compliance in the cloud using security by design

22
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Tim Sandage, Sr. Security Partner Strategist Compliance in the Cloud Using Security by Design Modernization of Technology Governance IN the Cloud

Upload: amazon-web-services

Post on 17-Jan-2017

110 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Compliance in the Cloud Using Security by Design

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Tim Sandage, Sr. Security Partner Strategist

Compliance in the Cloud Using

Security by Design Modernization of Technology Governance IN the Cloud

Page 2: Compliance in the Cloud Using Security by Design

Problem Statement

Increasing complexity (mobility, system connectivity)

causes increasing difficulty in managing risk and security

and demonstrating compliance.

Page 3: Compliance in the Cloud Using Security by Design

Current State – Technology Governance

Policies

Procedures and Guidelines

Standards

Page 4: Compliance in the Cloud Using Security by Design

Issues – Technology Governance

The majority of technology governance processes relies

predominantly on administrative and operational security

controls with LIMITED technology enforcement.

Assets

ThreatVulnerability

Risk

AWS has an opportunity to innovate and

advance Technology Governance Services.

Page 5: Compliance in the Cloud Using Security by Design

Flexibility and Complexity

What is the regulatory

requirement?

What's in-scope or out-

of-scope?

How to verify the

standards are met?

Page 6: Compliance in the Cloud Using Security by Design

Security by Design

Security by Design (SbD) is a security

assurance approach that formalizes AWS

account design, automates security controls,

and streamlines auditing.

Instead of relying on auditing security

retroactively, SbD provides security control

built in throughout the AWS IT management

process.

Identity & Access

Management

CloudTrail

CloudWatch

Config Rules

Trusted Advisor

Cloud HSMKey Management

Service

Directory Service

Page 7: Compliance in the Cloud Using Security by Design

Security by Design - Design Principles

• Build security in every layer

• Design for failures

• Implement auto-healing

• Think parallel

• Plan for Breach

• Don't fear constraints

• Leverage different storage options

• Design for cost

• Treat Infrastructure as Code

• Modular

• Versioned

• Constrained

Developing new risk mitigation capabilities, which go beyond global security frameworks,

by treating risks, eliminating manual processes, optimizing evidence and audit ratifications

processes through rigid automation

Page 8: Compliance in the Cloud Using Security by Design

SbD - Eco-system

Security by Design (SbD)

AWS CloudFormation

AWS Config Rules

Amazon Inspector

Page 9: Compliance in the Cloud Using Security by Design

SbD - Modernize Tech Governance (MTG)

Why?

Complexity is growing, making the old way to

govern technology obsolete

You need automation AWS offers to manage

security

Page 10: Compliance in the Cloud Using Security by Design

Goal - Modernize Tech Governance (MTG)

Adopting “Prevent” controls, making

“Detect” controls more powerful and

comprehensive

Page 11: Compliance in the Cloud Using Security by Design

SbD - Modernizing Technology Governance (MTG)

1.2 Identify Your Workloads Moving to AWS

2.1 Rationalize Security

Requirements

2.2 Define Data

Protections and Controls

2.3 Document

Security Architecture

3.1 Build/deploy

Security Architecture

1. Decide what

to do (Strategy)

2. Analyze and

Document

(outside of AWS)

1.1 Identify Stakeholders

3. Automate,

Deploy & Monitor3.2 Automate Security

Operations

4. Certify

3.3 Continuous

Monitor

4.1 Audit and Certification

3.4 Testing and

Game Days

Page 12: Compliance in the Cloud Using Security by Design

SbD – Rationalize Security RequirementsAWS has partnered with CIS Benchmarks to create consensus-based, best-practice security

configuration guides which will align to multiple security frameworks globally.

https://www.cisecurity.org/

The Benchmarks are:

• Recommended technical control

rules/values for hardening operating

systems, middle ware and software

applications, and network devices;

• Distributed free of charge by CIS in .PDF

format

• Used by thousands of enterprises as the

basis for security configuration policies and

the de facto standard for IT configuration

best practices.

Page 13: Compliance in the Cloud Using Security by Design

SbD – AWS CIS Benchmark Scope

Foundational Benchmark

CloudTrail

Config & Config

Rules

Key Management

Service

Identity & Access

ManagementCloudWatch

S3

SNS

Three-tier Web Architecture

EC2Elastic Load

BalancingVPC

Direct Connect

Amazon Elastic

Block Store

Cloud HSM Glacier Route 53VPN

Gateway

CloudFront

Page 14: Compliance in the Cloud Using Security by Design

Define Data Protections and Controls

Page 15: Compliance in the Cloud Using Security by Design

Document Security Architecture

https://getcompliant.allgress.com/gc

Page 16: Compliance in the Cloud Using Security by Design

SbD – Automate Security Operations

Automate deployments, provisioning, and configurations of

the AWS customer environments

CloudFormation Service CatalogStack

Template

Instances AppsResourcesStack

Stack

Design Package

Products Portfolios

DeployConstrain

Identity & Access

Management

Set Permissions

Page 17: Compliance in the Cloud Using Security by Design

AWS CloudTrail

EMR Kinesis VPC ELB S3 Lambda

AWS ConfigAWS CloudWatch

IoT

Other

Services

Add-on for AWS

Splunk App for AWSExplore Analyze Dashboard Alert

Use Cases for AWS:

Security Intelligence (Cloudtrail, Cloudwatch, VPC)

Operational Intelligence (CloudWatch, ELB etc.)

DevOps Intelligence (CloudWatch, Lambda)

Big Data Insights (Kinesis, EMR, IoT, S3)

Continuous Monitor – Splunk

Page 18: Compliance in the Cloud Using Security by Design

AWS CloudTrail

Resource Activity

Splunk App for AWS – Visualize & Monitor

AWS CloudTrail

User Activity

Page 19: Compliance in the Cloud Using Security by Design

SbD - Modernizing Technology Governance (MTG)

Automate

Governance

Automate

Deployments

Automate Security

Operations

Continuous

Compliance

Page 20: Compliance in the Cloud Using Security by Design

Closing the loop -

SbD - Modernizing Technology Governance

Result: Reliable technical implementation and enforcement

of operational and administrative controls

Page 21: Compliance in the Cloud Using Security by Design

AWS Resources

Amazon Web Services Cloud Compliance

• https://aws.amazon.com/compliance/

SbD website and whitepaper – to wrap your head around this

• https://aws.amazon.com/compliance/security-by-design/

Page 22: Compliance in the Cloud Using Security by Design