Security Essentials & Best Practices



Similar documents
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Netop Environment Security. Unified security to all Netop products while leveraging the benefits of cloud computing

Application Security Best Practices. Matt Tavis Principal Solutions Architect

AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II

Cloud S ecurity Security Processes & Practices Jinesh Varia

Famly ApS: Overview of Security Processes

How To Use Aws.Com

CLOUD COMPUTING WITH AWS An INTRODUCTION. John Hildebrandt Solutions Architect ANZ

319 MANAGED HOSTING TECHNICAL DETAILS

Amazon Web Services: Overview of Security Processes August 2015

Amazon Web Services: Overview of Security Processes May 2011

Amazon Web Services: Overview of Security Processes August 2015

Amazon Web Services: Overview of Security Processes June 2014

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Using ArcGIS for Server in the Amazon Cloud

Amazon Web Services: Overview of Security Processes March 2013

Building Energy Security Framework

AWS Directory Service. Simple AD Administration Guide Version 1.0

How To Protect Your Data From Harm

Live Guide System Architecture and Security TECHNICAL ARTICLE

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

KeyLock Solutions Security and Privacy Protection Practices

PATCH MANAGER what does it do?

AIST Data Symposium. Ed Lenta. Managing Director, ANZ Amazon Web Services

Service Organization Controls 3 Report

Alfresco Enterprise on AWS: Reference Architecture

TECHNOLOGY WHITE PAPER Jun 2012

TECHNOLOGY WHITE PAPER Jan 2016

Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager

Introduction to AWS in Higher Ed

AWS Security Best Practices

DoD-Compliant Implementations in the AWS Cloud

AWS Security & Compliance

Using ArcGIS for Server in the Amazon Cloud

Securing Amazon It s a Jungle Out There

Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect

Primex Wireless OneVue Architecture Statement

Cloud Security Overview

Amazon Web Services: Risk and Compliance July 2015

U.S. Securities and Exchange Commission s Office of Compliance Inspections and Examinations (OCIE)

EEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing

Thing Big: How to Scale Your Own Internet of Things.

Security Practices, Architecture and Technologies

Running Oracle Applications on AWS

Service Organization Controls 3 Report

Encrypting Data at Rest

VIEWABILL. Cloud Security and Operational Architecture. featuring RUBY ON RAILS

SECURITY IS JOB ZERO. Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs

Introduction to DevOps on AWS

Best Practices for Security and Compliance with Amazon Web Services. A Trend Micro White Paper I April 2013

Overview and Deployment Guide. Sophos UTM on AWS

Cloud models and compliance requirements which is right for you?

Security Overview Enterprise-Class Secure Mobile File Sharing

Deploy XenApp 7.5 and 7.6 and XenDesktop 7.5 and 7.6 with Amazon VPC

Amazon WorkDocs. Administration Guide Version 1.0

AWS alignment with the Australian Signals Directorate (ASD) Cloud Computing Security Considerations

Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.

Security Document. Issued April 2014 Updated October 2014 Updated May 2015

Anypoint Platform Cloud Security and Compliance. Whitepaper

Enterprise Cloud Computing with AWS. for internal partner use only

Logentries Insights: The State of Log Management & Analytics for AWS

UTILIZING CLOUDCHECKR FOR SECURITY

Autodesk PLM 360 Security Whitepaper

DLT Solutions and Amazon Web Services

Intrusion Detection in the Cloud

Introduction to Amazon Web Services! Leo Senior Solutions Architect

ur skills.com

Scalable Application. Mikalai Alimenkou

AWS Account Management Guidance

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

Cloud Portal Office Security Whitepaper. October 2013

2013 AWS Worldwide Public Sector Summit Washington, D.C.

Ensuring Enterprise Data Security with Secure Mobile File Sharing.

CloudPassage Halo Technical Overview

Amazon Web Services Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

Web Application Hosting in the AWS Cloud Best Practices

Did you know your security solution can help with PCI compliance too?

