SlideShare a Scribd company logo
Agenda
- Introduction
- AWS Shared Responsibility Model
- AWS Data Security
- AWS Servers Security
- AWS Applications Security
- Security Best Practice
1
Cloud Journey 2
Shared Responsibility Model 3
Shared Responsibility Model and service
categories 4
AWS Cloud Adoption Framework Overview 5
6
AWS Security Best Practices Checklist
Amazon Elastic
Compute Cloud
Amazon Relational
Database Service
Amazon Aurora
Amazon
CloudFront
Amazon API
Gateway
AWS Lambda
AWS Lightsail DNS Zone Walking
As of now, the AWS penetration testing policy allows testing of the
following AWS services:
7
Amazon inspector
Amazon Inspector features and benefits
๏ƒ˜ Enforce security standards and compliance
๏ƒ˜ Increasing development agility
๏ƒ˜ Leverage AWS Security expertise
๏ƒ˜ Integrated with AWS services and AWS partners
Amazon Inspector Components
8
AWS Agent
Assessment
run
Assessmen
t target Findings
Assessmen
t report
Rules
package
9
AWS Shield
AWS Shield features and benefits
๏ƒ˜ Seamless integration and deployment
๏ƒ˜ Customizable protection
๏ƒ˜ Cost efficient
๏ƒ˜ Quick detection
๏ƒ˜ Inline attack mitigation
10
AWS Web Application Firewall (WAF)
๏ƒ˜ Increased protection against web attacks
๏ƒ˜ Security integrated with how you develop applications
๏ƒ˜ Ease of deployment and maintenance
๏ƒ˜ Improved web traffic visibility
๏ƒ˜ Cost effective web application development
11
Amazon Cognito
12
Amazon API Gateway
๏ƒ˜ Low cost and efficient
๏ƒ˜ Flexible security controls
๏ƒ˜ Run your APIs without servers
๏ƒ˜ Monitor APIs
AWS Security
Best Practices
Checklist
(IAM)
โ€ข Avoid using AWS root account user access keys as it gives
full access to all resources
โ€ข Make sure MFA authentication is enabled for the root
account to provide two-factor authentication
โ€ข Assign individual IAM users with necessary permissions to
enable login ensure User Accounts also have MFA
authentication
โ€ข IAM Access Keys must be rotated at periodic intervals
โ€ข Ensure a strong password policy for users
โ€ข Assign permissions to users based on User Groups, instead
of individual IAM users
โ€ข Provide access to a resource through IAM Roles
โ€ข Grant least access while creating IAM Policies, needed to
perform the necessary actions
โ€ข Attach IAM Policies to Groups or Roles on creation
โ€ข If required, conditions can be defined for Policies under
which access is granted to a resource
โ€ข Get rid of unnecessary IAM credentials, those with are
inactive or unused use IAM Roles to grant access to
applications on EC2 Instances
13
AWS Security
Best Practices
Checklist (S3)
โ€ขEnsure S3 buckets are not publicly accessible (public read or
write
permissions)
โ€ขMake use of object-level or bucket-level permissions in addition
to IAM policies to grant access to resources
โ€ขEnable MFA Delete to prevent accidental deletion of buckets
โ€ขConsider encryption of stored data, which can be done in two
ways
server-side and client-side encryption
โ€ขEnable encryption of inbound and outbound data traffic,
through SSL
endpoints
โ€ขConfigure S3 lifecycle management through rule-based actions
and
use versioning to store and retrieve multiple versions of an
object in
a bucket, to deal with accidental deletions
โ€ขEnsure S3 access logging is enabled
โ€ขConstantly audit and monitor S3 buckets using CloudWatch 14
AWS Security
Best Practices
Checklist
(EC2, VPC &
EBS)
โ€ขEnsure data and disk volumes in EBS are encrypted with AES-
256, the
industry standard algorithm
โ€ขRestrict access to instances from limited IP ranges using Security
Groups
limit the range of open ports on EC2 security groups, to prevent
exposure to vulnerabilities
โ€ขEnsure ELBs have a valid security group attached to it
โ€ขMonitor and optimize default security groups, as they allow
unrestricted access for inbound and outbound traffic
โ€ขEnsure restricted inbound access to SSH, FTP, SMTP, MySQL,
PostgreSQL, MongoDB, MSSQL, CIFS, etc; to required entities
only
โ€ขUse IAM roles to grant access to EC2, instead of access keys for
temporary requirements
โ€ขIf youโ€™re using IAM user access keys for long term permissions,
ensure
that you donโ€™t embed the keys directly into code, generate different
keys for different applications, rotate your access keys, use MFA
authentication and decommission unused key pairs.
