancy

> Private key material never leaves the HSM

> AWS provisioned, customer managed