SlideShare une entreprise Scribd logo
1  sur  34
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A U G . 2 4 – 2 5 , 2 0 2 1 | H O U S T O N , T X
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lessons learned from the
front lines of incident response
Brian “BasementCat” Andrzejewski
T D R 2 0 2
Lead Operator, Customer Incident Response Team (CIRT)
AWS Professional Services
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Who we are
Why we are here
Common causes for customer security events
Critical security patterns to reduce customer risks
Where to go next
Agenda
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Who we are
A specialized AWS Customer Incident Response team that assists and
advises customers during their active security events on the customer’s
side of the AWS Shared Responsibility Model
Experienced team of
AWS Professional Services
and Solution Architects
in incident response
Assist in root cause
analysis of a customer’s
AWS service logs for their
active security event
Assist and advise
customers with active
triage & recovery of their
security event on AWS
Provide advise to
customers for long-term
recovery from their
active security event
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Available escalations during an AWS customer’s
active security event
1. Validate AWS account ownership
to customer(s) impacted
2. Assist with triage & recovery with
customer and AWS teams
3. Investigate root cause(s) with
customer for their event
4. Provide recommendations for
next steps
AWS support case (all tiers)
AWS Account team
AWS Security
AWS Customer Incident Response Team
(CIRT)
External
Internal
AWS Customer Incident
Response team
Customer triage path
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS shared responsibility model
Customers and AWS Partners
https://aws.amazon.com/compliance/shared-responsibility-model/
Security IN
the cloud
Managed by
customers
Security OF
the cloud
Managed by
AWS
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The line varies. . .
Hardware/AWS global
infrastructure
Compute/storage/
database/network
Client-side data
encryption/integrity
Server-side encryption
Network traffic protection
OS, network, firewall
Configuration
Platform and application
management
Customer data
AWS
IAM
Customer
IAM
Infrastructure
services
Client-side data
encryption
Network traffic protection
Firewall configuration
OS, network, firewall
configuration
Platform and application
management
Customer data
Hardware/AWS global
infrastructure
Compute/storage/
database/network
AWS
IAM
Customer
IAM
Container
services
Abstracted
services
Client-side data
encryption
Network traffic protection
OS, network, firewall
configuration
Platform and application
management
Customer data
Hardware/AWS global
infrastructure
Compute/storage/
database/network
AWS
IAM
Customer
IAM
Server-side encryption
More
customizable
+
More customer
responsibility
Less customizable
+
Less customer
responsibility
+
More best
practices built in
https://aws.amazon.com/whitepapers/aws-security-best-practices/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Additional AWS customer responsibilities
All activities that occur under your account –
including unauthorized access (4.1)
Properly configuring and using an AWS service (4.3)
Keeping AWS root account email current for
notifications (13.10.a)
Taking appropriate action to secure, protect, and
back up your account and your content (4.3)
Not disclosing login credentials and access keys to
unauthorized third parties (4.4)
https://aws.amazon.com/agreement/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why are we here?
challenges 24/7
best practices
seeking right
AWS skillsets and knowledge
share
excel
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS incident response methodology
• Incident Response Phases
 Prepare and prevent
 Detect and assess impact
 Triage and recovery
 Investigate to root cause(s)
• Improve and iterate
 Develop people and technology
 Update playbooks and runbooks
 Simulate security events in environment
 Apply lessons learned and iterate to improve
https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Common causes for
customer security events
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding the
risk equation
Threat actor:
A cat that wants to scratch you
Threat:
The cat’s paw reaching out to scratch you
Vulnerability:
Your inability to defend against the scratch
Risk:
The likelihood of being scratched
Acceptable risk:
Your willingness to be scratched by the cat
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Gartner estimates that
most cloud security
failures will be IN the
cloud on the user side
Gartner “Is the Cloud Secure?”
https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Common causes for customer security events
Insecure
AWS resource
configuration
Inaccurate
AWS account contact
information
Lack of continuous
vulnerability
management executed
Unintended disclosure
of security credentials
and secrets
Inadvertent response to
Amazon GuardDuty and
other detective controls
Unmanaged
application
software security
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Critical security patterns
to reduce customer risks
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementation goals and objectives
Scenario-driven guidance to common root causes of security events
• Grounded to real-world security events experienced by AWS customers
• Prescriptive guidance on how prevent and detect by root cause
Reduce customer’s security risks to their AWS accounts and its resources
• Applicable to all AWS customers and their existing architectures