Amazon Web Services: Risk and Compliance January 2013

THE BLUENOSE SECURITY FRAMEWORK

Amazon Web Services: Risk and Compliance July 2012

Accellion Security FAQ

Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples

Servers. Servers. NAT Public Subnet: /20. Internet Gateway. VPC Gateway VPC: /16

Larry Wilson Version 1.0 November, University Cyber-security Program Critical Asset Mapping

CloudPassage Halo Technical Overview

Security Controls for the Autodesk 360 Managed Services

FMCS SECURE HOSTING GUIDE

A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)

Every Silver Lining Has a Vault in the Cloud

Securing the Microsoft Platform on Amazon Web Services

Web Application Hosting in the AWS Cloud Best Practices

Getting Started with Clearlogin A Guide for Administrators V1.01

Best Practices for Siebel on AWS

Transcription:

Security Essentials & Best Practices

Overview Overview of the AWS cloud security concepts such as the AWS security center, Shared Responsibility Model, and Identity and Access Management.

1 AWS Security Center

AWS Security Center Comprehensive securtiy portal to provide a variety of security notifications, information and documentation: http://aws.amazon.com/security. Security Whitepapers Overview of Security Process AWS Risk and Compliance AWS Security Best Practices Security Resources Penetration Testing Vulnerability Reporting Report Suspicious Emails Security Bulletins

Security Resources and Blog AWS Security Resources Developer Information Articles + Tutorials Security Products Whitepapers Broad range of available security resources, training and tools: http://aws.amazon.com/security/security-resources/. AWS Security Blog Subscribe to the AWS Security Blog to stay up-to-date on AWS security and compliance: http://blogs.aws.amazon.com/security/

AWS Compliance List of compliance, assurance programs and resources: http://aws.amazon.com/compliance/. AWS Assurance Programs PCI DSS Level 1 SOC 1/ ISAE 3402 SOC 2 SOC 3 ISO 9001 IRAP FIPS 140-2 MPAA HIPPA FedRAMP (SM) DoD CSM Levels 1-2,3-5 DIACAP and FISMA ISO 27001 MTCS Tier 3 ITAR CSA

2 Shared Responsibility Model

AWS Shared Responsibility Model Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure Virtualization layer (EC2) Hardened service endpoints Rich IAM capabilities Customer Network configuration Security groups + = OS firewalls Operating systems Applications Proper service configuration AuthN & acct management Authorization policies More secure and compliant systems than any one entity could achieve on its. own at scale Scope of responsibility depends on the type of service offered by AWS: Infrastructure, Container, Abstracted Services Understanding who is responsible for what is critical to ensuring your AWS data and systems are secure!

Shared Responsibility Model Customer Customer content Pla=orm, Applica3ons, Iden3ty & Access Management Opera3ng System, Network & Firewall Configura3on Customers are responsible for their security and compliance IN the Cloud Client- side Data Encryp3on Server- side Data Encryp3on Network Traffic Protec3on AWS AWS Founda+on Services Compute Storage Database Networking AWS Global Infrastructure Availability Zones Regions Edge Loca+ons AWS is responsible for the security OF the Cloud

Meet your own security objectives Customer Your own accredita3on Your own cer3fica3ons Your own external audits Customer scope and effort is reduced Better results through focused efforts AWS AWS Founda+on Services Compute Storage Database Networking AWS Global Infrastructure Availability Zones Regions Edge Loca+ons Built on AWS consistent baseline controls

AWS Responsibilities Physical Security of Data Center Amazon has been building large-scale data centers for many years. Important attributes: Non-descript facilities Robust perimeter controls Strictly controlled physical access Two or more levels of two-factor authentication Controlled, need-based access. All access is logged and reviewed. Separation of Duties Employees with physical access don t have logical privileges.

AWS Responsibilities EC2 Security Host operating system Individual SSH keyed logins via bastion host for AWS admins All accesses logged and audited Guest (a.k.a. Instance) operating system Customer controlled (customer owns root/admin) AWS admins cannot log in Customer-generated keypairs Stateful firewall Mandatory inbound firewall, default deny mode Customer controls configuration via Security Groups Network Security IP Spoofing prohibited at host OS level. Packet sniffing is ineffective (protected at hypervisor level). Unauthorized Port Scanning a violation of TOS and is detected/blocked. Inbound ports blocked by default.

