SlideShare une entreprise Scribd logo
1  sur  63
Télécharger pour lire hors ligne
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The economics of incidents, and creative
ways to thwart future threats
S E P 3 1 2
Nathan Case
Twitter: NathanC54227646
Linkedin: nathancase
AWS Security Specialist
Frans Rosén
Twitter: fransrosen
Linkedin: fransrosen
Security Advisor
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Introductions
Some basics: Looking backward to look forward
Threats and change
Awareness
The future
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Nomore fear, uncertainty, and doubt (FUD)
• This is a “tear off the bandage” talk
• This talk focuses on the impacts of incidents
• This talk focuses on the issues; blame doesn’t help
• Tech is not the answer (humans always spill coffee)
• Public shaming should have stopped in junior high school
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why? (Reason for this talk)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS
Security OF
the cloud
AWS is responsible for protecting
the infrastructure that runs all of the
services offered in the AWS Cloud
Security IN
the cloud
Customer responsibility is determined
by the AWS Cloud services that a
customer selects
Customer
Shared responsibility model
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Region & number of AZs Announced Regions
Bahrain, Hong Kong SAR, Sweden
3
3
3
3
3
6
2
3
3
3
3
2
233
3
3
42
1
The largest global footprint consistently built with a multi-Availability Zone (AZ) and multi-data center design
AWS AZAWS Region
A Region is a physical location in the
world where we have multiple AZs
AZs consist of one or more discrete
data centers, each with redundant
power, networking, and connectivity,
and housed in separate facilities
Transit
AZ
Data center Data center
Data center
Security OF the cloud
Transit
AZ
AZ
AZ
Scale globally with resilience in every region
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Guiding principle
Bad practice is bad practice in
the cloud, the data center, or
whatever comes next
Security OF the cloud
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Segmentation
If everything is critical, then nothing is
If you have everything in one basket,
everything shares a classification
If you put all your risks in one
segment, I will target that segment
(If everything is bold…)
Security IN the cloud
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thecloud issafer
Tooling/instrumentation
Secure by default
Eliminating human
interaction/automation
Security OF the cloud
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Parts
Social mediaTransport
Security IN the cloud
Everything from a grilling app
to a banking platform
• Worst-case scenario of asset
management
• Data leakage where you least expect it
• When out-of-scope is actually very
much in-scope
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Data
Secrets
PII
Collateral data
...
Money
Funds transfer
Compute for mining
Physical good
...
Political
Persona
Cooperate identity
Activist
...
Personal
Social
Phishing
Theft
...
Understanding your critical assets
from the attacker point of view
Working backward from your customer (the hacker)
Security IN the cloud
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thenumberofvulnerabilities
The increased number of
vulnerabilities does not mean that
it’s getting worse
Lack of identified vulnerabilities is
a bigger issue
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Threat modeling
If you don't know your assets, you
don't know what to protect and
how to protect your assets, and
you end up building a wall around
everything
Production
TestingDevelopment
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Service
IAM
Amazon S3 buckets
Billing
...
Infrastructure
VPC resources
Connectivity
On instance
...
Application
Patching
Coding hole
...
Incident response domains
Understand your attack surface
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Availability Zone C
Availability Zone B
VPC CIDR:
10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
10.0.48.0/21
Sensitive subnet
Security groups
Route table
NACLs
Internet Gateway
Instance compromise
Amazon
S3
Amazon
RDS
IAM
AWS
CloudHSM
AWS
Organization
s
AWSKMS
AWS
Directory
Service
Infrastructure domain
Application domain
Different domains
Service domain
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Threats of today have changed, and they're all in it for the
money…Well, sort of
• Hacktivism vs. economically incentivized
• The simplicity of anonymization
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Threats of today have changed, and they're all in it for the
money…Well, sort of
• Hacktivism vs. economically incentivized
• The simplicity of anonymization
I honestly wish bug bounties were a “thing”
back in the days I would have been rich and
avoided so much drama :)
18 Dec 2015
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Historical outlook of what worked and didn't
Encounter Percentages for Windows systems over: 2013–2017
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
MicrosoftWindows malwareencounter ratetrend by category
Encounter Percentages for Windows systems over: 2013–2017
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Malware, cryptomining,
ransomware
Reviewing the data, we see that a lot of
malware encountered by Windows
