SlideShare a Scribd company logo
AWS Security Monitoring
Best Practices for Effective Threat Detection and Response
Introductions
Russ Spitler
VP of Product Strategy
Agenda
Review of the AWS “Shared Security” Model
Implications on Threat Detection
Current state of Security in the Amazon AWS Cloud
Effective Security Monitoring in AWS
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
AWS: Who’s really responsible?
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
User’s
Responsibility
Amazon’s
Responsibility
AWS: Who’s really responsible?
Plenty of advice on how to secure your AWS implementation:
• Secure the root credentials with a strong password and multi-factor
authentication
• Use Multi-Factor Authentication for all admin accounts
• AWS VPC security
• AWS EC2 security: Use roles with minimal permissions to make API
calls from within EC2.
• Use CloudTrail to track changes made to the environment via API
calls.
• Make use of intrusion detection and log analysis in your environment
• For more complex environments, use SAML to establish a single
sign-on (SSO) for your AWS management.
AWS: Shared Security Model
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
AWS: Shared Security Model
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
So how do you monitor your environment?
How do you detect the latest threats?
What we do know is if an environment can be
compromised, it WILL be compromised.
AWS: What is effective monitoring?
 View user activity
 Detect known malicious behavioral patterns
 Identify anomalous activity
 Audit best practices and secure configuration
 Dynamically adapt to a changing environment
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
Dynamic
environment
Restricted
Deployment
Monitoring in a shared world
New Features
In other words…
• What services are my users using?
• Who terminated my instance?
• Do any of my instances have known vulnerabilities?
• Has anyone updated my security groups?
• Do I have any of my services publicly accessible?
Failure to use Security Groups – more
than 20,000 databases are publically
accessible in one Amazon region alone.
(9 Regions total).
Failure to manage credentials –
unrestricted AWS credentials used in
deployments
Hackers are stealing compute power
with stolen AWS API credentials
Hackers are using stolen servers as
command and control servers.
AWS: The Current State Of Security
• Heavily Restricted Deployment Environment
• New Security Model With New Features
• Dynamic Environment
Online Retailer- “CloudTrail is a great start, but I need to understand what it is saying.”
“I just don’t have visibility into when Amazon’s security features are working.”
“The stuff I bought for my other datacenter just doesn’t work here.”
“I’m not sure if my developers are exposing the company to more risk.”
“It is my impression that this is not Amazon’s fault that these issues exist. Most of the
vulnerabilities this year are from misconfigurations or small things where the
developers working on applications made mistakes” – Andres Riancho @ BlackHat
The Security Problem Opportunity
What is effective monitoring in AWS?
 Dynamically scalable monitoring
 Visibility into the API activity
 Assessment of the environment’s
configuration
AWS
APPLICATION
OPERATING SYSTEM
NETWORK
HYPERVISOR
PHYSICAL
USM for AMAZON
Heavily Restricted Deployment
• Vulnerability Scanning
• API Audit Logs Analysis
New Security Model
• AWS Infrastructure Assessment
Dynamic Environment
• Log Management
• Asset Discovery
• CloudTrail Logs Integration
Native Cloud Features
• Horizontally scalable storage and correlation
• Automated Deployment in your environment from AWS
AUTOMATED ASSET DISCOVERY – Manage security the way
your infrastructure is managed.
Automatically inventory running instances
Full visibility into AWS meta-data for forensics analysis
Map all security data back to Amazon instance-ID’s for real
cloud forensics
AMAZON INFRASTRUCTURE ASSESSMENT – Double check
use of AWS security primitives and detect changes.
Detect insecure configuration of network access controls
Remotely assessable service ports.
Remotely assessable management ports.
VPC subnet
Security Group
Security GroupSecurity Group
Core Features
LOG MANAGEMENT & CORRELATION – Monitor your
applications & systems for compliance & security.
Monitor your applications to detect behavioral changes
Secure storage for compliance
S3 & CloudWatch Log integration for ease of management
CLOUDTRAIL MONITORING & ALERTING – Notification
of environmental changes & abuse.
Monitor full API audit log
Monitor and alert on critical environment updates
Monitor and alert on malicious behavior
Core Features
VULNERABILITY ASSESSMENT – Stay ahead of
vulnerabilities & understand your exposure.
Elastically assess your infrastructure
Auto-Notification of new instances
Secure, authenticated scans with low-overhead
ELASTIC SCALABILITY
Horizontally scales as you grow.
CloudFormation templates for easy provisioning
Priced for elastic environments.
Auto-Scaling Group
Core Features
Lets See It In Action
888.613.6023
ALIENVAULT.COM
CONTACT US
HELLO@ALIENVAULT.COM
Questions?
Download a Free 15-Day Trial
http://www.alienvault.com/free-trial
Check out our Solution Brief:
AlienVault Unified Security Management for AWS
http://www.alienvault.com/resource-center/solution-
briefs/alienvault-unified-security-management-for-aws
Reach out to us
• rgeorgian@alienvault.com
• Hello@alienvault.com
• Twitter: @AlienVault

