SlideShare a Scribd company logo
Building Secure Architectures
on AWS
Manoj Fernando
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
On-premises network architecture
203.0.113.0/28
203.0.113.8/29203.0.113.0/29
> Web servers > Application server
> Database Server
CIDR Notation
203.0.113.0/28
Start - 203.0.113.0
Total IP Count - 2 ^ (32-28) = 2 ^ 4 = 16
End – 203.0.113.16
Range – 203.0.113.0 – 203.0.113.16
203.0.113.0/28
Start - 203.0.113.0
Total IP Count - 2 ^ (32-29) = 2 ^ 3 = 8
End – 203.0.113.7
Range – 203.0.113.0 – 203.0.113.7
203.0.113.0/29 203.0.113.8/29
Start - 203.0.113.8
Total IP Count - 2 ^ (32-29) = 2 ^ 3 = 8
End - 203.0.113.16
Range – 203.0.113.8 - 203.0.113.16
Range – 203.0.113.0 – 203.0.113.16
Subnet 01 Subnet 02
Network
203.0.113.0/28
203.0.113.8/29203.0.113.0/29
> Web servers > Application server
> Database Server
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Connecting with the On-Premises Network
• Migrating to a serverless architecture
• Securing your serverless architecture
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Modeling On-Premises architecture on AWS cloud
Shared Responsibility Model
Reference : AWS
Web Server Backend Server
Setting up our private network
Web Server Backend Server
10.0.0.0/16
Divide into sub networks
Web Server Backend Server
10.0.0.0/16
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
Web Server Backend Server
10.0.0.0/16
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Web Server Backend Server
10.0.0.0/16
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Ireland (eu-west-1)
Availability Zone - 01 Availability Zone - 02
Setting up an Internet Gateway
Web Server Backend Server
10.0.0.0/16
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Ireland (eu-west-1)
Availability Zone - 01 Availability Zone - 02
RouterInternet
Gateway
Internet
Web Server Backend Server
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Availability Zone - 01 Availability Zone - 02
RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
10.0.0.0/16 local
0.0.0.0/0 Internet-gateway-id
Route Table (Subnet 1)
Destination Target
Web Server Backend Server
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Availability Zone - 01 Availability Zone - 02
RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
10.0.0.0/16 local
0.0.0.0/0 Internet-gateway-id
Route Table (Subnet 1)
Destination Target
10.0.0.0/16 local
Route Table (Subnet 2)
Destination Target
Setting up a Nat Gateway
Web Server Backend Server
10.0.0.1 10.0.1.1RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
10.0.0.0/16 local
0.0.0.0/0 Internet-gateway-id
Route Table (Subnet 1)
Destination Target
10.0.0.0/16 local
0.0.0.0/0 nat-gateway-id
Route Table (Subnet 2)
Destination Target
NAT Gateway
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Securing our cloud network architecture
Web Server Backend Server
10.0.0.1 10.0.1.1RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
10.0.0.0/16 local
0.0.0.0/0 Internet-gateway-id
Route Table (Subnet 1)
Destination Target
10.0.0.0/16 local
0.0.0.0/0 nat-gateway-id
Route Table (Subnet 2)
Destination Target
Can our web server access internet?
203.0.113.0/28
203.0.113.8/29203.0.113.0/29
> Web servers > Application server
> Database Server
Security Groups
• Who can access me?
