3.09 Security Pillar
3.09 Security Pillar
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 1
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 1: Security Pillar Overview
Build security into Physical data centers typically rely on security at the
every layer of your perimeter. AWS enables you to implement security at the
perimeter as well as within and between your resources.
infrastructure.
Things to consider:
Isolate parts of your infrastructure Leverage managed services
Encrypt data in transit and at rest Log access of resources
Enforce access control granularly, using the Automate your deployments to keep security
principle of least privilege consistent
Use multi-factor authentication
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 1: Security Pillar Overview
Securely Store and Analyze Terabytes of Data
Mount Sinai uses AWS to securely store and analyze 100 TB of data…
“
Needed to search and analyze terabytes of
By using AWS, we met strict genomics data to investigate the causes of
aggressive forms of cancer: breast and ovarian.
HIPAA standards for
Using AWS gives researchers the ability to mine
confidentiality… and we can data from cancer patients all over the world.
store source files securely and Analyzes more than 100 TB of data each time new
cost-effectively. information comes in.
Dr. John A. Martignetti Can store source files securely and cost-effectively
Icahn School of Medicine at Mount Sinai
with durability and accessibility.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 2
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Well-Architected Pillar 1: Security
The ability to protect information, systems, and assets while delivering business value through
risk assessments and mitigation strategies.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 2: Principles
Enable Traceability
Automate Responses To Security Events
Focus On Securing Your System
Automate Security Best Practices
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 2: Principles
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 2: Principles
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 2: Principles
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 2: Principles
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 3
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 3: Key Services for Security
Privilege
management
AWS IAM MFA token
Infrastructure
protection
Amazon VPC
Detective controls
AWS CloudTrail AWS Config Amazon
CloudWatch
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 4
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
To achieve this, attackers use a variety of techniques that consume network or other
resources, thus interrupting access for legitimate end users.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
AWS Customer
AWS API endpoints are hosted on Front your application with AWS
large, Internet-scale, world-class Services
infrastructure.
Safeguard exposed resources
Proprietary DDoS mitigation techniques
Minimize the attack surface
are used.
AWS networks are multi-homed across Evaluate soft limits and request
a number of providers to achieve increases ahead of time
Internet access diversity. Learn normal behavior
Create a plan for attacks
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
Auto
Auto Scaling
Users Scaling
WAF
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
Mapped to:
Common security compliance standards
Vulnerability definitions
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 4: Preventing Common Exploits
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 5
Securing Data
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
Custom SSL certificate support features let you use your own domain name and your own
SSL certificate.
Server Name Indication (SNI) Custom SSL
Allows multiple domains to serve SSL traffic over the same IP address.
Dedicated IP Custom SSL
To deliver content to browsers that do not support SNI.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
1. To use dedicated IP, request permission for your AWS account (not necessary for SNI).
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
High-security ciphers
Improve the security of HTTPS connections.
OCSP Stapling
Improves the time taken for individual SSL/TLS handshakes by moving the
Online Certificate Status Protocol (OSCP) check.
Session Tickets
Helps speed up the time spent restarting or resuming an SSL/TLS session.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CloudFront New Origin Security Features
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
Restrict access to Amazon S3 content by creating an origin access identity (OAI), which is a
special CloudFront user.
CloudFront origin access identity gets the objects from Amazon S3 on your users’ behalf.
Direct access to the objects through Amazon S3 URLs will be denied.
Procedure:
1. Create an origin access identity and add it to your distribution.
2. Change the permissions either on your Amazon S3 bucket or the objects in your bucket so that only
the origin access identity has read permission.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 5: Securing Data
Encrypting Data
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
Key is used to encrypt data
Encryption Primer along with an encryption
algorithm (e.g. AES).
?
Software Data Key Data Data
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
Customer Master
AWS KMS is a managed encryption service that Keys AWS KMS
enables you to easily encrypt your data.
