SlideShare a Scribd company logo
01 aws track 1
www.cloudsec.com | #CLOUDSEC
AWS Security Best Practices
For the Three Layers of Compute
Anand Iyer | Principal Solutions Architect
Three Layers of Compute..
Virtual server
instances
in the cloud
Three Layers of Compute..
Virtual server
instances
in the cloud
Services for
running
Docker
containers
Three Layers of Compute..
Virtual server
instances
in the cloud
Services for
running
Docker
containers
Serverless
execution in
response to
events
AWS Shield
AWS Identity and Access
Management
AWS Well-Architected Tool
AWS WAF
AWS Key Management
Service
AWS Security Services (Preventative)
AWS Control Tower
AWS Shield AWS Well-Architected Tool
AWS WAF
AWS Security Services (Preventative)
AWS Identity and Access
Management
AWS Control Tower AWS Key Management
Service
AWS Well-Architected Tool
AWS Shield AWS WAF
AWS Security Services (Preventative)
AWS Identity and Access
Management
AWS Control Tower AWS Key Management
Service
AWS Well-Architected Tool
AWS Shield AWS WAF
AWS Security Services (Preventative)
AWS Identity and Access
Management
AWS Control Tower AWS Key Management
Service
AWS Trusted Advisor
AWS CloudTrail
AWS Config
Amazon CloudWatch
Amazon GuardDuty
AWS Security Services (Detective)
AWS Security Hub
AWS Trusted Advisor
Amazon GuardDuty AWS Config
AWS Security Services (Detective)
AWS Security Hub AWS CloudTrail Amazon CloudWatch
AWS Trusted Advisor
AWS Config
AWS Security Services (Detective)
AWS Security Hub
Amazon GuardDuty
AWS CloudTrail Amazon CloudWatch
AWS Trusted Advisor
AWS Security Services (Detective)
AWS Security Hub
Amazon GuardDuty
AWS CloudTrail
AWS Config
Amazon CloudWatch
AWS Security Services (Detective)
AWS Security Hub
AWS Trusted Advisor
Amazon GuardDuty
AWS CloudTrail
AWS Config
Amazon CloudWatch
Other Security Activities (App Layer)
What? Why?
Solution design review Ensure application design adequately protects valuable resources and
information
Threat modeling Understand attacker & impact of control failures
Security unit tests Ensure expected security functionality operates as expected
Code review (manual peer review) Look for malicious code, style and standards
Code scan (static/dynamic) Look for code vulnerabilities
Penetration testing Make sure nothing obvious has been missed
Manage risks and vulnerabilities Ensure that known issues are resolved in a timely manner
Operate solution Manage and monitor application to identify technical and business
anomalies
The Things AWS Isn’t Doing
Protect your customer data and applications with
• Configuration of access controls
• Configuring encryption
• Application monitoring
• Intrusion detection/prevention
• Application runtime analysis
• Backups
• Disaster Recovery
Virtual server
instances
in the cloud
Infrastructure Services
AWS Global
Infrastructure
Customer Data
Platform & Application Management
Operating System, Network & Firewall Configuration
Client-side encryption
Data integrity
Authentication
Server-side encryption
File system and/or data
Network traffic protection
Encryption, integrity, identity
(Optional) Opaque Data: 0s and 1s
Foundation
Services
AWS
Endpoints
Compute Storage Databases Networking
Regions
Availability
Zones
Edge
Locations
Customer
IAM
AWS
IAM
Managed By AWS
Customers
Managed By
Amazon Web
Services
Shared Security Model (Infra Services)
Examples: Amazon EC2, Amazon EBS, and Amazon VPC
AWS Security Services for Infrastructure
Amazon EC2 Auto Scaling
AWS Systems Manager
AWS OpsWorks
AWS Well-Architected Tool
Amazon GuardDuty
AWS Config
Container Services
Services for
running
Docker
containers
AWS Global
Infrastructure
Customer Data
Application Management
Operating System, Network & Platform Management
Client-side encryption
Data integrity
Authentication
Server-side encryption
File system and/or data
Network traffic protection
Encryption, integrity, identity
(Optional) Opaque Data: 0s and 1s
Foundation
Services
AWS
Endpoints
Compute Storage Databases Networking
Regions
Availability
Zones
Edge
Locations
Customer
IAM
AWS
IAM
Managed By AWS
Customers
Managed By
Amazon Web
Services
Firewall Configuration
Shared Security Model (Container Services)
Examples: Amazon ECS, Amazon EKS and AWS Fargate
Container Services
Select, install, configure, harden, patch, monitor, perform break/fix, upgrade
and eventually decommission:
• Container assembly
• Application dependencies (example: NodeJS packages)
• Business application
AWS Security Services for Containers
Amazon EC2 Auto Scaling AWS OpsWorks
AWS Well-Architected Tool
Amazon GuardDuty AWS Config
Abstract / Serverless Services
Serverless
execution in
response to
events
Shared Security Model (Serverless Services)
Customer Data
(Optional)
Opaque
Data:
0s
and
1s
Operating System, Network & Firewall Configuration
Foundation
Services
AWS Global
Infrastructure
AWS
Endpoints
Compute Storage Databases Networking
Regions
Availability
Zones
Edge
Locations
AWS
IAM
Managed By
AWS Customers
Managed By
Amazon Web
Services
Platform & Application Management
Client-side encryption, data integrity and authentication
Server-side encryption provided by the platform
Network traffic protection provided by the platform
Examples:AWS Lambda,Amazon S3 and Amazon DynamoDB
AWS Security Services for Serverless
AWS Well-Architected Tool
Amazon GuardDuty AWS Config
High-level Services Are Better
Serverless
Containers
Infrastructure
AWS Identity & Access
Management (IAM)
AWS Organizations
AWS Cognito
AWS Directory Service
AWS Single Sign-On
AWS Security Hub
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
AWS Control Tower
Amazon EC2
Systems Manager
AWS Shield
AWS Web Application Firewall
(WAF)
Amazon Inspector
Amazon Virtual Private Cloud
(VPC)
AWS Key Management Service
(KMS)
AWS CloudHSM
Amazon Macie
Certificate Manager
Server Side Encryption
AWS Config Rules
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS Security Solutions
#CLOUDSEC www.cloudsec.com
THANK YOU!
Anand Iyer | Principal Solutions Architect, AISPL

