54
@ziniman [email protected] Security Best Practices January 2018 Boaz Ziniman - Technical Evangelist - AWS Local Events: https://aws.amazon.com/events/aws-israel/

Security Best Practices - Hebrew Webinar

Embed Size (px)

Citation preview

Page 1: Security Best Practices - Hebrew Webinar

@[email protected]

SecurityBestPractices

January2018

BoazZiniman- TechnicalEvangelist- AWS

LocalEvents:https://aws.amazon.com/events/aws-israel/

Page 2: Security Best Practices - Hebrew Webinar

JourneyThroughtheCloud

Learn from the journeys taken by other AWS customers

Discover best practices that you can use to bootstrap your projects

Common use cases and adoption models for the AWS Cloud

Page 3: Security Best Practices - Hebrew Webinar

SecurityBestPractices

• Architectedtobeoneofthemostflexibleandsecurecloudenvironments

• Removesmanyofthesecurityheadachesthatcomewithinfrastructure

• BuiltinSecurityFeatures

Page 4: Security Best Practices - Hebrew Webinar

Agenda

• SharingtheSecurityResponsibility• OverviewofAWSSecurityFeatures• CurrentRecommendations• VerifyingourSecurity• CaseStudies&UsefulResources

Page 5: Security Best Practices - Hebrew Webinar

AWSsecurityapproach

SizeofAWSsecurityteam

Visibilityintousage&resources

IncreasingyourSecurityPostureintheCloud

https://aws.amazon.com/security

Page 6: Security Best Practices - Hebrew Webinar

BroadAccreditations&Certifications

https://aws.amazon.com/compliance

Page 7: Security Best Practices - Hebrew Webinar

Partnerecosystem Customerecosystem Everyonebenefits

SecurityBenefitsfromCommunityNetworkEffect

Page 8: Security Best Practices - Hebrew Webinar

SHARINGTHESECURITYRESPONSIBILITY

Page 9: Security Best Practices - Hebrew Webinar

§ LetAWSdotheheavylifting§ Focusonwhat’smostvaluabletoyourbusiness

• Customer• ChoiceofGuestOS• ApplicationConfigurationOptions• AccountManagementflexibility• SecurityGroups• ACLs• IdentityManagement

• AWS• Facilityoperations• PhysicalSecurity• PhysicalInfrastructure• NetworkInfrastructure• VirtualisationInfrastructure• Hardwarelifecyclemanagement

SharedSecurityModel

Page 10: Security Best Practices - Hebrew Webinar

Such as Amazon EC2, Amazon EBS, and Amazon VPC

SharedSecurityModel:InfrastructureServices

Page 11: Security Best Practices - Hebrew Webinar

Such as Amazon RDS and Amazon EMR

SharedSecurityModel:ContainerServices

Page 12: Security Best Practices - Hebrew Webinar

Such as Amazon S3 and Amazon DynamoDB

SharedSecurityModel:AbstractedServices

Page 13: Security Best Practices - Hebrew Webinar

AWSSECURITYFEATURES

Page 14: Security Best Practices - Hebrew Webinar

SECUREACCESSAPIENDPOINTSUSETLS

Page 15: Security Best Practices - Hebrew Webinar

BUILT-INFIREWALLSYOUCONTROLACCESSTOYOURINSTANCES

Page 16: Security Best Practices - Hebrew Webinar

APPLICATIONPROTECTIONCONTROLACCESSTOYOUAPPLEVEL

Page 17: Security Best Practices - Hebrew Webinar

ROLE-BASEDACCESSCONTROLWITHFINE-GRAINEDPERMISSIONS

Page 18: Security Best Practices - Hebrew Webinar

MULTI-FACTORAUTHENTICATION

BUILTIN

Page 19: Security Best Practices - Hebrew Webinar

PRIVATESUBNETSWITHINYOURAWSVIRTUALPRIVATECLOUD

Page 20: Security Best Practices - Hebrew Webinar

ENCRYPTYOURDATAATREST

USINGAES256BITENCRYPTIONKEYS

Page 21: Security Best Practices - Hebrew Webinar

KMS&CLOUDHSMAHIGHLYSECUREWAYTOSTOREKEYS

Page 22: Security Best Practices - Hebrew Webinar

DEDICATEDCONNECTIONANOPTIONWITHAWSDIRECTCONNECT

Page 23: Security Best Practices - Hebrew Webinar

SECURITYLOGSAWSCLOUDTRAIL,AWSCONFIG&AMAZONCLOUDWATCHLOGS

Page 24: Security Best Practices - Hebrew Webinar

TRUSTEDADVISORYOURCUSTOMISEDCLOUDEXPERT

Page 25: Security Best Practices - Hebrew Webinar

ADVANCEDTOOLSYOUROWNSECURITYGUARD

Page 26: Security Best Practices - Hebrew Webinar

CURRENTRECOMMENDATIONS

Page 27: Security Best Practices - Hebrew Webinar

KnowtheAWSSharedResponsibilityModelBuildyoursystemsusingAWSasthefoundation&architectusinganISMSthattakesadvantageofAWSfeatures

