SlideShare a Scribd company logo
1 of 32
Download to read offline
AWS Government, Education, &
Nonprofits Symposium
Canberra, Australia | May 20, 2014
Security	
  as	
  an	
  enabler	
  –	
  improving	
  security	
  with	
  the	
  AWS	
  cloud	
  
Stephen Quigg
Principal Security Solutions Architect, Asia Pacific
Amazon Web Services
AWS	
  Region	
  
US-WEST (N. California)
 EU-WEST (Ireland)
ASIA PAC (Tokyo)
ASIA PAC
(Singapore)
US-WEST (Oregon)
SOUTH AMERICA (Sao Paulo)
US-EAST (Virginia)
GOV CLOUD
ASIA PAC
(Sydney)
AWS has Regions across the globe – including Sydney
You can stay onshore in Australia with AWS
AWS Sydney Region
Multiple availability
zones
You can
improve your security
with the AWS cloud
AWS	
  Founda;on	
  Services	
  
Compute	
   Storage	
   Database	
   Networking	
  
AWS	
  Global	
  
Infrastructure	
   Regions	
  
Availability	
  Zones	
  
Edge	
  Loca;ons	
  
Client-­‐side	
  Data	
  
Encryp8on	
  
Server-­‐side	
  Data	
  
Encryp8on	
  
Network	
  Traffic	
  
Protec8on	
  
Pla@orm,	
  Applica8ons,	
  Iden8ty	
  &	
  Access	
  Management	
  
Opera8ng	
  System,	
  Network	
  &	
  Firewall	
  Configura8on	
  
Customer	
  content	
  
Customers	
  
You can deploy a consistent security model every time
Customers
control their level
of security and
compliance IN
the Cloud
AWS is
responsible for
the security OF
the Cloud
You can build everything to be resilient and fault tolerant
AWS	
  operates	
  scalable,	
  fault	
  tolerant	
  services	
  
Build	
  resilient	
  solu8ons	
  opera8ng	
  in	
  mul8ple	
  datacenters	
  
AWS	
  helps	
  simplify	
  ac8ve-­‐ac8ve	
  resilient	
  solu8ons	
  
All	
  AWS	
  facili8es	
  are	
  always	
  on	
  
No	
  need	
  for	
  a	
  “Disaster	
  Recovery	
  Datacenter”	
  when	
  you	
  can	
  
have	
  resilience	
  
Every	
  AWS	
  facility	
  managed	
  to	
  the	
  same	
  global	
  standards	
  
AWS has robust connectivity and bandwidth
Each AZ has multiple, redundant Tier 1 ISP Service Providers
Resilient network infrastructure
Everything can have fine-grained network security
AvailabilityZoneA
AvailabilityZoneB
You control your VPC
address range
•  Your own private, isolated
section of the AWS cloud
•  Every VPC has a private IP
address space you define
•  Create your own subnets and
control all internal and
external connectivity
AWS network security
•  AWS network will prevent
spoofing and other common
layer 2 attacks
•  Every compute instance gets
multiple security groups -
stateful firewalls
•  Every subnet gets network
access control lists
Create multi-tier architectures every time
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
host
10.0.4.0/24
EC
2
App Log
EC
2
Web
Load
balancing
Firewall every single compute instance
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
10.0.4.0/24
EC
2
App
“Web servers will accept Port 80
from load balancers”
“App servers will
accept Port 8080
from web
servers”
“Allow SSH
access only from
from Jump Hosts”
Log
EC
2
Web
Load
balancing
Enable network access control on every subnet
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
10.0.3.0/24
EC
2
10.0.5.0/24
Jump
10.0.4.0/24
EC
2
App Log
EC
2
Web
“Deny all traffic between the web
server subnet and the database
server subnet”
Load
balancing
Control every Internet connection
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Internet Gateway
Control Internet routing
•  Create Public subnets and
Private subnets
•  Implement DMZ architectures
as per normal best practices
•  Allocate static Elastic IP
addresses or use AWS-
managed public IP addresses
Load
balancing
Connect in private to your existing datacentres
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Use Internet VPNs
or use AWS Direct
Connect
Your premises
Load
balancing
You can route to the Internet using your gateway
VPC A - 10.0.0.0/16
AvailabilityZoneA
10.0.1.0/24
10.0.2.0/24
EC
2
10.0.3.0/24
EC
2
10.0.4.0/24
EC
2
App
EC
2
WebEC
2
WebEC
2
EC
2
Web
Use Internet VPNs
or use AWS Direct
Connect
Your premises
Load
balancing
Create flexible multi-VPC hybrid environments
Your organisation
Project Teams Marketing
Business Units Reporting
Digital /
Websites
Dev and
Test
Redshift
EMR
Analytics
Internal
Enterprise
Apps
Amazon
S3
Amazon
Glacier
Storage/
Backup
Every website can absorb attacks and scale out
Amazon S3
Distributed
attackers
Customers
Customers
Route53
Sydney region
CloudFront
Your VPC
WAFWAF WAFWAF
ELB ELB
ELB ELB
App App App App
Auto
Scaling
Auto
Scaling
Auto
Scaling
Auto
Scaling
 