• Core AWS services to start your security journey and iterate beyond
• Prioritized to critical security practices observed to prevent and detect
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Bill of materials
Core AWS services AWS service tools
AWS Organizations Amazon GuardDuty
AWS Security Hub
AWS CloudTrail
AWS IAM Access
Analyzer and advisor
AWS IAM temporary
security credential
AWS Config
AWS Personal
Health Dashboard
AWS Well-Architected Tool Amazon CloudWatch
AWS Identity and Access
Management (IAM)
AWS Backup
Amazon VPC
Reachability Analyzer
AWS Secrets Manager
AWS IAM policy
simulator
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inaccurate AWS account information by customer
Prevent
• Ensure AWS account email uses both
 Corporate email domain
(i.e., example.com)
 Distribution email address
• AWS account root user
 Use IAM principals for day-to-day access
 Eliminate use of root access keys
 Use an MFA device for root console use
Detect
• Leverage CloudTrail and CloudWatch
events to detect AWS account changes
• Monitor your AWS notifications
 AWS account email
 AWS Health event alerts
• Use AWS Cost Anomaly Detection for
monitoring unusual AWS account costs
Affects AWS account holder’s ability to
• Act upon AWS-provided notifications that require timely resolution
• Provide account owner verification during AWS account recovery process
• Perform break-glass access for AWS account and during root user password reset
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Insecure AWS resource configuration by customer
Prevent
• Enable public block for supported AWS services to restrict public access
• Configure backups and validate restores with AWS Backup for critical resources and data
• Use different IAM principals and roles to manage vs. operate AWS resources to reduce impacts
• Deploy AWS resources into private VPCs to reduce unintended access
• Implement AWS Organizations security control polices to restrict
 Modify and delete AWS resource changes to system admin roles
 AWS access key usage to restricted policy conditionals
Critical configuration to focus on
• AWS Foundational Security Best Practices with severity critical or high
• Public-facing assets for defense-in-depth and restricted network access
• Deny-then-allow authentication for AWS resources that contain sensitive data
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Insecure AWS resource configuration by customer
Detect
• Enable Security Hub for all regions with AWS Foundational Security Best Practices to
detect common AWS resource misconfigurations
• Prioritize GuardDuty anomalous behavior findings for unexpected resources changes
• Leverage AWS Config for recording and building inventory
 AWS resources by name and service
 Individual AWS resource configurations
Critical configuration to focus on
• AWS Foundational Security Best Practices with severity critical or high
• Public-facing assets for defense-in-depth and restricted network access
• Deny-then-allow authentication for AWS resources that contain sensitive data
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unintended disclosure of security
credentials and secrets by customer
Prevent
• Disable and delete all AWS account root access keys
• Use temporary role-based access over static credentials and keys
• Require MFA for your most sensitive operations and privileged access
• Use Secrets Manager to vault and audit use of non-IAM credentials
• Build identity-based and resource-based policies for least-privilege access to reduce impact of
unintended access and disclosure
 Use explicit deny-then-allow policy conditions in identity and resource policies
 Tailor identity-based policies to use named actions to resource names or tagged resources
 Specify resource-based policies for explicit identity-based roles and/or identity
principal tags, and/or to restrict to specific VPC endpoints or source IP addresses
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Policy evaluation logic
https://amzn.to/3CLktQQ
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Resource-based policy restrictions
{
...
"Statement": [
{
"Sid": "VPCe",
"Action": "s3:*",
"Effect": "Deny",
"Resource": [
"arn:aws:s3:::DOC-EXAMPLE-BUCKET",
"arn:aws:s3:::DOC-EXAMPLE-BUCKET/*”
],
"Condition": {
"StringNotEquals": {
"aws:SourceVpce": [ "vpce-1111111” ]
}
},
”Principal": "*"
}
]
}
{
...
"Statement": [
{
"Sid": ”SourceIP",
"Action": "s3:*",
"Effect": "Deny",
"Resource": [
"arn:aws:s3:::DOC-EXAMPLE-BUCKET",
"arn:aws:s3:::DOC-EXAMPLE-BUCKET/*”
],
"Condition": {
"NotIpAddress": {
"aws:SourceIP": [ "11.11.11.11/32” ]
}
},
”Principal": "*"
}
]
}
VPC source restriction Source IP restriction
https://amzn.to/2VObNIA
S3 Bucket
Policy
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unintended disclosure of security
credentials and secrets by customer
Detect
• Monitor for identity behavioral changes recorded in AWS CloudTrail events:
 GuardDuty IAM findings
 CloudTrail Insights for unusual mutating events
• Continuously evaluate IAM principal usage to reduce over-privileged access impact
 IAM Credential Report to disable and remove unused IAM user and access keys
 IAM Access Advisor to refine IAM principal permissions using last-accessed information to AWS services
 IAM Access Analyzer to adjust IAM principal permissions through its past actions from CloudTrail trail and identify
resources shared with an external entity
 IAM Policy Simulator to test and simulate actions for their effective permissions of identity-based policies, permission
boundaries, SCPs, and resource-based policies
