SlideShare a Scribd company logo
AWS Security
Essentials
Aaron Bedra
Chief Scientist, Jemurai
@abedra
keybase.io/abedra
Cloud infrastructure
providers offer some
incredible benefits
There are loads of
reasons to take the leap
But there are a lot of
misconceptions about
how to approach it
This talk will focus on
AWS, but the concepts
apply to all providers
It’s easy to get caught up
in mirroring your legacy
datacenter
Just say no to lift and
shift!!!
But you have to realize
that this is not a
traditional DC
And you shouldn’t
treat it that way
There are aspects
you want to keep
And some you want
to throw away
To get security right in
the cloud requires
change
Key Areas
Automation

IAM

Network Design

Encryption

Auditing

Continuous Integration
Automation
AWS Security Essentials
This is a critical step
There’s no excuse for
ignoring automation
The platforms are
built for it
Humans clicking buttons
is what causes security
issues
And what causes
blockers, slow down, and
frustration
If you desire to move to the cloud
and wish to continue clicking
buttons, stay where you are
You shouldn’t be logging
into the AWS console
In fact, page the security
team when it happens
Or just disable console
access entirely*
Getting your infrastructure
configuration into code is
step 1
It allows for review,
analysis, and audit
It creates a culture
around describing
systems as data
The cloud is an
abstraction, talk about it
as one
It creates a place where simple
code review is the only blocker
between you and the end result
Automation Checklist
All infrastructure is recorded as code

All infrastructure changes are made by an automated tool

Console logins are restricted to a handful of
administrators

Teams are educated and empowered to make necessary
changes via automation
IAM
Get a grip on users
and permissions
I’ve seen some
things..
A mistake here could
provide control over
everything
How do we get to a
good place?
Use a directory!
If you already have a
directory, replicate it into
AWS
Avoid keeping multiple
systems of record for
user accounts
This solves on-boarding
and off-boarding issues
And ensures that
changes propagate
without additional work
If you don’t have a directory,
make sure you setup strong
account requirements
The root account
Don’t use it
Page security when it
is used
There are only a handful
of things you should use
the root account for
http://docs.aws.amazon.com/
general/latest/gr/aws_tasks-
that-require-root.html
Use of the root account
isn’t acceptable if it’s not
on that list
The only permission IAM
accounts should have is
assume role
Security Token Service
should be the gateway to
everything
This reduces the direct
exposure of credentials
And forces people to
think about the roles they
need to perform a task
IAM Checklist
Root account has MFA enabled

Root account has no access keys*

Users have no permissions outside of the ability to use STS to assume
roles*

Directories are replicated into AWS and used as the system of record

MFA is enabled for all human users

MFA is required to access privileged roles

Users are trained and provided tools to make role assumption seamless

Users have no inline policies
Network Design
Network design is
situation dependent
But there are a few
things that matter
Create a boundary
VPC should be that
boundary
Isolate environments
and scope with VPCs
Monitor what comes
in and out of the VPC
Be conscious about
entry points!
There should only be
one way in
VPN or Bastion hosts
Make sure not to expose
management of all
machines directly
Use tools to report on
external footprint
Network Design Checklist
Everything is deployed inside a VPC

Flow logs are enabled and monitored

Everything that can has a security group attached

Any security group that allows access from 0.0.0.0/0 has
a detailed description and justification

Remote access is only allowed via a bastion host or
internal interface
Encryption
AWS Security Essentials
We can all acknowledge
that this is difficult
But we can make choices
that reduce effort and the
chance for mistakes
KMS
This is your new
default
All your keys should
originate from KMS
Any AWS service you use
that stores data should
have a kms key attached
resource "aws_db_instance" "default" {
allocated_storage = 10
storage_type = "gp2"
engine = "mysql"
engine_version = "5.6.17"
instance_class = "db.t1.micro"
name = "mydb"
username = "foo"
password = "bar"
db_subnet_group_name = "my_database_subnet_group"
parameter_group_name = “default.mysql5.6"
}
resource "aws_db_instance" "default" {
allocated_storage = 10
storage_type = "gp2"
engine = "mysql"
engine_version = "5.6.17"
instance_class = "db.t1.micro"
name = "mydb"
username = "foo"
password = "bar"
db_subnet_group_name = "my_database_subnet_group"
parameter_group_name = “default.mysql5.6"
kms_key_id = “${aws_kms_key.foo.key_id}”
}
Start with AWS services
encrypted using KMS
Encryption Checklist
All Master or Key Encryption Keys are stored using KMS

All KMS keys have the rotation option enabled

All AWS services utilized that store data should use KMS

Data encryption keys are generated using kms master
keys and stored encrypted
Auditing
How do you know things
are configured correctly?
Scout2
Scout2 audits all
configurations across all
regions
It produces a report
of dangerous issues
AWS Security Essentials
Run this tool on your
infrastructure and see
what you find
You will likely be
surprised
Take some time to
discuss and correct
these issues
This helps with audit
of configuration
But what about user
activity?
CloudTrail/
CloudWatch
These tools are
invaluable
They are an absolute
must for anyone taking
security seriously
Enable CloudTrail for
all active regions
Use CloudWatch to
establish alerts on big
ticket concerns
Or better yet, use a third
party that can do this for
you
You don’t have to
manage everything on
your own
AWS Security Essentials
Alert Event Examples
Root account login