โ€ขEnable and activate your VPC flow logs to record inbound and
outbound
traffic in your VPC for better monitoring and early diagnosis
โ€ขDelete unused Virtual Private Gateways and VPC Internet
Gateways
โ€ขMake sure that no VPC endpoints are exposed, by checking the
principal
value in the policy
โ€ขEnsure no ACLs allow unrestricted inbound or outbound access
15
AWS Security
Best Practices
Checklist
(CloudTrail)
โ€ขEnsure CloudTrail is activated across all regions, and for global
services like IAM, STS, etc
โ€ขIt is recommended to log to a centralized S3 bucket
โ€ขMake sure both CloudTrail itself and CloudTrail logging are
enable
for all regions
โ€ขEnsure CloudTrail log file integrity validation is enabled
โ€ขEnsure CloudTrail log files are encrypted
16
20
AWS Security Best Practices Checklist
RDS
โ€ขEnsure RDS security groups do not allow unrestricted access
โ€ขEnsure encryption of the RDS instances and snapshots, using AES-256 level encryption
โ€ขProtect data in transit to RDS through SSL endpoints
โ€ขMonitor control to RDS using AWS KMS and Customer Managed Keys
โ€ขEnsure RDS database instances and snapshots are not publicly accessible
โ€ขEnable the auto minor upgrade feature for RDS
21
AWS Security Best Practices Checklist
Redshift โ€œ
โ€ขEnable require_ssl parameter in all Redshift clusters to minimize risk for encryption of
data in transit for Redshift, and to connect your SQL client with your cluster
โ€ขEnable Redshift Cluster encryption
โ€ขEnsure Redshift user activity logging is enabled
โ€ขEnsure Redshift encryption with KMS Customer Managed Keys
โ€ขIt is recommended that Redshift clusters are launched within a VPC for better control
โ€ขEnsure that the Redshift clusters are not publicly accessible
22
VPC Security Best Practices
โ€ขPlan Your VPC before You Create It
โ€ขChoose the Highest CIDR Block
โ€ขUnique IP Address Range
โ€ขLeave the Default VPC Alone
โ€ขDesign for Region Expansion
โ€ขTier Your Subnets
โ€ขFollow the Least Privilege Principle
โ€ขKeep Most Resources in the Private Subnet
23
IAM Security Best Practices
โ€ขDelete your root access keys
โ€ขEnforce MFA
โ€ขUse roles instead of users
โ€ขUse access advisor periodically
โ€ขDevelop a Zero Trust Approach to Security
โ€ขAutomate Onboarding and Offboarding
โ€ขUser Access review
24
DATA Security Best Practices
โ€ขEncryption
โ€ขUse KMS
โ€ขRotate your keys
โ€ขClassify your data
โ€ขSecure data in transit
โ€ขS3 bucket permissions
25
Servers Security Best Practices
โ€ขUse IAM roles for EC2
โ€ขUse ELB
โ€ขSecurity group configuration
โ€ขUse Web Application Firewall (WAF)
โ€ขSecured access:
โ€ขBackup and recovery
โ€ขEC2 termination protection
26
Application Security Best Practices
โ€ขUse web application firewall
โ€ขAmazon Inspector
โ€ขPenetration testing
โ€ขUtilize AWS security tools
27
Monitoring in AWS
AWS allows you to monitor all your resources in the cloud such as your servers and
your AWS services, along with applications running on these services through its fully
managed monitoring service AWS CloudWatch.
