AWS Security For Enterprises
AWS Security For Enterprises
Ekta Parashar
Workshop Agenda Security
Announced Regions
Paris, Ningxia
AWS Regions and Availability Zones
Region
An independent collection of AWS services in a defined
Region geographical location
Availability Availability Foundation for meeting location dependent privacy and
Zone Zone compliance requirements
A B
Customer has full control. AWS does not move
customer’s resources
Contains two or more Availability Zones
Availability
Zone
C Availability Zone
Distinct locations engineered to be insulated from
failures in other Availability Zones
Connected via an inexpensive, low latency network
Marketplace Mgmt. Tools Analytics Dev Tools Artificial IoT Mobile Enterprise Game
Intelligence Applications Development
The AWS Business
Applications
Monitoring
Query Large
Data Sets
Business Business
Service Catalog
Intelligence Analytics
Server Build, Test, Document
Security Hadoop/Spark Rules Engine
Account Support Management Monitor Apps Sharing
Configuration Real-time Data Private Git Voice & Text Local Compute Push Email &
Support Networking
Tracking Streaming Repositories Chatbots and Sync Notifications Calendaring
Database & Orchestration Continuous Machine Build, Deploy, Hosted
Managed Services Optimization Device Shadows
Storage Workflows Delivery Learning Manage APIs Desktops
Training &
Certification Application Application Database Server
Migration Discovery Migration
Data Migration
Migration Migration
Solution
Architects Integrated Identity Resource VMware on Devices & Edge
Hybrid Data Integration
Networking Federation Management AWS Systems
Account
Management Application
Transcoding Step Functions Messaging
Security & Pricing Services
Reports Identity & Key Storage & Application Certificate Web App.
Security Access Management
Active Directory DDoS Protection
Analysis Management Firewall
Technical Acct.
Management Data
Database Aurora MySQL PostgreSQL Oracle SQL Server MariaDB
Warehousing
NoSQL
Availability Points of
Infrastructure Regions
Zones Presence
Focus on Security & Enabling Compliance
AWS provides the same, familiar approaches to security and compliance that companies have
been using for decades – with increased visibility, control, and auditability.
Visibility Control
View your entire
Deep insight with AWS You have sole authority Shared responsibility
infrastructure with one
click CloudTrail on where data is stored model
Auditability
3rd party validation – certifications for workloads that matter
Physical Security of Data Centers
• Amazon has been building large-scale data centers for many years
• Important attributes:
• Non-descript facilities
• Robust perimeter controls
• Strictly controlled physical access
• 2 or more levels of two-factor auth
• Controlled, need-based access
• All access is logged and reviewed
• Separation of Duties
• employees with physical access don’t have logical privileges
Shared Security Responsibility Model
Shared Security Model
• Shared Responsibility
– Let AWS do the heavy lifting
– Focus on what’s most valuable to your business
• AWS • Customer
• Facility operations • Choice of Guest OS
• Physical Security • Application Configuration Options
• Physical Infrastructure • Account Management flexibility
• Network Infrastructure • Security Groups
• Virtualisation Infrastructure • ACLs
• Hardware lifecycle management • Identity Management
Shared Security Model: Infrastructure Services
Such as Amazon EC2, Amazon EBS, and Amazon VPC
I WAS A
SOLID STATE
DRIVE
Compliance
AWS Compliance
AWS Artifact – Self Service
For new customers reach out to your account manager to obtain compliance reports via email.
Virtual Private Cloud
(VPC)
AWS Security
What is a Virtual Private Cloud? Security
Logically isolated
Software-defined network
Virtual networking
Complete control
Secure
10.0.32.0/20 ( Public )
10.0.0.0/19 ( Private )
Your premises
Elastic Load
NAT Balancer
10.0.32.0/20 ( Public )
Availability Zone A
Web
EC2EC2
Web Web
EC2EC2
Web App
EC2 VPC
Router
10.0.0.0/19 ( Private )
Your premises
Elastic Load
NAT Balancer
10.0.32.0/20 ( Public )
Availability Zone A
Web
EC2EC2
Web Web
EC2EC2
Web App
EC2 VPC
Router
10.0.0.0/19 ( Private )
Your premises
Log
Customer
EC2 Jump
Virtual Private
Gateway
10.0.48.0/21 ( Sensitive ) Gateway
Elastic Load
NAT Balancer
10.0.32.0/20 ( Public )
Availability Zone A
Web
EC2EC2
Web Web
EC2EC2
Web App
EC2 VPC
Router
10.0.0.0/19 ( Private )
Your premises
Log
Customer
EC2 Jump
Virtual Private
Gateway
10.0.48.0/21 ( Sensitive ) Gateway
Elastic Load
NAT Balancer
10.0.32.0/20 ( Public )
Availability Zone A
Web
EC2EC2
Web Web
EC2EC2
Web App
EC2 VPC
Router
10.0.0.0/19 ( Private )
Your premises
Log
Customer
EC2 Jump
Virtual Private
Gateway
10.0.48.0/21 ( Sensitive ) Gateway
Elastic Load
NAT Balancer
10.0.32.0/20 ( Public )
Availability Zone A
Web
EC2EC2
Web Web
EC2EC2
Web App
EC2 VPC
Router
10.0.0.0/19 ( Private )
Your premises
Log
Customer
EC2 Jump
Virtual Private
Gateway
10.0.48.0/21 ( Sensitive ) Gateway
SG SG SG SG SG SG
In Out In Out In Out
Network ACL Network ACL Out Network ACL Network ACL Out
In In
Virtual Router
Route Route
Table Table
Internet Virtual
Gateway Private
Gateway
VPC Patterns - Single Large VPC
Analogous to a traditional data center
