SlideShare a Scribd company logo
Davi Ottenheimer, Product Security
Enterprise Cloud Security
Davi Ottenheimer
__
-=(o '.
'.-.
/| 
'| ||
__):,_
> _
Product Security
Making safety easier, faster, and more flexible
Cloud Trust Themes
Service: benefits of tighter configs by relinquishing some control
● Flexibility across clouds
● Meet industry standards
● Advantage in trusted bridge builders
Cloud Trust Themes
Common questions
● What can provider see (segregation of duties, AAA)
● What happens when provider detects a CVE or an incident
● How do we get operational logs
● Who is responsible for what
● Which key authorities can be used
● Where is the data really (can it disappear, can it not disappear)
Cloud Trust Themes
Why it is so important to get Enterprise Cloud Security right
● Cause of breaches - configuration flaws, unpatched vulns
● Reputation loss, regulatory oversight and fines increasing
https://www.computerweekly.com/news/450401190/UK-firms-could-face-122bn-in-data-breach-fines-in-2018
SALT. FOG.
https://www.flickr.com/photos/39391550@N00/6116946646
Why Do We Trust
600,000 Rivet Towers
Spanning a Salt Fog?
https://www.flickr.com/photos/39391550@N00/6116946646
What Does
Cloud Security
Look Like?
60,000 Rivets - Per Plane
1. Normal Checklist - takeoff and landing routines
2. Emergency Checklist - minutes to make a critical decision
“Life begins with a checklist...and it may end if you don’t use it”
United States War Office Film 1-3301 How to Fly the B-26
http://www.flyingpenguin.com/?p=12965
Service Organization Control (SOC)
PRIVACY & SECURITY
INTEGRITY
AVAILABILITY
CONFIDENTIALITY
AICPA
SOC 2
DIY Checklists - Great Way to Learn!
https://github.com/pkdone/MongoSecurityPlaypen
WARNING:
This project
intentionally is NOT
"production secure"
The DIY
SECURITY
SERVICE
LAYER
“...as a Service” is Less Complex, Fewer Errors
On-premises Database as a ServiceSelf-managed in a cloud
Managed features with
minimal configuration
Download, install,
configure management software
Configure firewall and manage ports
Encrypt network traffic
for MongoDB deployment
Encrypt network traffic to/from management
software and your MongoDB deployment
Enable and configure authentication
Enable and configure RBAC
Configure storage-level encryption
Encrypt backup jobs
Security hardening
Download, install,
configure management software
Configure firewall and manage ports
Encrypt network traffic
for MongoDB deployment
Encrypt network traffic to/from management
software and your MongoDB deployment
Enable and configure authentication
Enable and configure RBAC
Configure storage-level encryption
Encrypt backup jobs
Security hardening
Agenda
Identity and Access
Auditing
Encryption
Enterprise Cloud Security
Identity and Access
Enterprise Cloud Security
Secure Access Controls
● Default Role is Closed
● Multi-Factor
Authentication (MFA)
Integration
● Role-based Access
Controls (RBAC) for
Projects, Users and
Teams
SECURITY
USABILITY
MFA
Standards
(e.g. fido)
StrongWeak
Poor Easy
Secure Access Controls
● Basic Checklist
○ In-flight data encryption (TLS 1.1+)
○ Authentication (SCRAM or LDAPS)
○ Traffic “firewall” (IP whitelist, default closed)
● Design Considerations
○ Dedicated VPC/Vnet: Isolated Single-tenant
Cluster Nodes
○ Peered AWS VPCs (same region)
VPC Per
Atlas Project
AES At-Rest
Encryption
Secondary Secondary
Primary
Dedicated VPC
(per project)
● Network default closed to public
● IP addresses explicitly whitelisted for
inbound traffic
● User/password required to connect to
database with configurable privileges
● Encryption
○ TLS In-Transit (Network)
○ AES At-Rest (Volume)
Zone 1 Zone 2 Zone 3
Auth (SCRAM
or LDAPS)
IP Whitelist
TLS In-Flight
Encryption
Application
Server Environments
VPC Per
Atlas Project
AES At-Rest
Encryption
Secondary Secondary
Primary
● Network default closed to public
● IP addresses explicitly whitelisted for
inbound traffic
● User/password required to connect to