• Applied to AWS Resources
• Eg: EC2 instances, Databases, Load Balancers etc…
• Virtual Firewalls
• You can create inbound and outbound rules in a security group
• Follow the principle of Least Privilege
• Security Groups are stateful
• When architecting your application, list down all the resources and
decide who needs talk to whom and create security groups for your
resources
Web Server Backend Server
10.0.0.1 10.0.1.1RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
Web-Server-SG
Type TargetType Port Source
HTTP 80 0.0.0.0/0
HTTPS 443 0.0.0.0/0
10.0.0.1 10.0.1.1RouterInternet
Gateway
(igw)
Internet
Public Subnet Private Subnet
Web-Server-SG
Type TargetType Port Source
HTTP 80 0.0.0.0/0
HTTPS 443 0.0.0.0/0
Type Port Source
Custom 4000 Web-Server-SG
Backend-Server-SG
Web Server Backend Server
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Migrating to Serverless Architecture
Web Server
Instance
Backend Server
Instance
www.myapp.com
New features can be developed in a serverless
architecture
Web Server
Instance
Backend Server
Instance
www.myapp.com
Amazon
CloudFront
/*
/api/*
MySQL DB
(in RDS)
API
Gateway
Lambda
(getUsers Lambda)
/api/users
Serverless Means...
Reference: AWS
API Gateway + AWS Lambda is the easiest way to
create microservices
AWS Lambda Programming Model
Reference: AWS
Web Server
Instance
Backend Server
Instance
www.myapp.com
Amazon
CloudFront
/*
/api/*
MySQL DB
(in RDS)
API
Gateway
Lambda
(getUsers Lambda)
/api/users
Web Server Backend Server
10.0.0.0/16
10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
10.0.0.1 10.0.1.1
Ireland (eu-west-1)
RouterInternet
Gateway
Internet
MySQL DB
(in RDS)
How can getUsers lambda access the Database?
IAM Roles – What I can do?
• Security group – Who can access me
• IAM Role – What I can do
• Consider the backend server. What it can do?
• It can access the database
• So create an IAM role with database access permissions and attach to
backend EC2 server
How can getUsers lambda access the Database?
Step 01
• Run the getUsers lambda inside our VPC so that lambda executes in
our private network
Step 02
• Assign an IAM role for getUsers lambda to read from database
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Securing your Serverless Architecture
Securing Lambda Function
• Use IAM roles per function and don’t be too permissive
• Leverage principle of least privilege
• Application security best practices still apply
• Mandatory code reviews, static analysis
• Environment variables and sensitive data via KMS and Lambda’s
encryption helpers
Encrypting Environment Variables
Encrypting Environment Variables
How to secure our Identities
(Authentication + Authorization)
Too many concerns…
• Need to develop a reliable user directory to manage
identities
• Handling user data and password and protecting privacy
• Prioritizing scalability of your user store
• Implementing token-based authentication
• Support for multiple social identities
• Federation with corporate directories for B2E applications
User Pools & Federated Identities
Reference: AWS
Authentication & Authorization (API Gateway)
• API Gateway can authenticate and authorize requests to backend
• (eg: Lambda, EC2 Instances, Elastic Search, S3 etc..)
• 3 Main Methods
1. Amazon Cognito User Pools – User Pool Authorizer
2. Amazon Cognito Federated Identities – AWS IAM Authorizer
3. Custom Identity Providers – Custom Authorizer
• Identity Providers
1. Web Identities – Eg: Google, LinkedIn, UserPools
2. Corporate Identities – Eg: Active Directory, LDAP
Authentication & Authorization (API Gateway)
• API Gateway can authenticate and authorize requests to backend
• (eg: Lambda, EC2 Instances, Elastic Search, S3 etc..)
