SlideShare a Scribd company logo
Taking Security
Responsibility in AWS
Cloud
Franklin Mosley
Principal Application Security Engineer
AWS Certified Solutions Architect
Who Am I?
Software Engineer
Information Security
Application Security/Cloud Security
DevSecOps Practitioner
Open source contributor
Competed in AWS Chatbot Challenge
The Cloud
On demand delivery of IT resources and applications via the Internet
Benefits
Pricing (Utilizing economies of scale)
Pay-as-you-go
Global
Flexible
Spend less time planning
Taking Security Responsibility in the AWS Cloud
"You cannot escape the
responsibility of tomorrow
by evading it today."
Abraham Lincoln
AWS Shared Responsibility Model
AWS Well-Architected
Framework
Reliability
Performance Efficiency
Cost Optimization
Operational Excellence
Security
https://aws.amazon.com/architecture/well-architected/
Security Principles
Apply Security at
All Layers
Don't protect just the perimeter
Use security controls on all of
your resources
Enable Traceability
Log and audit all action and
changes
AWS
CloudTrail
Amazon
CloudWatch
AWS
Config
Implement a
Principle of Least
Privilege
Strong logical access control
Authorization
AWS
Identity and Access
Management (IAM)
Automate Security
Best Practices
Software-based security mechanisms
Use "Golden" AMIs
Infrastructure as Code
AWS Lambda Auto-Scaling Group
"Golden" AMI
and IAC Use
Case
Automate Remediation of Amazon
Inspector Findings
Elastic
Load
Balancing
Amazon
S3
Amazon
EBS
Amazon
RDS
AWS Key
Management
Service
Amazon
Inspector
AWS
Config
AWS
CloudTrail
Amazon
CloudWatch
Data Protection
Detective Controls
Amazon
VPC
Infrastructure
Protection
Taking Security Responsibility in the AWS Cloud
AWS Identity and Access
Management (IAM)
Service for controlling access
to AWS resources
AWS Identity and Access
Management (IAM)
Principals
Root User
IAM User
Roles/Temporary Security Tokens
AWS Identity and Access
Management (IAM)
Authentication
User Name/Password
Access Key
Access Key/Session Token
AWS Identity and Access
Management (IAM)
Policy
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": ["s3:ListBucket"],
"Resource": ["arn:aws:s3:::<BUCKET-NAME>"]
},
{
"Effect": "Allow",
"Action": [
"s3:PutObject",
"s3:GetObject"
],
"Resource": ["arn:aws:s3:::<BUCKET-NAME>/*"]
}
]
}
AWS Identity and Access
Management (IAM)
Policy Evaluation
Encryption
Data in Transit
Data at Rest
Data in Transit
CloudFront SSL
Elastic Load Balancing
API Communication over HTTPs
Taking Security Responsibility in the AWS Cloud
Data at Rest
Client-Side Encryption
Server-Side Encryption
RDS TDE
AWS Key Management
Service (KMS)
Managed Encryption Service
AWS Key Management
Service (KMS)
Features
Customer Master Key (CMK)
Data Key
Uses Envelope Encryption
AWS Key Management
Service (KMS)
AWS Key Management
Service (KMS)
Taking Security Responsibility in the AWS Cloud
How are you encrypting and
protecting your data at rest?
Security Questions
How are you encrypting and
protecting your data in transit?
Security Questions
How are you protecting access to
and use of the AWS root account
credentials?
Security Questions
How are you defining roles and
responsibilities of system users to
control human access to the AWS
Management Console and API?
Security Questions
How are you limiting automated
access to AWS resources?
Security Questions
How are you enforcing network and
host-level boundary protection?
Security Questions
How are you enforcing AWS service
level protection?
Security Questions
How are you capturing and analyzing
AWS logs?
Security Questions
TL;DR
Operate under least privilege
Practice defense in depth
Evaluate using the Well-Architected
Framework
Thank You!
Franklin Mosley
@fpmosley3
/in/franklinmosley

More Related Content

PDF
Aws certified-security
PPTX
AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...
PDF
How to protect your IoT data on AWS
PDF
AWS Shared Security Model in Practice
PDF
AWS Security
PPTX
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
PPTX
How to implement DevSecOps on AWS for startups
PPTX
Better Together: JWT and Hashi Vault in Modern Apps
Aws certified-security
AWS Leeds Meetup - How do you manage secure access to AWS in an ever-increasi...
How to protect your IoT data on AWS
AWS Shared Security Model in Practice
AWS Security
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
How to implement DevSecOps on AWS for startups
Better Together: JWT and Hashi Vault in Modern Apps

Similar to Taking Security Responsibility in the AWS Cloud (7)

PDF
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
PDF
1. aws security and compliance wwps pre-day sao paolo - markry
PDF
Security Best Practices
PDF
Security Best Practices: AWS AWSome Day Management Track
PDF
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
PDF
Serverless Security Automation on AWS - Hamburg AWS User Group
PDF
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
1. aws security and compliance wwps pre-day sao paolo - markry
Security Best Practices
Security Best Practices: AWS AWSome Day Management Track
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
Serverless Security Automation on AWS - Hamburg AWS User Group
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Ad

More from Franklin Mosley (7)

PDF
Getting to Know Security and Devs: Keys to Successful DevSecOps
PDF
DevSecOps: A New Hope for Security in CI/CD
PDF
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
PDF
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
PDF
DevSecOps: Minimizing Risk, Improving Security
PDF
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
PDF
RoboCop: Bringing Law and Order to CI/CD
Getting to Know Security and Devs: Keys to Successful DevSecOps
DevSecOps: A New Hope for Security in CI/CD
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Boston)
How to Make a Unicorn: Finding Cybersecurity Talent in the Real World (Dallas)
DevSecOps: Minimizing Risk, Improving Security
The Security Pro's Guide to DevSecOps: How to Get Developers To Write Secure ...
RoboCop: Bringing Law and Order to CI/CD
Ad

Recently uploaded (20)

PPTX
A Presentation on Touch Screen Technology
PDF
Encapsulation theory and applications.pdf
PDF
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PDF
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
1 - Historical Antecedents, Social Consideration.pdf
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
A comparative analysis of optical character recognition models for extracting...
PPTX
1. Introduction to Computer Programming.pptx
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
MIND Revenue Release Quarter 2 2025 Press Release
PDF
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
PDF
WOOl fibre morphology and structure.pdf for textiles
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
TLE Review Electricity (Electricity).pptx
A Presentation on Touch Screen Technology
Encapsulation theory and applications.pdf
ENT215_Completing-a-large-scale-migration-and-modernization-with-AWS.pdf
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Microsoft Solutions Partner Drive Digital Transformation with D365.pdf
Unlocking AI with Model Context Protocol (MCP)
1 - Historical Antecedents, Social Consideration.pdf
Heart disease approach using modified random forest and particle swarm optimi...
cloud_computing_Infrastucture_as_cloud_p
A comparative analysis of optical character recognition models for extracting...
1. Introduction to Computer Programming.pptx
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
SOPHOS-XG Firewall Administrator PPT.pptx
NewMind AI Weekly Chronicles - August'25-Week II
MIND Revenue Release Quarter 2 2025 Press Release
Transform Your ITIL® 4 & ITSM Strategy with AI in 2025.pdf
WOOl fibre morphology and structure.pdf for textiles
Building Integrated photovoltaic BIPV_UPV.pdf
TLE Review Electricity (Electricity).pptx

Taking Security Responsibility in the AWS Cloud