database with configurable privileges
● Encryption
○ TLS In-Transit (Network)
○ AES At-Rest (Volume)
● Peering cluster VPC to app VPC =
private network (can even reference
VPC peered security groups)
Zone 1 Zone 2 Zone 3
Auth (SCRAM
or LDAPS)
Your VPC for
Application Servers
VPC Peering
Connection
Peered VPC
(per project)
IaaS Account
Network
Customer
Replica Set
Cluster
Secondary Secondary
Primary
Zone 1 Zone 2 Zone 3
IaaS
Unsharded
Backup
Service
Data Flow Diagram
IaaS Account
Network
Query Router (mongos)
Config
Servers
Customer
IaaS
Shard 0
2 2
1
Sharded
Shard 1
2 2
1
Shard 2
2 2
1
Shard 3
2 2
1
Shard 3
2 2
1
Backup
Service
Data Flow Diagram
Auditing
Enterprise Cloud Security
Activity Logs
● Records
○ Database Processes
○ Create, Read, Update, Delete (CRUD)
● Live feeds on all actions for monitoring/alerts
○ User or role modifications
○ Cluster deploy
○ Scale
○ Termination operations
Fine-grained monitoring and alerts
Fine-grained monitoring and alerts
● Monitoring and alerts provide full metrics on the state of your cluster’s
database and server usage
● Automatic notifications when your database operations or server usage
reach defined thresholds that affect your cluster's performance
● Combining our automated alerting with the flexible scale-up-and-out
options in MongoDB Atlas, we can keep your database-supported
applications always performing as well as they should
Real-time activity panel
Real-time activity panel
Insight by revealing what’s happening in your cluster live to diagnose:
○ Operations
○ Read/Writes
○ Network In/Out
○ Memory
○ Hottest Collections
○ Slowest Operations
Behavioral Advisor
Behavioral Advisor
● Always-on for dedicated clusters
● Delivers automated recommendations without perf overhead
○ Relevant stats on slow queries
○ Automated index suggestions
○ Existing indexes across clusters
Data Explorer
● Interact with data from within UI
● A convenient way to:
○ Run queries
○ See metadata about your databases
& collections
○ View information about your indexes,
including index usage statistics
Queryable Snapshots
Query backup and restore data at document level in minutes
○ Identify whether data of interest has been
○ altered and pinpoint best time to
○ restore database by comparing
○ multiple snapshots
Encryption
Enterprise Cloud Security
Service Levels
Key Store
Key Distribution
Encrypted Data
Key Store
Key Distribution
Encrypted Data
Key Store
Key Distribution
Encrypted Data
Customer Customer
Customer
More Control (Customer-Managed Keys) More Ease (Encryption by Default)
Cloud Key Service
Service Use Cases
Regulated /
Top Secret
(PII/PHI/PCI)
Encrypted Data
Secret
(IP, Internal)
Key Distribution
Encrypted Data
Key Store
Key Distribution
Encrypted Data
More Control (Customer-Managed Keys) More Ease (Encryption by Default)
Cloud Key Service
Confidential
AWS KMS:
Delegated Master
Keys
Replica0
Replica Host (Linux, Windows…)
Replica0 (mongod)
Internal Keystore
(Encrypted by Master Key)
DB0
ECA Embedded Key Management
Certificate
PEM File
CA
Certificates
File
DB0 DB1 DBn
DB1 DBn
Replica1
Replica2
Atlas Enterprise
Cloud Agent
KMIP
(create / get)
KMSProxy
Partner Key
Management
Appliance:
Master Keys
Replica0
Replica Host (Linux, Windows…)
Replica0 (mongod)
Internal Keystore
(Encrypted by Master Key)
DB0
ESE Embedded Key Management
Certificate
PEM File
CA
Certificates
File
DB0 DB1 DBn
DB1 DBnReplica1
Replica2
KMIP
(create / get)
Key management and keystore
controlled by the organization, not
the cloud service provider
(https://www.nccoe.nist.gov/sites/default/files/library/sp1800/tc-hybrid-sp1800-
19a-preliminary-draft.pdf)
IaaS Key Service Differences
Key Service Symmetric Asymmetric Data Size Unwrap keys Sign/verify
AWS KMS AES-GCM-256 N/A 4kB RSA-OAEP
and CKM_RSA_PKCS
N/A
GCP KMS AES-GCM-256 N/A 64kB N/A N/A
Azure KV AES-256 RSA-2048 with
RSA-OAEP
and CKM_RSA_PKCS
Single 2048-bit
RSA block
RSA-OAEP and
CKM_RSA_PKCS
RSA-PSS
and CKM_RSA_PKCS
