intro to aws: security

65
©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved SECURITY IS JOB ZERO Security The Forefront For Any Online Business Bill Murray Sr. Mgr, AWS Security Programs

Upload: amazon-web-services

Post on 13-Aug-2015

530 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: Intro to AWS: Security

©2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

SECURITY IS JOB ZERO

Security – The Forefront For Any Online Business

Bill Murray – Sr. Mgr, AWS Security Programs

Page 2: Intro to AWS: Security

Security is Job Zero

Network

SecurityPhysical

Security

Platform

SecurityPeople &

Procedures

Page 3: Intro to AWS: Security

SECURITY IS SHARED

Page 4: Intro to AWS: Security

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure Regions

Availability Zones

Edge Locations

Client-side Data Encryption

Server-side Data Encryption

Network Traffic Protection

Platform, Applications, Identity & Access Management

Operating System, Network, & Firewall Configuration

Customer applications & contentC

ust

om

ers

Security & compliance is a shared responsibility

Customers have

their choice of

security

configurations IN

the Cloud

AWS is

responsible for

the security OF

the Cloud

Page 5: Intro to AWS: Security

Build everything on a constantly improving security baseline

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure Regions

Availability Zones

Edge Locations

AWS is

responsible for

the security OF

the Cloud

GxP

ISO 13485

AS9100

ISO/TS 16949

Page 6: Intro to AWS: Security

SECURITY IS FAMILIAR

Page 7: Intro to AWS: Security

Security is Familiar• We strive to make security at AWS as familiar as

what you are doing right now

– Visibility

– Auditability

– Controllability

– Agility

Page 8: Intro to AWS: Security

AWS Marketplace: One-stop shop for familiar tools

Advanced Threat

Analytics

Application Security

Identity and Access Mgmt

Encryption & Key Mgmt

Server & Endpoint

Protection

Network Security

Vulnerability & Pen Testing

Page 9: Intro to AWS: Security

SECURITY REQUIRES VISIBILITY

Page 10: Intro to AWS: Security

VISIBILITY

HOW OFTEN DO YOU MAP YOUR NETWORK?

WHAT’S IN YOUR ENVIRONMENT

RIGHT NOW?

Page 11: Intro to AWS: Security
Page 12: Intro to AWS: Security
Page 13: Intro to AWS: Security

Security is Visible• Who is accessing the resources?

• Who took what action?– When?

– From where?

– What did they do?

– Logs Logs Logs

Page 14: Intro to AWS: Security

You are making

API calls...On a growing set of

services around the

world…

AWS CloudTrail

is continuously

recording API

calls…

And delivering

log files to you

AWS CLOUDTRAIL

Redshift

Page 15: Intro to AWS: Security

Use cases enabled by CloudTrail

• Security Analysis Use log files as an input into log management and analysis solutions to perform

security analysis and to detect user behavior patterns

• Track Changes to AWS Resources Track creation, modification, and deletion of AWS resources such as Amazon EC2

instances, Amazon VPC security groups and Amazon EBS volumes

• Troubleshoot Operational Issues Identify the most recent actions made to resources in your AWS account

• Compliance Aid Easier to demonstrate compliance with internal policies and regulatory standards

Page 16: Intro to AWS: Security

SECURITY IS AUDITABLE

Page 17: Intro to AWS: Security

AWS Config

AWS Config is a fully managed service that

provides you with an inventory of your AWS

resources, lets you audit the resource

configuration history and notifies you of

resource configuration changes.

Page 18: Intro to AWS: Security

Continuous ChangeRecordingChanging

Resources

AWS Config

History

Stream

Snapshot (ex. 2014-11-05)

AWS Config

Page 19: Intro to AWS: Security

Use cases enabled by Config

• Security Analysis: Am I safe?

• Audit Compliance: Where is the evidence?

• Change Management: What will this change

affect?

• Troubleshooting: What has changed?

Page 20: Intro to AWS: Security

Am I safe?

• Properly configured resources

are critical to security

• Config enables you to

continuously monitor the

configurations of your

resources and evaluate these

configurations for potential

security weaknesses

Page 21: Intro to AWS: Security

Where is the evidence?

• Many compliance audits

require access to the state of

your systems at arbitrary times

(i.e. PCI, HIPAA)

• A complete inventory of all

resources and their

configuration attributes is

available for any point in time

Page 22: Intro to AWS: Security

What will this change affect?

• When your resources are

created, updated, or deleted,

these configuration changes

are streamed to Amazon SNS

• Relationships between

resources are understood, so

that you can proactively assess

change impact

Page 23: Intro to AWS: Security

What changed?

• It is critical to be able to quickly

answer “What has changed?”

