SlideShare une entreprise Scribd logo
1  sur  29
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Andrew Thomas, GM, AWS Perimeter Protection
March, 2019
Customer Use Cases
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Threats
Application Vulnerabilities Bad BotsDDoS
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Our Customers
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Common Use Cases
Web Applications Game ServersAPI & Serverless Web Sockets
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How customers use our services
• Shield Standard – Built-in DDoS protection
• Shield Advanced – Advanced DDoS visibility & protection
• WAF – Application layer protection for DDoS, Compliance
(PCI), and Internet Threats
• Security Automations & Bot mitigations
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shield Standard
Automatic detection and mitigation of
the most common attacks
Comprehensive protection against all
known infrastructure layer attacks when
using Amazon CloudFront and Amazon
Route 53
Available globally on all Internet-facing
AWS services
Automation Protection built
into AWS services
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront to Secure APIs
• Looking for DDoS Protection
• Need Highly Reliable API Delivery
• Easy Integration with AWS services like ELB
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront to Secure APIs
Slack Enabled CloudFront in Front of ELBs
 Caching Disabled
 Forward All Headers, Cookies, & Query strings
 TLS Termination at Edge
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Slack Uses CloudFront to Secure APIs
Learn more: https://aws.amazon.com/cloudfront/getting-started/#slack-video
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
 Higher fidelity detection
 Real-time attack Visibility
 AWS WAF at no additional cost
 24X7 DDoS Response Team (DRT)
 Cost protection to absorb scaling cost
Shield Advanced
Additional protection against large
and sophisticated attacks
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
VPC
• Reduced latencies from around the globe for API calls
• DDoS protection with the integration of AWS Shield Advanced
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Rovio – CloudFront, Shield Advanced & WAF
- Added CloudFront distribution to protect
dynamic content
- Enabled AWS Shield Advanced and AWS
WAF to protect and filter unwanted access.
- Removed extra traffic filtering and access
control previously required on ELBs
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“We love using Amazon CloudFront as it helps reducing latencies in
API usage (i.e. acceleration) and with the integration of AWS Shield
and WAF we get strong DDoS protection at the first connection point
outside our VPC. We are also future proofing our stack, as Cloudfront
provides HTTP/2 and IPv6 support right out of the box”
Mika Linnanoja – Senior Continuous Integration Engineer – Rovio Entertainment Ltd.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Netflix uses AWS Shield
Advanced For Additional
DDoS Protection
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Challenge
 Need DDoS Protection for APIs
on ELBs
Netflix uses Shield Advanced For Additional Protection
Benefit
 Protection Enabled on ELB without
any Architectural changes
 Integrated with AWS: Scrubbing
within AWS
 Same AWS Support team & DRT
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Protects Pearson
Against DDoS Attacks &
Other Application
Vulnerabilities
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DDoS Challenges in Traditional Data Center
• Impacted by several Distributed Denial-of-
Service (DDoS) attacks
• Volumetric attacks like SYN Floods very
common
• Performance degradation and operational
downtime
• Various DDoS mitigation services were
employed to protect against continued attacks
– On Prem / CSP
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Pearson’s NextGen Assessment Platforms
Mitigated DDoS Threats By Building on AWS Cloud platform
Amazon CloudFront AWS ShieldAWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Protect against attacks like SQL injection,
Cross-site attacks, and OWASP
Zero-day attacks
Customized, application-specific protection
Shield Advanced
with WAF
Protect against Application
Vulnerabilities
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“PayPlug faced the threat of a DDOS attack but was able to
avoid it thanks to the robustness of AWS services and the
support of AWS business and technical teams. The AWS team
guided PayPlug to enhance the security of its infrastructure,
including through a migration to VPC to protect instances by
firewall and by enabling Amazon CloudFront”
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“Security is essential for protecting bank card data that pass through its
service”
Naoufel Salem, Head of PayPlug Architecture, explains: “Our [systems] are
processing payment card data that should not be accessible. It is essential to
manage access, protect payment card data and ensure also protection against
DDOS-type attacks, all of which require fine management of all security
parameters.” The security issues have also been at the heart of the audit
carried out by the ACPR to grant its certification to PayPlug.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Bots & Brute-force attacks
Customized automations using Lambda
Integration with GuardDuty
Security Automations
Protect against bots and synthetic
requests
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The Pokémon Bot Challenge
Huge increase in new users
Massive, disproportional increase in
illegitimate users and traffic
• Bots
• Scanners
• DDoS attacks
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Automation Using AWS WAF
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Switched to CloudFront + AWS WAF &
Shield improved stability and performance
Improved support and response from Shield
DRT team
Re:Invent 2017 talk: https://bit.ly/2IRCjGn
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Contenu connexe