• 3 Main Methods
1. Amazon Cognito User Pools – User Pool Authorizer
2. Amazon Cognito Federated Identities – AWS IAM Authorizer
3. Custom Identity Providers – Custom Authorizer
• Identity Providers
1. Web Identities – Eg: Google, LinkedIn, UserPools
2. Corporate Identities – Eg: Active Directory, LDAP
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Reference: Slideshare
Serverless App Security
Reference: Slideshare
Other AWS Services for Security
• AWS WAF
• AWS Trusted Advisor
• AWS Cloud Trail
• AWS Cloud Watch
• AWS Inspector
• AWS Config
Web Server
Instance
Backend Server
Instance
www.myapp.com
Amazon
CloudFront
/*
/api/*
MySQL DB
(in RDS)
API
Gateway
Lambda
(getUsers Lambda)
/api/users
WAF
Other AWS Services for Security
• AWS WAF
• AWS Trusted Advisor
• AWS Cloud Trail
• AWS Cloud Watch
• AWS Inspector
• AWS Config
Reference: AWS
Other AWS Services for Security
• AWS WAF
• AWS Trusted Advisor
• AWS Cloud Trail
• AWS Cloud Watch
• AWS Inspector
• AWS Config
Reference: AWS
Other AWS Services for Security
• AWS WAF
• AWS Trusted Advisor
• AWS Cloud Trail
• AWS Cloud Watch
• AWS Inspector
• AWS Config
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Connecting with On-Premises Network
Our AWS VPC On-Premises
Network
Our AWS VPC On-Premises
Network
VPN
Connection
VPN
Gateway
Customer
Gateway
10.0.0.0/16 192.168.0.0/16
VPN and AWS Direct Connect
• Both allow secure connections between your corporate network and
your VPC
• VPN uses encrypted IPSec tunnel over the internet
• Direct Connect is a dedicated line between the corporate network
and your VPC
• Direct Connect is not affected by uncertainties in the internet and
suitable for large data transfers at high speed
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Cloud Adoption Framework
1. Infrastructure Security
2. Identity and Access Management
3. Data Protection
4. Detective Control
5. Incident Response
Cloud Adoption Framework
1. Infrastructure Security
2. Identity and Access Management
3. Data Protection
4. Detective Control
5. Incident Response
Agenda
• On-premises network architecture
• Modeling on-premises architecture on AWS cloud
• Securing our cloud network architecture
• Migrating to a serverless architecture
• Securing your serverless architecture
• Connecting with the On-Premises Network
• Review our architecture against Cloud Adoption Framework
• Next Steps…
Next Steps…
• Read about AWS Well Architected Framework Whitepaper
• Operational Excellence
• Security
• Reliability
• Performance Efficiency
• Security Pillar Whitepaper
Thank You!

More Related Content

PPTX
CCI2018 - Azure Network - Security Best Practices
PPTX
Let's Talk About: Azure Networking
PPTX
AWS Security Architecture - Overview
PDF
Using encryption with_aws
PPTX
Amazon Virtual Private Cloud VPC Architecture AWS Web Services
PDF
Advanced Security Masterclass - Tel Aviv Loft
PPTX
Digitally Transform (And Keep) Your On-Premises File Servers
PPTX
Vpc (virtual private cloud)
CCI2018 - Azure Network - Security Best Practices
Let's Talk About: Azure Networking
AWS Security Architecture - Overview
Using encryption with_aws
Amazon Virtual Private Cloud VPC Architecture AWS Web Services
Advanced Security Masterclass - Tel Aviv Loft
Digitally Transform (And Keep) Your On-Premises File Servers
Vpc (virtual private cloud)

Similar to Building Secure Architectures on AWS (20)

PDF
Aws Architecture Fundamentals | Dallas
PDF
Aws Architecture Fundamentals
PDF
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
PDF
AWS Architecture Fundamentals - Houston
PDF
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
PDF
DEF CON 24 - Rich Mogull - pragmatic cloud security
PPTX
Networking Best Practices for Your Serverless Applications
PDF
AWS Pentesting
PDF
Aws Architecture Fundamentals
PPTX
Deep dive - AWS security by design
PDF
AWS.pdf
PDF
Cloud Native Computing - Part II - Public Cloud (AWS)
PDF
How to protect your IoT data on AWS
PPTX
Hack proof your aws cloud cloudcheckr_040416
PDF
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
PPTX
Aws security best practices
PDF
AWS Finland User Group Meetup 2017-05-23
PDF
AWS BaseCamp: AWS Architecture Fundamentals
PDF
Securing Your Customers Data From Day One
PPTX
Introduction to AWS & Cloud Services
Aws Architecture Fundamentals | Dallas
Aws Architecture Fundamentals
Hybrid cloud for financial sector :: Felix Candelario :: AWS Finance Seminar
AWS Architecture Fundamentals - Houston
AWS를 활용한 금융권 hybrid cloud 구축하기 :: Felix Candelario :: AWS ...
