3. Overview
Overview of the AWS cloud security concepts such as the AWS Security Center,
Shared Responsibility Model, and Identity and Access Management.
What are your perceptions
on cloud security?
-protecting your account tby using notifications,
Least privileges principle
Who gets in and out
What are your top security concerns
4. AWS security Benefits
Build an environment for the most secure – sensitive organizations
Benefits ALL customers
Validate design, eand operational excellence
7. Question 1
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Shared Responsibility Model
Customers are
responsible for their
security and
compliance IN the
Cloud
AWS is responsible
for the security OF
the Cloud
8. ‘of’ the cloud
Securing Your AWS Infrastructure
Responsible for security
‘in’ the cloud
• AWS Security Services
• Asset Management
• Data Security
• Network Security
• Access Controls
Responsible for security
•
• Physical & Environmental Security
• IT Operations Access Controls
• Security Policy & Governance
• Change Management
9. AWS : Security of the Cloud
Physical security of data centers
Hardware and software infrastructure
Network infrastructure
Virtualization infrastructure
Host operating system
10. Physical & Environmental Security: Physical Security
Building
Perimeter and entry
Security staff and surveillance
Two-factor authentication Escort
11. AWS Responsibilities
• Host operating system
• Individual SSH keyed logins via bastion host for AWS admins
• All accesses logged and audited
• Guest (a.k.a. Instance) operating system
• Customer controlled (customer owns root/admin)
• AWS admins cannot log in
• Customer-generated keypairs
• Stateful firewall
• Mandatory inbound firewall, default deny mode
• Customer controls configuration via Security Groups
Configuration Management
• Most updates are done in such a manner that they will not impact the customer.
• Changes are authorized, logged, tested, approved, and documented.
• AWS will communicate with customers, either via email, or through the AWS Service
Health Dashboard (http://status.aws.amazon.com/) when there is a potential for service
being affected.
12. Physical & Environmental Security: Environmental Security
Fire detection and suppression
Power
Climate and temperature
Monitoring equipment
Storage device decommissioning
14. IT Operations Controls
Backup &
Recovery
Business
Continuity and
Disaster Recovery
Secure
Communication
Data
Management
Prevent loss of critical
data
Respond to & recover
from major disruptions
Prevent sensitive
information from being
disclosed to unauthorized
parties
Detect suspicious
activities & unauthorized
tampering of the system
15. AWS Responsibility? or Customer Responsibility?
Configuring the
Security Group rules
that determine which
ports are open on the
EC2 Linux instance
Toggling on the
Server-side
encryption feature for
S3 buckets
Patching the operating
system with the latest
security patches
Installing camera
systems to monitor
the physical
datacenters
Shredding disk drives
before they leave a
datacenter
Preventing packet
sniffing at the
hypervisor level
Securing the internal
network inside the AWS
datacenters
16. AWS Customers: Security in the Cloud
Validate design, and operational excellence
maintain complete control over your content.
managing security requirements for your content, including which content you choose
to store on AWS, which AWS services you use, and who has access to that content.
You also control how access rights are granted, managed, and revoked.
Security steps - configuring, and patching the operating systems that will run on
Amazon EC2 instances, configuring security groups, and managing user accounts.
18. Security Policy and governance Controls
Security
Policy
Risk
Assessment
Training &
Awareness
Guide operations &
information security in the
organization
Mitigate risks & reduce
exposure to
vulnerabilities
Enhance awareness of
AWS policies &
procedures
19. Security policy and governance controls
Communication Compliance HR Security Third Party
Management
Prevent unauthorized
modification or disclosure
of information
Prevent inadvertent
violation of laws &
regulations
Prevent potential security
breaches resulting from
human resource
Prevent potential
compromise of information
due to misuse
20. Questions
1. A customer has recently experienced an SQL injection attack on their web
application’s database hosted in EC2. They submitted a complaint ticket to AWS. What
should be the response from AWS?