Page 28: Security Best Practices - Hebrew Webinar

RegionsAnindependentcollectionofAWSresourcesinadefinedgeographyAsolidfoundationformeetinglocation-dependentprivacyandcompliancerequirements

AvailabilityZonesDesignedasindependentfailurezonesPhysicallyseparatedwithinatypicalmetropolitanregion

UnderstandtheAWSSecureGlobalInfrastructureRegions,AvailabilityZonesandEndpoints

Page 29: Security Best Practices - Hebrew Webinar

UnderstandtheAWSSecureGlobalInfrastructureUsingtheIAMservice

AWSIdentityandAccessManagement(IAM)enablesyoutosecurelycontrolaccesstoAWSservicesandresourcesforyourusers.

UsingIAM,youcancreateandmanageAWSusersandgroupsandusepermissionstoallowanddenytheiraccesstoAWSresourcesviacredentialssuchasaccesskeys,passwordsandmulti-factorauthenticationdevices.

YoucanalsofederatewithSAMLtoyourownpre-existingdirectoriesofuseraccountinformation,suchasOpenLDAPorActiveDirectory

http://docs.aws.amazon.com/IAM/latest/UserGuide/IAMBestPractices.html

Page 30: Security Best Practices - Hebrew Webinar

DefineandCategorise AssetsonAWS

Identifyalltheinformationassetsthatyouneedtoprotect

Page 31: Security Best Practices - Hebrew Webinar

DesignYourISMStoProtectYourAssetsonAWSEstablishastandardforimplementing,operating,monitoring,reviewing,maintaining&improvingyourinformationsecuritymanagementsyste

Page 32: Security Best Practices - Hebrew Webinar

AWSAccountYourAWSaccountrepresentsabusinessrelationshipbetweenyouandAWS.AWSaccountshaverootpermissionstoallAWSresourcesandservices,sotheyareverypowerful.

IAMUsersWithIAMyoucancreatemultipleusers,eachwithindividualsecuritycredentials,allcontrolledunderasingleAWSaccount.IAMuserscanbeaperson,service,orapplicationthatneedsaccesstoyourAWSresourcesthroughthemanagementconsole,CLI,ordirectlyviaAPIs.

ManageAWSAccounts,IAMUsers,Groups&RolesOperateundertheprincipleofLeastPrivilege

Page 33: Security Best Practices - Hebrew Webinar

ManageAWSAccounts,IAMUsers,Groups&RolesStrategiesforusingmultipleAWSaccounts

Business Requirement Proposed Design Comments

Centralised security management Single AWS Account Centralize information security management and minimize overhead.

Separation of production, development & testing accounts Three AWS Accounts Create one AWS account for production services, one for development and one for testing

Multiple autonomous departments Multiple AWS Accounts Create separate AWS accounts for each autonomous part of the organization. You can assign permissions and policies under each account

Centralized security management with multiple autonomous independent projects

Multiple AWS Accounts Create a single AWS account for common project resources (such as DNS services, Active Directory, CMS etc.). Then create separate AWS accounts per project. You can assign permissions and policies under each project account and grant access to resources across accounts.

Page 34: Security Best Practices - Hebrew Webinar

ManageAWSAccounts,IAMUsers,Groups&RolesDelegationusingIAMRolesandTemporarySecurityCredentials

Applications on Amazon EC2 and other services that need to access AWS resourcesCross Account AccessIdentity Federation

http://docs.aws.amazon.com/STS/latest/APIReference/Welcome.html

Page 35: Security Best Practices - Hebrew Webinar

ManageAWSAccounts,IAMUsers,Groups&RolesControlmultipleaccountswithAmazonOrganizations

Centrally manage policies across multiple AWS accounts

Automate AWS account creation and management

Control access to AWS services

Page 36: Security Best Practices - Hebrew Webinar

AmazonEC2KeyPairsUsedtoauthenticateSSHaccesstoLinuxinstancesandtogeneratetheinitialadministratorpasswordonWindowsinstances.

