38
Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance

Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Embed Size (px)

Citation preview

Page 1: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Security on  AWS(overview)

Bertram  DornEMEA  Specialized Solutions  ArchitectSecurity  and Compliance

Page 2: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Agenda: • Overview• AWS  Regions• Availability Zones• Shared Responsibility

• Security  Features• Best  Practices  for

• IAM• Data  at  Rest

Page 3: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

AWS  Global  Footprint

US  West  (N.California)

US  West  (Oregon)

GovCloud

US  East  (Virginia)

EU  West  (Ireland)

Asia  Pacific  (Tokyo)

Asia  Pacific  (Singapore)

Asia  Pacific  (Sydney)

China  (Beijing)

São  Paulo

EU  Central  (Frankfurt)

Korea  (Seul)

RegionAn independent collection of AWS resources in a defined geography

A solid foundation for meeting location-dependent privacy and compliance requirements

Page 4: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Example  AWS  Region

AZ

AZ

AZ AZ AZ

Transit

Transit• Mesh  of  Availability  Zones  (AZ)  and  Transit  Centers

• Redundantpaths  to  transit  centers

• Transit  centers  connect  to:– Private  links  to  other  AWS  regions

– Private  links  to  customers

– Internet  through  peering  &  paid  transit

• Metro-­‐area  DWDM  links   between  AZs

• 82,864 fiber  strands  in  region

• AZs  <2ms  apart  &  usually   <1ms

• 25Tbps peak  inter-­‐AZs  traffic

Page 5: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

AWS  Global  Footprint

Availability ZoneDesigned as independent failure zones

Physically separated within a typical metropolitan region

Page 6: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Example  AWS  Availability  Zone

• 1  of  30  AZs  world-­‐wide• All  regions  have  2  or  more  AZs• Each  AZ  is  1  or  more  DC– No  data  center  is  in  two  AZs– Some  AZs  have  as  many  as  6  DCs

• DCs  in  AZ  less  than  ¼  ms apart

AZ

AZ

AZ AZ AZ

Transit

Transit

Page 7: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Example  AWS  Data  Center

• Single  DC  typically  over  50,000  servers  &  often  over  80,000  

• Larger  DCs  undesirable   (blast  radius)• Up  to  102Tbps  provisioned   to  a  single  DC  (inter  DC  not  intra)

Page 8: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Shared Responsibility

Cross-service Controls

Service-specific Controls

Managed by AWS

Managed by Customer

Security of the Cloud

Security in the Cloud

Cloud Service Provider Controls

Optimized Network/OS/App Controls

Request reports at:aws.amazon.com/compliance/#contact

ISO27000

ISO9001

Page 9: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

What  is  AWS?

AWS  Global  Infrastructure

Application  Services

Networking

Deployment  &  Administration

DatabaseStorageCompute

Page 10: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.

Service  Breadth  &  Depth

Page 11: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Features  Overview

Page 12: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.

Network  Security Choose  and  combine  a  bunch  of  build   in  network  related  options:

ü Build  in  firewall  features  (Security  Groups  and  NACL’s)ü Virtual  Private  Cloudü Transport  Encryption   (IPsec  and  TLS)ü Dedicated  Network  Connection   (Direct  Connect)ü Cypher  Suites  with  Perfect  Forward  Secrecy  ü Managed  NAT  Gatewaysü WebApplicationFilters

Page 13: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Virtual  Private  Cloud  Security  Layers

Security Group

Subnet  10.0.0.0/24

Routing Table

Network ACL

Subnet  10.0.1.0/24

Routing Table

Network ACL

Virtual Private Gateway Internet Gateway

Lockdown at instance level

Isolate network functions

Lockdown at network level

Route restrictively

Router

Availability Zone A Availability Zone B

Security Group

Security Group

Page 14: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.

Access  Control Allow  only    authorized  administrators  and  applications  access  on  AWS  resources  

ü Multi-­‐Factor-­‐Authentication   (MFA)ü Fine  granular  access  to  AWS  object  inS3-­‐Buckets/SQS/SNS  

and  othersü API-­‐Request  Authenticationü Geo-­‐Restrictionsü Temporary  access  tokens  through   STS

Page 15: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.

Monitoring  and  Logging Get  an  overview  about  activities  on  your  AWS  ressources

ü Asset-­‐Management  and  -­‐Configuration   with  AWS  Configü Compliance  Auditing   and  security  analytics  with  AWS  

CloudTrailü Identifications  of  configuration   challenges  through  

TrustedAdvisorü Fine  granular  logging   of  access  to  S3  objectsü Detailed  informations about  flows  in  the  network   through  

VPC-­‐FlowLogsü Rule  based  config checks  and  actions  with  AWS  Config Rulesü Filter  and  monitoring   of  HTTP  access  to  applications  with  

WAF  functions   in  CloudFront

Page 16: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.