http://docs.aws.amazon.com/kms/latest/developerguide/overview.html
https://cloud.google.com/kms/docs/
https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest#key-hierarchy
For Instance: Migration Checklist
Log Review
Security Policy Review
Identity and Access Control Configuration
Encryption Key Management
Disaster Recovery / Backup
Redundancy / Resilience
Networked Workloads
Product Load / Scale
Patching Cycles
Abstracted
Service
Architecture
“...as a Service” is Less Complex, Fewer Errors
On-premises Database as a ServiceSelf-managed in a cloud
Managed features with
minimal configuration
Download, install,
configure management software
Configure firewall and manage ports
Encrypt network traffic
for MongoDB deployment
Encrypt network traffic to/from management
software and your MongoDB deployment
Enable and configure authentication
Enable and configure RBAC
Configure storage-level encryption
Encrypt backup jobs
Security hardening
Download, install,
configure management software
Configure firewall and manage ports
Encrypt network traffic
for MongoDB deployment
Encrypt network traffic to/from management
software and your MongoDB deployment
Enable and configure authentication
Enable and configure RBAC
Configure storage-level encryption
Encrypt backup jobs
Security hardening
https://www.flickr.com/photos/39391550@N00/6116946646
Why Do We Trust
600,000 Rivet Towers
Spanning a Salt Fog?
Enterprise Cloud Security
Identity and Access
Auditing
Encryption
Davi Ottenheimer, Product Security
Thank You

More Related Content

PDF
MongoDB World 2018: Enterprise Security in the Cloud
PDF
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
PPTX
Windows Azure Security Features And Functionality
PDF
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
PDF
VMworld 2013: Security Automation Workflows with NSX
PPTX
Nagios Conference 2014 - Tanja Lewit - Nagios and Kentix System Partners - Cr...
PPTX
Nsx security deep dive
PDF
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...
MongoDB World 2018: Enterprise Security in the Cloud
Security Practitioners guide to Micro Segmentation with VMware NSX and Log In...
Windows Azure Security Features And Functionality
VMworld 2013: NSX Security Solutions In Action - Deploying, Troubleshooting, ...
VMworld 2013: Security Automation Workflows with NSX
Nagios Conference 2014 - Tanja Lewit - Nagios and Kentix System Partners - Cr...
Nsx security deep dive
VMworld 2013: Introducing NSX Service Composer: The New Consumption Model for...

What's hot (20)

PPTX
Managing your secrets in a cloud environment
PPTX
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
PPT
Security Issues in OpenStack
PDF
Andy Kennedy - Scottish VMUG April 2016
PDF
Microservices with Node.js and RabbitMQ
PDF
OpenStack: Security Beyond Firewalls
PPTX
Digitally Transform (And Keep) Your On-Premises File Servers
PDF
CIS13: OpenStack API Security
PPTX
Azure Key Vault - Getting Started
PDF
OpenStack Security
PDF
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
PPTX
Designing A Platform Agnostic HA System
PDF
VMworld 2014: Virtualize your Network with VMware NSX
PPTX
Server update management optimization
PDF
VMware NSX for vSphere - Intro and use cases
PDF
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
PDF
Extending Amazon GuardDuty with Cloud Insight Essentials
PPTX
Securing sensitive data with Azure Key Vault
PDF
SSL for SaaS Providers
PPTX
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Managing your secrets in a cloud environment
Azure Low Lands 2019 - Building secure cloud applications with Azure Key Vault
Security Issues in OpenStack
Andy Kennedy - Scottish VMUG April 2016
Microservices with Node.js and RabbitMQ
OpenStack: Security Beyond Firewalls
Digitally Transform (And Keep) Your On-Premises File Servers
CIS13: OpenStack API Security
Azure Key Vault - Getting Started
OpenStack Security
Network security with Azure PaaS services by Erwin Staal from 4DotNet at Azur...