AWS Responsibilities Configuration Management Most updates are done in such a manner that they will not impact the customer. Changes are authorized, logged, tested, approved, and documented. AWS will communicate with customers, either via email, or through the AWS. Service Health Dashboard (http://status.aws.amazon.com/) when there is a potential for service being affected. Built for Continuous Availability Scalable, fault tolerant services. All datacenters (AZs) are always on. No Disaster Recovery Datacenter Managed to the same standards Robust Internet connectivity Each AZ has redundant, Tier 1 ISP Service Providers Resilient network infrastructure

AWS Responsibilities Disk Management Proprietary disk management prevents customers from accessing each other s data. Disks wiped prior to use. Disks can be encrypted by the customer for additional security. Storage Device Decommissioning All storage devices go through process using techniques from: DoD 5220.22-M ( National Industrial Security Program Operating Manual ). NIST 800-88 ( Guidelines for Media Sanitization ). Ultimately devices are: Degaussed. Physically destroyed.

3 Identity and Access Management

Identity Management Definitions Identity Management describes the management of individual principals, their authentication, authorization, and privileges within or across system and enterprise boundaries with the goal of increasing security and productivity while decreasing cost, downtime and repetitive tasks. (Wikipedia)

Considerations for Layers of Principals Applications Identities: Application Users, Application Administrators Operating Systems Identities: Developers, DevOps and/or System Engineers Amazon Web Services Identities: Developers, DevOp Engineers, Testers, Software/Platform Interaction of AWS Identities: Provisioning/deprovisioning EC2 instances and EBS storage. Configuring Load Balancers. Accessing S3 Objects or data in DynamoDB. Accessing data in DynamoDB. Interacting with SQS queues. Sending SNS notifications.

AWS Principals Account Owner ID (Root Account) Access to all subscribed services. Access to billing. Access to console and APIs. Access to Customer Support. IAM Users, Groups and Roles Access to specific services. Access to console and/or APIs. Access to Customer Support (Business and Enterprise). Temporary Security Credentials Access to specific services. Access to console and/or APIs.

AWS Identity Authentication Authentication: How do we know you are who you say you are? Console API Username/ Password MFA Token (Recommended) Access/Secret Key(s) MFA Token (Optional) Signed URL (Token) Temporary Access/Secret Key(s) Note: It is recommended to delete Root Access Keys. AWS does not store/retain your Secret Keys.

AWS Authorization and Privileges Authorization: What are you allowed to do? Account Owner (Root) Privileged for all actions. Note: Always associate the account owner ID with an MFA device and store it in a secured place! IAM Policies Privileges defined at User and Resource Level

AWS IAM Hierarchy of Privileges Enforce principle of least privilege with Identity and Access Management (IAM) users, groups, and policies and temporary credentials. AWS Account Owner (Root) AWS IAM User Temporary Security Credentials Permissions Unrestricted access to all enabled services and resources. Access restricted by Group and User policies Access restricted by generating identity and further by policies used to generate token Example Action: * Effect: Allow Resource: * (implicit) Action: [ s3:*, sts:get* ] Effect: Allow Resource: * Action: [ s3:get* ] Effect: Allow Resource: arn:aws:s3:::mybucket/*

AWS Identity and Access Management (IAM) Securely control access to AWS services and resources for your users. Username/ User Manage groups of users Centralized Access Control Optional Configurations: Password for console access. Policies for controlling access AWS APIs. Two methods to sign API calls: X.509 certificate Access/Secret Keys Multi-factor Authentication (MFA)

Identity and Access Management Common approaches for Applications and Operating Systems Local User Databases Local Password (passwd) files. Local Windows administrator accounts. User Databases. User DB LDAP Directories: On-premise accessed over VPN. Replicated to AWS (read-only or read/write). Federated (one-way trusts, ADFS). Managed Samba-based directories via AWS Directory Services. AWS Directory Service Domain Controller

AWS Directory Service Managed service for Active Directory Existing Corporate Credentials AWS-based Applications AWS Management Console via IAM Roles Directories Supported AD Connector: Connect to your on-premise Active Directory. Simple AD: AWS-based managed directory compatible w/ Active Directory.

4 Encryption

Encryption. Protecting data in-transit and at-rest. Encryption In-Transit HTTPS SSH SSL/TLS VPN Object Encryption At-Rest Object Database Filesystem Disk Details about encryption can be found in the AWS Whitepaper, Securing Data at Rest with Encryption.