Tendances

Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
Amazon Web Services
 

Tendances (20)

How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019 DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
DDoS attack detection at scale - SDD408 - AWS re:Inforce 2019
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
Building enterprise solutions with blockchain and ledger technology - SVC202 ...
Building enterprise solutions with blockchain and ledger technology - SVC202 ...Building enterprise solutions with blockchain and ledger technology - SVC202 ...
Building enterprise solutions with blockchain and ledger technology - SVC202 ...
 
Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Info...
Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Info...Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Info...
Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Info...
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Core services
Core servicesCore services
Core services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
 
AWS re:Invent Comes to London 2019 - Keynote
AWS re:Invent Comes to London 2019 - KeynoteAWS re:Invent Comes to London 2019 - Keynote
AWS re:Invent Comes to London 2019 - Keynote
 
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
Aligning to the NIST Cybersecurity Framework in the AWS Cloud - SEC204 - Chic...
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019 Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
Guarding the guardian’s guard: IBM Trusteer - SEP326 - AWS re:Inforce 2019
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 

Similaire à Learn how AWS customers are implementing robust security posture for their AWS environments

Developing on AWS - Crypto Startup
Developing on AWS - Crypto StartupDeveloping on AWS - Crypto Startup
Developing on AWS - Crypto Startup
Amazon Web Services
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
Amazon Web Services
 

Similaire à Learn how AWS customers are implementing robust security posture for their AWS environments (20)

Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdf
 
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
 
Developing on AWS - Crypto Startup
Developing on AWS - Crypto StartupDeveloping on AWS - Crypto Startup
Developing on AWS - Crypto Startup
 
Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks
Protect Your Game Servers from DDoS Attacks - AWS Online Tech TalksProtect Your Game Servers from DDoS Attacks - AWS Online Tech Talks
Protect Your Game Servers from DDoS Attacks - AWS Online Tech Talks
 
Getting started - Protect your applications in under 30 mins
Getting started - Protect your applications in under 30 minsGetting started - Protect your applications in under 30 mins
Getting started - Protect your applications in under 30 mins
 
AWS Fundamentals for DoD, Immersion Day Huntsville 2019
AWS Fundamentals for DoD, Immersion Day Huntsville 2019AWS Fundamentals for DoD, Immersion Day Huntsville 2019
AWS Fundamentals for DoD, Immersion Day Huntsville 2019
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWS
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Learn how AWS customers are implementing robust security posture for their AWS environments