• Implement application security scanning for static credentials and secrets to reduce disclosure
• Monitor your AWS account email address for AWS notifications of compromised credentials
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Tools for least-access assessment
https://amzn.to/3CJZGwL
Use IAM access advisor
• Enabled per IAM principal by
default in IAM service
• Review which AWS services have
been used up to last 400 days
per IAM principal
Use IAM Access Analyzer to
generate least-access policy
• Requires CloudTrail trail is
enabled to Amazon S3
• Evaluates last 90 days of specific
IAM principal access from selected
CloudTrail trail S3 bucket
• Generates a suggested IAM policy
from evaluation to use
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inadvertent response to GuardDuty and other
detective controls by customer
Prevent and detect
• Tailor findings and detections to your threat models for criticality of data protection
https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
• Use AWS Security Hub to aggregate, organize, review, and prioritize findings from AWS and
AWS Partners for further response, such as
Enabling GuardDuty detections of malicious activity and unauthorized behaviors from
CloudTrail management & data events, Amazon VPC Flow Logs, and Route 53 DNS logs
Enabling and reviewing AWS Security Hub findings from security checks of
standards and controls (i.e. CIS, PCI DSS, AWS Foundational)
Impacts ability for actionable incident response
• Mean times to detect, respond, and recover from a security event
• Increases scope of resources to triage and recover from security event
• Raises risk of data exfiltration and/or destruction as mean times increase to detect & respond
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lack of continuous vulnerability management
executed by customer
Not maintaining software updates continuously – common sources of compromises
• Operating systems and their services
• Installed application software and their dependencies
• Continuous deployment and integration systems (CI/CD)
Exposing unmanaged systems and applications to public internet
• Open ports and applications with no inbound or outbound network restrictions
• Using default configuration of common applications and services
• Zero-day exploits against common applications
Prevent and detect
• Perform continuous vulnerability scanners against resources, source code, and network ports
Examples: Amazon Inspector, VPC Reachability Analyzer
• Implementing defense-in-depth approach to restrict discovery and exploitation
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unmanaged application software security by
customer
Source of compromise when unmanaged leads to additional security issues
• For in-house, open-source, and acquired software
• For application software dependencies to build, install, and operate
Prevent and detect
• Implementing OWASP Top 10 controls for secure coding practices
• Apply static and dynamic analysis tools for application software security practice
• Mitigate risk through defense-in-depth approach to application design, network, and
identity controls
• Use third-party endpoint security clients to protect process-to-network executions
• Red team “trust, then verify” application software implementations to validate defense-in-depth
security controls to protect, detect, and respond
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Where to
go next
AWS account
Detect
Front-end application
Backend application
Public internet
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Core references
1. Top 10 security items to improve in your AWS account
https://amzn.to/3AA1RkT
2. Security Pillar – AWS Well-Architected Framework
https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/
3. AWS Security Reference Architecture (AWS SRA)
https://amzn.to/3jWjxk6
4. AWS Security Incident Response Guide
https://amzn.to/3xFXxP5
5. AWS Security Guides
https://docs.aws.amazon.com/security/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Call to action: Top 10
1. Ensure you have a defined cloud security strategy and incident response plan,
including people, processes, and technology for cloud
2. Use business email distribution lists for AWS account contact information to
respond to AWS notifications
3. Configure backups plans with AWS Backup for critical resources and data, and
periodically verify and their order and priority for system restores
4. Ensure enablement of GuardDuty, AWS Config, Security Hub, CloudTrail, and
service access and audit logs for detection of security event observables
5. Use AWS Foundational Security Best Practices to continuously assess risks for
critical and high severities for common AWS resource misconfigurations
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Call to action: Top 10
6. Continuously assess for least-privileged access with IAM tools
7. Replace long-lived credentials with short-lived credentials to reduce risks of
security event impact and scope
8. Implement OWASP Top 10 – especially input validation and rate limits – for
applications within your code and with AWS services (e.g., AWS WAF)
9. Continuously patch to latest security patches for your OS, applications, and
dependencies
10. Routinely train and simulate for cloud security events to iterate and improve
Security is an iterative process, not a one-time project
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Brian Andrzejewski
bcandrze@amazon.com
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete
the session survey
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Contenu connexe