AWS CloudWatch provide
๏ถ Metrics
๏ถ Dashboards
๏ถ Events
๏ถ Alarms
๏ถ Log monitoring
28
AWS
Well
Architected
Framework
29
AWS
Security
Building
Blocks

More Related Content

PPT
Intro to Amazon S3
PPTX
IAM Deep Dive - Custom IAM Policies with Conditions
PDF
Azure Penetration Testing
PPTX
AWS Cloud trail
PPTX
AWS Database Services
PDF
AWS Connectivity, VPC Design and Security Pro Tips
PPT
Cloud computing
PDF
AWS EBS
Intro to Amazon S3
IAM Deep Dive - Custom IAM Policies with Conditions
Azure Penetration Testing
AWS Cloud trail
AWS Database Services
AWS Connectivity, VPC Design and Security Pro Tips
Cloud computing
AWS EBS

What's hot (20)

PDF
20190313 AWS Black Belt Online Seminar Amazon VPC Basic
PPTX
Aws security best practices
PDF
Azure DDoS Protection Standard
PDF
Serverless computing with AWS Lambda
PPTX
Azure Governance
PDF
AWS Black Belt Techใ‚ทใƒชใƒผใ‚บ Amazon WorkDocs / Amazon WorkMail
PPTX
AWS solution Architect Associate study material
PPTX
AWS Storage - S3 Fundamentals
PPTX
All about paas_iaas_saas_29.01.2015
PDF
AWS
ย 
PDF
PDF
Introduction to Cloud Computing
PPTX
AWS S3 | Tutorial For Beginners | AWS S3 Bucket Tutorial | AWS Tutorial For B...
PPTX
Azure Security Overview
PDF
AWS Aurora ์šด์˜์‚ฌ๋ก€ (by ๋ฐฐ์€๋ฏธ)
PPT
Cloud computing security
PPTX
PPTX
Cloud Computing Security
PPT
Unit 1-Cloud computing Foundation
PPTX
AWS VPC & Networking basic concepts
20190313 AWS Black Belt Online Seminar Amazon VPC Basic
Aws security best practices
Azure DDoS Protection Standard
Serverless computing with AWS Lambda
Azure Governance
AWS Black Belt Techใ‚ทใƒชใƒผใ‚บ Amazon WorkDocs / Amazon WorkMail
AWS solution Architect Associate study material
AWS Storage - S3 Fundamentals
All about paas_iaas_saas_29.01.2015
AWS
ย 
Introduction to Cloud Computing
AWS S3 | Tutorial For Beginners | AWS S3 Bucket Tutorial | AWS Tutorial For B...
Azure Security Overview
AWS Aurora ์šด์˜์‚ฌ๋ก€ (by ๋ฐฐ์€๋ฏธ)
Cloud computing security
Cloud Computing Security
Unit 1-Cloud computing Foundation
AWS VPC & Networking basic concepts
Ad

Similar to AWS Security (17)

PPTX
#ALSummit: Architecting Security into your AWS Environment
PDF
Managed Threat Detection and Response
PPTX
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
PDF
Advanced Security Masterclass - Tel Aviv Loft
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
Cloudifying your Security Operations on AWS
PDF
8 Elements of Multi-Cloud Security
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
PPTX
AWS Security Architecture - Overview
PDF
AWS Security Best Practices (March 2017)
PPTX
Core strategies to develop defense in depth in AWS
PPTX
Hybrid - Seguridad en Contenedores v3.pptx
PPTX
Cloud computing and Cloud security fundamentals
PPTX
AWS Landing Zone - Architecting Security and Governance.pptx
PDF
Security Best Practices_John Hildebrandt
PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
#ALSummit: Architecting Security into your AWS Environment
Managed Threat Detection and Response
CIS Compliance Automations Eevidence Collection, Security and Compliance Be...