  • 1. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Andrew Thomas, GM, AWS Perimeter Protection March, 2019 Customer Use Cases
  • 2. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Threats Application Vulnerabilities Bad BotsDDoS
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Our Customers
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Common Use Cases Web Applications Game ServersAPI & Serverless Web Sockets
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How customers use our services • Shield Standard – Built-in DDoS protection • Shield Advanced – Advanced DDoS visibility & protection • WAF – Application layer protection for DDoS, Compliance (PCI), and Internet Threats • Security Automations & Bot mitigations
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Shield Standard Automatic detection and mitigation of the most common attacks Comprehensive protection against all known infrastructure layer attacks when using Amazon CloudFront and Amazon Route 53 Available globally on all Internet-facing AWS services Automation Protection built into AWS services
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront to Secure APIs • Looking for DDoS Protection • Need Highly Reliable API Delivery • Easy Integration with AWS services like ELB
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront to Secure APIs Slack Enabled CloudFront in Front of ELBs  Caching Disabled  Forward All Headers, Cookies, & Query strings  TLS Termination at Edge
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Slack Uses CloudFront to Secure APIs Learn more: https://aws.amazon.com/cloudfront/getting-started/#slack-video
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.  Higher fidelity detection  Real-time attack Visibility  AWS WAF at no additional cost  24X7 DDoS Response Team (DRT)  Cost protection to absorb scaling cost Shield Advanced Additional protection against large and sophisticated attacks
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. VPC • Reduced latencies from around the globe for API calls • DDoS protection with the integration of AWS Shield Advanced
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Rovio – CloudFront, Shield Advanced & WAF - Added CloudFront distribution to protect dynamic content - Enabled AWS Shield Advanced and AWS WAF to protect and filter unwanted access. - Removed extra traffic filtering and access control previously required on ELBs
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “We love using Amazon CloudFront as it helps reducing latencies in API usage (i.e. acceleration) and with the integration of AWS Shield and WAF we get strong DDoS protection at the first connection point outside our VPC. We are also future proofing our stack, as Cloudfront provides HTTP/2 and IPv6 support right out of the box” Mika Linnanoja – Senior Continuous Integration Engineer – Rovio Entertainment Ltd.
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Netflix uses AWS Shield Advanced For Additional DDoS Protection
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Challenge  Need DDoS Protection for APIs on ELBs Netflix uses Shield Advanced For Additional Protection Benefit  Protection Enabled on ELB without any Architectural changes  Integrated with AWS: Scrubbing within AWS  Same AWS Support team & DRT
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Protects Pearson Against DDoS Attacks & Other Application Vulnerabilities
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DDoS Challenges in Traditional Data Center • Impacted by several Distributed Denial-of- Service (DDoS) attacks • Volumetric attacks like SYN Floods very common • Performance degradation and operational downtime • Various DDoS mitigation services were employed to protect against continued attacks – On Prem / CSP
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Pearson’s NextGen Assessment Platforms Mitigated DDoS Threats By Building on AWS Cloud platform Amazon CloudFront AWS ShieldAWS WAF
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Protect against attacks like SQL injection, Cross-site attacks, and OWASP Zero-day attacks Customized, application-specific protection Shield Advanced with WAF Protect against Application Vulnerabilities
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “PayPlug faced the threat of a DDOS attack but was able to avoid it thanks to the robustness of AWS services and the support of AWS business and technical teams. The AWS team guided PayPlug to enhance the security of its infrastructure, including through a migration to VPC to protect instances by firewall and by enabling Amazon CloudFront”
  • 24. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “Security is essential for protecting bank card data that pass through its service” Naoufel Salem, Head of PayPlug Architecture, explains: “Our [systems] are processing payment card data that should not be accessible. It is essential to manage access, protect payment card data and ensure also protection against DDOS-type attacks, all of which require fine management of all security parameters.” The security issues have also been at the heart of the audit carried out by the ACPR to grant its certification to PayPlug.
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Bots & Brute-force attacks Customized automations using Lambda Integration with GuardDuty Security Automations Protect against bots and synthetic requests
  • 26. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The Pokémon Bot Challenge Huge increase in new users Massive, disproportional increase in illegitimate users and traffic • Bots • Scanners • DDoS attacks
  • 27. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Automation Using AWS WAF
  • 28. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Switched to CloudFront + AWS WAF & Shield improved stability and performance Improved support and response from Shield DRT team Re:Invent 2017 talk: https://bit.ly/2IRCjGn
  • 29. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Notes de l'éditeur

  1. Many of the largest AWS customers across industries including e-commerce, gaming, media, finance, and public sector use AWS Shield Advanced to protect their applications. Here are a few examples.
  2. Pokémon Go brought new challenges. Some of them are the kinds you want Increase in new users playing Pokémon Go Some are not so good: Increase in bot accounts used for Scanners Simulate users in order to gather data Account Re-sellers Level up accounts – Impress your friends! DDoS Attacks