Designing A Platform Agnostic HA System
VMworld 2014: Virtualize your Network with VMware NSX
Server update management optimization
VMware NSX for vSphere - Intro and use cases
Nagios Conference 2011 - Jared Bird - Using Nagios As A Security Tool
Extending Amazon GuardDuty with Cloud Insight Essentials
Securing sensitive data with Azure Key Vault
SSL for SaaS Providers
ITProceed 2015 - Securing Sensitive Data with Azure Key Vault
Ad

Similar to Enterprise Cloud Security (20)

PDF
MongoDB World 2018: Enterprise Cloud Security
PDF
DBA Tasks in Oracle Autonomous Database
PPTX
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
PPTX
Securing Your Enterprise Web Apps with MongoDB Enterprise
PDF
Migrating Regulated Financial and Healthcare Data to a Trusted Cloud
PPTX
004 - Logging in the Cloud -- hide01.ir.pptx
PDF
KoprowskiT_SQLSat419_WADBforBeginners
PPTX
Securing with Sophos - Sophos Day Belux 2014
PPTX
Platform Deep Dive
PPTX
Using Sumo Logic - Apr 2018
PPTX
Introducing PagerDuty Process Automation
PPT
Securing Servers in Public and Hybrid Clouds
PDF
Derbycon - The Unintended Risks of Trusting Active Directory
PPTX
Securing Your MongoDB Deployment
PPTX
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
PDF
Managed Threat Detection & Response for AWS Applications
PPTX
Automating AWS security and compliance
PDF
Managed Threat Detection and Response
PDF
Solving enterprise challenges through scale out storage & big compute final
PDF
Cloud Breach - Forensics Audit Planning
MongoDB World 2018: Enterprise Cloud Security
DBA Tasks in Oracle Autonomous Database
Scoping for BMC Discovery (ADDM) Deployment by Traversys Limited
Securing Your Enterprise Web Apps with MongoDB Enterprise
Migrating Regulated Financial and Healthcare Data to a Trusted Cloud
004 - Logging in the Cloud -- hide01.ir.pptx
KoprowskiT_SQLSat419_WADBforBeginners
Securing with Sophos - Sophos Day Belux 2014
Platform Deep Dive
Using Sumo Logic - Apr 2018
Introducing PagerDuty Process Automation
Securing Servers in Public and Hybrid Clouds
Derbycon - The Unintended Risks of Trusting Active Directory
Securing Your MongoDB Deployment
[Toroman/Kranjac] Red Team vs. Blue Team in Microsoft Cloud
Managed Threat Detection & Response for AWS Applications
Automating AWS security and compliance
Managed Threat Detection and Response
Solving enterprise challenges through scale out storage & big compute final
Cloud Breach - Forensics Audit Planning
Ad

More from MongoDB (20)

PDF
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
PDF
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
PDF
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
PDF
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
PDF
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
PDF
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
PDF
MongoDB SoCal 2020: MongoDB Atlas Jump Start
PDF
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
PDF
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
PDF
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
PDF
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
PDF
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
PDF
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
PDF
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
PDF
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
PDF
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
PDF
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
PDF
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
PDF
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
PDF
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...
MongoDB SoCal 2020: Migrate Anything* to MongoDB Atlas
MongoDB SoCal 2020: Go on a Data Safari with MongoDB Charts!
MongoDB SoCal 2020: Using MongoDB Services in Kubernetes: Any Platform, Devel...
MongoDB SoCal 2020: A Complete Methodology of Data Modeling for MongoDB
MongoDB SoCal 2020: From Pharmacist to Analyst: Leveraging MongoDB for Real-T...