Encrypt	
  your	
  Elas8c	
  Block	
  Store	
  volumes	
  any	
  way	
  you	
  like	
  
•  Many	
  free	
  u8li8es,	
  plus	
  Trend,	
  SafeNet	
  and	
  other	
  partners	
  offer	
  
high-­‐assurance	
  solu8ons	
  
Amazon	
  S3	
  offers	
  either	
  server	
  or	
  client-­‐side	
  encryp8on	
  
•  Manage	
  your	
  own	
  keys	
  or	
  let	
  AWS	
  do	
  it	
  for	
  you	
  
RedshiR	
  has	
  one-­‐click	
  disk	
  encryp8on	
  as	
  standard	
  
•  Encrypt	
  your	
  data	
  analy8cs	
  
•  You	
  can	
  supply	
  your	
  own	
  keys	
  
RDS	
  supports	
  transparent	
  data	
  encryp8on	
  (TDE)	
  
•  Easily	
  encrypt	
  sensi8ve	
  database	
  tables	
  
You can encrypt your sensitive information everywhere
DBA
Tamper-resistant customer controlled hardware
security modules within your VPC
•  Industry-standard SafeNet Luna devices. Common Criteria
EAL4+, NIST FIPS 140-2 certified
•  No access from Amazon administrators who manage and
maintain the appliance
•  High availability and replication with on-premise HSMs
Reliable & Durable Key Storage
•  Use for transparent data encryption on self-managed
databases and natively with AWS Redshift
•  Integrate with applications using Java APIs
•  Integration with marketplace disk-encryption and SSL
Store your encryption keys securely in CloudHSM
Use your own HSMs if you want
Your premises
Applications
Your HSM
NATCloudHSM NATCloudHSM
Volume, object,
database encryption
Signing / DRM /
apps
EC2
SYNC
EBS
S3
Amazon S3
Amazon Glacier
You can enforce consistent host security
Launch
instanc
e
EC2
AMI catalogue Running instance Your instance
Hardening
Audit and logging
Vulnerability management
Malware and HIPS
Whitelisting and integrity
User administration
Operating system
Configur
e
instance
You	
  control	
  the	
  configura8on	
  of	
  your	
  servers	
  
Harden operating system and platforms to your own spec
Use host-based protection software
•  Apply ASD Top 35 mitigation strategies!
Think about how you will manage administrative users
•  Restrict access as much as possible
Build out the rest of your standard security environment
•  Connect to your existing services, e.g. SIEM
Control access and segregate duties everywhere
Region
Internet
Gateway
Subnet 10.0.1.0/24
Subnet 10.0.2.0/24
VPC A - 10.0.0.0/16
Availability Zone
Availability Zone
Router
Internet
Customer
Gateway
You	
  get	
  to	
  control	
  who	
  can	
  do	
  what	
  
in	
  your	
  AWS	
  environment	
  and	
  from	
  
where	
  
	
  
Fine-­‐grained	
  control	
  of	
  your	
  en8re	
  
cloud	
  environment	
  with	
  two-­‐factor	
  
authen8ca8on	
  
	
  
