Cloud S ecurity Security Processes & Practices Jinesh Varia



Similar documents
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

KeyLock Solutions Security and Privacy Protection Practices

319 MANAGED HOSTING TECHNICAL DETAILS

Security Essentials & Best Practices

Amazon Web Services: Overview of Security Processes May 2011

Famly ApS: Overview of Security Processes

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Cloud Security Overview

Accellion Security FAQ

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Security Whitepaper. NetTec NSI Philosophy. Best Practices

Security Practices, Architecture and Technologies

SMS. Cloud Computing. Systems Management Specialists. Grupo SMS option 3 for sales

Amazon Web Services: Overview of Security Processes March 2013

Building Energy Security Framework

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Amazon Elastic Beanstalk

Security, Risk, and Compliance: Engine Yard

Accellion Security FAQ

CMPT 471 Networking II

Amazon Web Services: Overview of Security Processes June 2014

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

DISTRIBUTED SYSTEMS [COMP9243] Lecture 9a: Cloud Computing WHAT IS CLOUD COMPUTING? 2

Dooblo SurveyToGo: Security Overview

Overview and Deployment Guide. Sophos UTM on AWS

CS 356 Lecture 25 and 26 Operating System Security. Spring 2013

THE BLUENOSE SECURITY FRAMEWORK

White Paper How Noah Mobile uses Microsoft Azure Core Services

Live Guide System Architecture and Security TECHNICAL ARTICLE

Apteligent White Paper. Security and Information Polices

Protocol Security Where?

Securing SaaS Applications: A Cloud Security Perspective for Application Providers

NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015

Druva Phoenix: Enterprise-Class. Data Security & Privacy in the Cloud

Stephen Coty Director, Threat Research

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1

DiamondStream Data Security Policy Summary

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

A Survey on Cloud Security Issues and Techniques

Deploy Remote Desktop Gateway on the AWS Cloud

Amazon Web Services: Risk and Compliance January 2011

Chapter 11 Cloud Application Development

How AWS Pricing Works May 2015

Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida

Amazon Web Services: Risk and Compliance January 2013

VMWARE Introduction ESX Server Architecture and the design of Virtual Machines

SoftLayer Fundamentals. Security / Firewalls. August, 2014

SECURITY in the RACKSPACE CLOUD An overview of our best practices

Residual risk. 3 Compliance challenges (i.e. right to examine, exit clause, privacy acy etc.)

IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:

An Introduction to Cloud Computing Concepts

全 球 資 安 剖 析, 您 做 確 實 了 嗎? Albert Yung Barracuda Networks

Security from a customer s perspective. Halogen s approach to security

Vendor Questionnaire

Secondary DMZ: DMZ (2)

Enforcing Enterprise-out Security for Cloud Servers

Securing the Microsoft Platform on Amazon Web Services

Troux Hosting Options

Tibbr Installation Addendum for Amazon Web Services

GE Measurement & Control. Cyber Security for NEI 08-09

Every Silver Lining Has a Vault in the Cloud

HIPAA Compliant Infrastructure Services. Real Security Outcomes. Delivered.

FortiGate-AWS Deployment Guide

APNIC elearning: IPSec Basics. Contact: esec03_v1.0

Mirantis OpenStack Express: Security White Paper

About Acquia. Acquia Cloud Site Factory allows you to rapidly build mobile- ready brand, campaign, and franchise websites on a turnkey cloud platform.