More Related Content

PPTX
AWS architecture Overview
PDF
Security Spotlight: Presidio
PDF
Security @ (Cloud) Scale Deep Dive
PDF
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
PPTX
AWSome Day Digital LATAM
PPTX
Migration to Aws Cloud
PDF
An Introduction to AWS
PPTX
AWS 101 - Amazon Web Services
AWS architecture Overview
Security Spotlight: Presidio
Security @ (Cloud) Scale Deep Dive
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWSome Day Digital LATAM
Migration to Aws Cloud
An Introduction to AWS
AWS 101 - Amazon Web Services

Similar to 01 aws track 1 (16)

PDF
Serverless Security Automation on AWS - Hamburg AWS User Group
PDF
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
PDF
The AWS Shared Responsibility Model in Practice
PPTX
CSS17: DC - The AWS Shared Responsibility Model in Practice
PDF
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
PPTX
Cloud Security (AWS)
PPTX
AWS Security and SecOps
PPTX
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
PPTX
The AWS Shared Security Responsibility Model in Practice
PDF
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
PDF
1. aws security and compliance wwps pre-day sao paolo - markry
PDF
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
PDF
Security Best Practices_John Hildebrandt
PDF
Security and Compliance Better on AWS_John Hildebrandt
PDF
Herramientas Cloud Ninja AWS "From Zero to Hero"
Serverless Security Automation on AWS - Hamburg AWS User Group
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Cloud Security (AWS)
AWS Security and SecOps
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
1. aws security and compliance wwps pre-day sao paolo - markry
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Security Best Practices_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Herramientas Cloud Ninja AWS "From Zero to Hero"
Ad

Recently uploaded (20)

PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PDF
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
DOCX
Unit-3 cyber security network security of internet system
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PPTX
artificial intelligence overview of it and more
PDF
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
PPTX
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
PPTX
Introduction to Information and Communication Technology
PDF
“Google Algorithm Updates in 2025 Guide”
PDF
Sims 4 Historia para lo sims 4 para jugar
PDF
Testing WebRTC applications at scale.pdf
PPTX
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
PDF
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
PPTX
Digital Literacy And Online Safety on internet
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PDF
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
PPTX
Job_Card_System_Styled_lorem_ipsum_.pptx
PPTX
Funds Management Learning Material for Beg
PPTX
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
PPTX
Internet___Basics___Styled_ presentation
Slides PDF The World Game (s) Eco Economic Epochs.pdf
💰 𝐔𝐊𝐓𝐈 𝐊𝐄𝐌𝐄𝐍𝐀𝐍𝐆𝐀𝐍 𝐊𝐈𝐏𝐄𝐑𝟒𝐃 𝐇𝐀𝐑𝐈 𝐈𝐍𝐈 𝟐𝟎𝟐𝟓 💰
Unit-3 cyber security network security of internet system
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
artificial intelligence overview of it and more
Best Practices for Testing and Debugging Shopify Third-Party API Integrations...
durere- in cancer tu ttresjjnklj gfrrjnrs mhugyfrd
Introduction to Information and Communication Technology
“Google Algorithm Updates in 2025 Guide”
Sims 4 Historia para lo sims 4 para jugar
Testing WebRTC applications at scale.pdf
Introduction about ICD -10 and ICD11 on 5.8.25.pptx
Behind the Smile Unmasking Ken Childs and the Quiet Trail of Deceit Left in H...
Digital Literacy And Online Safety on internet
522797556-Unit-2-Temperature-measurement-1-1.pptx
Vigrab.top – Online Tool for Downloading and Converting Social Media Videos a...
Job_Card_System_Styled_lorem_ipsum_.pptx
Funds Management Learning Material for Beg
CSharp_Syntax_Basics.pptxxxxxxxxxxxxxxxxxxxxxxxxxxxx
Internet___Basics___Styled_ presentation
Ad