machines will be things that require
human help to solve
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Internal threats
Generally, open security
boundaries
Development practice
Oddly, the office of no
(The intern or the coffee-soaked,
sleepy admin)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Convenience for QA
Security IN the cloud
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Username: qa_test_xxx@xxx
Password: azerty13
2FA-code
Security IN the cloud
Example: Convenience for QA
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Username: qa_test_xxx@xxx
Password: azerty13
2FA-code:
Security IN the cloud
Example: Convenience for QA
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Username: qa_test_xxx@xxx
Password: azerty13
2FA-code:
Security IN the cloud
Example: Convenience for QA
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Theexternal threats
• Cybercriminals are becoming more agile in their development process
• Shorter vulnerability lifespan—from detection to weaponization
• Criminals will take only a day or hours to implement attacks against the latest
vulnerabilities
• 4-minute breach after credentials to GitHub
• Cloud-based cybercriminals
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Theexternal threats
• Cybercriminals are becoming more agile in their development process
• Shorter vulnerability lifespan—from detection to weaponization
• Criminals will take only a day or hours to implement attacks against the latest
vulnerabilities
• 4-minute breach after credentials to GitHub
• Cloud-based cybercriminals
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Theexternal threats
• Cybercriminals are becoming more agile in their development process
• Shorter vulnerability lifespan—from detection to weaponization
• Criminals will take only a day or hours to implement attacks against the latest vulnerabilities
• 4-minute breach after credentials to GitHub
• Cloud-based cybercriminals
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The external threats
• Cybercriminals are becoming more agile in
their development process
• They are business people, just nefariously
so
• This means
• Shorter vulnerability lifespan—from detection to
weaponization
• Criminals will take only a day or hours to implement
attacks against the latest vulnerabilities
• Four-minute breach after credentials to GitHub
• Cloud-based cybercriminals
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
So where is the impact?
The average cost for each lost or stolen record containing sensitive and
confidential information also increased by 4.8 percent year over year to $148
This number is repeated by a number of websites, reports, etc.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
So where is the impact?
“Activity-based costing (ABC) is a costing method that identifies activities in an
organization and assigns the cost of each activity to all products and services
according to the actual consumption by each. This model assigns more indirect
costs (overhead) into direct costs compared to conventional costing.”
https://en.wikipedia.org/wiki/Activity-based_costing
Direct cost: The direct expense outlay to accomplish a given activity
Indirect cost: The amount of time, effort, and other organizational resources
allocated to data breach resolution, but not as a direct cash outlay
Opportunity cost: The cost resulting from lost business opportunities as a
consequence of negative rep
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
So where is the impact?
While we can view the cost per record stolen, the larger cost is the amount of time
that the enterprise needs to spend in order to deal with a breach
This can often lead to months of project work, stopping new products and
features, causing a long-term type of pain for enterprises
There are no stats for this cost as there is no way to collect the data, verify it, or
compare it between companies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
How do we correct it?
If the true loss is not just monetary, but
is forward momentum of enterprise,
how do we fix it?
Back to the basics, with a new focus
• Architectural security
• Planning for failure
• Plan for data privacy
• Plan for the audit
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your security team is your last line of defense
Why start and stop there?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Isthisan example ofarchitectural security?
Availability Zone C
Availability Zone B
VPC CIDR: 10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
10.0.48.0/21
Sensitive subnet
Security groups
Route table
NACLs
Internet gateway
Instances
Amazon
S3
Amazon
RDS
IAM
AWS
CloudHSM
AWS
Organization
s
AWSKMS
AWS
Directory
Service
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Isthisan example ofarchitectural security?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
What isDevSecOps?
DevSecOps is the combination of cultural
philosophies, practices, and tools that exploits the
advances made in IT automation to achieve a state
of production immutability, frequent delivery of
business value, and automated enforcement of
security policy
DevSecOps is achieved by integrating and
automating the enforcement of preventive,
detective, and responsive security controls into the
pipeline
Security
OperationsDevelopment
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps
Business
Development Operations
Build it faster Keep it stable
Security
Make it secure
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
DevSecOps
Operations
Security
Development
The business
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Problem description
CryptoCurrency:EC2/BitcoinTool.B!DNS has been found in Amazon GuardDuty. This means that we have an account or machine that has been compromised.
John, our lead developer, added his AWS key and secret key to his most recent Git post. This was found by someone and then sold to a cryptomining company in
another country. We had bad threat detection, and the account was used for a couple of days before we found out.
-or-
John had his laptop stolen and didn’t encrypt his hard drive. Because he kept everything in his local Git Repo, his user was compromised.
Postmortem
Use good development practices. Adding static variables that contain access keys to a Git causes long-term issues for a cloud account.
- Use Git-secrets
- Attend a workshop at re:invent discussing the use of open-source development tools.
- Limit blast radius
- Enjoy one of the multi-account sessions at re:Invent.
The loss of corporate resources that were unencrypted.
- Encrypt hard drives going forward.
- Limit account activities of humans for threat detection.
- Limit account access of people in production and test environments.
Aws_labs repos
https://github.com/awslabs
RCA: CryptoCurrency:EC2/BitcoinTool.B!DNS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Accidental exposure of host access
credentials
Objective: Test response in
determining if customer data was
exposed and the actions taken to
rotate access keys
Imagine developer committed SSH
private key to GitHub
What was changed?
How?
When was the issue contained?
Security incident -> RCA -> SIRS
Possible game 1: "CryptoCurrency:EC2/BitcoinTool.B!DNS"
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Simulatelike your
business depends on it
Build teams with developers,
security, and management (and HR
and legal)
Compete with the other parts of
your organization
Compete with a red team
Compete with other companies
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Compete like your
business depends on it
• Requirements
• Rules of engagement
• Rules for scoring
• Do not use production or
production data
• Do not be afraid to lose; that is
how we learn
• Engage outside red teams to
teach your developers how to
think
• Be devious
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your security teams are your last line of defense
Don’t do this
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Availability Zone C
Availability Zone B
VPC CIDR: 10.0.0.0/16
Availability Zone A
10.0.0.0/19
Public subnet
10.0.32.0/20
Private subnet
Security groups
Route table
If your security teams are your last line of defense, your
developers are your first
If you plan for an incident, when you have an
incident, you will not be surprised
This includes data leaks
GitHub posts
The next thing
Build security champions
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your security team employees are your last line of defense
How does Amazon do it?
Cultural focus on customer obsession that focuses on security (Job 0)
What does that mean?
• What is a Severity 2 trouble ticket?
• Why is the security leadership okay with being called accidentally?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Your security team employees are your last line of defense
Bug bounties/internal gamification
No more security team! Well, not so much
They enhance your testing, not replace it
Beware of exposing your known weak points
Breaches
You have to do your own testing and development process (you have to actually FIX the bug, or you will
pay for it again)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Bug bounties?
The good things
Aligning hackers from a young age into the legal way of helping
Put pressure on your regular security processes
Aligns nicely with DevSecOps and automation
The bad things
Worthless without proper processes
Regression testing?
Again, it’s not a replacement
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
People are more security-aware than ever before
• We see more vulnerabilities than we ever did before
• Teams are focusing on diversity and changing the way we think
• We have more security tools than ever
• Artificial intelligence and machine learning are changing the landscape
• Whaling still works
• People are bound to do the easy thing
• Businesses focus on the short-term money, not the long-term cost
• Humans are prideful
And I still cannot update human firmware
But
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
The issues are not with the products
• The future of security is not based in a cool new product
• Privacy, which is part of security, should drive the decisions that you make from
the start
• Adding a firewall is only adding security on one layer and will only provide
limited help
• While humans are the issue, we can also be the solution
• Security teams can be the grease to get things done quickly if they are added in
the beginning
• Use the teams you have, grow them, and train them to be the best that they
can be
But
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Nathan Case
Twitter: NathanC54227646
LinkedIn: nathancase
Frans Rosén
Twitter: fransrosen
LinkedIn: fransrosen

