SlideShare a Scribd company logo
1SANS Technology Institute - Candidate for Master of Science Degree 1
Automated Intrusion Detection and
Response on Amazon Web Services
Teri Radichel
September 2016
GIAC GSEC, GCIH and GCIA
SANS Technology Institute - Candidate for Master of Science Degree 2
Can AWS Improve
Security Operations?
• Whitepaper: Overview of AWS Security
Processes – Are Yours Better?
• Shared Responsibility Model
• Separation of duties
• Built in inventory and scalable logging
• DevSecOps: Write code to configure
infrastructure and respond to events
SANS Technology Institute - Candidate for Master of Science Degree 3
What Is AWS?
• Platform for
infrastructure
management
• Start, stop and
configure
resources via
console or code
• Automated scaling
SANS Technology Institute - Candidate for Master of Science Degree 4
Start Instance From Console
EC2 instances (virtual machines) can be
managed via the web console
SANS Technology Institute - Candidate for Master of Science Degree 5
Start Instance Via Code
Better: Write code to manage instances
Start an instance:
$ aws ec2 run-instances --image-id ami-xxxxxx
View details about an instance:
$ aws ec2 describe-instances --instance-id ixxxxxxxx
Terminate an instance:
$ aws ec2 terminate-instances --instance-id ixxxxxxxx
SANS Technology Institute - Candidate for Master of Science Degree 6
CloudFormation Templates
• Configuration files for AWS resources
• Store configuration in source control
• Decouple configuration and deployment
• Handles dependency management
• Deploy via AWS tools such as AWS CLI:
$ aws cloudformation create-stack –template-url [path]
SANS Technology Institute - Candidate for Master of Science Degree 7
AWS Networking
• VPC (Virtual Private Cloud)
• Subnets and Security Groups
• Internet Gateway
• Virtual Private Gateway
• Direct Connect, VPN
• VPC Flow Logs
SANS Technology Institute - Candidate for Master of Science Degree 8
Sample Code
• Follow instructions in README.md
https://github.com/tradichel/AWSSecurityAutomationFramework
• Execute run.sh and specify mode:
– CREATE will create cloud resources
– PINGTEST generates unwanted traffic and
triggers a response
– DELETE will delete resources created by
either CREATE or PINGTEST
SANS Technology Institute - Candidate for Master of Science Degree 9
Resources Deployed
SANS Technology Institute - Candidate for Master of Science Degree 10
PINGTEST Mode
One instance is configured to ping other
"UserData":
{ "Fn::If" :
[
"PingMe",
{ "Fn::Base64":
{ "Fn::Join": [ "", [
"#!/bin/bash -en",
"echo ping ",
{"Fn::GetAtt" : [ "Ec2Instance1" , "PrivateIp" ]},
" > /tmp/ping.shn",
"cd /tmpn",
"chmod 777 ping.shn",
"nohup ./ping.sh &n"
] ] } },
{"Ref" : "AWS::NoValue"}
]
}
SANS Technology Institute - Candidate for Master of Science Degree 11
Click a Log Group to see Log Streams
VPC Flow Logs
SANS Technology Institute - Candidate for Master of Science Degree 12
CloudWatch Log Stream
• Click on ENI to see related logs
SANS Technology Institute - Candidate for Master of Science Degree 13
Code Evaluates Logged Events
Function monitors VPC flow logs for
REJECTs and logs statistics
SANS Technology Institute - Candidate for Master of Science Degree 14
REJECT Triggers Response
Snapshot Instance
Terminate Instance
SANS Technology Institute - Candidate for Master of Science Degree 15
AWS Security Benefits
• Comprehensive inventory
• Built in, scalable logging
• Infrastructure as code
• Tools that facilitate automated intrusion
detection and response
• Augmented security for some ~ if you
follow AWS security best practices.

More Related Content

PPTX
AWS Security Strategy
PPTX
Security for Complex Networks on AWS
PPTX
Crypto Miners in the Cloud
PDF
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
PPTX
Packet Capture on AWS
PDF
Pragmatic Cloud Security Automation
PPTX
Los Angeles AWS Users Group - Athena Deep Dive
PPTX
Scaling Security in the Cloud With Open Source
AWS Security Strategy
Security for Complex Networks on AWS
Crypto Miners in the Cloud
Using Splunk/ELK for auditing AWS/GCP/Azure security posture
Packet Capture on AWS
Pragmatic Cloud Security Automation
Los Angeles AWS Users Group - Athena Deep Dive
Scaling Security in the Cloud With Open Source

What's hot (20)