DEF CON 24 - Rich Mogull - pragmatic cloud security
Networking Best Practices for Your Serverless Applications
AWS Pentesting
Aws Architecture Fundamentals
Deep dive - AWS security by design
AWS.pdf
Cloud Native Computing - Part II - Public Cloud (AWS)
How to protect your IoT data on AWS
Hack proof your aws cloud cloudcheckr_040416
AWS STARTUP DAY 2018 I Securing Your Customer Data From Day One
Aws security best practices
AWS Finland User Group Meetup 2017-05-23
AWS BaseCamp: AWS Architecture Fundamentals
Securing Your Customers Data From Day One
Introduction to AWS & Cloud Services
Ad

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PDF
Advanced Soft Computing BINUS July 2025.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Advanced IT Governance
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Modernizing your data center with Dell and AMD
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Advanced Soft Computing BINUS July 2025.pdf
Big Data Technologies - Introduction.pptx
Network Security Unit 5.pdf for BCA BBA.
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Understanding_Digital_Forensics_Presentation.pptx
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
CIFDAQ's Market Insight: SEC Turns Pro Crypto
The AUB Centre for AI in Media Proposal.docx
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Advanced IT Governance
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Ad

Building Secure Architectures on AWS

  • 1. Building Secure Architectures on AWS Manoj Fernando
  • 2. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 3. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 5. 203.0.113.0/28 203.0.113.8/29203.0.113.0/29 > Web servers > Application server > Database Server
  • 6. CIDR Notation 203.0.113.0/28 Start - 203.0.113.0 Total IP Count - 2 ^ (32-28) = 2 ^ 4 = 16 End – 203.0.113.16 Range – 203.0.113.0 – 203.0.113.16
  • 7. 203.0.113.0/28 Start - 203.0.113.0 Total IP Count - 2 ^ (32-29) = 2 ^ 3 = 8 End – 203.0.113.7 Range – 203.0.113.0 – 203.0.113.7 203.0.113.0/29 203.0.113.8/29 Start - 203.0.113.8 Total IP Count - 2 ^ (32-29) = 2 ^ 3 = 8 End - 203.0.113.16 Range – 203.0.113.8 - 203.0.113.16 Range – 203.0.113.0 – 203.0.113.16 Subnet 01 Subnet 02 Network
  • 8. 203.0.113.0/28 203.0.113.8/29203.0.113.0/29 > Web servers > Application server > Database Server
  • 9. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Connecting with the On-Premises Network • Migrating to a serverless architecture • Securing your serverless architecture • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 13. Setting up our private network
  • 14. Web Server Backend Server 10.0.0.0/16
  • 15. Divide into sub networks
  • 16. Web Server Backend Server 10.0.0.0/16 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2
  • 17. Web Server Backend Server 10.0.0.0/16 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1
  • 18. Web Server Backend Server 10.0.0.0/16 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1 Ireland (eu-west-1) Availability Zone - 01 Availability Zone - 02
  • 19. Setting up an Internet Gateway
  • 20. Web Server Backend Server 10.0.0.0/16 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1 Ireland (eu-west-1) Availability Zone - 01 Availability Zone - 02 RouterInternet Gateway Internet