Ifyouhavehighersecurityrequirements,youarefreetoimplementalternativeauthenticationmechanismsanddisableAmazonEC2KeyPairAuthentication

ManageOS-levelAccesstoAmazonEC2InstancesYouownthecredentials,butAWShelpsyoubootstrapinitialaccesstotheOS

Page 37: Security Best Practices - Hebrew Webinar

ResourceAccessAuthorisationUsersorIAMRolescanonlyaccessresourcesafterauthentication

Fine-grainedresourcespoliciescanrestrictusersorpermituserstoaccessonlytheresourcesthatyouspecify

{"Effect": "Allow”,"Action": ["s3:GetObject”,"s3:PutObject”],"Resource": ["arn:aws:s3:::myBucket/amazon/snakegame/${cognito-identity.amazonaws.com:sub}"]

}

SecureYourData

Atrest&intransit

Page 38: Security Best Practices - Hebrew Webinar

SecureYourData

Atrest&intransit

ProtectingDataatRestOptionsdifferbyAWSService.AmazonS3– ServersideencryptionwithAmazonS3managedkeys,yourownencryptionkeyswithCustomer-ProvidedKeys(SSE-C),orkeysmanagedbyKMS

AmazonEBS– usevolumeencryptionprovidedbyyouroperatingsystemorKMS.Forexample,WindowsEFSorMicrosoftWindowsBitlocker,Linuxdm-crypt,CloudHSMoron-premiseHSMwithSafeNetProtectV

AmazonRDS– usedatabasespecificcryptographicfunctions,orKMSEMR/DynamoDB– seeSecurityBestPracticesWhitepaperforoptions

Page 39: Security Best Practices - Hebrew Webinar

OS Hardening and UpdatesUse of Amazon Machine Images (AMIs) makes it easy to deploy standardized operating system and application builds

Amazon provides and maintains a preconfigured set of AMIs, but you are also free to create your own and use these as the basis for EC2 instances that you deploy

Standard OS hardening principles (eg CIS Benchmarks, DISA STIGs) can and should be applied to the operating systems that you chose to run on EC2 instances

There are lots more detailed recommendations for securing your OS environment in the AWS Security Best Practices Whitepaper

SecureYourOperatingSystems&ApplicationsWiththesharedresponsibilitymodelyoumanageoperatingsystems&applicationsecurity

Page 40: Security Best Practices - Hebrew Webinar

AmazonVirtualPrivateCloud(VPC)CreateprivatecloudswithLayer2separation,withintheAWSCloud

UseyourownIPaddressspace,allocatedbyyou.UseRFC1918privateaddressspacefornon-internet-routablenetworks

ConnecttoyourVPCviatheInternet,IPsecovertheInternet,AWSDirectConnect,AWSDirectConnectwithIPsecoracombinationofthese.Defineyourownsubnettopology,routingtableandcreatecustomserviceinstancessuchasDNSortimeservers

SecureYourInfrastructure

UsingAWSplatformfeatures

Page 41: Security Best Practices - Hebrew Webinar

SecureYourInfrastructure

UsingAWSplatformfeatures

SecurityZoningandNetworkSegmentationNetworksegmentationsimplyisolatesonenetworkfromanother

Securityzonesaregroupsofsystemcomponentswithsimilarsecuritylevelsthathavecommoncontrolsappliedtothem

CombineAWSplatformsecurityfeatureswithyourownoverlayinfrastructurecomponentssuchasrepositories,DNS&timeserverstosegmentnetworksandcreatesecurityzones

TheAWSelasticcloudinfrastructure&automateddeploymenttoolsmeanthatyoucanapplythesamesecuritycontrolsacrossallAWSregionsRepeatableanduniformdeploymentsimproveyouroverallsecurityposture

Page 42: Security Best Practices - Hebrew Webinar

ImplementOS&HigherLevelMonitoringLogsmaybegeneratedbyavarietyofnetworkcomponentsaswellasoperatingsystems,platformsandapplicationsWerecommendloggingandanalysisofthefollowingeventtypes:• Actionstakenbyanyindividualwithrootoradministrativeprivileges• Accesstoallaudittrails• Invalidlogicalaccessattempts• Useofidentificationandauthenticationmechanisms• Initialisationofauditlogs• Creation,deletionandmodificationofsystemlevelobjects

Area Consideration

Log collection Note how log files are collected. Often operating system, application, or third-party/middleware agents collect log file information

Log transport When log files are centralized, transfer them to the central location in a secure, reliable, and timely fashion

Log storage Centralize log files from multiple instances to facilitate retention policies, as well as analysis and correlation

Log taxonomy Present different categories of log files in a format suitable for analysis

Log analysis/correlation

Log files provide security intelligence after you analyze them and correlate events in them. You can analyze logs in real time, or at scheduled intervals.

