24
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 17 th June 2016 Compliance in the Cloud Using Security by Design Dean Samuels Manager, Solutions Architecture – Hong Kong & Taiwan Amazon Web Services

Compliance in the Cloud Using “Security by Design” Principles

Embed Size (px)

Citation preview

Page 1: Compliance in the Cloud Using “Security by Design” Principles

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

17th June 2016

Compliance in the Cloud Using Security by Design

Dean Samuels Manager, Solutions Architecture – Hong Kong & Taiwan

Amazon Web Services

Page 2: Compliance in the Cloud Using “Security by Design” Principles

Problem statement

Increasing complexity (mobility, system connectivity) causes increasing difficulty in managing risk and security

and demonstrating compliance.

Page 3: Compliance in the Cloud Using “Security by Design” Principles

Current state—technology governance

Policies

Procedures and guidelines

Standards

Page 4: Compliance in the Cloud Using “Security by Design” Principles

Issues—technology governance The majority of technology governance processes relies predominantly on administrative and operational security controls with limited technology enforcement.

Assets

Threat Vulnerability

Risk

AWS has an opportunity to innovate and advance technology governance services.

Page 5: Compliance in the Cloud Using “Security by Design” Principles

Flexibility and complexity

Single VPC or multiple VPCs

Public or private

subnets

Who will manage

the keys

AWS Identity and Access

Management (IAM) groups or roles

What is the regulatory requirement?

What's in scope or out of scope?

How to verify the standards are met?

Which AWS

database

Page 6: Compliance in the Cloud Using “Security by Design” Principles

Security by Design

Security by Design (SbD) is a security assurance approach that formalizes AWS account design, automates security controls, and streamlines auditing. Instead of relying on auditing security retroactively, SbD provides security control built in throughout the AWS IT management process.

AWS Identity & Access Management (IAM)

AWS CloudTrail

Amazon CloudWatch

AWS Config Rules

AWS Trusted Advisor

AWS CloudHSM

AWS Key Management Service

(AWS KMS)

AWS Directory Service

Page 7: Compliance in the Cloud Using “Security by Design” Principles

SbD—design principles

•  Build security in every layer •  Design for failures •  Implement auto-healing •  Think parallel •  Plan for breach

•  Don't fear constraints •  Leverage different storage options •  Design for cost •  Treat infrastructure as code

•  Modular •  Versioned •  Constrained

Security by Design involves developing new risk mitigation capabilities, which go beyond global security frameworks by treating risks, eliminating manual processes, and optimizing evidence and audit ratifications processes through rigid automation.

Page 8: Compliance in the Cloud Using “Security by Design” Principles

SbD—ecosystem

Security by Design (SbD)

AWS CloudFormation

AWS Config Rules

Amazon Inspector

Page 9: Compliance in the Cloud Using “Security by Design” Principles

SbD—modernizing tech governance (MTG)

Why?

Complexity is growing, making the old way to govern technology obsolete.

You need automation that AWS offers to manage

security.

Page 10: Compliance in the Cloud Using “Security by Design” Principles

Goal—modernizing tech governance

Adopt “prevent” controls; make “detect” controls more powerful and

comprehensive.

Page 11: Compliance in the Cloud Using “Security by Design” Principles

SbD—modernizing tech governance

1.2 Identify your workloads moving to AWS

2.1 Rationalize security requirements

2.2 Define data protections and controls

2.3 Document security architecture

3.1 Build/deploy security architecture

1. Decide what to do (strategy)

2. Analyze and document (outside of AWS)

1.1 Identify stakeholders

3. Automate, deploy, and monitor 3.2 Automate

security operations

4. Certify

3.3 Continuously monitor

4.1 Audit and certify

3.4 Test and have game days

Page 12: Compliance in the Cloud Using “Security by Design” Principles

SbD—rationalize security requirements AWS has partnered with CIS Benchmarks to create consensus-based, best-practice security configuration guides that will align to multiple security frameworks globally.

https://www.cisecurity.org/

The benchmarks are: •  Recommended technical control rules

and values for hardening operating systems, middleware and software applications, and network devices.