Two-tiered key hierarchy using envelope encryption.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
Encrypted Encrypted
Data Data Key
Data is encrypted Amazon
EBS
using the data key
Plaintext
3
Encrypted 4
Data Data Application EC2
Instances
S3 bucket
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
Only data keys are available directly to the customer, and these are unique to each item encrypted.
If one was compromised, it would not allow decryption of other objects.
It is easier to manage a small number of master keys than millions of data keys.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
2 4
3
Decrypt
Requests to decrypt the
encrypted volume key
Amazon
EC2 Host
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
AWS CloudHSM
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 6: Encrypting Data
Customer-managed durability and availability Highly available and durable key storage and
management
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 7
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
Data stored in Amazon S3 is private by default, requires AWS credentials for access
• Access to Amazon S3 can be over HTTP or HTTPS
• Amazon S3 logging allows auditing of access to all objects
• Amazon S3 supports access control lists and policies for every bucket, prefix (directory/folder),
and object
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
Data stored in Amazon S3 is private by default, requires AWS credentials for access
• Access to Amazon S3 can be over HTTP or HTTPS
• Amazon S3 logging allows auditing of access to all objects
• Amazon S3 supports access control lists and policies for every bucket, prefix (directory/folder),
and object
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
Three types:
DB security groups
Control access to a DB instance that is not in a VPC.
VPC security groups
Control access to a DB instance inside a VPC.
EC2 security groups
Control access to EC2 instances.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
Instance
not in a DB security
group
VPC
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
EC2 security
group
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 7: Encrypting Data at Rest in S3
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Part 8
Authentication
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Options:
• Run Microsoft AD as a managed service within AWS Directory Service
• Use AD Connector
• Use Simple AD
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Options:
• Run Microsoft AD as a managed service within AWS Directory Service
• Use AD Connector
• Use Simple AD
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Options:
• Run Microsoft AD as a managed service within AWS Directory Service
• Powered by Windows Server 2012 R2
• Created as a highly available pair of domain controllers connected to your VPC
• Use AD Connector
• Connect to your on-premises Active Directory via VPC VPN connection or AWS Direct Connect
• Users access AWS applications with existing credentials
• Integrate with existing RADIUS-based MFA solutions
• UseWeb
© 2017 Amazon Simple
Services,AD
Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
STS is a lightweight web service that enables you to request temporary, limited-privilege
credentials for IAM users or for users that you authenticate (federated users).
Allow trusted entity to assume a role by calling the AssumeRole APIs of STS
To view security credentials of a running Amazon EC2 instance, use the following Instance Metadata
Service (IMDS) URL:
http://169.254.169.254/latest/meta-data/iam/security-credentials/
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Federated Users
Single Sign-On (SSO): Temporary credentials can be used to sign user directly into
the AWS Management Console.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Benefits:
• Open standards
• Quicker and easier to implement federation
• Leverage existing identity management software to manage access to AWS resources
• No coding required
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
Benefits:
• Open standards
• Quicker and easier to implement federation
• Leverage existing identity management software to manage access to AWS resources
• No coding required
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
AWS Sign-in
User logs in to Portal
Receive response
1
(SAML assertion)
Identity Store
3 5
Redirected to AWS
Management Console
2
User authenticated
Portal
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
A mobile app can be developed without server-side code and without distributing long-
term credentials with the mobile app.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
CCA 3.09: Security Pillar ► Part 8: Authentication
1 Authentication Acce
ss AW
S Se
rvice
s
3
2
Au
th
or
iza
tio AWS Services
n
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
In review…
Security Pillar Overview
Principles of the Security Pillar & Key Services
Preventing Common Security Exploits
Securing & Encrypting Data
Securing Data At Rest on S3
Authentication
Knowledge Assessment
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
Up Next…
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.
This work may not be reproduced or redistributed, in whole or in part, without prior written permission
from Amazon Web Services, Inc. Commercial copying, lending, or selling is prohibited.
© 2017 Amazon Web Services, Inc. or its affiliates. All rights reserved.