Contenu connexe

Tendances

How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...Amazon Web Services
 
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Amazon Web Services
 
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...Amazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Amazon Web Services
 
An AWS approach to higher standards of assurance with provable security - FND...
An AWS approach to higher standards of assurance with provable security - FND...An AWS approach to higher standards of assurance with provable security - FND...
An AWS approach to higher standards of assurance with provable security - FND...Amazon Web Services
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...Amazon Web Services
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Amazon Web Services
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Amazon Web Services
 
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Amazon Web Services
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Amazon Web Services
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Amazon Web Services
 
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Amazon Web Services
 
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Amazon Web Services
 
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 Amazon Web Services
 
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Amazon Web Services
 
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019 Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019 Amazon Web Services
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 Amazon Web Services
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...Amazon Web Services
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
 

Tendances (20)

How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
 
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019 Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
Balancing cloud innovation and security - GRC317 - AWS re:Inforce 2019
 
An AWS approach to higher standards of assurance with provable security - FND...
An AWS approach to higher standards of assurance with provable security - FND...An AWS approach to higher standards of assurance with provable security - FND...
An AWS approach to higher standards of assurance with provable security - FND...
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
 
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
Using ML with Amazon SageMaker & GuardDuty to identify anomalous traffic - SE...
 
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019 Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
Leadership session: Foundational security - FND313-L - AWS re:Inforce 2019
 
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
 
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
 
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019 Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019
Building secure APIs in the cloud - SDD403-R - AWS re:Inforce 2019
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 

Similaire à The economics of incidents, and creative ways to thwart future threats - SEP312 - AWS re:Inforce 2019

人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用Amazon Web Services
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Amazon Web Services
 
An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...Amazon Web Services
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...Amazon Web Services
 
Innovate - Cybersecurity: A Drive Force Behind Cloud Adoption
Innovate - Cybersecurity: A Drive Force Behind Cloud AdoptionInnovate - Cybersecurity: A Drive Force Behind Cloud Adoption
Innovate - Cybersecurity: A Drive Force Behind Cloud AdoptionAmazon Web Services
 
Cybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionCybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionAmazon Web Services
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWSAmazon Web Services
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWSAmazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Amazon Web Services
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Amazon Web Services
 
Threat Detection using artificial intelligence
Threat Detection using artificial intelligenceThreat Detection using artificial intelligence
Threat Detection using artificial intelligenceAmazon Web Services
 
MozDef Workshop slide
MozDef Workshop slideMozDef Workshop slide
MozDef Workshop slideCloudVillage
 
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...Amazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 
Serverless Cyber Ops for Government
Serverless Cyber Ops for GovernmentServerless Cyber Ops for Government
Serverless Cyber Ops for GovernmentAmazon Web Services
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Amazon Web Services
 
Failure is not an Option - Designing Highly Resilient AWS Systems
Failure is not an Option - Designing Highly Resilient AWS SystemsFailure is not an Option - Designing Highly Resilient AWS Systems
Failure is not an Option - Designing Highly Resilient AWS SystemsAmazon Web Services
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloudAmazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitAmazon Web Services
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...Amazon Web Services
 

Similaire à The economics of incidents, and creative ways to thwart future threats - SEP312 - AWS re:Inforce 2019 (20)

人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
 
An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...
 
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
The evolution of continuous cloud security and compliance - DEM05-S - New Yor...
 
Innovate - Cybersecurity: A Drive Force Behind Cloud Adoption
Innovate - Cybersecurity: A Drive Force Behind Cloud AdoptionInnovate - Cybersecurity: A Drive Force Behind Cloud Adoption
Innovate - Cybersecurity: A Drive Force Behind Cloud Adoption
 
Cybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud AdoptionCybersecurity: A Drive Force Behind Cloud Adoption
Cybersecurity: A Drive Force Behind Cloud Adoption
 
How to Enhance Your Application Security Strategy with F5 on AWS
 How to Enhance Your Application Security Strategy with F5 on AWS How to Enhance Your Application Security Strategy with F5 on AWS
How to Enhance Your Application Security Strategy with F5 on AWS
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWS
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Threat Detection using artificial intelligence
Threat Detection using artificial intelligenceThreat Detection using artificial intelligence
Threat Detection using artificial intelligence
 
MozDef Workshop slide
MozDef Workshop slideMozDef Workshop slide
MozDef Workshop slide
 
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
The evolution of automated reasoning technology at AWS - SEP201 - AWS re:Info...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
Serverless Cyber Ops for Government
Serverless Cyber Ops for GovernmentServerless Cyber Ops for Government
Serverless Cyber Ops for Government
 
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
Shifting everywhere: Security and the cloud at 3M in the ’20s - DEM05-R - AWS...
 