Advanced Security Masterclass - Tel Aviv Loft
Managed Threat Detection & Response for AWS Applications
Cloudifying your Security Operations on AWS
8 Elements of Multi-Cloud Security
Hackproof Your Cloud: Responding to 2016 Threats
Multi cloud governance best practices - AWS, Azure, GCP
AWS Security Architecture - Overview
AWS Security Best Practices (March 2017)
Core strategies to develop defense in depth in AWS
Hybrid - Seguridad en Contenedores v3.pptx
Cloud computing and Cloud security fundamentals
AWS Landing Zone - Architecting Security and Governance.pptx
Security Best Practices_John Hildebrandt
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Ad

Recently uploaded (20)

PPTX
international classification of diseases ICD-10 review PPT.pptx
PPTX
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
PPT
tcp ip networks nd ip layering assotred slides
PPTX
522797556-Unit-2-Temperature-measurement-1-1.pptx
PPTX
Digital Literacy And Online Safety on internet
PDF
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
PDF
Slides PDF The World Game (s) Eco Economic Epochs.pdf
PPT
Design_with_Watersergyerge45hrbgre4top (1).ppt
PDF
Unit-1 introduction to cyber security discuss about how to secure a system
PDF
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
PDF
Decoding a Decade: 10 Years of Applied CTI Discipline
PPTX
Introduction to Information and Communication Technology
PDF
SASE Traffic Flow - ZTNA Connector-1.pdf
PPTX
Funds Management Learning Material for Beg
PDF
Tenda Login Guide: Access Your Router in 5 Easy Steps
PDF
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
PDF
The New Creative Director: How AI Tools for Social Media Content Creation Are...
DOCX
Unit-3 cyber security network security of internet system
PPTX
presentation_pfe-universite-molay-seltan.pptx
PDF
WebRTC in SignalWire - troubleshooting media negotiation
international classification of diseases ICD-10 review PPT.pptx
June-4-Sermon-Powerpoint.pptx USE THIS FOR YOUR MOTIVATION
tcp ip networks nd ip layering assotred slides
522797556-Unit-2-Temperature-measurement-1-1.pptx
Digital Literacy And Online Safety on internet
๐Ÿ’ฐ ๐”๐Š๐“๐ˆ ๐Š๐„๐Œ๐„๐๐€๐๐†๐€๐ ๐Š๐ˆ๐๐„๐‘๐Ÿ’๐ƒ ๐‡๐€๐‘๐ˆ ๐ˆ๐๐ˆ ๐Ÿ๐ŸŽ๐Ÿ๐Ÿ“ ๐Ÿ’ฐ
ย 
Slides PDF The World Game (s) Eco Economic Epochs.pdf
Design_with_Watersergyerge45hrbgre4top (1).ppt
Unit-1 introduction to cyber security discuss about how to secure a system
RPKI Status Update, presented by Makito Lay at IDNOG 10
ย 
Decoding a Decade: 10 Years of Applied CTI Discipline
Introduction to Information and Communication Technology
SASE Traffic Flow - ZTNA Connector-1.pdf
Funds Management Learning Material for Beg
Tenda Login Guide: Access Your Router in 5 Easy Steps
Automated vs Manual WooCommerce to Shopify Migration_ Pros & Cons.pdf
The New Creative Director: How AI Tools for Social Media Content Creation Are...