MongoDB SoCal 2020: Best Practices for Working with IoT and Time-series Data
MongoDB SoCal 2020: MongoDB Atlas Jump Start
MongoDB .local San Francisco 2020: Powering the new age data demands [Infosys]
MongoDB .local San Francisco 2020: Using Client Side Encryption in MongoDB 4.2
MongoDB .local San Francisco 2020: Using MongoDB Services in Kubernetes: any ...
MongoDB .local San Francisco 2020: Go on a Data Safari with MongoDB Charts!
MongoDB .local San Francisco 2020: From SQL to NoSQL -- Changing Your Mindset
MongoDB .local San Francisco 2020: MongoDB Atlas Jumpstart
MongoDB .local San Francisco 2020: Tips and Tricks++ for Querying and Indexin...
MongoDB .local San Francisco 2020: Aggregation Pipeline Power++
MongoDB .local San Francisco 2020: A Complete Methodology of Data Modeling fo...
MongoDB .local San Francisco 2020: MongoDB Atlas Data Lake Technical Deep Dive
MongoDB .local San Francisco 2020: Developing Alexa Skills with MongoDB & Golang
MongoDB .local Paris 2020: Realm : l'ingrédient secret pour de meilleures app...
MongoDB .local Paris 2020: Upply @MongoDB : Upply : Quand le Machine Learning...

Recently uploaded (20)

PPT
Teaching material agriculture food technology
PPTX
MYSQL Presentation for SQL database connectivity
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Tartificialntelligence_presentation.pptx
PDF
Empathic Computing: Creating Shared Understanding
PDF
cuic standard and advanced reporting.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Assigned Numbers - 2025 - Bluetooth® Document
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Spectroscopy.pptx food analysis technology
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
Machine learning based COVID-19 study performance prediction
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Encapsulation theory and applications.pdf
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
Teaching material agriculture food technology
MYSQL Presentation for SQL database connectivity
Network Security Unit 5.pdf for BCA BBA.
Tartificialntelligence_presentation.pptx
Empathic Computing: Creating Shared Understanding
cuic standard and advanced reporting.pdf
Unlocking AI with Model Context Protocol (MCP)
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Per capita expenditure prediction using model stacking based on satellite ima...
Assigned Numbers - 2025 - Bluetooth® Document
Reach Out and Touch Someone: Haptics and Empathic Computing
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Spectroscopy.pptx food analysis technology
Group 1 Presentation -Planning and Decision Making .pptx
Machine learning based COVID-19 study performance prediction
“AI and Expert System Decision Support & Business Intelligence Systems”
Digital-Transformation-Roadmap-for-Companies.pptx
Encapsulation_ Review paper, used for researhc scholars
Encapsulation theory and applications.pdf
Advanced methodologies resolving dimensionality complications for autism neur...

Enterprise Cloud Security

  • 1. Davi Ottenheimer, Product Security Enterprise Cloud Security
  • 2. Davi Ottenheimer __ -=(o '. '.-. /| '| || __):,_ > _ Product Security Making safety easier, faster, and more flexible
  • 3. Cloud Trust Themes Service: benefits of tighter configs by relinquishing some control ● Flexibility across clouds ● Meet industry standards ● Advantage in trusted bridge builders
  • 4. Cloud Trust Themes Common questions ● What can provider see (segregation of duties, AAA) ● What happens when provider detects a CVE or an incident ● How do we get operational logs ● Who is responsible for what ● Which key authorities can be used ● Where is the data really (can it disappear, can it not disappear)
  • 5. Cloud Trust Themes Why it is so important to get Enterprise Cloud Security right ● Cause of breaches - configuration flaws, unpatched vulns ● Reputation loss, regulatory oversight and fines increasing https://www.computerweekly.com/news/450401190/UK-firms-could-face-122bn-in-data-breach-fines-in-2018