Failure is not an Option - Designing Highly Resilient AWS Systems
Failure is not an Option - Designing Highly Resilient AWS SystemsFailure is not an Option - Designing Highly Resilient AWS Systems
Failure is not an Option - Designing Highly Resilient AWS Systems
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

The economics of incidents, and creative ways to thwart future threats - SEP312 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The economics of incidents, and creative ways to thwart future threats S E P 3 1 2 Nathan Case Twitter: NathanC54227646 Linkedin: nathancase AWS Security Specialist Frans Rosén Twitter: fransrosen Linkedin: fransrosen Security Advisor
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Introductions Some basics: Looking backward to look forward Threats and change Awareness The future
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Nomore fear, uncertainty, and doubt (FUD) • This is a “tear off the bandage” talk • This talk focuses on the impacts of incidents • This talk focuses on the issues; blame doesn’t help • Tech is not the answer (humans always spill coffee) • Public shaming should have stopped in junior high school
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Why? (Reason for this talk)
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Security OF the cloud AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud Security IN the cloud Customer responsibility is determined by the AWS Cloud services that a customer selects Customer Shared responsibility model
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Region & number of AZs Announced Regions Bahrain, Hong Kong SAR, Sweden 3 3 3 3 3 6 2 3 3 3 3 2 233 3 3 42 1 The largest global footprint consistently built with a multi-Availability Zone (AZ) and multi-data center design AWS AZAWS Region A Region is a physical location in the world where we have multiple AZs AZs consist of one or more discrete data centers, each with redundant power, networking, and connectivity, and housed in separate facilities Transit AZ Data center Data center Data center Security OF the cloud Transit AZ AZ AZ Scale globally with resilience in every region
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Guiding principle Bad practice is bad practice in the cloud, the data center, or whatever comes next Security OF the cloud
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Segmentation If everything is critical, then nothing is If you have everything in one basket, everything shares a classification If you put all your risks in one segment, I will target that segment (If everything is bold…) Security IN the cloud
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Thecloud issafer Tooling/instrumentation Secure by default Eliminating human interaction/automation Security OF the cloud
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Parts Social mediaTransport Security IN the cloud Everything from a grilling app to a banking platform • Worst-case scenario of asset management • Data leakage where you least expect it • When out-of-scope is actually very much in-scope
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Data Secrets PII Collateral data ... Money Funds transfer Compute for mining Physical good ... Political Persona Cooperate identity Activist ... Personal Social Phishing Theft ... Understanding your critical assets from the attacker point of view Working backward from your customer (the hacker) Security IN the cloud
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Thenumberofvulnerabilities The increased number of vulnerabilities does not mean that it’s getting worse Lack of identified vulnerabilities is a bigger issue
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Threat modeling If you don't know your assets, you don't know what to protect and how to protect your assets, and you end up building a wall around everything Production TestingDevelopment
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Service IAM Amazon S3 buckets Billing ... Infrastructure VPC resources Connectivity On instance ... Application Patching Coding hole ... Incident response domains Understand your attack surface
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet 10.0.48.0/21 Sensitive subnet Security groups Route table NACLs Internet Gateway Instance compromise Amazon S3 Amazon RDS IAM AWS CloudHSM AWS Organization s AWSKMS AWS Directory Service Infrastructure domain Application domain Different domains Service domain
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Threats of today have changed, and they're all in it for the money…Well, sort of • Hacktivism vs. economically incentivized • The simplicity of anonymization
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Threats of today have changed, and they're all in it for the money…Well, sort of • Hacktivism vs. economically incentivized • The simplicity of anonymization I honestly wish bug bounties were a “thing” back in the days I would have been rich and avoided so much drama :) 18 Dec 2015
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Historical outlook of what worked and didn't Encounter Percentages for Windows systems over: 2013–2017
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. MicrosoftWindows malwareencounter ratetrend by category Encounter Percentages for Windows systems over: 2013–2017
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Malware, cryptomining, ransomware Reviewing the data, we see that a lot of malware encountered by Windows machines will be things that require human help to solve