  • 21. Web Server Backend Server 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1 Availability Zone - 01 Availability Zone - 02 RouterInternet Gateway (igw) Internet Public Subnet Private Subnet 10.0.0.0/16 local 0.0.0.0/0 Internet-gateway-id Route Table (Subnet 1) Destination Target
  • 22. Web Server Backend Server 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1 Availability Zone - 01 Availability Zone - 02 RouterInternet Gateway (igw) Internet Public Subnet Private Subnet 10.0.0.0/16 local 0.0.0.0/0 Internet-gateway-id Route Table (Subnet 1) Destination Target 10.0.0.0/16 local Route Table (Subnet 2) Destination Target
  • 23. Setting up a Nat Gateway
  • 24. Web Server Backend Server 10.0.0.1 10.0.1.1RouterInternet Gateway (igw) Internet Public Subnet Private Subnet 10.0.0.0/16 local 0.0.0.0/0 Internet-gateway-id Route Table (Subnet 1) Destination Target 10.0.0.0/16 local 0.0.0.0/0 nat-gateway-id Route Table (Subnet 2) Destination Target NAT Gateway
  • 25. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 26. Securing our cloud network architecture
  • 27. Web Server Backend Server 10.0.0.1 10.0.1.1RouterInternet Gateway (igw) Internet Public Subnet Private Subnet 10.0.0.0/16 local 0.0.0.0/0 Internet-gateway-id Route Table (Subnet 1) Destination Target 10.0.0.0/16 local 0.0.0.0/0 nat-gateway-id Route Table (Subnet 2) Destination Target Can our web server access internet?
  • 28. 203.0.113.0/28 203.0.113.8/29203.0.113.0/29 > Web servers > Application server > Database Server
  • 29. Security Groups • Who can access me? • Applied to AWS Resources • Eg: EC2 instances, Databases, Load Balancers etc… • Virtual Firewalls • You can create inbound and outbound rules in a security group • Follow the principle of Least Privilege • Security Groups are stateful • When architecting your application, list down all the resources and decide who needs talk to whom and create security groups for your resources
  • 30. Web Server Backend Server 10.0.0.1 10.0.1.1RouterInternet Gateway (igw) Internet Public Subnet Private Subnet Web-Server-SG Type TargetType Port Source HTTP 80 0.0.0.0/0 HTTPS 443 0.0.0.0/0
  • 31. 10.0.0.1 10.0.1.1RouterInternet Gateway (igw) Internet Public Subnet Private Subnet Web-Server-SG Type TargetType Port Source HTTP 80 0.0.0.0/0 HTTPS 443 0.0.0.0/0 Type Port Source Custom 4000 Web-Server-SG Backend-Server-SG Web Server Backend Server
  • 32. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 33. Migrating to Serverless Architecture
  • 35. New features can be developed in a serverless architecture
  • 36. Web Server Instance Backend Server Instance www.myapp.com Amazon CloudFront /* /api/* MySQL DB (in RDS) API Gateway Lambda (getUsers Lambda) /api/users
  • 38. API Gateway + AWS Lambda is the easiest way to create microservices
  • 39. AWS Lambda Programming Model Reference: AWS
  • 40. Web Server Instance Backend Server Instance www.myapp.com Amazon CloudFront /* /api/* MySQL DB (in RDS) API Gateway Lambda (getUsers Lambda) /api/users
  • 41. Web Server Backend Server 10.0.0.0/16 10.0.0.0/24Subnet 1 10.0.1.0/24Subnet 2 10.0.0.1 10.0.1.1 Ireland (eu-west-1) RouterInternet Gateway Internet MySQL DB (in RDS)
  • 42. How can getUsers lambda access the Database?
