Sunteți pe pagina 1din 35

Module 4:

Secure your cloud applications


Navjot Singh
Technical Trainer
AWS

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security is our top priority

Designed for Constantly Highly Highly Highly


security monitored automated available accredited

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security of the cloud

• Hosts, network, software, facilities


• Protection of the AWS global infrastructure is top priority
• Availability of third-party audit reports

Foundation services
Compute Storage Database Network
AWS

AWS global Availability zones Regions Edge locations


infrastructure

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security in the cloud

Customer data
Customer

Platform, applications, identity & access management

Operating system, network & firewall configuration

Client-side data encryption & Server-side encryption Network traffic protection


Data integrity authentication (File system and/or data) (Encryption/integrity/identity)

Considerations
• What you should store • In what content format and
• Which AWS services you structure
should use • Who has access
• Which region to store in

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS shared responsibility model

Customer data
Customer

Platform, applications, identity & access management

Operating system, network & firewall configuration

Client-side data encryption & Server-side encryption Network traffic protection


Data integrity authentication (File system and/or data) (Encryption/integrity/identity)

Foundation services
Compute Storage Database Network
AWS

AWS global Availability zones Regions Edge locations


infrastructure

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security, identity, and compliance products

AWS Artifact Amazon Inspector


AWS Certificate Manager AWS Key Management Service
Amazon Cloud Directory Amazon Macie
AWS CloudHSM AWS Organizations
Amazon Cognito AWS Shield
AWS Directory Service AWS Secrets Manager
AWS Firewall Manager AWS Single Sign-On
Amazon GuardDuty AWS WAF
AWS Identity and Access Management

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Manage authentication and
authorization

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Identity and Access Management (IAM)

Securely control access to AWS resources

IAM USER GROUP ROLE


A person or application Collection of users Temporary privileges
that interacts with AWS with identical permissions that an entity can assume

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Authentication: Who are you?

$ aws
AWS
CLI IAM

AWS
SDKS IAM USER IAM GROUP

AWS
Management
Console

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Authorization: What can you do?

$ aws AWS
Full CLI
access

Read only Amazon


IAM USER, S3 Bucket
GROUP OR ROLE

IAM policies

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IAM roles

• IAM users, applications, and


services may assume IAM roles
• Roles uses an IAM policy
IAM ROLE for permissions

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

IAM Role IAM Policy

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

Assume
IAM Role IAM Policy

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

Assume
IAM Role IAM Policy

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Best practices

• Delete access keys for the • Rotate credentials regularly


AWS account root user
• Remove unnecessary users
• Activate multi-factor and credentials
authentication (MFA)
• Monitor activity in your
• Only give IAM users AWS account
permissions they need

• Use roles for applications

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Access your security and compliance

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Challenges of threat assessment

• Expensive

• Complex

• Time-consuming

• Difficult to track IT changes

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is Amazon Inspector?

Automated security
assessment as a service

• Assesses applications for


vulnerabilities

• Produces a detailed list of


security findings

• Leverages security best


practices

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Inspector findings

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Remediation recommendation

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect your infrastructure from
Distributed Denial of Service (DDoS) attacks

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is DDoS?

DDoS

DDoS DDoS

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
DDoS mitigation challenges

Limited Involves
Complex bandwidth rearchitecting Manual

Time- Degraded
consuming performance Expensive

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is AWS Shield? • A managed DDoS protection service
• Always-on detection and mitigations
• Seamless integration and deployment
• Cost-efficient and customizable protection

DDoS

DDoS DDoS

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shield Standard and AWS Shield Advanced

AWS Shield Standard AWS Shield Advanced


(Included) (Optional)
• Quick detection • Enhanced detection
• Inline attack mitigation • Advanced attack mitigation
• Visibility and attack notification
• DDoS cost protection
• Specialized support

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS security compliance

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Assurance programs

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How AWS helps customers achieve compliance

Sharing information Assurance program


• Industry certifications • Certifications/attestations
• Security and control practices • Laws, regulations, and privacy
• Compliance reports directly • Alignments/frameworks
under NDA

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Customer responsibility

Review – Design – Identify – Verify

© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2020, Amazon Web Services, Inc. or its affiliates. All rights reserved.

S-ar putea să vă placă și