01 aws track 1

  • 2. www.cloudsec.com | #CLOUDSEC AWS Security Best Practices For the Three Layers of Compute Anand Iyer | Principal Solutions Architect
  • 3. Three Layers of Compute.. Virtual server instances in the cloud
  • 4. Three Layers of Compute.. Virtual server instances in the cloud Services for running Docker containers
  • 5. Three Layers of Compute.. Virtual server instances in the cloud Services for running Docker containers Serverless execution in response to events
  • 6. AWS Shield AWS Identity and Access Management AWS Well-Architected Tool AWS WAF AWS Key Management Service AWS Security Services (Preventative) AWS Control Tower
  • 7. AWS Shield AWS Well-Architected Tool AWS WAF AWS Security Services (Preventative) AWS Identity and Access Management AWS Control Tower AWS Key Management Service
  • 8. AWS Well-Architected Tool AWS Shield AWS WAF AWS Security Services (Preventative) AWS Identity and Access Management AWS Control Tower AWS Key Management Service
  • 9. AWS Well-Architected Tool AWS Shield AWS WAF AWS Security Services (Preventative) AWS Identity and Access Management AWS Control Tower AWS Key Management Service
  • 10. AWS Trusted Advisor AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty AWS Security Services (Detective) AWS Security Hub
  • 11. AWS Trusted Advisor Amazon GuardDuty AWS Config AWS Security Services (Detective) AWS Security Hub AWS CloudTrail Amazon CloudWatch
  • 12. AWS Trusted Advisor AWS Config AWS Security Services (Detective) AWS Security Hub Amazon GuardDuty AWS CloudTrail Amazon CloudWatch
  • 13. AWS Trusted Advisor AWS Security Services (Detective) AWS Security Hub Amazon GuardDuty AWS CloudTrail AWS Config Amazon CloudWatch
  • 14. AWS Security Services (Detective) AWS Security Hub AWS Trusted Advisor Amazon GuardDuty AWS CloudTrail AWS Config Amazon CloudWatch
  • 15. Other Security Activities (App Layer) What? Why? Solution design review Ensure application design adequately protects valuable resources and information Threat modeling Understand attacker & impact of control failures Security unit tests Ensure expected security functionality operates as expected Code review (manual peer review) Look for malicious code, style and standards Code scan (static/dynamic) Look for code vulnerabilities Penetration testing Make sure nothing obvious has been missed Manage risks and vulnerabilities Ensure that known issues are resolved in a timely manner Operate solution Manage and monitor application to identify technical and business anomalies
  • 16. The Things AWS Isn’t Doing Protect your customer data and applications with • Configuration of access controls • Configuring encryption • Application monitoring • Intrusion detection/prevention • Application runtime analysis • Backups • Disaster Recovery
  • 17. Virtual server instances in the cloud Infrastructure Services
  • 18. AWS Global Infrastructure Customer Data Platform & Application Management Operating System, Network & Firewall Configuration Client-side encryption Data integrity Authentication Server-side encryption File system and/or data Network traffic protection Encryption, integrity, identity (Optional) Opaque Data: 0s and 1s Foundation Services AWS Endpoints Compute Storage Databases Networking Regions Availability Zones Edge Locations Customer IAM AWS IAM Managed By AWS Customers Managed By Amazon Web Services Shared Security Model (Infra Services) Examples: Amazon EC2, Amazon EBS, and Amazon VPC
  • 19. AWS Security Services for Infrastructure Amazon EC2 Auto Scaling AWS Systems Manager AWS OpsWorks AWS Well-Architected Tool Amazon GuardDuty AWS Config
  • 21. AWS Global Infrastructure Customer Data Application Management Operating System, Network & Platform Management Client-side encryption Data integrity Authentication Server-side encryption File system and/or data Network traffic protection Encryption, integrity, identity (Optional) Opaque Data: 0s and 1s Foundation Services AWS Endpoints Compute Storage Databases Networking Regions Availability Zones Edge Locations Customer IAM AWS IAM Managed By AWS Customers Managed By Amazon Web Services Firewall Configuration Shared Security Model (Container Services) Examples: Amazon ECS, Amazon EKS and AWS Fargate
  • 22. Container Services Select, install, configure, harden, patch, monitor, perform break/fix, upgrade and eventually decommission: • Container assembly • Application dependencies (example: NodeJS packages) • Business application
  • 23. AWS Security Services for Containers Amazon EC2 Auto Scaling AWS OpsWorks AWS Well-Architected Tool Amazon GuardDuty AWS Config
  • 24. Abstract / Serverless Services Serverless execution in response to events
  • 25. Shared Security Model (Serverless Services) Customer Data (Optional) Opaque Data: 0s and 1s Operating System, Network & Firewall Configuration Foundation Services AWS Global Infrastructure AWS Endpoints Compute Storage Databases Networking Regions Availability Zones Edge Locations AWS IAM Managed By AWS Customers Managed By Amazon Web Services Platform & Application Management Client-side encryption, data integrity and authentication Server-side encryption provided by the platform Network traffic protection provided by the platform Examples:AWS Lambda,Amazon S3 and Amazon DynamoDB
  • 26. AWS Security Services for Serverless AWS Well-Architected Tool Amazon GuardDuty AWS Config
  • 27. High-level Services Are Better Serverless Containers Infrastructure
  • 28. AWS Identity & Access Management (IAM) AWS Organizations AWS Cognito AWS Directory Service AWS Single Sign-On AWS Security Hub AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs AWS Control Tower Amazon EC2 Systems Manager AWS Shield AWS Web Application Firewall (WAF) Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service (KMS) AWS CloudHSM Amazon Macie Certificate Manager Server Side Encryption AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection AWS Security Solutions
  • 29. #CLOUDSEC www.cloudsec.com THANK YOU! Anand Iyer | Principal Solutions Architect, AISPL

Editor's Notes

  • #20: Icons: https://thenounproject.com
  • #23: Icons: https://thenounproject.com
  • #24: Icons: https://thenounproject.com
  • #27: Icons: https://thenounproject.com
  • #28: Icons: https://thenounproject.com