Tendances

Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드Amazon Web Services Korea
 
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksCloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksAmazon Web Services
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS OrganizationsAmazon Web Services
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Amazon Web Services
 
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignAmazon Web Services
 
AWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customizationAWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customizationDhaval Soni
 
Containers on AWS: An Introduction
Containers on AWS: An IntroductionContainers on AWS: An Introduction
Containers on AWS: An IntroductionAmazon Web Services
 
AWS CodeCommit, CodeDeploy & CodePipeline
AWS CodeCommit, CodeDeploy & CodePipelineAWS CodeCommit, CodeDeploy & CodePipeline
AWS CodeCommit, CodeDeploy & CodePipelineJulien SIMON
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentAmazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksAmazon Web Services
 
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법Amazon Web Services Korea
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 

Tendances (20)

Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
AWS Summit Seoul 2023 | 당신만 모르고 있는 AWS 컨트롤 타워 트렌드
 
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech TalksCloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
CloudHSM: Secure, Scalable Key Storage in AWS - AWS Online Tech Talks
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Organizations
Introduction to AWS OrganizationsIntroduction to AWS Organizations
Introduction to AWS Organizations
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
Threat detection on AWS: An introduction to Amazon GuardDuty - FND216 - AWS r...
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
Introducing AWS DataSync - Simplify, automate, and accelerate online data tra...
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
AWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customizationAWS Control Tower introduces Terraform account provisioning and customization
AWS Control Tower introduces Terraform account provisioning and customization
 
Containers on AWS: An Introduction
Containers on AWS: An IntroductionContainers on AWS: An Introduction
Containers on AWS: An Introduction
 
AWS CodeCommit, CodeDeploy & CodePipeline
AWS CodeCommit, CodeDeploy & CodePipelineAWS CodeCommit, CodeDeploy & CodePipeline
AWS CodeCommit, CodeDeploy & CodePipeline
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environment
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법
AWS Summit Seoul 2023 | 클라우드 보안의 새로운 접근법
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 

Similaire à Lessons from AWS Incident Response

Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftAmazon Web Services
 
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณAWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณAmazon Web Services
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewEagleDream Technologies
 
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud AndaAWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud AndaAmazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
AWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAmazon Web Services
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Amazon Web Services
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAmazon Web Services
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Amazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 

Similaire à Lessons from AWS Incident Response (20)

Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณAWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud AndaAWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applications
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 

Dernier

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsPrecisely
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Alan Dix
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...shyamraj55
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphNeo4j
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxnull - The Open Security Community
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsHyundai Motor Group
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 

Dernier (20)

Unlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power SystemsUnlocking the Potential of the Cloud for IBM Power Systems
Unlocking the Potential of the Cloud for IBM Power Systems
 
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...Swan(sea) Song – personal research during my six years at Swansea ... and bey...
Swan(sea) Song – personal research during my six years at Swansea ... and bey...
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
Automating Business Process via MuleSoft Composer | Bangalore MuleSoft Meetup...
 
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge GraphSIEMENS: RAPUNZEL – A Tale About Knowledge Graph
SIEMENS: RAPUNZEL – A Tale About Knowledge Graph
 
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptxMaking_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
Making_way_through_DLL_hollowing_inspite_of_CFG_by_Debjeet Banerjee.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter RoadsSnow Chain-Integrated Tire for a Safe Drive on Winter Roads
Snow Chain-Integrated Tire for a Safe Drive on Winter Roads
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 

Lessons from AWS Incident Response

  • 1. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. A U G . 2 4 – 2 5 , 2 0 2 1 | H O U S T O N , T X
  • 2. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Lessons learned from the front lines of incident response Brian “BasementCat” Andrzejewski T D R 2 0 2 Lead Operator, Customer Incident Response Team (CIRT) AWS Professional Services
  • 3. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Who we are Why we are here Common causes for customer security events Critical security patterns to reduce customer risks Where to go next Agenda
  • 4. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Who we are A specialized AWS Customer Incident Response team that assists and advises customers during their active security events on the customer’s side of the AWS Shared Responsibility Model Experienced team of AWS Professional Services and Solution Architects in incident response Assist in root cause analysis of a customer’s AWS service logs for their active security event Assist and advise customers with active triage & recovery of their security event on AWS Provide advise to customers for long-term recovery from their active security event
  • 5. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Available escalations during an AWS customer’s active security event 1. Validate AWS account ownership to customer(s) impacted 2. Assist with triage & recovery with customer and AWS teams 3. Investigate root cause(s) with customer for their event 4. Provide recommendations for next steps AWS support case (all tiers) AWS Account team AWS Security AWS Customer Incident Response Team (CIRT) External Internal AWS Customer Incident Response team Customer triage path
  • 6. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS shared responsibility model Customers and AWS Partners https://aws.amazon.com/compliance/shared-responsibility-model/ Security IN the cloud Managed by customers Security OF the cloud Managed by AWS
  • 7. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. The line varies. . . Hardware/AWS global infrastructure Compute/storage/ database/network Client-side data encryption/integrity Server-side encryption Network traffic protection OS, network, firewall Configuration Platform and application management Customer data AWS IAM Customer IAM Infrastructure services Client-side data encryption Network traffic protection Firewall configuration OS, network, firewall configuration Platform and application management Customer data Hardware/AWS global infrastructure Compute/storage/ database/network AWS IAM Customer IAM Container services Abstracted services Client-side data encryption Network traffic protection OS, network, firewall configuration Platform and application management Customer data Hardware/AWS global infrastructure Compute/storage/ database/network AWS IAM Customer IAM Server-side encryption More customizable + More customer responsibility Less customizable + Less customer responsibility + More best practices built in https://aws.amazon.com/whitepapers/aws-security-best-practices/
  • 8. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Additional AWS customer responsibilities All activities that occur under your account – including unauthorized access (4.1) Properly configuring and using an AWS service (4.3) Keeping AWS root account email current for notifications (13.10.a) Taking appropriate action to secure, protect, and back up your account and your content (4.3) Not disclosing login credentials and access keys to unauthorized third parties (4.4) https://aws.amazon.com/agreement/
  • 9. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why are we here? challenges 24/7 best practices seeking right AWS skillsets and knowledge share excel
  • 10. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS incident response methodology • Incident Response Phases  Prepare and prevent  Detect and assess impact  Triage and recovery  Investigate to root cause(s) • Improve and iterate  Develop people and technology  Update playbooks and runbooks  Simulate security events in environment  Apply lessons learned and iterate to improve https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/
  • 11. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Common causes for customer security events
