How To Use Aws.Com



Similar documents
Thing Big: How to Scale Your Own Internet of Things.

AIST Data Symposium. Ed Lenta. Managing Director, ANZ Amazon Web Services

Innovative Geschäftsmodelle Ermöglicht durch die AWS Cloud

Introduction to AWS in Higher Ed

Razvoj Java aplikacija u Amazon AWS Cloud: Praktična demonstracija

Encrypting Data at Rest

CLOUD COMPUTING WITH AWS An INTRODUCTION. John Hildebrandt Solutions Architect ANZ

Service Organization Controls 3 Report

Amazon Web Services Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand

Security Essentials & Best Practices

How To Manage An Orgsync Database On An Amazon Cloud 2 Instance

Last time. Today. IaaS Providers. Amazon Web Services, overview

EEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing

Running Oracle Applications on AWS

Last time. Today. IaaS Providers. Amazon Web Services, overview

Scalability in the Cloud HPC Convergence with Big Data in Design, Engineering, Manufacturing

Scalable Application. Mikalai Alimenkou

AWS Key Management Service. Developer Guide

ur skills.com

Introduction to Amazon Web Services! Leo Senior Solutions Architect

AWS Cloud for HPC and Big Data

Getting Started with SAP BI on AWS

AWS IaaS Services. Methods Digital GCloud Service Definition

Securing Data at Rest with Encryption

Microservices on AWS

AWS Performance Tuning

Scaling in the Cloud with AWS. By: Eli White (CTO & mojolive) eliw.com - mojolive.com

Cloud Computing with Amazon Web Services and the DevOps Methodology.

Service Organization Controls 3 Report

Amazon Web Services Fredrik Rapp, Partner Manager. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Primex Wireless OneVue Architecture Statement

Hadoop & Spark Using Amazon EMR

Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros

DLT Solutions and Amazon Web Services

A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)

Amazon Web Services: Risk and Compliance July 2015

CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA

PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS

SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS

Amazon Web Services. Lawrence Berkeley LabTech Conference 9/10/15. Jamie Baker Federal Scientific Account Manager AWS WWPS

LONDON. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved

319 MANAGED HOSTING TECHNICAL DETAILS

Cloud and the future of Unemployment Sean Rhody, CTO Capgemini Government Solutions

SECURITY IS JOB ZERO. Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs

Application Security Best Practices. Matt Tavis Principal Solutions Architect

Enterprise Cloud Computing with AWS. for internal partner use only

Preparing Your IT for the Holidays. A quick start guide to take your e-commerce to the Cloud

Alliance Key Manager Cloud HSM Frequently Asked Questions

The Cloud as a Computing Platform: Options for the Enterprise

Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok

AWS Benefits, Regions & Across. Paul Yung Head of Territory Development HK, Macau & TW pyung@amazon.com

ways to enhance security in AWS ebook

AWS Security & Compliance

Secure the AWS Cloud with SafeNet Solutions ebook GEMALTO.COM

TECHNOLOGY WHITE PAPER Jan 2016

AWS Directory Service. Simple AD Administration Guide Version 1.0

PATCH MANAGER what does it do?

Using ArcGIS for Server in the Amazon Cloud

AWS Security Best Practices

How to Leverage Cloud to Quickly Build Scalable Applications

Introduction to DevOps on AWS

TECHNOLOGY WHITE PAPER Jun 2012

AWS Security & Compliance Day

HADOOP BIG DATA DEVELOPER TRAINING AGENDA

MICROSTRATEGY ON AWS

ways to enhance security in AWS ebook

Using ArcGIS for Server in the Amazon Cloud

Amazon Web Services: Overview of Security Processes August 2015

Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS

CONNECTRIA MANAGED AMAZON WEB SERVICES (AWS)

Enterprise IT in the Cloud How to accelerate your business and be an IT hero

Amazon Relational Database Service. User Guide API Version

Scalable Architecture on Amazon AWS Cloud

SAS BIG DATA SOLUTIONS ON AWS SAS FORUM ESPAÑA, OCTOBER 16 TH, 2014 IAN MEYERS SOLUTIONS ARCHITECT / AMAZON WEB SERVICES

Amazon Elastic Beanstalk

Securing Amazon It s a Jungle Out There

Big Data on AWS. Services Overview. Bernie Nallamotu Principle Solutions Architect