  • 43. IAM Roles – What I can do? • Security group – Who can access me • IAM Role – What I can do • Consider the backend server. What it can do? • It can access the database • So create an IAM role with database access permissions and attach to backend EC2 server
  • 44. How can getUsers lambda access the Database? Step 01 • Run the getUsers lambda inside our VPC so that lambda executes in our private network Step 02 • Assign an IAM role for getUsers lambda to read from database
  • 45. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 46. Securing your Serverless Architecture
  • 47. Securing Lambda Function • Use IAM roles per function and don’t be too permissive • Leverage principle of least privilege • Application security best practices still apply • Mandatory code reviews, static analysis • Environment variables and sensitive data via KMS and Lambda’s encryption helpers
  • 50. How to secure our Identities (Authentication + Authorization)
  • 51. Too many concerns… • Need to develop a reliable user directory to manage identities • Handling user data and password and protecting privacy • Prioritizing scalability of your user store • Implementing token-based authentication • Support for multiple social identities • Federation with corporate directories for B2E applications
  • 52. User Pools & Federated Identities Reference: AWS
  • 53. Authentication & Authorization (API Gateway) • API Gateway can authenticate and authorize requests to backend • (eg: Lambda, EC2 Instances, Elastic Search, S3 etc..) • 3 Main Methods 1. Amazon Cognito User Pools – User Pool Authorizer 2. Amazon Cognito Federated Identities – AWS IAM Authorizer 3. Custom Identity Providers – Custom Authorizer • Identity Providers 1. Web Identities – Eg: Google, LinkedIn, UserPools 2. Corporate Identities – Eg: Active Directory, LDAP
  • 54. Authentication & Authorization (API Gateway) • API Gateway can authenticate and authorize requests to backend • (eg: Lambda, EC2 Instances, Elastic Search, S3 etc..) • 3 Main Methods 1. Amazon Cognito User Pools – User Pool Authorizer 2. Amazon Cognito Federated Identities – AWS IAM Authorizer 3. Custom Identity Providers – Custom Authorizer • Identity Providers 1. Web Identities – Eg: Google, LinkedIn, UserPools 2. Corporate Identities – Eg: Active Directory, LDAP
  • 65. Other AWS Services for Security • AWS WAF • AWS Trusted Advisor • AWS Cloud Trail • AWS Cloud Watch • AWS Inspector • AWS Config
  • 66. Web Server Instance Backend Server Instance www.myapp.com Amazon CloudFront /* /api/* MySQL DB (in RDS) API Gateway Lambda (getUsers Lambda) /api/users WAF
  • 67. Other AWS Services for Security • AWS WAF • AWS Trusted Advisor • AWS Cloud Trail • AWS Cloud Watch • AWS Inspector • AWS Config Reference: AWS
  • 68. Other AWS Services for Security • AWS WAF • AWS Trusted Advisor • AWS Cloud Trail • AWS Cloud Watch • AWS Inspector • AWS Config Reference: AWS
  • 69. Other AWS Services for Security • AWS WAF • AWS Trusted Advisor • AWS Cloud Trail • AWS Cloud Watch • AWS Inspector • AWS Config
  • 70. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 72. Our AWS VPC On-Premises Network
  • 73. Our AWS VPC On-Premises Network VPN Connection VPN Gateway Customer Gateway 10.0.0.0/16 192.168.0.0/16
  • 74. VPN and AWS Direct Connect • Both allow secure connections between your corporate network and your VPC • VPN uses encrypted IPSec tunnel over the internet • Direct Connect is a dedicated line between the corporate network and your VPC • Direct Connect is not affected by uncertainties in the internet and suitable for large data transfers at high speed
  • 75. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 76. Cloud Adoption Framework 1. Infrastructure Security 2. Identity and Access Management 3. Data Protection 4. Detective Control 5. Incident Response
  • 77. Cloud Adoption Framework 1. Infrastructure Security 2. Identity and Access Management 3. Data Protection 4. Detective Control 5. Incident Response
  • 78. Agenda • On-premises network architecture • Modeling on-premises architecture on AWS cloud • Securing our cloud network architecture • Migrating to a serverless architecture • Securing your serverless architecture • Connecting with the On-Premises Network • Review our architecture against Cloud Adoption Framework • Next Steps…
  • 79. Next Steps… • Read about AWS Well Architected Framework Whitepaper • Operational Excellence • Security • Reliability • Performance Efficiency • Security Pillar Whitepaper