  • 12. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding the risk equation Threat actor: A cat that wants to scratch you Threat: The cat’s paw reaching out to scratch you Vulnerability: Your inability to defend against the scratch Risk: The likelihood of being scratched Acceptable risk: Your willingness to be scratched by the cat © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Gartner estimates that most cloud security failures will be IN the cloud on the user side Gartner “Is the Cloud Secure?” https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/
  • 14. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Common causes for customer security events Insecure AWS resource configuration Inaccurate AWS account contact information Lack of continuous vulnerability management executed Unintended disclosure of security credentials and secrets Inadvertent response to Amazon GuardDuty and other detective controls Unmanaged application software security
  • 15. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Critical security patterns to reduce customer risks
  • 16. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementation goals and objectives Scenario-driven guidance to common root causes of security events • Grounded to real-world security events experienced by AWS customers • Prescriptive guidance on how prevent and detect by root cause Reduce customer’s security risks to their AWS accounts and its resources • Applicable to all AWS customers and their existing architectures • Core AWS services to start your security journey and iterate beyond • Prioritized to critical security practices observed to prevent and detect
  • 17. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Bill of materials Core AWS services AWS service tools AWS Organizations Amazon GuardDuty AWS Security Hub AWS CloudTrail AWS IAM Access Analyzer and advisor AWS IAM temporary security credential AWS Config AWS Personal Health Dashboard AWS Well-Architected Tool Amazon CloudWatch AWS Identity and Access Management (IAM) AWS Backup Amazon VPC Reachability Analyzer AWS Secrets Manager AWS IAM policy simulator
  • 18. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Inaccurate AWS account information by customer Prevent • Ensure AWS account email uses both  Corporate email domain (i.e., example.com)  Distribution email address • AWS account root user  Use IAM principals for day-to-day access  Eliminate use of root access keys  Use an MFA device for root console use Detect • Leverage CloudTrail and CloudWatch events to detect AWS account changes • Monitor your AWS notifications  AWS account email  AWS Health event alerts • Use AWS Cost Anomaly Detection for monitoring unusual AWS account costs Affects AWS account holder’s ability to • Act upon AWS-provided notifications that require timely resolution • Provide account owner verification during AWS account recovery process • Perform break-glass access for AWS account and during root user password reset
  • 19. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Insecure AWS resource configuration by customer Prevent • Enable public block for supported AWS services to restrict public access • Configure backups and validate restores with AWS Backup for critical resources and data • Use different IAM principals and roles to manage vs. operate AWS resources to reduce impacts • Deploy AWS resources into private VPCs to reduce unintended access • Implement AWS Organizations security control polices to restrict  Modify and delete AWS resource changes to system admin roles  AWS access key usage to restricted policy conditionals Critical configuration to focus on • AWS Foundational Security Best Practices with severity critical or high • Public-facing assets for defense-in-depth and restricted network access • Deny-then-allow authentication for AWS resources that contain sensitive data
  • 20. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Insecure AWS resource configuration by customer Detect • Enable Security Hub for all regions with AWS Foundational Security Best Practices to detect common AWS resource misconfigurations • Prioritize GuardDuty anomalous behavior findings for unexpected resources changes • Leverage AWS Config for recording and building inventory  AWS resources by name and service  Individual AWS resource configurations Critical configuration to focus on • AWS Foundational Security Best Practices with severity critical or high • Public-facing assets for defense-in-depth and restricted network access • Deny-then-allow authentication for AWS resources that contain sensitive data
  • 21. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unintended disclosure of security credentials and secrets by customer Prevent • Disable and delete all AWS account root access keys • Use temporary role-based access over static credentials and keys • Require MFA for your most sensitive operations and privileged access • Use Secrets Manager to vault and audit use of non-IAM credentials • Build identity-based and resource-based policies for least-privilege access to reduce impact of unintended access and disclosure  Use explicit deny-then-allow policy conditions in identity and resource policies  Tailor identity-based policies to use named actions to resource names or tagged resources  Specify resource-based policies for explicit identity-based roles and/or identity principal tags, and/or to restrict to specific VPC endpoints or source IP addresses
  • 22. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Policy evaluation logic https://amzn.to/3CLktQQ
  • 23. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Resource-based policy restrictions { ... "Statement": [ { "Sid": "VPCe", "Action": "s3:*", "Effect": "Deny", "Resource": [ "arn:aws:s3:::DOC-EXAMPLE-BUCKET", "arn:aws:s3:::DOC-EXAMPLE-BUCKET/*” ], "Condition": { "StringNotEquals": { "aws:SourceVpce": [ "vpce-1111111” ] } }, ”Principal": "*" } ] } { ... "Statement": [ { "Sid": ”SourceIP", "Action": "s3:*", "Effect": "Deny", "Resource": [ "arn:aws:s3:::DOC-EXAMPLE-BUCKET", "arn:aws:s3:::DOC-EXAMPLE-BUCKET/*” ], "Condition": { "NotIpAddress": { "aws:SourceIP": [ "11.11.11.11/32” ] } }, ”Principal": "*" } ] } VPC source restriction Source IP restriction https://amzn.to/2VObNIA S3 Bucket Policy