•  Distributed free of charge by CIS in .PDF format.

•  Used by thousands of enterprises as the basis for security configuration policies and the de facto standard for IT configuration best practices.

Page 13: Compliance in the Cloud Using “Security by Design” Principles

SbD—AWS CIS benchmark scope

Foundational benchmark

CloudTrail

AWS Config & Config Rules AWS KMS

IAM CloudWatch

Amazon S3

Amazon SNS

Three-tier web architecture

Amazon EC2 Elastic Load Balancing Amazon VPC

AWS Direct Connect

Amazon Elastic Block Store

CloudHSM Amazon Glacier Amazon Route 53

VPN Gateway

Amazon CloudFront

Page 14: Compliance in the Cloud Using “Security by Design” Principles

SbD—define data protections and controls

Page 15: Compliance in the Cloud Using “Security by Design” Principles

https://aws-poc.allgress.com/allgress/awsgc

SbD—document security architecture

Page 16: Compliance in the Cloud Using “Security by Design” Principles

SbD—automate security operations Automate deployments, provisioning, and configurations of the AWS customer environments.

CloudFormation AWS Service Catalog Stack

Template

Instances Apps Resources Stack

Stack

Design Package

Products Portfolios

Deploy Constrain

IAM

Set Permissions

Page 17: Compliance in the Cloud Using “Security by Design” Principles

AWS CloudTrail

Amazon

EMR

Amazon Kinesis

Amazon

VPC

Elastic Load Balancing

Amazon

S3 AWS

Lambda

AWS Config

AWS CloudWatch

AWS IoT Other

Services

Add-on for AWS

Splunk app for AWS Explore Analyze Dashboard Alert

UsecasesforAWS:Securityintelligence(CloudTrail,CloudWatch,VPC)Opera;onalintelligence(CloudWatch,ELB,etc.)DevOpsintelligence(CloudWatch,Lambda)

Bigdatainsights(AmazonKinesis,EMR,IoT,S3)

SbD—continuously monitor—Splunk

Page 18: Compliance in the Cloud Using “Security by Design” Principles

AWS CloudTrail resource activity

Splunk app for AWS—visualize and monitor

AWS CloudTrail user activity

Page 19: Compliance in the Cloud Using “Security by Design” Principles

SbD—modernizing technology governance (MTG)

Automate governance

Automate deployments

Automate security operations

Continuous compliance

Page 20: Compliance in the Cloud Using “Security by Design” Principles

Closing the loop

SbD—modernizing technology governance Result: Reliable technical implementation and enforcement of operational and administrative controls

Page 21: Compliance in the Cloud Using “Security by Design” Principles

AWS resources Amazon Web Services Cloud Compliance

•  https://aws.amazon.com/compliance/

SbD website and whitepaper—to wrap your head around this •  https://aws.amazon.com/compliance/security-by-design/

Page 22: Compliance in the Cloud Using “Security by Design” Principles

Allgress—getting started 1.  Engage with Allgress in the field: Contact sales 2.  Get started with the Allgress GetCompliant Portal to easily

pull compliance configurations from AWS customer accounts 3.  Download the Allgress Module Breakdown

Page 23: Compliance in the Cloud Using “Security by Design” Principles

Splunk—Getting started

1.  Engage with Splunk in the field: [email protected] can point you in the right direction, and you can request the Splunk Playbook.

2.  Download Splunk>Enterprise. 3.  Download and set up the Splunk App for AWS (and supporting TA) to

easily configure Splunk for Config, CloudTrail, CloudWatch metrics, VPC flog logging, S3, and Billing.

4.  Take the self-paced Using Splunk tutorial and look at Splunk>Docs and Splunk>Apps for more.

5.  You can get started quickly with the Splunk search commands, and then use supporting documentation to advance your skill. Our Quick Reference Guide becomes an essential tool and cheat sheet. Other search reference documentation is posted also.

Page 24: Compliance in the Cloud Using “Security by Design” Principles

Dean Samuels Manager, Solutions Architecture – Hong Kong & Taiwan

Amazon Web Services

Thank you!