  • 9. 60,000 Rivets - Per Plane 1. Normal Checklist - takeoff and landing routines 2. Emergency Checklist - minutes to make a critical decision “Life begins with a checklist...and it may end if you don’t use it” United States War Office Film 1-3301 How to Fly the B-26 http://www.flyingpenguin.com/?p=12965
  • 10. Service Organization Control (SOC) PRIVACY & SECURITY INTEGRITY AVAILABILITY CONFIDENTIALITY AICPA SOC 2
  • 11. DIY Checklists - Great Way to Learn! https://github.com/pkdone/MongoSecurityPlaypen WARNING: This project intentionally is NOT "production secure" The DIY SECURITY SERVICE LAYER
  • 12. “...as a Service” is Less Complex, Fewer Errors On-premises Database as a ServiceSelf-managed in a cloud Managed features with minimal configuration Download, install, configure management software Configure firewall and manage ports Encrypt network traffic for MongoDB deployment Encrypt network traffic to/from management software and your MongoDB deployment Enable and configure authentication Enable and configure RBAC Configure storage-level encryption Encrypt backup jobs Security hardening Download, install, configure management software Configure firewall and manage ports Encrypt network traffic for MongoDB deployment Encrypt network traffic to/from management software and your MongoDB deployment Enable and configure authentication Enable and configure RBAC Configure storage-level encryption Encrypt backup jobs Security hardening
  • 15. Secure Access Controls ● Default Role is Closed ● Multi-Factor Authentication (MFA) Integration ● Role-based Access Controls (RBAC) for Projects, Users and Teams SECURITY USABILITY MFA Standards (e.g. fido) StrongWeak Poor Easy
  • 16. Secure Access Controls ● Basic Checklist ○ In-flight data encryption (TLS 1.1+) ○ Authentication (SCRAM or LDAPS) ○ Traffic “firewall” (IP whitelist, default closed) ● Design Considerations ○ Dedicated VPC/Vnet: Isolated Single-tenant Cluster Nodes ○ Peered AWS VPCs (same region)
  • 17. VPC Per Atlas Project AES At-Rest Encryption Secondary Secondary Primary Dedicated VPC (per project) ● Network default closed to public ● IP addresses explicitly whitelisted for inbound traffic ● User/password required to connect to database with configurable privileges ● Encryption ○ TLS In-Transit (Network) ○ AES At-Rest (Volume) Zone 1 Zone 2 Zone 3 Auth (SCRAM or LDAPS) IP Whitelist TLS In-Flight Encryption Application Server Environments
  • 18. VPC Per Atlas Project AES At-Rest Encryption Secondary Secondary Primary ● Network default closed to public ● IP addresses explicitly whitelisted for inbound traffic ● User/password required to connect to database with configurable privileges ● Encryption ○ TLS In-Transit (Network) ○ AES At-Rest (Volume) ● Peering cluster VPC to app VPC = private network (can even reference VPC peered security groups) Zone 1 Zone 2 Zone 3 Auth (SCRAM or LDAPS) Your VPC for Application Servers VPC Peering Connection Peered VPC (per project)
  • 19. IaaS Account Network Customer Replica Set Cluster Secondary Secondary Primary Zone 1 Zone 2 Zone 3 IaaS Unsharded Backup Service Data Flow Diagram
  • 20. IaaS Account Network Query Router (mongos) Config Servers Customer IaaS Shard 0 2 2 1 Sharded Shard 1 2 2 1 Shard 2 2 2 1 Shard 3 2 2 1 Shard 3 2 2 1 Backup Service Data Flow Diagram
  • 22. Activity Logs ● Records ○ Database Processes ○ Create, Read, Update, Delete (CRUD) ● Live feeds on all actions for monitoring/alerts ○ User or role modifications ○ Cluster deploy ○ Scale ○ Termination operations
  • 24. Fine-grained monitoring and alerts ● Monitoring and alerts provide full metrics on the state of your cluster’s database and server usage ● Automatic notifications when your database operations or server usage reach defined thresholds that affect your cluster's performance ● Combining our automated alerting with the flexible scale-up-and-out options in MongoDB Atlas, we can keep your database-supported applications always performing as well as they should
