KEMBAR78
Secure Your Cloud Applications: Sander Veenstra Technical Trainer AWS | PDF | Amazon Web Services | Cloud Computing
100% found this document useful (1 vote)
187 views35 pages

Secure Your Cloud Applications: Sander Veenstra Technical Trainer AWS

The document discusses security best practices for AWS cloud applications and infrastructure. It recommends securing authentication and authorization using AWS Identity and Access Management (IAM) to control access and manage permissions for AWS resources. The document also emphasizes the shared responsibility model where AWS manages security of the cloud platform and customers are responsible for security in the cloud.

Uploaded by

mohit narayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
100% found this document useful (1 vote)
187 views35 pages

Secure Your Cloud Applications: Sander Veenstra Technical Trainer AWS

The document discusses security best practices for AWS cloud applications and infrastructure. It recommends securing authentication and authorization using AWS Identity and Access Management (IAM) to control access and manage permissions for AWS resources. The document also emphasizes the shared responsibility model where AWS manages security of the cloud platform and customers are responsible for security in the cloud.

Uploaded by

mohit narayan
Copyright
© © All Rights Reserved
We take content rights seriously. If you suspect this is your content, claim it here.
Available Formats
Download as PDF, TXT or read online on Scribd
You are on page 1/ 35

Module 4:

Secure your cloud applications


Sander Veenstra
Technical Trainer
AWS

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure your infrastructure

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security is our top priority

Designed for Constantly Highly Highly Highly


security monitored automated available accredited

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security of the cloud

• Hosts, network, software, facilities


• Protection of the AWS global infrastructure is top priority
• Availability of third-party audit reports

Foundation services
AWS

Compute Storage Database Network

AWS global
Availability Zones Regions Edge Locations
infrastructure

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security in the cloud
Customer data
Customer

Platform, applications, identity & access management


Operating system, network & firewall configuration
Client-side data encryption & Server-side encryption Network traffic protection
Data integrity authentication (File system and/or data) (Encryption/integrity/identity)

Considerations
• What you should store
• Which AWS services you should use
• Which Region to store in
• In what content format and structure
• Who has access
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS shared responsibility model
Customer

Customer data
Platform, applications, identity & access management
Operating system, network & firewall configuration
Client-side data encryption & Server-side encryption Network traffic protection
Data integrity authentication (File system and/or data) (Encryption/integrity/identity)

Foundation services
AWS

Compute Storage Database Network

AWS global Availability Zones Regions Edge Locations


infrastructure

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security, identity, and compliance products
AWS Artifact Amazon Inspector
AWS Certificate Manager AWS Key Management
Amazon Cloud Directory Service
AWS CloudHSM Amazon Macie
Amazon Cognito AWS Organizations
AWS Directory Service AWS Shield
AWS Firewall Manager AWS Secrets Manager
Amazon GuardDuty AWS Single Sign-On
AWS Identity and Access AWS WAF
Management
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Manage authentication and authorization

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Identity and Access Management (IAM)
Securely control access to AWS resources

A person or application that interacts with AWS


IAM user

Collection of users with identical permissions


Group

Temporary privileges that an entity can assume


Role

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Authentication: Who are you?
$ aws
AWS
CLI

IAM
AWS
SDKs
IAM user IAM group

AWS
Management
Console

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Authorization: What can you do?

$ aws
Full AWS
access CLI

Read Amazon
IAM user, only S3 Bucket
group or role

IAM policies

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
IAM roles

• IAM users, applications, and


services may assume IAM roles

IAM role • Roles uses an IAM policy for


permissions

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

IAM
IAM role policy

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

Assume

IAM
IAM role policy

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Using roles for temporary security credentials

EC2
instance

Application
Amazon
S3 bucket

Assume

IAM
IAM role policy

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Best practices

• Delete access keys for the AWS • Rotate credentials regularly


account root user
• Remove unnecessary users
• Activate multi-factor and credentials
authentication (MFA)
• Monitor activity in your AWS
• Only give IAM users permissions they account
need
• Use roles for applications

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Access your security and compliance

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Challenges of threat assessment

• Expensive

• Complex

• Time-consuming

• Difficult to track IT changes

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is Amazon Inspector?
Automated security assessment as a service

• Assesses applications for


vulnerabilities

• Produces a detailed list of security


findings

• Leverages security best practices

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Inspector findings

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Remediation recommendation

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Proctect your infrastructure from Distributed
Denial of Service (DDoS) attacks

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is DDoS?

O
Legit user
DDoS

DDoS DDoS

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
DDoS mitigation challenges
Complex
Limited bandwidth
Involves rearchitecting
Manual
Degraded performance
Time-consuming
Expensive
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is AWS Shield?

P
Legit user

DDoS

DDoS DDoS

• A managed DDoS protection service


• Always-on detection and mitigations
• Seamless integration and deployment
• Cost-efficient and customizable protection

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shield Standard and AWS Shield Advanced

AWS Shield Standard AWS Shield Advanced


(included) (Optional)
• Quick detection • Enhanced detection
• Inline attack mitigation • Advanced attack mitigation
• Visibility and attack notification
• DDoS cost protection
• Specialized support

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS security compliance

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Assurance programs

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How AWS helps customers achieve compliance

Sharing information Assurance program


• Industry certifications • Certifications/attestations
• Security and control practices • Laws, regulations, and privacy
• Compliance reports directly • Alignments/frameworks
under NDA

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Customer responsibility

Review – Design – Identify – Verify

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

You might also like