More Related Content

PPTX
Improve Security Visibility with AlienVault USM Correlation Directives
PPTX
Creating Correlation Rules in AlienVault
PPTX
IDS for Security Analysts: How to Get Actionable Insights from your IDS
PDF
Open Source IDS Tools: A Beginner's Guide
PPTX
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
PPTX
Beginner's Guide to SIEM
PPTX
Six Steps to SIEM Success
PPTX
Simplify PCI DSS Compliance with AlienVault USM
Improve Security Visibility with AlienVault USM Correlation Directives
Creating Correlation Rules in AlienVault
IDS for Security Analysts: How to Get Actionable Insights from your IDS
Open Source IDS Tools: A Beginner's Guide
Meltdown and Spectre - How to Detect the Vulnerabilities and Exploits
Beginner's Guide to SIEM
Six Steps to SIEM Success
Simplify PCI DSS Compliance with AlienVault USM

What's hot (20)

PPTX
Incident response live demo slides final
PPTX
How to Solve Your Top IT Security Reporting Challenges with AlienVault
PPTX
Automating Critical Security Controls for Threat Remediation and Compliance
PPTX
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
PPTX
Improve Situational Awareness for Federal Government with AlienVault USM
PPTX
Configuring Data Sources in AlienVault
PDF
Avoid Meltdown from the Spectre - How to measure impact and track remediation
PPTX
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
PPTX
How Malware Works
PPTX
Improve Threat Detection with OSSEC and AlienVault USM
PDF
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
PPTX
SIEM 101: Get a Clue About IT Security Analysis
PPTX
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
PPTX
Demo how to detect ransomware with alien vault usm_gg
PPTX
Securing Your Public Cloud Infrastructure
PDF
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
PPTX
Best Practices for Configuring Your OSSIM Installation
PPTX
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
PDF
Managing third party libraries
PPTX
#ALSummit: Live Cyber Hack Demonstration
Incident response live demo slides final
How to Solve Your Top IT Security Reporting Challenges with AlienVault
Automating Critical Security Controls for Threat Remediation and Compliance
Webcast Series #1: Continuous Security and Compliance Monitoring for Global I...
Improve Situational Awareness for Federal Government with AlienVault USM
Configuring Data Sources in AlienVault
Avoid Meltdown from the Spectre - How to measure impact and track remediation
New USM v5.0 - Get Complete Security Visibility Faster & Easier Than Ever
How Malware Works
Improve Threat Detection with OSSEC and AlienVault USM
SIEM for Beginners: Everything You Wanted to Know About Log Management but We...
SIEM 101: Get a Clue About IT Security Analysis
OSSIM User Training: Detect and Respond to Threats More Quickly with OSSIM v4.5
Demo how to detect ransomware with alien vault usm_gg
Securing Your Public Cloud Infrastructure
Security Whack-a-Mole: SANS 2017 Threat Landscape Survey
Best Practices for Configuring Your OSSIM Installation
Webcast Series #3: GDPR Deadline Readiness and Impact to Global Organizations...
Managing third party libraries
#ALSummit: Live Cyber Hack Demonstration
Ad

Viewers also liked (16)

PPT
Best Practices for Leveraging Security Threat Intelligence
PDF
AWS Security Best Practices (March 2017)
PPTX
Managing Security with Splunk Enterprise
PPTX
Operational Complexity: The Biggest Security Threat to Your AWS Environment
PPTX
The Evolution of IDS: Why Context is Key
PPTX
How to Leverage Log Data for Effective Threat Detection
PPTX
Improve threat detection with hids and alien vault usm
PPTX
OSSIM User Training: Get Improved Security Visibility with OSSIM
PPTX
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PDF
PCI DSS Implementation: A Five Step Guide
PPTX
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
PPTX
Alienvault threat alerts in spiceworks
PDF
Security operations center 5 security controls
PDF
Insider Threat Detection Recommendations
PPTX
Advanced OSSEC Training: Integration Strategies for Open Source Security
PPTX
Security Operations Center (SOC) Essentials for the SME
Best Practices for Leveraging Security Threat Intelligence
AWS Security Best Practices (March 2017)
Managing Security with Splunk Enterprise
Operational Complexity: The Biggest Security Threat to Your AWS Environment
The Evolution of IDS: Why Context is Key
How to Leverage Log Data for Effective Threat Detection
Improve threat detection with hids and alien vault usm
OSSIM User Training: Get Improved Security Visibility with OSSIM
How to Detect SQL Injections & XSS Attacks with AlienVault USM
PCI DSS Implementation: A Five Step Guide
New OSSIM v5.0 - Get Security Visibility Faster & Easier Than Ever
Alienvault threat alerts in spiceworks
Security operations center 5 security controls
Insider Threat Detection Recommendations
Advanced OSSEC Training: Integration Strategies for Open Source Security
Security Operations Center (SOC) Essentials for the SME
Ad