• You can quickly identifying the

recent configuration changes

to your resources by using the

console or by building custom

integrations with the regularly

exported resource history files

Page 24: Intro to AWS: Security

SECURITY PROVIDES CONTROL

Page 25: Intro to AWS: Security

Ubiquitous encryption is one of our core design tenets

Good Crypto Everywhere, All The Time

Page 26: Intro to AWS: Security

TLS is everywhere in our APIs

Good Crypto Everywhere, All The Time

Page 27: Intro to AWS: Security

TLS is complex

Good Crypto Everywhere, All The Time

Page 28: Intro to AWS: Security

Good Crypto Everywhere, All The Time

Page 29: Intro to AWS: Security

Small, Fast, Simple

Good Crypto Everywhere, All The Time

Page 30: Intro to AWS: Security

Small: ~6,000 lines of code, all audited

~80% less memory consumed

Good Crypto Everywhere, All The Time

Page 31: Intro to AWS: Security

Fast: 12% faster

Good Crypto Everywhere, All The Time

Page 32: Intro to AWS: Security

Simple: avoid rarely used options/extensions

Good Crypto Everywhere, All The Time

Page 33: Intro to AWS: Security

Open source

Available on AWSLabs today

https://github.com/awslabs/s2n

Good Crypto Everywhere, All The Time

Page 34: Intro to AWS: Security

AWS is committed to OpenSSL

Supporting OpenSSL development through the Linux

Foundation’s Core Infrastructure Initiative

Good Crypto Everywhere, All The Time

Page 35: Intro to AWS: Security

First class security and compliance

starts (but doesn’t end!) with encryption

Automatic encryption with managed keys

Bring your own keys

Dedicated hardware security modules

Page 36: Intro to AWS: Security

Encryption & Best Practices with AWS

Managed key encryption

Key storage with AWS CloudHSM

Customer-supplied key encryption

DIY on Amazon EC2

Create, store, & retrieve keys securely

Rotate keys regularly

Securely audit access to keys

Partner enablement of crypto

Page 37: Intro to AWS: Security

AWS Key Management Service

• A managed service that makes it easy for you to create, control, and use your encryption keys

• Integrated with AWS SDKs and AWS services including Amazon EBS, Amazon S3, and Amazon Redshift

• Integrated with AWS CloudTrail to provide auditable logs to help your regulatory and compliance activities

Page 38: Intro to AWS: Security

AWS Key Management ServiceIntegrated with AWS IAM Console

Page 39: Intro to AWS: Security

AWS Key Management ServiceIntegrated with Amazon EBS

Page 40: Intro to AWS: Security

AWS Key Management ServiceIntegrated with Amazon S3

Page 41: Intro to AWS: Security

AWS Key Management ServiceIntegrated with Amazon Redshift

Page 42: Intro to AWS: Security

SECURITY IS AGILE

Page 43: Intro to AWS: Security

HOW DOES AWS PRACTICE SECURITY?

Page 44: Intro to AWS: Security

The practice of security at AWS is

different, but the outcome is familiar:

So what does your security team look like?

Page 45: Intro to AWS: Security

Our Culture:

Everyone’s an owner

When the problem is “mine” rather than

“hers” there’s a much higher likelihood I’ll do

the right thing

Page 46: Intro to AWS: Security

Measure constantly, report regularly, and

hold senior executives accountable for

security – have them drive the right

culture

Our Culture:

Page 47: Intro to AWS: Security

Our Culture:

Measure measure measure

• 5 min metrics are too coarse

• 1 min metrics just barely OK

Page 48: Intro to AWS: Security

Our Culture:

Saying “no” is a failure

Page 49: Intro to AWS: Security

Our Culture:

Apply more effort to the “why” rather than the

“how”

Why is what really matters

When something goes wrong, ask the “five whys”

Page 50: Intro to AWS: Security

Our Culture:

Decentralize - don’t be a bottleneck

It’s human nature to go around a bottleneck

Page 51: Intro to AWS: Security

Our Culture:

Produce services that others can consume

through hardened APIs

Page 52: Intro to AWS: Security

Our Culture:

Test, CONSTANTLY

• Inside/outside

• Privileged/unprivileged

• Black-box/white-box

• Vendor/self

Page 53: Intro to AWS: Security

Our Culture:

Proactive monitoring rules the day

• What’s “normal” in your environment?

• Depending on signatures == waiting to

find out WHEN you’ve been had

Page 54: Intro to AWS: Security

Our Culture:

Collect, digest, disseminate, & use intelligence

Page 55: Intro to AWS: Security

Our Culture:

Make your compliance team a part of your

security operations

Page 56: Intro to AWS: Security

Our Culture:

Base decisions on facts, metrics, & detailed

understanding of your environment and

adversaries

Page 57: Intro to AWS: Security

Simple Security Controls

Easy to Get Right

Easy to Audit

Easy to Enforce

Page 58: Intro to AWS: Security
Page 59: Intro to AWS: Security

CONSTANT REDUCTION IN

SURFACE AREA

Page 60: Intro to AWS: Security

CONSTANT REDUCTION IN

HUMAN ACCESS POTENTIAL

Page 61: Intro to AWS: Security

UBIQUITOUS ENCRYPTION

Page 62: Intro to AWS: Security

EVEN MORE GRANULAR

SEPARATION

Page 63: Intro to AWS: Security

Security is Job ZeroYOU ARE BETTER OFF IN AWS THAN YOU ARE

IN YOUR OWN ENVIRONMENT

– “Based on our experience, I believe that we can be even more

secure in the AWS cloud than in our own data centers.”

-Tom Soderstrom, CTO, NASA JPL

– “Nearly 60% of organizations agreed that CSPs [cloud service

providers] provide better security than their own IT organizations.”

Source: IDC 2013 U.S. Cloud Security Survey,

doc #242836, September 2013

Page 64: Intro to AWS: Security

Your Feedback is Important to AWSPlease complete the session evaluation. Tell us what you think!

Page 65: Intro to AWS: Security

CHICAGO