PPTX
Lacework Kubernetes Meetup | August 28, 2018
PPTX
Of CORS thats a thing how CORS in the cloud still kills security
PPTX
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
PPTX
Lacework | Top 10 Cloud Security Threats
PDF
Battle in the Clouds - Attacker vs Defender on AWS
PDF
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
PDF
Practical Guide to Securing Kubernetes
PPTX
Native cloud security monitoring
PPTX
Locking Down Your Cloud
PDF
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
PDF
All Your Containers Are Belong To Us
PDF
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
PDF
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
PDF
MozDef Workshop slide
PPTX
Azure for Auditors
PPTX
Alfredo Reino - Monitoring aws and azure
PDF
Phishing in the cloud era
PDF
Security Spotlight: The Coca Cola Company - CSS ATX 2017
PDF
Node JS reverse shell
PDF
The AWS Shared Responsibility Model in Practice
Lacework Kubernetes Meetup | August 28, 2018
Of CORS thats a thing how CORS in the cloud still kills security
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
Lacework | Top 10 Cloud Security Threats
Battle in the Clouds - Attacker vs Defender on AWS
Keynote - Cloudy Vision: How Cloud Integration Complicates Security
Practical Guide to Securing Kubernetes
Native cloud security monitoring
Locking Down Your Cloud
Exploiting IAM in the google cloud platform - dani_goland_mohsan_farid
All Your Containers Are Belong To Us
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
MozDef Workshop slide
Azure for Auditors
Alfredo Reino - Monitoring aws and azure
Phishing in the cloud era
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Node JS reverse shell
The AWS Shared Responsibility Model in Practice
Ad

Similar to Automated Intrusion Detection and Response on AWS (20)

PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PPTX
Hack proof your aws cloud cloudcheckr_040416
PPTX
Managing Security on AWS
PDF
AWS Incident Response Cheat Sheet.pdf
PPTX
Deep dive - AWS security by design
PPTX
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
PDF
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
PDF
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
PDF
Automating Security in Cloud Workloads with DevSecOps
PDF
Securing Your Customers Data From Day One
PPTX
Threat detection and mitigation at AWS
PPTX
AWS Monitoring & Logging
PDF
AWS BaseCamp: AWS Architecture Fundamentals
PPTX
AWSome Day Digital LATAM
PDF
AWS Architecture Fundamentals - Houston
PDF
Practical AWS Security - Scott Hogg
PPTX
5 minutes on security
DOCX
Basic understanding of aws
PDF
AWSome Day Lisbon 2017
PDF
AWSome Day Lisboa 2017
Hackproof Your Cloud: Responding to 2016 Threats
Hack proof your aws cloud cloudcheckr_040416
Managing Security on AWS
AWS Incident Response Cheat Sheet.pdf
Deep dive - AWS security by design
Build and Manage a Highly Secure Cloud Environment on AWS and Azure
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
Automating Security in Cloud Workloads with DevSecOps
Securing Your Customers Data From Day One
Threat detection and mitigation at AWS
AWS Monitoring & Logging
AWS BaseCamp: AWS Architecture Fundamentals
AWSome Day Digital LATAM
AWS Architecture Fundamentals - Houston
Practical AWS Security - Scott Hogg
5 minutes on security
Basic understanding of aws
AWSome Day Lisbon 2017
AWSome Day Lisboa 2017
Ad

More from 2nd Sight Lab (20)

PPTX
Threat Modeling a Batch Job Framework - Teri Radichel - AWS re:Inforce 2025
PPTX
Cross-Cloud Comparison and Security Notes
PPTX
Threat Modeling a Batch Job System - AWS Security Community Day
PPTX
Azure Security - Day6 - Operations And Risk
PPTX
Azure Security - Day5 - Governance And Architecture
PPTX
AzureSecurity Day4 Compute And Application Service Security
PPTX
AzureSecurity - Day3 - Storage And Key Vault
PPTX
AzureSecurity - Day2 - Azure Network Security
PPTX
AzureSecurity Day1: Identity and Access Management
PPTX
So You Want a Job in Cybersecurity
PPTX
Cloud Offense Informs Cloud Defense.pptx
PPTX
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
PPTX
Real World Cloud Compromise
PPTX
Serverless Attack Vectors
PPTX
Top Priorities for Cloud Application Security
PPTX
How the Cloud Changes Cyber Security
PPTX
Are you ready for a cloud pentest? AWS re:Inforce 2019
PPTX
Are You Ready for a Cloud Pentest?
PPTX
Red Team vs. Blue Team on AWS ~ re:Invent 2018
PPTX
Top 5 Priorities for Cloud Security
Threat Modeling a Batch Job Framework - Teri Radichel - AWS re:Inforce 2025
Cross-Cloud Comparison and Security Notes
Threat Modeling a Batch Job System - AWS Security Community Day
Azure Security - Day6 - Operations And Risk
Azure Security - Day5 - Governance And Architecture
AzureSecurity Day4 Compute And Application Service Security
AzureSecurity - Day3 - Storage And Key Vault
AzureSecurity - Day2 - Azure Network Security
AzureSecurity Day1: Identity and Access Management
So You Want a Job in Cybersecurity
Cloud Offense Informs Cloud Defense.pptx
Underrated AWS Security Controls ~ AWS Atlanta Summit 2022
Real World Cloud Compromise
Serverless Attack Vectors
Top Priorities for Cloud Application Security
How the Cloud Changes Cyber Security
Are you ready for a cloud pentest? AWS re:Inforce 2019
Are You Ready for a Cloud Pentest?
Red Team vs. Blue Team on AWS ~ re:Invent 2018
Top 5 Priorities for Cloud Security