  • 24. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unintended disclosure of security credentials and secrets by customer Detect • Monitor for identity behavioral changes recorded in AWS CloudTrail events:  GuardDuty IAM findings  CloudTrail Insights for unusual mutating events • Continuously evaluate IAM principal usage to reduce over-privileged access impact  IAM Credential Report to disable and remove unused IAM user and access keys  IAM Access Advisor to refine IAM principal permissions using last-accessed information to AWS services  IAM Access Analyzer to adjust IAM principal permissions through its past actions from CloudTrail trail and identify resources shared with an external entity  IAM Policy Simulator to test and simulate actions for their effective permissions of identity-based policies, permission boundaries, SCPs, and resource-based policies • Implement application security scanning for static credentials and secrets to reduce disclosure • Monitor your AWS account email address for AWS notifications of compromised credentials https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  • 25. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Tools for least-access assessment https://amzn.to/3CJZGwL Use IAM access advisor • Enabled per IAM principal by default in IAM service • Review which AWS services have been used up to last 400 days per IAM principal Use IAM Access Analyzer to generate least-access policy • Requires CloudTrail trail is enabled to Amazon S3 • Evaluates last 90 days of specific IAM principal access from selected CloudTrail trail S3 bucket • Generates a suggested IAM policy from evaluation to use
  • 26. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Inadvertent response to GuardDuty and other detective controls by customer Prevent and detect • Tailor findings and detections to your threat models for criticality of data protection https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html • Use AWS Security Hub to aggregate, organize, review, and prioritize findings from AWS and AWS Partners for further response, such as Enabling GuardDuty detections of malicious activity and unauthorized behaviors from CloudTrail management & data events, Amazon VPC Flow Logs, and Route 53 DNS logs Enabling and reviewing AWS Security Hub findings from security checks of standards and controls (i.e. CIS, PCI DSS, AWS Foundational) Impacts ability for actionable incident response • Mean times to detect, respond, and recover from a security event • Increases scope of resources to triage and recover from security event • Raises risk of data exfiltration and/or destruction as mean times increase to detect & respond
  • 27. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Lack of continuous vulnerability management executed by customer Not maintaining software updates continuously – common sources of compromises • Operating systems and their services • Installed application software and their dependencies • Continuous deployment and integration systems (CI/CD) Exposing unmanaged systems and applications to public internet • Open ports and applications with no inbound or outbound network restrictions • Using default configuration of common applications and services • Zero-day exploits against common applications Prevent and detect • Perform continuous vulnerability scanners against resources, source code, and network ports Examples: Amazon Inspector, VPC Reachability Analyzer • Implementing defense-in-depth approach to restrict discovery and exploitation
  • 28. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unmanaged application software security by customer Source of compromise when unmanaged leads to additional security issues • For in-house, open-source, and acquired software • For application software dependencies to build, install, and operate Prevent and detect • Implementing OWASP Top 10 controls for secure coding practices • Apply static and dynamic analysis tools for application software security practice • Mitigate risk through defense-in-depth approach to application design, network, and identity controls • Use third-party endpoint security clients to protect process-to-network executions • Red team “trust, then verify” application software implementations to validate defense-in-depth security controls to protect, detect, and respond
  • 29. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Where to go next AWS account Detect Front-end application Backend application Public internet
  • 30. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Core references 1. Top 10 security items to improve in your AWS account https://amzn.to/3AA1RkT 2. Security Pillar – AWS Well-Architected Framework https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/ 3. AWS Security Reference Architecture (AWS SRA) https://amzn.to/3jWjxk6 4. AWS Security Incident Response Guide https://amzn.to/3xFXxP5 5. AWS Security Guides https://docs.aws.amazon.com/security/
  • 31. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Call to action: Top 10 1. Ensure you have a defined cloud security strategy and incident response plan, including people, processes, and technology for cloud 2. Use business email distribution lists for AWS account contact information to respond to AWS notifications 3. Configure backups plans with AWS Backup for critical resources and data, and periodically verify and their order and priority for system restores 4. Ensure enablement of GuardDuty, AWS Config, Security Hub, CloudTrail, and service access and audit logs for detection of security event observables 5. Use AWS Foundational Security Best Practices to continuously assess risks for critical and high severities for common AWS resource misconfigurations
  • 32. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Call to action: Top 10 6. Continuously assess for least-privileged access with IAM tools 7. Replace long-lived credentials with short-lived credentials to reduce risks of security event impact and scope 8. Implement OWASP Top 10 – especially input validation and rate limits – for applications within your code and with AWS services (e.g., AWS WAF) 9. Continuously patch to latest security patches for your OS, applications, and dependencies 10. Routinely train and simulate for cloud security events to iterate and improve Security is an iterative process, not a one-time project
  • 33. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank you! © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Brian Andrzejewski bcandrze@amazon.com
  • 34. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Notes de l'éditeur