Integrated	
  with	
  your	
  exis8ng	
  
corporate	
  directory	
  using	
  SAML	
  2.0	
  
AWS account
owner
Network
management
Security
management
Server
management
Storage
management
Build and run
Full visibility of your AWS environment
•  CloudTrail will record access to API calls and save logs in
your S3 buckets, no matter how those API calls were
made
Who did what and when and from what IP address
•  Support for many AWS services and growing - includes
EC2, EBS, VPC, RDS, IAM and RedShift
•  Easily Aggregate all log information
Out of the box integration with log analysis tools from
AWS partners including Splunk, AlertLogic and SumoLogic
Get consistent visibility of logs that you can monitor
You get to do all of this in
DEVELOPMENT
TESTING
PRE-PRODUCTION
LIVE
Lets hear from an AWS
customer who has done it
Bruce Haefele
Chief Architect
Heath Direct Australia
Delivering health services on AWS
Who we are and what we do
We isolate environments into VPCs
Dev
Int
Test
Staging Prod.
Tools Admin Corp.
Sydney region
HSM
Appliance
External Datacenter
Provider
VPN
We isolate components within each VPC
AvailabilityZoneA
EC
2
WebEC
2
API
Port.
App.
IAM
Vuln.
PII
Log
SIEM
Mon.
Sec.
Man.
Enc.
Man.
De-id
Auth.
Sec.
Data
Public Unclassified Sensitive / Health
Web
WAF
API.
Gate.
ESB
Services we use in the AWS cloud
Dynamo DB
RDS
Elastic Network
Interface
EBS
Elastic Load
Balancer
Glacier
VPC
Storage Gateway
EC2 Cloud FormationAWS IAMAutoscalingElastic IPs
Route 53
Cloudwatch
S3
Cloudfront VPC VPN
Things you should think about
•  Start	
  small	
  and	
  experiment	
  
•  Rethink	
  your	
  approach	
  to	
  your	
  
infrastructure	
  
•  Data	
  classifica8on	
  
•  What	
  AWS	
  services	
  you	
  can	
  use	
  
and	
  what	
  you	
  have	
  to	
  build	
  
•  Defense	
  in	
  depth	
  
•  Where	
  and	
  how	
  to	
  encrypt	
  
•  What	
  to	
  log,	
  backup	
  strategies,	
  
archive	
  and	
  retrieval	
  
•  How	
  to	
  federate	
  and	
  integrate	
  –	
  
levels	
  of	
  trust	
  
•  Privileged	
  access	
  
•  Compliance	
  
•  Vendor	
  licensing	
  models	
  
•  Financial	
  management	
  
Read AWS security whitepapers, tips and good practices
•  http://blogs.aws.amazon.com/security
•  http://aws.amazon.com/compliance
•  http://aws.amazon.com/security
•  Risk and compliance, best practices, audit guides and
operational checklists to help you before you go live
•  Workshop	
  solu8ons	
  with	
  an	
  AWS	
  solu8ons	
  architect,	
  including	
  me!	
  
•  Get	
  free	
  trials	
  of	
  security	
  from	
  AWS	
  Partners	
  on	
  the	
  AWS	
  marketplace
Sign up for AWS premium support
•  http://aws.amazon.com/support
•  Get help when you need it most – as you grow
•  Choose different levels of support with no long-term commitment
Further info and how to get AWS support
THANK YOU
Please give us your feedback by filling out the Feedback Forms
AWS Government, Education, &
Nonprofits Symposium
Canberra, Australia | May 20, 2014
AWS Government, Education, &
Nonprofits Symposium
Canberra, Australia | May 20, 2014
Security	
  as	
  an	
  enabler	
  –	
  improving	
  security	
  with	
  the	
  AWS	
  cloud	
  
Stephen Quigg
Principal Security Solutions Architect, Asia Pacific
Amazon Web Services

More Related Content

What's hot

Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2
ReadMaloney
 

What's hot (20)

Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud Scale
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Five Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud ArchitectureFive Steps to Creating a Secure Hybrid Cloud Architecture
Five Steps to Creating a Secure Hybrid Cloud Architecture
 
AWS Lunch and Learn - Security
AWS Lunch and Learn - SecurityAWS Lunch and Learn - Security
AWS Lunch and Learn - Security
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
Aws security Fundamentals
Aws security Fundamentals Aws security Fundamentals
Aws security Fundamentals
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
 
Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 

Viewers also liked

Security in the AWS Cloud - Steve Riley
Security in the AWS Cloud - Steve RileySecurity in the AWS Cloud - Steve Riley
Security in the AWS Cloud - Steve Riley
Amazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
Amazon Web Services
 