Amazon Web Services Yu Xiao

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Logentries Insights: The State of Log Management & Analytics for AWS

JAVA IN THE CLOUD PAAS PLATFORM IN COMPARISON

Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud

Managed Amazon Web Services

Amazon Web Services: Overview of Security Processes August 2015

Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview

Amazon Web Services: Overview of Security Processes June 2014

Cloud Computing Benefits for Educational Institutions

PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP

Best Practices for Siebel on AWS

Transcription:

Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved.

Agenda Theory Options

The Cryptographic Trinity Key Data Algorithm If you don t own all three parts of the solution, your data is not considered to be hard encrypted

In Region I:

In Region II: AWS DC AWS DC AWS DC AWS DC

Between Regions: Availability Zone Availability Zone Public Availability Zone Availability Zone Region DX Site Customer WAN DX Site Region

Summary Data in transit within an AZ might leave the building Data in transit between AZs will leave the building Data in transit between AWS Regions or between AWS and customer premises needs to be taken care of, too Whatever you do: Encrypt Your Data in Flight How about devices: Device decommisining is main task for AWS This is fully compliant and audited No device does leave our DCs functional People leaving a DC need to pass a metal detector Let s discuss data at rest

Discussion Points Hard encryption might be excessive, for some purposes Find out where you need which kind of encryption map your view of risk and need Think about the lifetime of your data (example: German expiry of use of 3DES and resulting requirement for bulk data re-encryption with stronger algorithm ) Sometimes encryption is only there for Compliance reasons Work on your data classification Find balance between your obligation for executive care, cost and complexity

But: Getting Data at rest encrypted on AWS So so easy that you should consider a policy: All data need to be encrypted at rest!

AWS services and where we look into today: + Technology Partners Consulting Partners Ecosystem AWS Marketplace Elastic Beanstalk for Java, Node.js, Python, Ruby, PHP and.net Containers & Deployment (PaaS) OpsWorks CloudFormation IAM CloudTrail Cloud HSM CloudWatch Management & Administration Management Console APIs and SDKs Command Line Interface Analytics Application Services EMR Redshift Kinesis Data Pipeline CloudFront SNS SQS SES SWF WorkSpaces AppStream CloudSearch Networking VPC Direct Connect Route 53 Compute Storage MySQL, PostgreSQL Databases Oracle, SQL Server EC2 Elastic Load Balancer Auto Scaling S3 EBS Glacier Storage Gateway Import/Export RDS DynamoDB ElastiCache Regions Availability Zones Content Delivery POPs

AWS Key Management Service I Designed for Scalability and Throughput Uses bespoke AWS hardware + software Is a multi-tenant service Performs AES256 operations API for crypto command: Key Management Encryption / Decryption Customer selects MasterKey Data Key is transported via envelope encryption Data Key 1 Amazon S3 Object Customer Master Key(s) Data Key 2 Data Key 3 Data Key 4 Amazon EBS Volume Amazon Redshift Cluster AWS KMS Custom Application

AWS Key Management Service II Reference Architecture Encrypted Data Application or AWS Service Data Key + Encrypted Data Key AWS Key Management Service Master Key(s) in Customer s Account 1. Application or AWS service client requests an encryption key to use to encrypt data, and passes a reference to a master key under the account. 2. Client request is authenticated based on whether they have access to use the master key. 3. A new data encryption key is created and a copy of it is encrypted under the master key. 4. Both data key and encrypted data key are returned to the client. Data key is used to encrypt customer data and then deleted as soon as is practical. 5. Encrypted data key is stored for later use and sent back to AWS KMS when the source data needs to be decrypted.

