SlideShare a Scribd company logo
Application of zero trust security
architecture on Amazon Web
Services
Frans Sauermann & Ernest Ketcha
Agenda
• Introduction
• Problem Statement
• Zero Trust Architecture
• Analysis
• Results
• Conclusion and Outlook
Introduction & Motivation
• Perimeter is Disappearing
• Enterprise users are no longer in office
• Work from home is the norm for organizations post COVID
• Cloud adoption is on the rise
• Moving data to Edge through Edge computing is becoming crucial
• Enterprises are now adopting a multi-cloud strategy to support their digital transformation
strategy
• On-premise data centers are also accessed by third parties
• Cloud Migration
• Workload migration to the cloud to reduce operational cost
• Requirement to ensure the same level of security pre and post migration should be
maintained
The Problem
• Two main drivers motivate for the application of zero trust security on Amazon web services:
Migration of traditional IT to cloud services; and the inversion of security architecture approaches
towards zero-trust security architecture and Continuous Adaptive Risk and Trust Assessment
(CARTA).
• An architecture in this space will assist Solution architects and developers to realize zero-trust on
customer AWS tenants.
• This paper discusses the Zero Trust reference model and indicates how it can be achieved using
AWS services.
Zero Trust Architecture
• Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing
accurate, least privilege per-request access decisions in information systems and services in the face of a
network viewed as compromised.
• Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and
encompasses component relationships, workflow planning, and access policies.
• A zero-trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in
place for an enterprise as a product of a zero-trust architecture plan.
Untrusted zone Contextual trust zone
Policy Decision/
Enforcement Point
Target Resource/
System/
Data/Application
Zero Trust Architecture – Principles
• All data sources and computing services are considered resources.
• All communication is secured regardless of network location.
• Access to individual enterprise resources is granted on a per-session basis.
• Access to resources is determined by dynamic policy—including the observable state of client identity,
application/service, and the requesting asset—and may include other behavioral and environmental
attributes.
• The enterprise monitors and measures the integrity and security posture of all owned and associated
assets.
• All resource authentication and authorization is dynamic and strictly enforced before access is allowed.
• The enterprise collects as much information as possible about the current state of assets, network
infrastructure and communications and uses it to improve its security posture.
Untrusted zone Contextual trust zone
Policy Decision/
Enforcement Point
Target Resource/
System/
Data/Application
Logical Components of a ZTA (NIST model)
Untrusted zone Contextual trust zone
Policy Enforcement
Point
Enterprise
Resources
Policy decision point
Policy Engine
Policy
Administrator
3rd parties
capabilities
Internal
capabilities and
policies
Control pane
Data pane
ZTA Variations:
• ZTA Using Enhanced Identity
Governance
• ZTA Using Micro-Segmentation
• ZTA Using Network Infrastructure and
Software Defined Perimeters
Zero Trust: Network View
• The entire enterprise private network is not considered an implicit trust zone.
• Devices on the network may not be owned or configurable by the enterprise.
• No resource is inherently trusted.
• Not all enterprise resources are on enterprise-owned infrastructure.
• Remote enterprise subjects and assets cannot fully trust their local network
connection.
• Assets and workflows moving between enterprise and non-enterprise infrastructure
should have a consistent security policy and posture.
Analysis – Business & Application Layers
Analysis – Application and Network Layers
Results and Findings
AWS Model
AWS GuardDuty
AWS IAM
AWS Inspector
Logical Overview
Conclusion and outlook
• NIST Zero Trust model outlines components to be considered for
alignment in a ZTA.
• ZTA model and principles need to be mapped to its realization.
• Services need to be aligned to match overall ZTA overlay
• AWS services can support the realization of ZTA.
The End
Thank You!