Viewers also liked (8)

Security in the AWS Cloud - Steve Riley
Security in the AWS Cloud - Steve RileySecurity in the AWS Cloud - Steve Riley
Security in the AWS Cloud - Steve Riley
 
AWS Public Sector Symposium 2014 Canberra | Managing Seasonal Workloads on AWS
AWS Public Sector Symposium 2014 Canberra | Managing Seasonal Workloads on AWS AWS Public Sector Symposium 2014 Canberra | Managing Seasonal Workloads on AWS
AWS Public Sector Symposium 2014 Canberra | Managing Seasonal Workloads on AWS
 
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
AWS Public Sector Symposium 2014 Canberra | Managing the Pace of Innovation: ...
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
Get the Most Bang for Your Buck with #EC2 #WINNING
Get the Most Bang for Your Buck with #EC2 #WINNINGGet the Most Bang for Your Buck with #EC2 #WINNING
Get the Most Bang for Your Buck with #EC2 #WINNING
 
Container Orchestration with Amazon ECS
Container Orchestration with Amazon ECSContainer Orchestration with Amazon ECS
Container Orchestration with Amazon ECS
 
Introduction to AWS Batch
Introduction to AWS BatchIntroduction to AWS Batch
Introduction to AWS Batch
 
Workshop: Deploy a Deep Learning Framework on Amazon ECS
Workshop: Deploy a Deep Learning Framework on Amazon ECSWorkshop: Deploy a Deep Learning Framework on Amazon ECS
Workshop: Deploy a Deep Learning Framework on Amazon ECS
 

Similar to AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving Security with the AWS Cloud

엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
Amazon Web Services Korea
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
Martin Yan
 

Similar to AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving Security with the AWS Cloud (20)

AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
Getting started with AWS Security
Getting started with AWS SecurityGetting started with AWS Security
Getting started with AWS Security
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
Pragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlay
Pragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlayPragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlay
Pragmatic Approach to Workload Migrations - London Summit Enteprise Track RePlay
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Top 5 Ways to Secure Your Business on the Cloud
Top 5 Ways to Secure Your Business on the CloudTop 5 Ways to Secure Your Business on the Cloud
Top 5 Ways to Secure Your Business on the Cloud
 
Segurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWSSegurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWS
 
AWS Canberra WWPS Summit 2013 - Cloud Computing with AWS: Introduction to AWS
AWS Canberra WWPS Summit 2013 - Cloud Computing with AWS: Introduction to AWSAWS Canberra WWPS Summit 2013 - Cloud Computing with AWS: Introduction to AWS
AWS Canberra WWPS Summit 2013 - Cloud Computing with AWS: Introduction to AWS
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
giselly40
 

Recently uploaded (20)

Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 

AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving Security with the AWS Cloud

