(sec406) new launch: building secure applications with aws key management service | aws re:invent...

51
November 12, Las Vegas, NV Greg Roth, AWS Identity & Access Management

Upload: amazon-web-services

Post on 24-Jun-2015

2.848 views

Category:

Technology


0 download

DESCRIPTION

Learn how you can use the AWS Key Management Service to protect data in your applications. This talk shows you how to use the encryption features of AWS Key Management Service within your applications and provides an in-depth walk-through of applying policy control to keys to control access.

TRANSCRIPT

Page 1: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

November 12, Las Vegas, NV

Greg Roth, AWS Identity & Access Management

Page 2: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 3: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 4: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 5: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 6: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 7: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 8: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 9: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 10: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 11: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 12: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 13: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 14: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 15: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 16: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 17: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 18: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 19: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 20: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 21: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 22: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

Object

Web Server

client

magic

Disks

Page 23: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

Object

Web Server

client

magic

Disks

Page 24: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

2) S3 requests an encryption key for the requested key name1) Request to store data in S3 + key name for encryption4) S3 encrypts the data with the encryption key,

then deletes the key from memory

3) AWS KMS returns an encryption key

+ an encrypted version of the key

5) S3 stores the object along with the encrypted key

Amazon S3 KMS

Request

Policy

Page 25: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

Amazon S32) S3 retrieves the encrypted data and the encrypted key.

S3 sends the encrypted key and the UserID to KMS.1) Request to retrieve data4) S3 decrypts the data with the encryption key,

Then deletes the key from memory

3) AWS KMS unencrypts the encryption key

and returns the key to S3

5) S3 returns the data to the user

KMS

Request

Page 26: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 27: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 28: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 29: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 30: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 31: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 32: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 33: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

http://bit.ly/awsevals

Page 34: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 35: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 36: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 37: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 38: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 39: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 40: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 41: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 42: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 43: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 44: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 45: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 46: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 47: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 48: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 49: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014
Page 50: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

https://www.coursera.org/course/crypto

https://www.bouncycastle.org/docs/docs1.5on/index.ht

ml

Page 51: (SEC406) NEW LAUNCH: Building Secure Applications with AWS Key Management Service | AWS re:Invent 2014

http://bit.ly/awsevals