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Internal threats Generally, open security boundaries Development practice Oddly, the office of no (The intern or the coffee-soaked, sleepy admin)
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Convenience for QA Security IN the cloud
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Username: qa_test_xxx@xxx Password: azerty13 2FA-code Security IN the cloud Example: Convenience for QA
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Username: qa_test_xxx@xxx Password: azerty13 2FA-code: Security IN the cloud Example: Convenience for QA
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Username: qa_test_xxx@xxx Password: azerty13 2FA-code: Security IN the cloud Example: Convenience for QA
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Theexternal threats • Cybercriminals are becoming more agile in their development process • Shorter vulnerability lifespan—from detection to weaponization • Criminals will take only a day or hours to implement attacks against the latest vulnerabilities • 4-minute breach after credentials to GitHub • Cloud-based cybercriminals
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Theexternal threats • Cybercriminals are becoming more agile in their development process • Shorter vulnerability lifespan—from detection to weaponization • Criminals will take only a day or hours to implement attacks against the latest vulnerabilities • 4-minute breach after credentials to GitHub • Cloud-based cybercriminals
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Theexternal threats • Cybercriminals are becoming more agile in their development process • Shorter vulnerability lifespan—from detection to weaponization • Criminals will take only a day or hours to implement attacks against the latest vulnerabilities • 4-minute breach after credentials to GitHub • Cloud-based cybercriminals
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The external threats • Cybercriminals are becoming more agile in their development process • They are business people, just nefariously so • This means • Shorter vulnerability lifespan—from detection to weaponization • Criminals will take only a day or hours to implement attacks against the latest vulnerabilities • Four-minute breach after credentials to GitHub • Cloud-based cybercriminals
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 35. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. So where is the impact? The average cost for each lost or stolen record containing sensitive and confidential information also increased by 4.8 percent year over year to $148 This number is repeated by a number of websites, reports, etc.
  • 36. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. So where is the impact? “Activity-based costing (ABC) is a costing method that identifies activities in an organization and assigns the cost of each activity to all products and services according to the actual consumption by each. This model assigns more indirect costs (overhead) into direct costs compared to conventional costing.” https://en.wikipedia.org/wiki/Activity-based_costing Direct cost: The direct expense outlay to accomplish a given activity Indirect cost: The amount of time, effort, and other organizational resources allocated to data breach resolution, but not as a direct cash outlay Opportunity cost: The cost resulting from lost business opportunities as a consequence of negative rep
  • 37. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. So where is the impact? While we can view the cost per record stolen, the larger cost is the amount of time that the enterprise needs to spend in order to deal with a breach This can often lead to months of project work, stopping new products and features, causing a long-term type of pain for enterprises There are no stats for this cost as there is no way to collect the data, verify it, or compare it between companies
  • 38. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. How do we correct it? If the true loss is not just monetary, but is forward momentum of enterprise, how do we fix it? Back to the basics, with a new focus • Architectural security • Planning for failure • Plan for data privacy • Plan for the audit
  • 39. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 40. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 41. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Your security team is your last line of defense Why start and stop there?
  • 42. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Isthisan example ofarchitectural security? Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet 10.0.48.0/21 Sensitive subnet Security groups Route table NACLs Internet gateway Instances Amazon S3 Amazon RDS IAM AWS CloudHSM AWS Organization s AWSKMS AWS Directory Service
  • 43. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Isthisan example ofarchitectural security?
  • 44. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. What isDevSecOps? DevSecOps is the combination of cultural philosophies, practices, and tools that exploits the advances made in IT automation to achieve a state of production immutability, frequent delivery of business value, and automated enforcement of security policy DevSecOps is achieved by integrating and automating the enforcement of preventive, detective, and responsive security controls into the pipeline Security OperationsDevelopment
  • 45. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps Business Development Operations Build it faster Keep it stable Security Make it secure