Recently uploaded (20)

PPTX
MYSQL Presentation for SQL database connectivity
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Spectral efficient network and resource selection model in 5G networks
DOCX
The AUB Centre for AI in Media Proposal.docx
PPT
Teaching material agriculture food technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPTX
Cloud computing and distributed systems.
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Machine learning based COVID-19 study performance prediction
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
MYSQL Presentation for SQL database connectivity
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Spectral efficient network and resource selection model in 5G networks
The AUB Centre for AI in Media Proposal.docx
Teaching material agriculture food technology
NewMind AI Weekly Chronicles - August'25 Week I
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Cloud computing and distributed systems.
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
NewMind AI Monthly Chronicles - July 2025
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Machine learning based COVID-19 study performance prediction
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows

Automated Intrusion Detection and Response on AWS

  • 1. 1SANS Technology Institute - Candidate for Master of Science Degree 1 Automated Intrusion Detection and Response on Amazon Web Services Teri Radichel September 2016 GIAC GSEC, GCIH and GCIA
  • 2. SANS Technology Institute - Candidate for Master of Science Degree 2 Can AWS Improve Security Operations? • Whitepaper: Overview of AWS Security Processes – Are Yours Better? • Shared Responsibility Model • Separation of duties • Built in inventory and scalable logging • DevSecOps: Write code to configure infrastructure and respond to events
  • 3. SANS Technology Institute - Candidate for Master of Science Degree 3 What Is AWS? • Platform for infrastructure management • Start, stop and configure resources via console or code • Automated scaling
  • 4. SANS Technology Institute - Candidate for Master of Science Degree 4 Start Instance From Console EC2 instances (virtual machines) can be managed via the web console
  • 5. SANS Technology Institute - Candidate for Master of Science Degree 5 Start Instance Via Code Better: Write code to manage instances Start an instance: $ aws ec2 run-instances --image-id ami-xxxxxx View details about an instance: $ aws ec2 describe-instances --instance-id ixxxxxxxx Terminate an instance: $ aws ec2 terminate-instances --instance-id ixxxxxxxx
  • 6. SANS Technology Institute - Candidate for Master of Science Degree 6 CloudFormation Templates • Configuration files for AWS resources • Store configuration in source control • Decouple configuration and deployment • Handles dependency management • Deploy via AWS tools such as AWS CLI: $ aws cloudformation create-stack –template-url [path]
  • 7. SANS Technology Institute - Candidate for Master of Science Degree 7 AWS Networking • VPC (Virtual Private Cloud) • Subnets and Security Groups • Internet Gateway • Virtual Private Gateway • Direct Connect, VPN • VPC Flow Logs
  • 8. SANS Technology Institute - Candidate for Master of Science Degree 8 Sample Code • Follow instructions in README.md https://github.com/tradichel/AWSSecurityAutomationFramework • Execute run.sh and specify mode: – CREATE will create cloud resources – PINGTEST generates unwanted traffic and triggers a response – DELETE will delete resources created by either CREATE or PINGTEST
  • 9. SANS Technology Institute - Candidate for Master of Science Degree 9 Resources Deployed
  • 10. SANS Technology Institute - Candidate for Master of Science Degree 10 PINGTEST Mode One instance is configured to ping other "UserData": { "Fn::If" : [ "PingMe", { "Fn::Base64": { "Fn::Join": [ "", [ "#!/bin/bash -en", "echo ping ", {"Fn::GetAtt" : [ "Ec2Instance1" , "PrivateIp" ]}, " > /tmp/ping.shn", "cd /tmpn", "chmod 777 ping.shn", "nohup ./ping.sh &n" ] ] } }, {"Ref" : "AWS::NoValue"} ] }
  • 11. SANS Technology Institute - Candidate for Master of Science Degree 11 Click a Log Group to see Log Streams VPC Flow Logs
  • 12. SANS Technology Institute - Candidate for Master of Science Degree 12 CloudWatch Log Stream • Click on ENI to see related logs
  • 13. SANS Technology Institute - Candidate for Master of Science Degree 13 Code Evaluates Logged Events Function monitors VPC flow logs for REJECTs and logs statistics
  • 14. SANS Technology Institute - Candidate for Master of Science Degree 14 REJECT Triggers Response Snapshot Instance Terminate Instance
  • 15. SANS Technology Institute - Candidate for Master of Science Degree 15 AWS Security Benefits • Comprehensive inventory • Built in, scalable logging • Infrastructure as code • Tools that facilitate automated intrusion detection and response • Augmented security for some ~ if you follow AWS security best practices.