Root account key usage

New user created

User added to administrative roles

Too many KMS decrypt events
Auditing Checklist
Configuration analysis is performed at least daily, if not for
every change

CloudTrail is enabled for all active regions

CloudWatch metrics and alarms are implemented for
major violation cases

Guard Duty?
Continuous
Integration
How do I automate it?
Because your infrastructure
is in code, you can hook
audit into the CI pipeline
Now you can block or
rollback changes based
on audit findings
You can also institute a
seamless sign-off policy
that lives in code hosting
AWS Security Essentials
AWS Security Essentials
CI Checklist
All infrastructure changes trigger configuration audits

Critical issues found in CI trigger immediate response

Use the CI pipeline to create a sign-off process that
allows teams to move faster
The benefits of being on
provider like AWS are
massive
If there is still fear of
shifting, please look
again!
Healthcare, Finance,
Government, etc. are
there already
Questions?

More Related Content

PPT
Security and compliance
PPTX
AWS User Group - Security & Compliance
PPTX
Application Security in the Cloud - Best Practices
PDF
Beginners guide to aws security monitoring
PPTX
Infrastructure Provisioning & Automation For Large Enterprises
PPTX
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
DOCX
How to implement cloud computing security
PPTX
Blue Chip Tek Connect and Protect Presentation #3
Security and compliance
AWS User Group - Security & Compliance
Application Security in the Cloud - Best Practices
Beginners guide to aws security monitoring
Infrastructure Provisioning & Automation For Large Enterprises
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
How to implement cloud computing security
Blue Chip Tek Connect and Protect Presentation #3

Similar to AWS Security Essentials (12)

PPTX
Securing Your Public Cloud Infrastructure
PDF
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
PDF
The Ultimate Guide For Cloud Penetration Testing.pdf
PPTX
AWS Security Strategy
PPTX
Automating your AWS Security Operations
PDF
Aws security-pillar
PPTX
Security in the cloud Workshop HSTC 2014
PDF
Advanced Security Automation Made Simple
PPTX
Multi cloud governance best practices - AWS, Azure, GCP
PPTX
Core strategies to develop defense in depth in AWS
PDF
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
PDF
Top 20 AWS Security Questions with Detailed Answers (2025) (1).pdf
Securing Your Public Cloud Infrastructure
O365Con18 - A Lap Around Monitoring, Auditing and Securing Microsoft Azure - ...
The Ultimate Guide For Cloud Penetration Testing.pdf
AWS Security Strategy
Automating your AWS Security Operations
Aws security-pillar
Security in the cloud Workshop HSTC 2014
Advanced Security Automation Made Simple
Multi cloud governance best practices - AWS, Azure, GCP
Core strategies to develop defense in depth in AWS
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
Top 20 AWS Security Questions with Detailed Answers (2025) (1).pdf
Ad

More from Aaron Bedra (8)

PDF
The Cost of Complexity
PDF
Leveling the playing field
PDF
Windy City Rails - Layered Security
PDF
Focus, SCNA 2011
PDF
Repsheet: A Behavior Based Approach to Web Application Security
KEY
Pontificating quantification
PDF
Clojure in the Field
PDF
The Art of the Spike
The Cost of Complexity
Leveling the playing field
Windy City Rails - Layered Security
Focus, SCNA 2011
Repsheet: A Behavior Based Approach to Web Application Security
Pontificating quantification
Clojure in the Field
The Art of the Spike
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Machine learning based COVID-19 study performance prediction
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Big Data Technologies - Introduction.pptx
PPTX
Cloud computing and distributed systems.
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Approach and Philosophy of On baking technology
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PPT
Teaching material agriculture food technology
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
Review of recent advances in non-invasive hemoglobin estimation
Spectroscopy.pptx food analysis technology
Programs and apps: productivity, graphics, security and other tools
MYSQL Presentation for SQL database connectivity
Machine learning based COVID-19 study performance prediction
Network Security Unit 5.pdf for BCA BBA.
Big Data Technologies - Introduction.pptx
Cloud computing and distributed systems.
Per capita expenditure prediction using model stacking based on satellite ima...
Approach and Philosophy of On baking technology
The AUB Centre for AI in Media Proposal.docx
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Teaching material agriculture food technology
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Understanding_Digital_Forensics_Presentation.pptx
Dropbox Q2 2025 Financial Results & Investor Presentation
sap open course for s4hana steps from ECC to s4
Unlocking AI with Model Context Protocol (MCP)
How UI/UX Design Impacts User Retention in Mobile Apps.pdf

AWS Security Essentials