  1. In our Security Best Practices whitepaper it’s been broken down into 3 categories Infrastructure Services – Where everything from the operating system upwards is on the customer – example EC2 Container Services – not to be confused with the likes of Kubernetes/Docker, AWS handles the OS and the platform running on it – and the rest is the customer – example RDS, ECS Abstracted Services – where the customer just needs to decide where their data goes, who has access to it – and if client-side encryption is used – example S3
  2. SOURCE: https://1n0xpcas37.execute-api.us-west-2.amazonaws.com/Prod/assets/22a90603-3601-4b8d-9aad-b649f05fbc91
  3. AWS account and resource best practices: https://aws.amazon.com/premiumsupport/knowledge-center/security-best-practices/ AWS Account email reset: https://aws.amazon.com/premiumsupport/knowledge-center/admin-left-need-acct-access/ AWS Health events: https://docs.aws.amazon.com/health/latest/ug/cloudwatch-events-health.html Billing Alarms: https://aws.amazon.com/blogs/aws-cost-management/preview-anomaly-detection-and-alerting-now-available-in-aws-cost-management/
  4. AWS Secrets Manager – Creating and retrieving a secret: https://docs.aws.amazon.com/secretsmanager/latest/userguide/tutorials_basic.html Security best practices in IAM https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  5. GuardDuty IAM findings https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html CloudTrail insights: https://aws.amazon.com/about-aws/whats-new/2019/11/aws-cloudtrail-announces-cloudtrail-insights/ IAM Credential Report: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html IAM Access Advisor: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html IAM Access Analyzer: https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html IAM Policy Simulator: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html
  6. AWS Git-secrets https://github.com/awslabs/git-secrets GitRob (no longer being updated) https://github.com/michenriksen/gitrob Trufflehog https://github.com/trufflesecurity/truffleHog