A) AWS should not be liable for the damages since the customer should have properly
patched the EC2 instance.
B) AWS and the customer should contact a third party auditor to verify the incident.
C) AWS should reiterate that the customer is responsible for the security of their
applications in the Cloud.
D) AWS should secure their infrastructure better to reduce these kinds of incidents.
21. Questions
Shared Controls: Controls which apply to both the infrastructure layer and customer
layers, but in completely separate contexts or perspectives. In a shared control, AWS
provides the requirements for the infrastructure and the customer must provide their own
control implementation within their use of AWS services.
Examples inc
– Patch Management: AWS is responsible for patching and fixing flaws within the
infrastructure, but customers are responsible for patching their guest OS and
applications.
– Configuration Management: AWS maintains the configuration of its infrastructure
devices, but a customer is responsible for configuring their own guest operating systems,
databases, and applications.
– Awareness & Training: AWS trains AWS employees, but a customer must train their
22. Questions
What is AWS responsible for securing?
• AWS-owned hardware
• AWS-owned software
• AWS-owned networking
• All of the above
What constitutes "inherited controls" in AWS' shared responsibility model?
• Physical and environmental controls
• Patch management
• Zone security
• None of the above
23. Questions
1. Patch management is solely the responsibility of the user.
• True
• False
Who holds the responsibility to protect user data stored on physical disks?
• Government regulatory agencies
• Users
• AWS
• All of the above
24. Questions
Who holds the responsibility to protect user data stored on physical disks?
• Government regulatory agencies
• Users
• AWS
• All of the above
26. Enables you to manage access to AWS services and resources securely.
IAM features; IAM users, groups, and roles, IAM policies, Multi-factor authentication
Definitions
• IAM = Identity and Access Management, Global service
• Root account created by default, shouldn’t be used or shared
• Users are people within your organization, and can be grouped
• Groups only contain users, not other groups
• Users don’t have to belong to a group, and user can belong to multiple groups
AWS Identity and Access Management (IAM)
Different ways of
Authentication:
- What you know()
- What you have
(RSA, token)
- Who you are(Finger
print, eye
scanner)
27. AAA with AWS
Authenticate
IAM Username/Password
Access Key
(+ MFA)
Federation
Authorize
IAM Policies
Audit
CloudTrail
28. AWS account root user
use the root user to create your first IAM user
and assign it permissions to create other users.
29. AWS Principals
• Access to specific services.
• Access to console and/or APIs.
• Access to Customer Support (Business and Enterprise).
IAM Users, Groups and Roles
• Access to specific services.
• Access to console and/or APIs.
Temporary Security Credentials
• Access to all subscribed services.
• Access to billing.
• Access to console and APIs.
• Access to Customer Support.
Account Owner ID (Root Account)
30. AWS Identity Authentication
Authentication: How do we know you are who you say you are?
AWS Management Console API access
Login with Username/Password with
optional MFA (recommended)
Access API using Access Key +
Secret Key, with optional MFA
ACCESS KEY ID
Ex: AKIAIOSFODNN7EXAMPLE
SECRET KEY
Ex: UtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
For time-limited access: Call the AWS Security Token
Service (STS) to get a temporary AccessKey +
SecretKey + session token
For time-limited access: a Signed URL can provide
temporary access to the Console
31. Authorization: What are you allowed to do?
Account Owner (Root)
• Privileged for all actions.
IAM Policies
• Privileges defined at User and
Resource Level
Note: Always associate the account owner ID with
an MFA device and store it in a secured place!
32. AWS Account
Owner (Root)
AWS IAM
User
Temporary
Security
Credentials
Permissions Example
Unrestricted access to all
enabled services and
resources.