  • 1. AWS Government, Education, & Nonprofits Symposium Canberra, Australia | May 20, 2014 Security  as  an  enabler  –  improving  security  with  the  AWS  cloud   Stephen Quigg Principal Security Solutions Architect, Asia Pacific Amazon Web Services
  • 2. AWS  Region   US-WEST (N. California) EU-WEST (Ireland) ASIA PAC (Tokyo) ASIA PAC (Singapore) US-WEST (Oregon) SOUTH AMERICA (Sao Paulo) US-EAST (Virginia) GOV CLOUD ASIA PAC (Sydney) AWS has Regions across the globe – including Sydney
  • 3. You can stay onshore in Australia with AWS AWS Sydney Region Multiple availability zones
  • 4. You can improve your security with the AWS cloud
  • 5. AWS  Founda;on  Services   Compute   Storage   Database   Networking   AWS  Global   Infrastructure   Regions   Availability  Zones   Edge  Loca;ons   Client-­‐side  Data   Encryp8on   Server-­‐side  Data   Encryp8on   Network  Traffic   Protec8on   Pla@orm,  Applica8ons,  Iden8ty  &  Access  Management   Opera8ng  System,  Network  &  Firewall  Configura8on   Customer  content   Customers   You can deploy a consistent security model every time Customers control their level of security and compliance IN the Cloud AWS is responsible for the security OF the Cloud
  • 6. You can build everything to be resilient and fault tolerant AWS  operates  scalable,  fault  tolerant  services   Build  resilient  solu8ons  opera8ng  in  mul8ple  datacenters   AWS  helps  simplify  ac8ve-­‐ac8ve  resilient  solu8ons   All  AWS  facili8es  are  always  on   No  need  for  a  “Disaster  Recovery  Datacenter”  when  you  can   have  resilience   Every  AWS  facility  managed  to  the  same  global  standards   AWS has robust connectivity and bandwidth Each AZ has multiple, redundant Tier 1 ISP Service Providers Resilient network infrastructure
  • 7. Everything can have fine-grained network security AvailabilityZoneA AvailabilityZoneB You control your VPC address range •  Your own private, isolated section of the AWS cloud •  Every VPC has a private IP address space you define •  Create your own subnets and control all internal and external connectivity AWS network security •  AWS network will prevent spoofing and other common layer 2 attacks •  Every compute instance gets multiple security groups - stateful firewalls •  Every subnet gets network access control lists
  • 8. Create multi-tier architectures every time VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump host 10.0.4.0/24 EC 2 App Log EC 2 Web Load balancing
  • 9. Firewall every single compute instance VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump 10.0.4.0/24 EC 2 App “Web servers will accept Port 80 from load balancers” “App servers will accept Port 8080 from web servers” “Allow SSH access only from from Jump Hosts” Log EC 2 Web Load balancing
  • 10. Enable network access control on every subnet VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 10.0.3.0/24 EC 2 10.0.5.0/24 Jump 10.0.4.0/24 EC 2 App Log EC 2 Web “Deny all traffic between the web server subnet and the database server subnet” Load balancing
  • 11. Control every Internet connection VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Internet Gateway Control Internet routing •  Create Public subnets and Private subnets •  Implement DMZ architectures as per normal best practices •  Allocate static Elastic IP addresses or use AWS- managed public IP addresses Load balancing
  • 12. Connect in private to your existing datacentres VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Use Internet VPNs or use AWS Direct Connect Your premises Load balancing
  • 13. You can route to the Internet using your gateway VPC A - 10.0.0.0/16 AvailabilityZoneA 10.0.1.0/24 10.0.2.0/24 EC 2 10.0.3.0/24 EC 2 10.0.4.0/24 EC 2 App EC 2 WebEC 2 WebEC 2 EC 2 Web Use Internet VPNs or use AWS Direct Connect Your premises Load balancing
  • 14. Create flexible multi-VPC hybrid environments Your organisation Project Teams Marketing Business Units Reporting Digital / Websites Dev and Test Redshift EMR Analytics Internal Enterprise Apps Amazon S3 Amazon Glacier Storage/ Backup
  • 15. Every website can absorb attacks and scale out Amazon S3 Distributed attackers Customers Customers Route53 Sydney region CloudFront Your VPC WAFWAF WAFWAF ELB ELB ELB ELB App App App App Auto Scaling Auto Scaling Auto Scaling Auto Scaling
  • 16.   Encrypt  your  Elas8c  Block  Store  volumes  any  way  you  like   •  Many  free  u8li8es,  plus  Trend,  SafeNet  and  other  partners  offer   high-­‐assurance  solu8ons   Amazon  S3  offers  either  server  or  client-­‐side  encryp8on   •  Manage  your  own  keys  or  let  AWS  do  it  for  you   RedshiR  has  one-­‐click  disk  encryp8on  as  standard   •  Encrypt  your  data  analy8cs   •  You  can  supply  your  own  keys   RDS  supports  transparent  data  encryp8on  (TDE)   •  Easily  encrypt  sensi8ve  database  tables   You can encrypt your sensitive information everywhere DBA