Encryption Security  is  the  first  priority   for  AWS

ü Encryption  of  your  data  at  rest  with  AES256  (EBS/S3/Glacier/RDS)

ü Centralized  (by  Region)  managed  Key-­‐Managementü IPsec  tunnels   into  AWS  with  the  VPN-­‐Gatewaysü Deicated HSM  modules   in  the  cloud  with  CloudHSM

Page 17: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

IAM  Overview

Page 18: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups

Page 19: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups• Unique  Security  Credentials

Page 20: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups• Unique  Security  Credentials• Temporary  Security  Credentials

Page 21: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups• Unique  Security  Credentials• Temporary  Security  Credentials

• Policies  &  Permissions

Page 22: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups• Unique  Security  Credentials• Temporary  Security  Credentials

• Policies  &  Permissions• Roles

Page 23: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Identity  and  Access  Management

• Users  &  Groups• Unique  Security  Credentials• Temporary  Security  Credentials

• Policies  &  Permissions• Roles• Multi-­factor  Authentication

Page 24: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

IAM  Best  Practices

Page 25: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Root  Accounts  Do  Not  Need  Access  Keys

Root  Accounts  Do  Normally Not  Log  In

Page 26: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Best  PracticesLock  away  your  AWS  account  access  keys

Create  individual   IAM  users

Use  groups  to  assign  permissions  to  IAM  users

Grant  least  privilege

Configure  a  strong  password  policy  for  your  users

Enable  MFA  for  privileged  users

Use  roles  for  applications  that  run  on  Amazon  EC2  instances

Delegate  by  using  roles  instead  of  by  sharing  credentials

Rotate  credentials  regularly

Remove  unnecessary  credentials

Use  policy  conditions

Keep  a  history  of  activity

Page 27: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

What  type  of  events  should  I  monitor  for?

v You  can  monitor  any  specific  event  recorded  by  CloudTrail  and  receive  notification  from  CloudWatch

v Monitor  for  security  or  network  related  events  that  are   likely  to  have  a  high  blast  radius

v Popular  examples  based  on  customer  feedback

1. Creation,  deletion  and  modification  of  security  groups  and  VPCs2. Changes  to  IAM  policies  or  S3  bucket  policies3. Failed  AWS  Management  Console  sign-­in  events4. API  calls  that  resulted  in  authorization  failures5. Launching,  terminating,   stopping,  starting  and  rebooting  EC2  instances

v Fully  defined  and  pre-­built  CloudFormation  template  to  get  started

Page 28: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Receive  email  notifications  of  specific  API  activity

Page 29: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Demo:  Kibana

Page 30: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Data  at  Rest:  Simplified

Page 31: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Securing  Data  at  Rest

Amazon  RDS Redshift

Amazon  S3GlacierAmazon  EBS

> AES-­256  key

> KMS  integration

> Easy  one-­click  encryption

Page 32: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Securing  Data  at  Rest

Amazon  S3 Glacier

> AES-­256  key

> Each  object  is  encrypted

> Each  key  is  encrypted  with  a  master  key

> Master  key  is  rotated  regularly

> KMS  integration

Page 33: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Amazon  EBS

Securing  Data  at  Rest

> AES-­256  key

> Performed  on  EC2  host

> Snapshots

> KMS  integrated

> Each Volume  gets it‘s DataKey

> DataKey is encrypted withMasterKey

Page 34: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Amazon  RDS

Securing  Data  at  Rest

> AES-­256  key

> Logs,  backups,  and  snapshots

> Read  replicas

> Active  and  backup

> CloudHSM  (Oracle  TDE  only)

> KMS  integration

Page 35: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Redshift

Securing  Data  at  Rest

> AES-­256  key

> Data  blocks

> Metadata

> Active  and  backup

> CloudHSM  integration

> 4-­tier  encryption  architecture

Page 36: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Securing  Data  at  Rest

CloudHSM

> Hardware  Security  Module

> Single  tenancy

> Private  key  material  never  leaves  the  HSM

> AWS  provisioned,  customer  managed

Page 37: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Whitepaper:  Encrypting  Data  at  Rest

https://d0.awsstatic.com/whitepapers/aws-­securing-­data-­at-­rest-­with-­encryption.pdf

Page 38: Security onAWS (overview)aws-de-media.s3.amazonaws.com/images/Webinar/201… ·  · 2016-01-27Agenda: • Overview • AWS Regions • Availability Zones • Shared Responsibility

Thank  You

Content  Providers:

Bertram  DornBrian  WagnerDave  Walker