Cloud Security:Threats & Mitgations

The Comprehensive Guide to PCI Security Standards Compliance

Security Overview Enterprise-Class Secure Mobile File Sharing

Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits

System Security Plan University of Texas Health Science Center School of Public Health

Amazon Web Services: Risk and Compliance July 2012

Track 2 Workshop PacNOG 7 American Samoa. Firewalling and NAT

CorreLog Alignment to PCI Security Standards Compliance

How To Protect Your Data From Harm

A GUIDE TO SECURITY AND PRIVACY IN A HOSTED EXCHANGE ENVIRONMENT TECHNICAL DOCUMENT

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Security and Data Protection for Online Document Management Software

Cloud Computing for Research. Jeff Barr - January 2011

Running Oracle Applications on AWS

Clouds on the Horizon Cloud Security in Today s DoD Environment. Bill Musson Security Analyst

Security Gateway R75. for Amazon VPC. Getting Started Guide

Transcription:

Cloud Security Processes & Practices Jinesh Varia

Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices

AWS Security White Paper Available on http://aws.amazon.com Second version now being drafted. Feedback appreciated.

AWS Certifications Working to ensure continued Sarbanes-Oxley (SOX) compliance. Working toward SAS70 Type II certification. Goal: validate efficacy and efficiency of internal controls. We ll be pursuing additional certifications. D l b ildi HIPAA li t h lth Developers are building HIPAA-compliant healthcare applications now.

Physical Security We ve been building large-scale data centers for many years. Important attributes and features: Non-descript facilities Military-grade perimeter control berms Strictly tl controlled physical access (perimeter and building) 3 or more levels of two-factor authentication Controlled, need-based access for Amazon and AWS employees. All physical and electronic access is logged.

Data Backups Data stored in Amazon S3, Amazon SimpleDB, and Amazon EBS is stored redundantly in multiple physical locations. Amazon S3 replicates customer objects across multiple storage systems in multiple datacenters to ensure durability. This durability is equivalent to more traditional backup solutions, but offers much higher data availability and throughput. Data stored in Amazon EC2 must be proactively copied to Amazon EBS and/or Amazon S3 for redundancy

Multiple Levels of EC2 Security Host operating system Individual SSH keyed logins via bastion host for AWS admins All accesses logged and audited Guest operating system Customer controlled at root level AWS admins cannot log in Customer-generated keypairs Stateful firewall Mandatory inbound firewall, default deny mode Signed API calls Require X.509 certificate or customer s secret AWS key

EC2 Virtualization EC2 Hypervisor: Guest operating system doesn t have elevated privilege level. Instances are completely isolated. Intrinsic network firewall. No access to raw devices. Virtualized disks, logically isolated, wiped clean after use.

EC2 Instance Isolation

Virtual Memory and Local Disk Amazon Machine Instances Encrypted File System Encrypted Swap File Amazon Machine Instance Proprietary Amazon disk management prevents ents one AMI from reading the disk contents of another AMI Local disk storage can also be encrypted by the customer for an added layer of security

EC2 Security Recommendations Host-based firewall (e.g. iptables) for inbound and outbound traffic. SSL encryption of API calls while in transit. Data encryption encrypted swap and filesystem. Resources: Wikipedia list of cryptographic file systems Linux HOWTO

Network Security Considerations DDoS (Distributed Denial of Service): Standard mitigation techniques in effect. MITM (Man in the Middle): All endpoints protected by SSL. Fresh EC2 host keys generated at boot time. IP Spoofing: Prohibited at host OS level. Port Scanning: Violation of AWS TOS. Detected, stopped, and blocked. Ineffective anyway since inbound ports blocked by default. Packet Sniffing: Promiscuous mode is ineffective. Protection at hypervisor level.

Multi-tier tier Security Architecture

Network Traffic Confidentiality Amazon Machine Instances Internet Traffic Encrypted File System Encrypted Swap File Amazon Machine Instance VPN Corporate Network All t affic sho ld be c ptog aphicall cont olled All traffic should be cryptographically controlled Inbound and outbound traffic to corporate networks should be wrapped within industry standard VPN tunnels

Amazon S3 Security Access controls at bucket and object level: Read Write Full Owner has full control. SSL to protect data in transit. Encrypt when stored.

Amazon SimpleDB Security Access based on AWS account. Domains accessible only to owner. SSL to protect data in transit. Encrypt data elements not used as keys.

Questions?