Action: *
Effect: Allow
Resource: *
(implicit)
Access restricted by
Group and User policies
Action:
[‘s3:*’,’sts:Get*’]
Effect: Allow
Resource: *
Access restricted by
generating identity and
further by policies used
to generate token
Action: [ ‘s3:Get*’ ]
Effect: Allow
Resource:
‘arn:aws:s3:::mybucket/*’
Enforce principle of least privilege with Identity and Access Management (IAM)
users, groups, and policies and temporary credentials.
33. Securely control access to AWS services and resources for your users.
Username/
User
Manage groups
of users
Centralized
Access Control
• Password for console access.
• Policies for controlling access AWS APIs.
• Two methods to sign API calls:
•X.509 certificate
•Access/Secret Keys
• Multi-factor Authentication (MFA)
Optional Configurations:
AWS Identity and Access Management (IAM)
35. • AWS Certificate Manager (ACM)
makes it easy to provision, manage, deploy, and renew SSL/TLS
certificates on the AWS platform.
Customer
Master
Key(s)
Data Key 1
Amazo
n S3
Object
Amazon
EBS
Volume
Amazon
Redshift
Cluster
Data Key 2 Data Key 3 Data Key 4
• AWS key Management Service
Managed service to securely create, control, rotate, and use
encryption keys.
• AWS CloudHSM
Help meet compliance requirements for data
security by using a dedicated Hardware Security
Module appliance with AWS.
Dedicated, single-tenant hardware device
36. Amazon Inspector
Amazon Inspector is an automated security
assessment service that helps improve the
security and compliance of applications deployed
on AWS.
AWS CloudTrail
Web service that records AWS API
calls for your account and delivers
logs.
• Whomade the API call?
• When was the API call made?
• What was the API call?
• Which resources were acted up on in the API call?
• Where was the API call made from and made to?
AWS CloudWatch
Monitoring services for AWS Resources and AWS-based Applications
Monitor and Store Logs
Set Alarms (react to changes)
View Graphs and Statistics
Collect and Track Metrics
How can you use it?
React to application log events and availability
Automatically scale EC2 instance fleet
View Operational Status and Identify Issues
Monitor CPU, Memory, Disk I/O, Network, etc.
What does it do?
37. AWS WAF
General WAF use cases
• Protect from SQL Injection (SQLi) and Cross Site Scripting (XSS)
• Prevent Web Site Scraping, Crawlers, and BOTs
• Mitigate DDoS (HTTP/HTTPS floods)
38. Vulnerability Assessment Service
Built from the ground up to support DevSecOps
Automatable via APIs
Integrates with CI/CD tools
On-Demand Pricing model
Static & Dynamic Rules Packages
Generates Findings
AWS Artifact
is a service that provides on-demand access to AWS
security and compliance reports and select online
agreements. AWS Artifact consists of two main sections:
AWS Artifact Agreements and AWS Artifact Reports.
AWS CloudTrail
Web service that records AWS API calls for your
account and delivers logs.
• Whomade the API call?
• When was the API call made?
• What was the API call?
• Which resources were acted up on in the API call?
• Where was the API call made from and made to?
AWS GuardDuty
Amazon GuardDuty is a threat detection service that
continuously monitors for malicious activity and unauthorized
behavior to protect your AWS accounts, workloads, and data
stored in Amazon S3
39. Amazon Inspector
Vulnerability Assessment Service
Built from the ground up to support DevSecOps
Automatable via APIs
Integrates with CI/CD tools
On-Demand Pricing model
Static & Dynamic Rules Packages
Generates Findings
AWS Artifact
is a service that provides on-demand access to AWS
security and compliance reports and select online
agreements. AWS Artifact consists of two main sections:
AWS Artifact Agreements and AWS Artifact Reports.
Managed service for tracking AWS inventory and configuration, and
configuration change notification.
AWS Config
AWS Trusted Advisor
Leverage Trusted Advisor to analyze your AWS resources for best
practices for availability, cost, performance and security.
AWS Shield
AWS Shield is a managed Distributed Denial of Service (DDoS)
protection service that safeguards applications running on AWS.