Similar to AWS Security Best Practices for Effective Threat Detection & Response (9)

PDF
Security Best Practices_John Hildebrandt
PDF
Security and Compliance Better on AWS_John Hildebrandt
PPTX
#ALSummit: Alert Logic & AWS - AWS Security Services
PDF
Segurança de Ponta a Ponta na AWS
PDF
Information Security in AWS - Dave Walker
PDF
1. aws security and compliance wwps pre-day sao paolo - markry
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
PPTX
Blue Chip Tek Connect and Protect Presentation #3
PDF
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
Security Best Practices_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
#ALSummit: Alert Logic & AWS - AWS Security Services
Segurança de Ponta a Ponta na AWS
Information Security in AWS - Dave Walker
1. aws security and compliance wwps pre-day sao paolo - markry
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Blue Chip Tek Connect and Protect Presentation #3
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...

More from AlienVault (10)

PDF
Malware Invaders - Is Your OS at Risk?
PPTX
Malware detection how to spot infections early with alien vault usm
PDF
The State of Incident Response - INFOGRAPHIC
PPTX
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
PDF
Alien vault sans cyber threat intelligence
PPTX
Security by Collaboration: Rethinking Red Teams versus Blue Teams
PPTX
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
PPTX
How to Detect System Compromise & Data Exfiltration with AlienVault USM
PPTX
Spice world 2014 hacker smackdown
PPTX
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball
Malware Invaders - Is Your OS at Risk?
Malware detection how to spot infections early with alien vault usm
The State of Incident Response - INFOGRAPHIC
Insider Threats: How to Spot Trouble Quickly with AlienVault USM
Alien vault sans cyber threat intelligence
Security by Collaboration: Rethinking Red Teams versus Blue Teams
Prepare to Be Breached: How to Adapt your Security Controls to the “New Normal”
How to Detect System Compromise & Data Exfiltration with AlienVault USM
Spice world 2014 hacker smackdown
Planning your 2015 Threat Detection Strategy with a Broken Crystal Ball

Recently uploaded (20)

PDF
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Approach and Philosophy of On baking technology
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
GamePlan Trading System Review: Professional Trader's Honest Take
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
Teaching material agriculture food technology
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
Machine learning based COVID-19 study performance prediction
PPTX
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
KodekX | Application Modernization Development
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Network Security Unit 5.pdf for BCA BBA.
[발표본] 너의 과제는 클라우드에 있어_KTDS_김동현_20250524.pdf
Big Data Technologies - Introduction.pptx
Review of recent advances in non-invasive hemoglobin estimation
Approach and Philosophy of On baking technology
NewMind AI Weekly Chronicles - August'25 Week I
“AI and Expert System Decision Support & Business Intelligence Systems”
GamePlan Trading System Review: Professional Trader's Honest Take
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
Machine learning based COVID-19 study performance prediction
breach-and-attack-simulation-cybersecurity-india-chennai-defenderrabbit-2025....
20250228 LYD VKU AI Blended-Learning.pptx
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
KodekX | Application Modernization Development
The Rise and Fall of 3GPP – Time for a Sabbatical?
Network Security Unit 5.pdf for BCA BBA.