Unit-3 cyber security network security of internet system
presentation_pfe-universite-molay-seltan.pptx
WebRTC in SignalWire - troubleshooting media negotiation

AWS Security

  • 1. Agenda - Introduction - AWS Shared Responsibility Model - AWS Data Security - AWS Servers Security - AWS Applications Security - Security Best Practice 1
  • 4. Shared Responsibility Model and service categories 4
  • 5. AWS Cloud Adoption Framework Overview 5
  • 6. 6 AWS Security Best Practices Checklist Amazon Elastic Compute Cloud Amazon Relational Database Service Amazon Aurora Amazon CloudFront Amazon API Gateway AWS Lambda AWS Lightsail DNS Zone Walking As of now, the AWS penetration testing policy allows testing of the following AWS services:
  • 7. 7 Amazon inspector Amazon Inspector features and benefits ๏ƒ˜ Enforce security standards and compliance ๏ƒ˜ Increasing development agility ๏ƒ˜ Leverage AWS Security expertise ๏ƒ˜ Integrated with AWS services and AWS partners
  • 8. Amazon Inspector Components 8 AWS Agent Assessment run Assessmen t target Findings Assessmen t report Rules package
  • 9. 9 AWS Shield AWS Shield features and benefits ๏ƒ˜ Seamless integration and deployment ๏ƒ˜ Customizable protection ๏ƒ˜ Cost efficient ๏ƒ˜ Quick detection ๏ƒ˜ Inline attack mitigation
  • 10. 10 AWS Web Application Firewall (WAF) ๏ƒ˜ Increased protection against web attacks ๏ƒ˜ Security integrated with how you develop applications ๏ƒ˜ Ease of deployment and maintenance ๏ƒ˜ Improved web traffic visibility ๏ƒ˜ Cost effective web application development
  • 12. 12 Amazon API Gateway ๏ƒ˜ Low cost and efficient ๏ƒ˜ Flexible security controls ๏ƒ˜ Run your APIs without servers ๏ƒ˜ Monitor APIs
  • 13. AWS Security Best Practices Checklist (IAM) โ€ข Avoid using AWS root account user access keys as it gives full access to all resources โ€ข Make sure MFA authentication is enabled for the root account to provide two-factor authentication โ€ข Assign individual IAM users with necessary permissions to enable login ensure User Accounts also have MFA authentication โ€ข IAM Access Keys must be rotated at periodic intervals โ€ข Ensure a strong password policy for users โ€ข Assign permissions to users based on User Groups, instead of individual IAM users โ€ข Provide access to a resource through IAM Roles โ€ข Grant least access while creating IAM Policies, needed to perform the necessary actions โ€ข Attach IAM Policies to Groups or Roles on creation โ€ข If required, conditions can be defined for Policies under which access is granted to a resource โ€ข Get rid of unnecessary IAM credentials, those with are inactive or unused use IAM Roles to grant access to applications on EC2 Instances 13
  • 14. AWS Security Best Practices Checklist (S3) โ€ขEnsure S3 buckets are not publicly accessible (public read or write permissions) โ€ขMake use of object-level or bucket-level permissions in addition to IAM policies to grant access to resources โ€ขEnable MFA Delete to prevent accidental deletion of buckets โ€ขConsider encryption of stored data, which can be done in two ways server-side and client-side encryption โ€ขEnable encryption of inbound and outbound data traffic, through SSL endpoints โ€ขConfigure S3 lifecycle management through rule-based actions and use versioning to store and retrieve multiple versions of an object in a bucket, to deal with accidental deletions โ€ขEnsure S3 access logging is enabled โ€ขConstantly audit and monitor S3 buckets using CloudWatch 14