Encryption Data at Rest Volume Encryption EBS Encryption Filesystem Tools AWS Marketplace/ Partner EBS Object Encryption S3 Server Side Encryption (SSE) S3 SSE w/ Customer Provided Keys Client-Side Encryption Database Encryption RDS MSSQL TDE RDS ORACLE TDE/HSM RDS MYSQL KMS RDS PostgreSQL KMS Redshift Encryption

AWS Key Management Service Managed service to securely create, control, rotate, and use encryption keys. Customer Master Key(s) Centralized Key Management for use with AWS: EBS S3 Redshift AWS SDK Data Key 1 Data Key 2 Data Key 3 Data Key 4 AWS CloudTrail Amazon S3 Object Details about security controls can be found in the AWS Whitepaper: KMS Cryptographic Details. Amazon EBS Volume Amazon Redshift Cluster

AWS CloudHSM Help meet compliance requirements for data security by using a dedicated Hardware Security Module appliance with AWS. CloudHSM Appliance Details: Customer Keys Crypto Operations VPC AWS Administrator manages the appliance AWS Management Monitoring Data Center SafeNet Luna HSM AWS CloudHSM You control keys and crypto operations Amazon Virtual Private Cloud

5 Configuration Management

AWS CloudTrail Web service that records AWS API calls for your account and delivers logs. Console AWS SDK CLI CloudTrail S3 AWS Partner Network CloudSearch EMR/Redshift

AWS CloudWatch Monitoring services for AWS Resources and AWS-based Applications. EC2 Collect and Track Metrics Custom ELB EMR Route 53 SNS EBS SQS AutoScaling EBS Billing RDS Storage Gateway CloudFront DynamoDB ElastiCache Monitor and Store Logs Set Alarms View Graphs and Statistics

AWS Service Catalog Self-service portal for creating and managing resources in AWS. Pre-Announced Administrator Portfolio w/permissions Create CloudFormation Template Notifications Product Service Catalog Product A Portfolio Product B Deployed Stack(s) Browse Products Launch Products Notifications End Users Create and manage approved catalogs of resources. End users browse and launch products via self-service portal. Control user access to applications or AWS resources per compliance needs. Extensible via API to existing self-service frameworks.

AWS Config *Preview Managed service for tracking AWS inventory and configuration, and configuration change notification. AWS Config EC2 EBS VPC CloudTrail Security Analysis Audit Compliance Change Management Troubleshooting Discovery

6 Security Best Practices

AWS Trusted Advisor Leverage Trusted Advisor to analyze your AWS resources for best practices for availability, cost, performance and security. Fault Tolerance Performance Cost Optimization Security Security Groups Specific Ports CloudTrail Logging S3 Bucket Permissions Free Tier IAM Use IAM Password Policy RDS Security Group Access MFA on Root CloudSearch Route53

AWS Shared Responsibility Model Understand compliance and security responsibilities for AWS Resources. Facilities Operations Guest Operating System Amazon Web Services Infrastructure Physical Security Physical Network Virtual Customer Configuration Application Security Group Access Control List Identity Management HW Lifecycle Management Access Management

Identity Access Management Create appropriate principles, authorization and privileges for AWS Resources. AWS Identify and Access Management Multi-Factor Authentication User User User Hardware Virtual Groups Roles Policies Principle of Least Privilege IAM AWS Administrative Users Root Account Note: Always associate the account owner ID with an MFA device and store it in a secured place!

Enforce consistent security on your hosts Configure and harden EC2 instances based on security and compliance needs. Host-based Protection Software Restrict Access Where Possible Connect to Existing Services User administration Whitelisting and integrity Malware and HIPS Vulnerability management Audit and logging Hardening Operating system AMI catalog Launch instance EC2 Running instance Configure instance Your instance

Defense-in-Depth Physical Network AWS Compliance Program Third Party Attestations Security Groups VPC Configuration Web Application Firewalls Bastion Hosts Encryption In-Transit DATA System Security Data Security Hardened AMIs OS and App Patch Mgmt. IAM Roles for EC2 IAM Credentials Logical Access Controls User Authentication Encryption At-Rest

? Questions