  • 26. Real-time activity panel Insight by revealing what’s happening in your cluster live to diagnose: ○ Operations ○ Read/Writes ○ Network In/Out ○ Memory ○ Hottest Collections ○ Slowest Operations
  • 28. Behavioral Advisor ● Always-on for dedicated clusters ● Delivers automated recommendations without perf overhead ○ Relevant stats on slow queries ○ Automated index suggestions ○ Existing indexes across clusters
  • 29. Data Explorer ● Interact with data from within UI ● A convenient way to: ○ Run queries ○ See metadata about your databases & collections ○ View information about your indexes, including index usage statistics
  • 30. Queryable Snapshots Query backup and restore data at document level in minutes ○ Identify whether data of interest has been ○ altered and pinpoint best time to ○ restore database by comparing ○ multiple snapshots
  • 32. Service Levels Key Store Key Distribution Encrypted Data Key Store Key Distribution Encrypted Data Key Store Key Distribution Encrypted Data Customer Customer Customer More Control (Customer-Managed Keys) More Ease (Encryption by Default) Cloud Key Service
  • 33. Service Use Cases Regulated / Top Secret (PII/PHI/PCI) Encrypted Data Secret (IP, Internal) Key Distribution Encrypted Data Key Store Key Distribution Encrypted Data More Control (Customer-Managed Keys) More Ease (Encryption by Default) Cloud Key Service Confidential
  • 34. AWS KMS: Delegated Master Keys Replica0 Replica Host (Linux, Windows…) Replica0 (mongod) Internal Keystore (Encrypted by Master Key) DB0 ECA Embedded Key Management Certificate PEM File CA Certificates File DB0 DB1 DBn DB1 DBn Replica1 Replica2 Atlas Enterprise Cloud Agent KMIP (create / get) KMSProxy
  • 35. Partner Key Management Appliance: Master Keys Replica0 Replica Host (Linux, Windows…) Replica0 (mongod) Internal Keystore (Encrypted by Master Key) DB0 ESE Embedded Key Management Certificate PEM File CA Certificates File DB0 DB1 DBn DB1 DBnReplica1 Replica2 KMIP (create / get) Key management and keystore controlled by the organization, not the cloud service provider (https://www.nccoe.nist.gov/sites/default/files/library/sp1800/tc-hybrid-sp1800- 19a-preliminary-draft.pdf)
  • 36. IaaS Key Service Differences Key Service Symmetric Asymmetric Data Size Unwrap keys Sign/verify AWS KMS AES-GCM-256 N/A 4kB RSA-OAEP and CKM_RSA_PKCS N/A GCP KMS AES-GCM-256 N/A 64kB N/A N/A Azure KV AES-256 RSA-2048 with RSA-OAEP and CKM_RSA_PKCS Single 2048-bit RSA block RSA-OAEP and CKM_RSA_PKCS RSA-PSS and CKM_RSA_PKCS http://docs.aws.amazon.com/kms/latest/developerguide/overview.html https://cloud.google.com/kms/docs/ https://docs.microsoft.com/en-us/azure/security/azure-security-encryption-atrest#key-hierarchy
  • 37. For Instance: Migration Checklist Log Review Security Policy Review Identity and Access Control Configuration Encryption Key Management Disaster Recovery / Backup Redundancy / Resilience Networked Workloads Product Load / Scale Patching Cycles Abstracted Service Architecture
  • 38. “...as a Service” is Less Complex, Fewer Errors On-premises Database as a ServiceSelf-managed in a cloud Managed features with minimal configuration Download, install, configure management software Configure firewall and manage ports Encrypt network traffic for MongoDB deployment Encrypt network traffic to/from management software and your MongoDB deployment Enable and configure authentication Enable and configure RBAC Configure storage-level encryption Encrypt backup jobs Security hardening Download, install, configure management software Configure firewall and manage ports Encrypt network traffic for MongoDB deployment Encrypt network traffic to/from management software and your MongoDB deployment Enable and configure authentication Enable and configure RBAC Configure storage-level encryption Encrypt backup jobs Security hardening
  • 40. Enterprise Cloud Security Identity and Access Auditing Encryption
  • 41. Davi Ottenheimer, Product Security Thank You