  • 17. Tamper-resistant customer controlled hardware security modules within your VPC •  Industry-standard SafeNet Luna devices. Common Criteria EAL4+, NIST FIPS 140-2 certified •  No access from Amazon administrators who manage and maintain the appliance •  High availability and replication with on-premise HSMs Reliable & Durable Key Storage •  Use for transparent data encryption on self-managed databases and natively with AWS Redshift •  Integrate with applications using Java APIs •  Integration with marketplace disk-encryption and SSL Store your encryption keys securely in CloudHSM
  • 18. Use your own HSMs if you want Your premises Applications Your HSM NATCloudHSM NATCloudHSM Volume, object, database encryption Signing / DRM / apps EC2 SYNC EBS S3 Amazon S3 Amazon Glacier
  • 19. You can enforce consistent host security Launch instanc e EC2 AMI catalogue Running instance Your instance Hardening Audit and logging Vulnerability management Malware and HIPS Whitelisting and integrity User administration Operating system Configur e instance You  control  the  configura8on  of  your  servers   Harden operating system and platforms to your own spec Use host-based protection software •  Apply ASD Top 35 mitigation strategies! Think about how you will manage administrative users •  Restrict access as much as possible Build out the rest of your standard security environment •  Connect to your existing services, e.g. SIEM
  • 20. Control access and segregate duties everywhere Region Internet Gateway Subnet 10.0.1.0/24 Subnet 10.0.2.0/24 VPC A - 10.0.0.0/16 Availability Zone Availability Zone Router Internet Customer Gateway You  get  to  control  who  can  do  what   in  your  AWS  environment  and  from   where     Fine-­‐grained  control  of  your  en8re   cloud  environment  with  two-­‐factor   authen8ca8on     Integrated  with  your  exis8ng   corporate  directory  using  SAML  2.0   AWS account owner Network management Security management Server management Storage management Build and run
  • 21. Full visibility of your AWS environment •  CloudTrail will record access to API calls and save logs in your S3 buckets, no matter how those API calls were made Who did what and when and from what IP address •  Support for many AWS services and growing - includes EC2, EBS, VPC, RDS, IAM and RedShift •  Easily Aggregate all log information Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic and SumoLogic Get consistent visibility of logs that you can monitor
  • 22. You get to do all of this in DEVELOPMENT TESTING PRE-PRODUCTION LIVE
  • 23. Lets hear from an AWS customer who has done it
  • 24. Bruce Haefele Chief Architect Heath Direct Australia Delivering health services on AWS
  • 25. Who we are and what we do
  • 26. We isolate environments into VPCs Dev Int Test Staging Prod. Tools Admin Corp. Sydney region HSM Appliance External Datacenter Provider VPN
  • 27. We isolate components within each VPC AvailabilityZoneA EC 2 WebEC 2 API Port. App. IAM Vuln. PII Log SIEM Mon. Sec. Man. Enc. Man. De-id Auth. Sec. Data Public Unclassified Sensitive / Health Web WAF API. Gate. ESB
  • 28. Services we use in the AWS cloud Dynamo DB RDS Elastic Network Interface EBS Elastic Load Balancer Glacier VPC Storage Gateway EC2 Cloud FormationAWS IAMAutoscalingElastic IPs Route 53 Cloudwatch S3 Cloudfront VPC VPN
  • 29. Things you should think about •  Start  small  and  experiment   •  Rethink  your  approach  to  your   infrastructure   •  Data  classifica8on   •  What  AWS  services  you  can  use   and  what  you  have  to  build   •  Defense  in  depth   •  Where  and  how  to  encrypt   •  What  to  log,  backup  strategies,   archive  and  retrieval   •  How  to  federate  and  integrate  –   levels  of  trust   •  Privileged  access   •  Compliance   •  Vendor  licensing  models   •  Financial  management  
  • 30. Read AWS security whitepapers, tips and good practices •  http://blogs.aws.amazon.com/security •  http://aws.amazon.com/compliance •  http://aws.amazon.com/security •  Risk and compliance, best practices, audit guides and operational checklists to help you before you go live •  Workshop  solu8ons  with  an  AWS  solu8ons  architect,  including  me!   •  Get  free  trials  of  security  from  AWS  Partners  on  the  AWS  marketplace Sign up for AWS premium support •  http://aws.amazon.com/support •  Get help when you need it most – as you grow •  Choose different levels of support with no long-term commitment Further info and how to get AWS support
  • 31. THANK YOU Please give us your feedback by filling out the Feedback Forms AWS Government, Education, & Nonprofits Symposium Canberra, Australia | May 20, 2014
  • 32. AWS Government, Education, & Nonprofits Symposium Canberra, Australia | May 20, 2014 Security  as  an  enabler  –  improving  security  with  the  AWS  cloud   Stephen Quigg Principal Security Solutions Architect, Asia Pacific Amazon Web Services