S3 (normal mode) Data is sent to S3 encrypted S3 stores the data unencrypted Data travels unencrypted between AZs Enforce https: { } "Statement": [{ "Effect": "Deny, "Action": "s3:*", "Condition": { "Bool": { "aws:securetransport": false } }, "Resource": "arn:aws:s3:::bucket/*" ]}

S3 (server-side encryption) Data is sent to S3 encrypted S3 encrypts data with AWS owned key Data travels encrypted between AZs Data at rest is encrypted with AWS-owned key Enforce at-rest encryption: { "Statement":[{ "Sid":"DenyUnEncryptedObjectUploads", "Effect":"Deny", "Principal":"*", "Action":"s3:PutObject", "Resource":"arn:aws:s3:::YourBucket/*", "Condition":{ "StringNotEquals":{ "s3:x-amz-server-side-encryption":"aes256" } } } ] }

S3 (server-side, user key) Data is sent to S3 encrypted S3 encrypts data with customer key sent in request The key will be forgotten by AWS immediatelly Data travels encrypted between Azs Data at rest is encrypted with customer-owned key Customer needs to send key in GET request

IAM S3 (server-side, user key + KMS) Data is sent to S3 encrypted S3 encrypts data with key sent in request Data travels encrypted between AZs Data at rest is encrypted with customer-owned key Key remains in KMS KMS Object

S3 (client-side encryption) Client encrypts the data locally with local held key Data is sent to S3 encrypted Data travels encrypted between AZs Data at rest is encrypted with customer-owned key AWS never sees the key

EBS (normal mode) Instance sends data to volume via hypervisor module Module can encrypt or not, depending on customer choice Data travels to the disks and between datacentres, potentially unencrypted Data lives unencrypted on Disk

IAM EBS (server-side encryption) Instance sends encrypted data over hypervisor to volume Instance OS needs to support encryption Data travels encrypted to the disks and between datacentres Data lives encrypted on Disk AWS owns key/algorithm/data Included in scope of AWS SOC1 report KMS Volume

CloudHSM Tamper-Proof and Tamper-Evident Destroys its stored keys if under attack FIPS 140-2 Level 2 certified Base position is to be a Keystore Can also be used to timestamp documents You can send data for encrypt / decrypt Key never does leave the HSM Can be used by several commecial software Can be used by API access the HSM Needs to be backed-up (ideally to HSM on customer premises) Can be (and should) be combined in HA clusters Is NOT a key management system but can work with some third-party ones Communicates via: PKCS#11 JCE Some applications need a plugin

Redshift can use CloudHSM When using CloudHSM Redshift gets cluster key from HSM Redshift generates a database key and encrypts it with the cluster key from the CloudHSM Redshift encrypts data with the database key Redshift supports re-encryption

RDS Crypto Support RDS / Oracle can use CloudHSM to store keys for Oracle Wallet So TDE can be HSM-backed RDS / MySQL, RDS / Postgres can use KMS to manage keys used to encrypt underlying EBS volumes So all tables are encrypted at rest Note that in-memory database contents (once the database has been unlocked) are cleartext RAM encryption is not something AWS has today, but it has been done in other contexts

VPC VGW Hardware IPsec termination points Data on the VPC side of the VGW is unprotected by the VGW (no re-encryption) If you need VPN termination with onward re-encryption, use EC2 instances with OpenSWAN or Cisco CRSs instead Uses pre-shared symmetric key The Key is a shared one between AWS and the customer Customer

Between Regions Public Availability Zone Availability Zone Availability Zone Region Customer WAN Custome r DC Availability Zone Region DX Site DX Site

Others Glacier Archives have always been encrypted this is entirely transparent to the user Glacier keys are AES256 AWS holds key/algorithm/data Route53 Supports signed zones ELB Supports SSL termination including onward re-encryption and customer choice of cipher suite (useful post-poodle) AWS holds keys/algorithm/data Unidirectional trust only (no certificate-based authentication of client to server) Import/Export Currently relies on Truecrypt shared secret between customer and AWS for exporting data Truecrypt has not been broken, but it is not longer maintained. Therefore import/export will choose another option

Bertram Dorn Amazon Web Services Germany GmbH bedorn@amazon.de Additional Ressources: http://aws.amazon.com/documentation http://aws.amazon.com/compliance http://aws.amazon.com/security