More Related Content

PPT
Analysis concepts and principles
PPTX
Intro to Security in SDLC
PDF
Malware detection-using-machine-learning
PPTX
Waterfall Model
PPTX
Secure Software Development Life Cycle
PPTX
Design of security architecture in Information Technology
PDF
Software Engineering - chp4- design patterns
PPTX
Secure SDLC Framework
Analysis concepts and principles
Intro to Security in SDLC
Malware detection-using-machine-learning
Waterfall Model
Secure Software Development Life Cycle
Design of security architecture in Information Technology
Software Engineering - chp4- design patterns
Secure SDLC Framework

What's hot (20)

PPTX
scenario testing in software testing
PDF
Introduction to Non Functional Requirement (NFR)
PPTX
Distributed database management system
PPT
Process Improvement in Software Engineering SE25
PDF
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
PPTX
Software testing ppt
PPTX
Information Security Blueprint
PPTX
Conceptual security architecture
PDF
Introduction to The Flow Factory Design Pattern
PPTX
Database Security And Authentication
PPTX
Software quality assurance
PDF
Securing DevOps through Privileged Access Management
PDF
Engineering Software Products: 5. cloud based software
PPTX
Threats to information security
PPTX
Software testing life cycle
PPT
Distributed Transaction
PPTX
RMMM Plan
PPTX
PPT
Software process improvement.ppt
PDF
Rayleigh model
scenario testing in software testing
Introduction to Non Functional Requirement (NFR)
Distributed database management system
Process Improvement in Software Engineering SE25
Proactive security: The Opensource Security Testing Methodology Manual (OSSTM...
Software testing ppt
Information Security Blueprint
Conceptual security architecture
Introduction to The Flow Factory Design Pattern
Database Security And Authentication
Software quality assurance
Securing DevOps through Privileged Access Management
Engineering Software Products: 5. cloud based software
Threats to information security
Software testing life cycle
Distributed Transaction
RMMM Plan
Software process improvement.ppt
Rayleigh model
Ad

Similar to COSAC 2021 presentation - AWS Zero Trust (20)

PPTX
Zero Trust: Redefining Security in the Digital Age
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY
PPTX
Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Tr...
PPTX
Zero Trust Network Access
PDF
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
PPTX
Zero Trust and Data Security
PDF
What Is Zero Trust Architecture and Why Do You Need It.pdf
PDF
[Round table] zeroing in on zero trust architecture
PPTX
Zero trust model for cloud computing.pptx
PDF
Zero Trust Architecture - Allendevaux.pdf
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PPTX
microsoft-cybersecurity-reference-architectures (1).pptx
PDF
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
PPTX
The Importance of Zero Trust Security in Modern.pptx
PDF
Fortinet ZTNA - Um contexto de sua Implementação
PDF
Zero Tolerance Zero Trust Architecture
PDF
Zero trust architecture and MIS.pdf
PDF
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
PDF
Fortifying Cybersecurity_ The Imperative of Zero Trust Network Access
Zero Trust: Redefining Security in the Digital Age
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO-TRUST ARCHITECHTURE IN CYBER SECURITY
Zero Trust Architecture Zero Trust ArchitectureZero Trust ArchitectureZero Tr...
Zero Trust Network Access
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
Zero Trust and Data Security
What Is Zero Trust Architecture and Why Do You Need It.pdf
[Round table] zeroing in on zero trust architecture
Zero trust model for cloud computing.pptx
Zero Trust Architecture - Allendevaux.pdf
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
microsoft-cybersecurity-reference-architectures (1).pptx
Understanding the Zero Trust Architecture Market: A Comprehensive Overview
The Importance of Zero Trust Security in Modern.pptx
Fortinet ZTNA - Um contexto de sua Implementação
Zero Tolerance Zero Trust Architecture
Zero trust architecture and MIS.pdf
Zero Trust Network Security- A Modern Approach to Cyber Defense (1).pdf
Fortifying Cybersecurity_ The Imperative of Zero Trust Network Access
Ad

Recently uploaded (20)

PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Modernizing your data center with Dell and AMD
PDF
NewMind AI Monthly Chronicles - July 2025
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Empathic Computing: Creating Shared Understanding
PPTX
A Presentation on Artificial Intelligence
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Electronic commerce courselecture one. Pdf
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
DOCX
The AUB Centre for AI in Media Proposal.docx
PDF
Encapsulation theory and applications.pdf
Review of recent advances in non-invasive hemoglobin estimation
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Modernizing your data center with Dell and AMD
NewMind AI Monthly Chronicles - July 2025
20250228 LYD VKU AI Blended-Learning.pptx
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Unlocking AI with Model Context Protocol (MCP)
Empathic Computing: Creating Shared Understanding
A Presentation on Artificial Intelligence
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Electronic commerce courselecture one. Pdf
Mobile App Security Testing_ A Comprehensive Guide.pdf
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Diabetes mellitus diagnosis method based random forest with bat algorithm
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Agricultural_Statistics_at_a_Glance_2022_0.pdf
The AUB Centre for AI in Media Proposal.docx
Encapsulation theory and applications.pdf

COSAC 2021 presentation - AWS Zero Trust

  • 1. Application of zero trust security architecture on Amazon Web Services Frans Sauermann & Ernest Ketcha
  • 2. Agenda • Introduction • Problem Statement • Zero Trust Architecture • Analysis • Results • Conclusion and Outlook
  • 3. Introduction & Motivation • Perimeter is Disappearing • Enterprise users are no longer in office • Work from home is the norm for organizations post COVID • Cloud adoption is on the rise • Moving data to Edge through Edge computing is becoming crucial • Enterprises are now adopting a multi-cloud strategy to support their digital transformation strategy • On-premise data centers are also accessed by third parties • Cloud Migration • Workload migration to the cloud to reduce operational cost • Requirement to ensure the same level of security pre and post migration should be maintained
  • 4. The Problem • Two main drivers motivate for the application of zero trust security on Amazon web services: Migration of traditional IT to cloud services; and the inversion of security architecture approaches towards zero-trust security architecture and Continuous Adaptive Risk and Trust Assessment (CARTA). • An architecture in this space will assist Solution architects and developers to realize zero-trust on customer AWS tenants. • This paper discusses the Zero Trust reference model and indicates how it can be achieved using AWS services.
  • 5. Zero Trust Architecture • Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. • Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. • A zero-trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a product of a zero-trust architecture plan. Untrusted zone Contextual trust zone Policy Decision/ Enforcement Point Target Resource/ System/ Data/Application
  • 6. Zero Trust Architecture – Principles • All data sources and computing services are considered resources. • All communication is secured regardless of network location. • Access to individual enterprise resources is granted on a per-session basis. • Access to resources is determined by dynamic policy—including the observable state of client identity, application/service, and the requesting asset—and may include other behavioral and environmental attributes. • The enterprise monitors and measures the integrity and security posture of all owned and associated assets. • All resource authentication and authorization is dynamic and strictly enforced before access is allowed. • The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture. Untrusted zone Contextual trust zone Policy Decision/ Enforcement Point Target Resource/ System/ Data/Application
  • 7. Logical Components of a ZTA (NIST model) Untrusted zone Contextual trust zone Policy Enforcement Point Enterprise Resources Policy decision point Policy Engine Policy Administrator 3rd parties capabilities Internal capabilities and policies Control pane Data pane ZTA Variations: • ZTA Using Enhanced Identity Governance • ZTA Using Micro-Segmentation • ZTA Using Network Infrastructure and Software Defined Perimeters Zero Trust: Network View • The entire enterprise private network is not considered an implicit trust zone. • Devices on the network may not be owned or configurable by the enterprise. • No resource is inherently trusted. • Not all enterprise resources are on enterprise-owned infrastructure. • Remote enterprise subjects and assets cannot fully trust their local network connection. • Assets and workflows moving between enterprise and non-enterprise infrastructure should have a consistent security policy and posture.
  • 8. Analysis – Business & Application Layers
  • 9. Analysis – Application and Network Layers
  • 10. Results and Findings AWS Model AWS GuardDuty AWS IAM AWS Inspector
  • 12. Conclusion and outlook • NIST Zero Trust model outlines components to be considered for alignment in a ZTA. • ZTA model and principles need to be mapped to its realization. • Services need to be aligned to match overall ZTA overlay • AWS services can support the realization of ZTA.