  • 46. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps Operations Security Development The business
  • 47. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 48. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Problem description CryptoCurrency:EC2/BitcoinTool.B!DNS has been found in Amazon GuardDuty. This means that we have an account or machine that has been compromised. John, our lead developer, added his AWS key and secret key to his most recent Git post. This was found by someone and then sold to a cryptomining company in another country. We had bad threat detection, and the account was used for a couple of days before we found out. -or- John had his laptop stolen and didn’t encrypt his hard drive. Because he kept everything in his local Git Repo, his user was compromised. Postmortem Use good development practices. Adding static variables that contain access keys to a Git causes long-term issues for a cloud account. - Use Git-secrets - Attend a workshop at re:invent discussing the use of open-source development tools. - Limit blast radius - Enjoy one of the multi-account sessions at re:Invent. The loss of corporate resources that were unencrypted. - Encrypt hard drives going forward. - Limit account activities of humans for threat detection. - Limit account access of people in production and test environments. Aws_labs repos https://github.com/awslabs RCA: CryptoCurrency:EC2/BitcoinTool.B!DNS
  • 49. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Accidental exposure of host access credentials Objective: Test response in determining if customer data was exposed and the actions taken to rotate access keys Imagine developer committed SSH private key to GitHub What was changed? How? When was the issue contained? Security incident -> RCA -> SIRS Possible game 1: "CryptoCurrency:EC2/BitcoinTool.B!DNS"
  • 50. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 51. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Simulatelike your business depends on it Build teams with developers, security, and management (and HR and legal) Compete with the other parts of your organization Compete with a red team Compete with other companies
  • 52. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Compete like your business depends on it • Requirements • Rules of engagement • Rules for scoring • Do not use production or production data • Do not be afraid to lose; that is how we learn • Engage outside red teams to teach your developers how to think • Be devious
  • 53. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 54. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Your security teams are your last line of defense Don’t do this
  • 55. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Availability Zone C Availability Zone B VPC CIDR: 10.0.0.0/16 Availability Zone A 10.0.0.0/19 Public subnet 10.0.32.0/20 Private subnet Security groups Route table If your security teams are your last line of defense, your developers are your first If you plan for an incident, when you have an incident, you will not be surprised This includes data leaks GitHub posts The next thing Build security champions
  • 56. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 57. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Your security team employees are your last line of defense How does Amazon do it? Cultural focus on customer obsession that focuses on security (Job 0) What does that mean? • What is a Severity 2 trouble ticket? • Why is the security leadership okay with being called accidentally?
  • 58. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Your security team employees are your last line of defense Bug bounties/internal gamification No more security team! Well, not so much They enhance your testing, not replace it Beware of exposing your known weak points Breaches You have to do your own testing and development process (you have to actually FIX the bug, or you will pay for it again)
  • 59. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Bug bounties? The good things Aligning hackers from a young age into the legal way of helping Put pressure on your regular security processes Aligns nicely with DevSecOps and automation The bad things Worthless without proper processes Regression testing? Again, it’s not a replacement
  • 60. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 61. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. People are more security-aware than ever before • We see more vulnerabilities than we ever did before • Teams are focusing on diversity and changing the way we think • We have more security tools than ever • Artificial intelligence and machine learning are changing the landscape • Whaling still works • People are bound to do the easy thing • Businesses focus on the short-term money, not the long-term cost • Humans are prideful And I still cannot update human firmware But
  • 62. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. The issues are not with the products • The future of security is not based in a cool new product • Privacy, which is part of security, should drive the decisions that you make from the start • Adding a firewall is only adding security on one layer and will only provide limited help • While humans are the issue, we can also be the solution • Security teams can be the grease to get things done quickly if they are added in the beginning • Use the teams you have, grow them, and train them to be the best that they can be But
  • 63. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Nathan Case Twitter: NathanC54227646 LinkedIn: nathancase Frans Rosén Twitter: fransrosen LinkedIn: fransrosen