  • 15. AWS Security Best Practices Checklist (EC2, VPC & EBS) โ€ขEnsure data and disk volumes in EBS are encrypted with AES- 256, the industry standard algorithm โ€ขRestrict access to instances from limited IP ranges using Security Groups limit the range of open ports on EC2 security groups, to prevent exposure to vulnerabilities โ€ขEnsure ELBs have a valid security group attached to it โ€ขMonitor and optimize default security groups, as they allow unrestricted access for inbound and outbound traffic โ€ขEnsure restricted inbound access to SSH, FTP, SMTP, MySQL, PostgreSQL, MongoDB, MSSQL, CIFS, etc; to required entities only โ€ขUse IAM roles to grant access to EC2, instead of access keys for temporary requirements โ€ขIf youโ€™re using IAM user access keys for long term permissions, ensure that you donโ€™t embed the keys directly into code, generate different keys for different applications, rotate your access keys, use MFA authentication and decommission unused key pairs. โ€ขEnable and activate your VPC flow logs to record inbound and outbound traffic in your VPC for better monitoring and early diagnosis โ€ขDelete unused Virtual Private Gateways and VPC Internet Gateways โ€ขMake sure that no VPC endpoints are exposed, by checking the principal value in the policy โ€ขEnsure no ACLs allow unrestricted inbound or outbound access 15
  • 16. AWS Security Best Practices Checklist (CloudTrail) โ€ขEnsure CloudTrail is activated across all regions, and for global services like IAM, STS, etc โ€ขIt is recommended to log to a centralized S3 bucket โ€ขMake sure both CloudTrail itself and CloudTrail logging are enable for all regions โ€ขEnsure CloudTrail log file integrity validation is enabled โ€ขEnsure CloudTrail log files are encrypted 16
  • 17. 20 AWS Security Best Practices Checklist RDS โ€ขEnsure RDS security groups do not allow unrestricted access โ€ขEnsure encryption of the RDS instances and snapshots, using AES-256 level encryption โ€ขProtect data in transit to RDS through SSL endpoints โ€ขMonitor control to RDS using AWS KMS and Customer Managed Keys โ€ขEnsure RDS database instances and snapshots are not publicly accessible โ€ขEnable the auto minor upgrade feature for RDS
  • 18. 21 AWS Security Best Practices Checklist Redshift โ€œ โ€ขEnable require_ssl parameter in all Redshift clusters to minimize risk for encryption of data in transit for Redshift, and to connect your SQL client with your cluster โ€ขEnable Redshift Cluster encryption โ€ขEnsure Redshift user activity logging is enabled โ€ขEnsure Redshift encryption with KMS Customer Managed Keys โ€ขIt is recommended that Redshift clusters are launched within a VPC for better control โ€ขEnsure that the Redshift clusters are not publicly accessible
  • 19. 22 VPC Security Best Practices โ€ขPlan Your VPC before You Create It โ€ขChoose the Highest CIDR Block โ€ขUnique IP Address Range โ€ขLeave the Default VPC Alone โ€ขDesign for Region Expansion โ€ขTier Your Subnets โ€ขFollow the Least Privilege Principle โ€ขKeep Most Resources in the Private Subnet
  • 20. 23 IAM Security Best Practices โ€ขDelete your root access keys โ€ขEnforce MFA โ€ขUse roles instead of users โ€ขUse access advisor periodically โ€ขDevelop a Zero Trust Approach to Security โ€ขAutomate Onboarding and Offboarding โ€ขUser Access review
  • 21. 24 DATA Security Best Practices โ€ขEncryption โ€ขUse KMS โ€ขRotate your keys โ€ขClassify your data โ€ขSecure data in transit โ€ขS3 bucket permissions
  • 22. 25 Servers Security Best Practices โ€ขUse IAM roles for EC2 โ€ขUse ELB โ€ขSecurity group configuration โ€ขUse Web Application Firewall (WAF) โ€ขSecured access: โ€ขBackup and recovery โ€ขEC2 termination protection
  • 23. 26 Application Security Best Practices โ€ขUse web application firewall โ€ขAmazon Inspector โ€ขPenetration testing โ€ขUtilize AWS security tools
  • 24. 27 Monitoring in AWS AWS allows you to monitor all your resources in the cloud such as your servers and your AWS services, along with applications running on these services through its fully managed monitoring service AWS CloudWatch. AWS CloudWatch provide ๏ถ Metrics ๏ถ Dashboards ๏ถ Events ๏ถ Alarms ๏ถ Log monitoring