AWS Security Best Practices for Effective Threat Detection & Response

  • 1. AWS Security Monitoring Best Practices for Effective Threat Detection and Response
  • 3. Agenda Review of the AWS “Shared Security” Model Implications on Threat Detection Current state of Security in the Amazon AWS Cloud Effective Security Monitoring in AWS
  • 6. Plenty of advice on how to secure your AWS implementation: • Secure the root credentials with a strong password and multi-factor authentication • Use Multi-Factor Authentication for all admin accounts • AWS VPC security • AWS EC2 security: Use roles with minimal permissions to make API calls from within EC2. • Use CloudTrail to track changes made to the environment via API calls. • Make use of intrusion detection and log analysis in your environment • For more complex environments, use SAML to establish a single sign-on (SSO) for your AWS management. AWS: Shared Security Model AWS APPLICATION OPERATING SYSTEM NETWORK HYPERVISOR PHYSICAL
  • 7. AWS: Shared Security Model AWS APPLICATION OPERATING SYSTEM NETWORK HYPERVISOR PHYSICAL So how do you monitor your environment? How do you detect the latest threats? What we do know is if an environment can be compromised, it WILL be compromised.
  • 8. AWS: What is effective monitoring?  View user activity  Detect known malicious behavioral patterns  Identify anomalous activity  Audit best practices and secure configuration  Dynamically adapt to a changing environment
  • 10. In other words… • What services are my users using? • Who terminated my instance? • Do any of my instances have known vulnerabilities? • Has anyone updated my security groups? • Do I have any of my services publicly accessible?
  • 11. Failure to use Security Groups – more than 20,000 databases are publically accessible in one Amazon region alone. (9 Regions total). Failure to manage credentials – unrestricted AWS credentials used in deployments Hackers are stealing compute power with stolen AWS API credentials Hackers are using stolen servers as command and control servers. AWS: The Current State Of Security
  • 12. • Heavily Restricted Deployment Environment • New Security Model With New Features • Dynamic Environment Online Retailer- “CloudTrail is a great start, but I need to understand what it is saying.” “I just don’t have visibility into when Amazon’s security features are working.” “The stuff I bought for my other datacenter just doesn’t work here.” “I’m not sure if my developers are exposing the company to more risk.” “It is my impression that this is not Amazon’s fault that these issues exist. Most of the vulnerabilities this year are from misconfigurations or small things where the developers working on applications made mistakes” – Andres Riancho @ BlackHat The Security Problem Opportunity
  • 13. What is effective monitoring in AWS?  Dynamically scalable monitoring  Visibility into the API activity  Assessment of the environment’s configuration AWS APPLICATION OPERATING SYSTEM NETWORK HYPERVISOR PHYSICAL
  • 14. USM for AMAZON Heavily Restricted Deployment • Vulnerability Scanning • API Audit Logs Analysis New Security Model • AWS Infrastructure Assessment Dynamic Environment • Log Management • Asset Discovery • CloudTrail Logs Integration Native Cloud Features • Horizontally scalable storage and correlation • Automated Deployment in your environment from AWS
  • 15. AUTOMATED ASSET DISCOVERY – Manage security the way your infrastructure is managed. Automatically inventory running instances Full visibility into AWS meta-data for forensics analysis Map all security data back to Amazon instance-ID’s for real cloud forensics AMAZON INFRASTRUCTURE ASSESSMENT – Double check use of AWS security primitives and detect changes. Detect insecure configuration of network access controls Remotely assessable service ports. Remotely assessable management ports. VPC subnet Security Group Security GroupSecurity Group Core Features
  • 16. LOG MANAGEMENT & CORRELATION – Monitor your applications & systems for compliance & security. Monitor your applications to detect behavioral changes Secure storage for compliance S3 & CloudWatch Log integration for ease of management CLOUDTRAIL MONITORING & ALERTING – Notification of environmental changes & abuse. Monitor full API audit log Monitor and alert on critical environment updates Monitor and alert on malicious behavior Core Features
  • 17. VULNERABILITY ASSESSMENT – Stay ahead of vulnerabilities & understand your exposure. Elastically assess your infrastructure Auto-Notification of new instances Secure, authenticated scans with low-overhead ELASTIC SCALABILITY Horizontally scales as you grow. CloudFormation templates for easy provisioning Priced for elastic environments. Auto-Scaling Group Core Features
  • 18. Lets See It In Action
  • 19. 888.613.6023 ALIENVAULT.COM CONTACT US HELLO@ALIENVAULT.COM Questions? Download a Free 15-Day Trial http://www.alienvault.com/free-trial Check out our Solution Brief: AlienVault Unified Security Management for AWS http://www.alienvault.com/resource-center/solution- briefs/alienvault-unified-security-management-for-aws Reach out to us • rgeorgian@alienvault.com • Hello@alienvault.com • Twitter: @AlienVault

Editor's Notes

  • #7: So how do you monitor your environment? How do you detect the latest threats? What we do know is if an environment can be compromised, it WILL be compromised.
  • #8: So how do you monitor your environment? How do you detect the latest threats? What we do know is if an environment can be compromised, it WILL be compromised.