Pros
• Aligned with existing data center concept, allows Enterprises
to easily accept virtual DC concept
• Allows for Rapid Deployment requiring minimal incremental
Involvement from Network group
WEB UAT
• Single Direct Connect integration point
Direct
Connect
Locations Cons
• Complex operational management where multiple teams are
UNRESTRICTED
COMMON SERVICES
VPC Patterns - Multiple VPCs by Environment
Segregated based on environment type
Pros
• Delegate access control and VPC configuration to different
teams based on environment
• Easier separation of environments, thus limiting the blast
radius of changes
PRODUCTION
• Separation of security controls across environments
• Security assessment policies can be based on environment
• Supports strong segregation of duties by environment
Direct
Connect
Locations Cons
SIT UAT
• Complex operational management where multiple teams are
delegated access to VPC
• Complex security management, IAM policies are common
• Complex tagging processes required for billing
• Limited expansion space, “get it right first time” or add
multiple environment VPCs
DEVELOPMENT
VPC Patterns - Multiple VPCs and Accounts
Segregated based on environment type, across multiple AWS accounts
Pros
• Delegate access control and VPC configuration to different
teams based on environment
• Easier separation of environments, thus limiting the blast
radius of changes
PRODUCTION
• Separation of security controls across accounts and
environments
• Security assessment policies can be based on environment
• Supports strong segregation of duties by environment
Direct
Connect
Locations Cons
• Limited expansion space, “get it right first time” or add
SIT UAT
multiple environment VPCs
• Availability Zone mapping
DEVELOPMENT
Identity & Access
Management (IAM)
AWS Security
User Access (IAM)
• With AWS IAM you get to control who can do
what in your AWS environment and from
where
• CloudWatch Logs lets you monitor and troubleshoot your systems and
applications using your application or system logs.
• CloudWatch Logs can be used to monitor your logs for specific phrases,
values, or patterns.
• You can enable VPC Flow Logs to capture information about the IP traffic
going to and from network interfaces in your VPC.
• Flow log data is stored using Amazon CloudWatch Logs approximately
batched every 10 minutes.
• In addition to troubleshooting, you can use VPC Flow Logs as a security
tool to monitor the traffic that is reaching your instance.
All EBS volumes should be encrypted Encrypt volumes and alert operations
team
Instances must be from a specific Terminate instance and notify build team
approved AMI
• Customers can request permission to conduct scans of their cloud infrastructure or use pre-
approved marketplace scanning products.
Amazon Inspector
Pure Play WAF CDN WAF Load Balancer WAF UTM WAF
• Imperva* • Akamai Kona • F5 Networks* • Sophos*
• Alert Logic • CloudFlare** • Citrix* • Fortinet*
• Barracuda* • EdgeCast • Barracuda*
• Qualys* • Incapsula**
• LeaseWeb
CloudFront
legitimate
users traffic
Edge AND/OR
Location
S3 ELB EC2
hackers SQL Injection,
XSS, other attacks Customer On Premises Environment
site
bad bots
scraping
Origin Server Origin Storage
ELB Sandwich
CloudFront
legitimate
users traffic ELB EC2
WAF ELB
Edge
Location
site
bad bots
scraping
CloudFront
legitimate
users traffic
AND/OR
site
bad bots
scraping
Origin Server Origin Storage
• AWS CloudHSM
• On-premise solutions
• You can browse, test, and buy encryption and key management solutions via
the AWS Marketplace
• Pricing models vary: pay-by-the-hour, monthly, or annual
• The software fees are simply added to your AWS bill
• Some solutions offer a bring-your-own-license option
AWS Marketplace
AWS KMS AWS CloudHSM DIY
Partner Solutions
Where keys are generated AWS In AWS, on an HSM that Your network or in AWS Your network or in AWS
and stored you control
Where keys are used AWS services or your AWS or your Your network or your Your network or your
applications applications EC2 instance EC2 instance
How to control key use Policy you define; Customer code + Vendor-specific Config files, vendor-
enforced by AWS SafeNet APIs management specific management
Responsibility for AWS You You You
performance/scale
Integration with AWS Yes Limited Limited Limited
services?
Pricing model Per key/usage Per hour Per hour/per year Variable
• Two topics:
• Between your corporate network and the VPC
• Virtual Private Networks (VPN)
• Between applications to your apps’ end-users
• TLS certificates
• Two topics:
• Between your corporate network and the VPC
• Virtual Private Networks (VPN)
• Between applications to your apps’ end-users
• TLS certificates
• AWS Certificate Manager (ACM) is a service that lets you easily provision,
manage, and deploy TLS certificates for use with Amazon Elastic Load
Balancer or Amazon CloudFront distribution.
• With ACM, there is no additional charge for provisioning TLS certificates.
• ACM manages the renewal process of TLS certificates and deploys renewed
certificates to your AWS resources.
• Certificates provided by ACM are verified by Amazon’s certificate authority
(CA), Amazon Trust Services (ATS).
SaaS
SaaS
SaaS
More secure in the cloud