Log protection/security

Log files are sensitive. Protect them through network control, identity and access management, protection/ encryption, data integrity authentication, and tamper-proof time-stamping

Monitoring,Alerting,AuditTrail&IncidentResponseAdaptexistingprocesses,tools&methodologiesforuseinthecloud

Page 43: Security Best Practices - Hebrew Webinar

Monitoring,Alerting,AuditTrail&IncidentResponseAdaptexistingprocesses,tools&methodologiesforuseinthecloud

UseCloudWatchLogstoCentraliseYourLogsCloudWatchLogsenablesyoutomonitorandtroubleshootyoursystemsandapplicationsusingyourexistingsystem,application,andcustomlogfiles.

Sendyourexistingsystem,application,andcustomlogfilestoCloudWatchLogsviaouragent,andmonitortheselogsinnearreal-time.

Thiscanhelpyoubetterunderstandandoperateyoursystemsandapplications,andyoucanstoreyourlogsusinghighlydurable,low-coststorageforlateraccess

Area Consideration

Log collection Note how log files are collected. Often operating system, application, or third-party/middleware agents collect log file information

Log transport When log files are centralized, transfer them to the central location in a secure, reliable, and timely fashion

Log storage Centralize log files from multiple instances to facilitate retention policies, as well as analysis and correlation

Log taxonomy Present different categories of log files in a format suitable for analysis

Log analysis/correlation

Log files provide security intelligence after you analyze them and correlate events in them. You can analyze logs in real time, or at scheduled intervals.

Log protection/security

Log files are sensitive. Protect them through network control, identity and access management, protection/ encryption, data integrity authentication, and tamper-proof time-stamping

Page 44: Security Best Practices - Hebrew Webinar

Monitoring,Alerting,AuditTrail&IncidentResponseAdaptexistingprocesses,tools&methodologiesforuseinthecloud

UseCloudTrailtoRecordAWSAPICallsAWSCloudTrailisawebservicethatrecordsAWSAPIcallsforyouraccountanddeliverslogfilestoyou.

TherecordedinformationincludestheidentityoftheAPIcaller,thetimeoftheAPIcall,thesourceIPaddressoftheAPIcaller,therequestparameters,andtheresponseelementsreturnedbytheAWSservice.

WithCloudTrail,youcangetahistoryofAWSAPIcallsforyouraccount.TheAWSAPIcallhistoryproducedbyCloudTrailenablessecurityanalysis,resourcechangetracking,andcomplianceauditing.

Page 45: Security Best Practices - Hebrew Webinar

RESOURCESYOUCANUSETOLEARNMORE

Page 46: Security Best Practices - Hebrew Webinar

aws.amazon.com/security/

Page 47: Security Best Practices - Hebrew Webinar

AWSTechnicalDocumentation

Page 48: Security Best Practices - Hebrew Webinar

https://aws.amazon.com/blogs/security/

Page 49: Security Best Practices - Hebrew Webinar

IntroductiontoAWSSecurity

SecurityatScale:GovernanceinAWS

SecurityatScale:LogginginAWS

AWSSecurityBestPractices

SecuringDataatRestwithEncryption

AWSAnswerstoKeyComplianceQuestions

AWSSecurityWhitePapers

https://aws.amazon.com/whitepapers/#security

Page 50: Security Best Practices - Hebrew Webinar

aws.amazon.com/architecture/

Page 51: Security Best Practices - Hebrew Webinar

CertificationSelf-PacedLabs

aws.amazon.com/training

Tryproducts,gainnewskills,andgethands-onpracticeworkingwith

AWStechnologies

Training

ValidateyourprovenskillsandexpertisewiththeAWSplatform

Buildtechnicalexpertisetodesignandoperatescalable,efficient

applicationsonAWS

AWSTraining&Certification

aws.amazon.com/training/self-paced-labs

aws.amazon.com/certification

Page 52: Security Best Practices - Hebrew Webinar

https://aws.amazon.com/summits/summit-tel-aviv/

Page 53: Security Best Practices - Hebrew Webinar

@[email protected]

ThankYou!January2018

BoazZiniman- TechnicalEvangelist- AWS

FullSeries:http://bit.ly/JTTCloudHeb

Page 54: Security Best Practices - Hebrew Webinar

https://aws.amazon.com/summits/summit-tel-aviv/