SlideShare une entreprise Scribd logo
1  sur  34
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A U G . 2 4 – 2 5 , 2 0 2 1 | H O U S T O N , T X
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lessons learned from the
front lines of incident response
Brian “BasementCat” Andrzejewski
T D R 2 0 2
Lead Operator, Customer Incident Response Team (CIRT)
AWS Professional Services
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Who we are
Why we are here
Common causes for customer security events
Critical security patterns to reduce customer risks
Where to go next
Agenda
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Who we are
A specialized AWS Customer Incident Response team that assists and
advises customers during their active security events on the customer’s
side of the AWS Shared Responsibility Model
Experienced team of
AWS Professional Services
and Solution Architects
in incident response
Assist in root cause
analysis of a customer’s
AWS service logs for their
active security event
Assist and advise
customers with active
triage & recovery of their
security event on AWS
Provide advise to
customers for long-term
recovery from their
active security event
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Available escalations during an AWS customer’s
active security event
1. Validate AWS account ownership
to customer(s) impacted
2. Assist with triage & recovery with
customer and AWS teams
3. Investigate root cause(s) with
customer for their event
4. Provide recommendations for
next steps
AWS support case (all tiers)
AWS Account team
AWS Security
AWS Customer Incident Response Team
(CIRT)
External
Internal
AWS Customer Incident
Response team
Customer triage path
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS shared responsibility model
Customers and AWS Partners
https://aws.amazon.com/compliance/shared-responsibility-model/
Security IN
the cloud
Managed by
customers
Security OF
the cloud
Managed by
AWS
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The line varies. . .
Hardware/AWS global
infrastructure
Compute/storage/
database/network
Client-side data
encryption/integrity
Server-side encryption
Network traffic protection
OS, network, firewall
Configuration
Platform and application
management
Customer data
AWS
IAM
Customer
IAM
Infrastructure
services
Client-side data
encryption
Network traffic protection
Firewall configuration
OS, network, firewall
configuration
Platform and application
management
Customer data
Hardware/AWS global
infrastructure
Compute/storage/
database/network
AWS
IAM
Customer
IAM
Container
services
Abstracted
services
Client-side data
encryption
Network traffic protection
OS, network, firewall
configuration
Platform and application
management
Customer data
Hardware/AWS global
infrastructure
Compute/storage/
database/network
AWS
IAM
Customer
IAM
Server-side encryption
More
customizable
+
More customer
responsibility
Less customizable
+
Less customer
responsibility
+
More best
practices built in
https://aws.amazon.com/whitepapers/aws-security-best-practices/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Additional AWS customer responsibilities
All activities that occur under your account –
including unauthorized access (4.1)
Properly configuring and using an AWS service (4.3)
Keeping AWS root account email current for
notifications (13.10.a)
Taking appropriate action to secure, protect, and
back up your account and your content (4.3)
Not disclosing login credentials and access keys to
unauthorized third parties (4.4)
https://aws.amazon.com/agreement/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why are we here?
challenges 24/7
best practices
seeking right
AWS skillsets and knowledge
share
excel
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS incident response methodology
• Incident Response Phases
 Prepare and prevent
 Detect and assess impact
 Triage and recovery
 Investigate to root cause(s)
• Improve and iterate
 Develop people and technology
 Update playbooks and runbooks
 Simulate security events in environment
 Apply lessons learned and iterate to improve
https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Common causes for
customer security events
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding the
risk equation
Threat actor:
A cat that wants to scratch you
Threat:
The cat’s paw reaching out to scratch you
Vulnerability:
Your inability to defend against the scratch
Risk:
The likelihood of being scratched
Acceptable risk:
Your willingness to be scratched by the cat
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Gartner estimates that
most cloud security
failures will be IN the
cloud on the user side
Gartner “Is the Cloud Secure?”
https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Common causes for customer security events
Insecure
AWS resource
configuration
Inaccurate
AWS account contact
information
Lack of continuous
vulnerability
management executed
Unintended disclosure
of security credentials
and secrets
Inadvertent response to
Amazon GuardDuty and
other detective controls
Unmanaged
application
software security
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Critical security patterns
to reduce customer risks
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementation goals and objectives
Scenario-driven guidance to common root causes of security events
• Grounded to real-world security events experienced by AWS customers
• Prescriptive guidance on how prevent and detect by root cause
Reduce customer’s security risks to their AWS accounts and its resources
• Applicable to all AWS customers and their existing architectures
• Core AWS services to start your security journey and iterate beyond
• Prioritized to critical security practices observed to prevent and detect
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Bill of materials
Core AWS services AWS service tools
AWS Organizations Amazon GuardDuty
AWS Security Hub
AWS CloudTrail
AWS IAM Access
Analyzer and advisor
AWS IAM temporary
security credential
AWS Config
AWS Personal
Health Dashboard
AWS Well-Architected Tool Amazon CloudWatch
AWS Identity and Access
Management (IAM)
AWS Backup
Amazon VPC
Reachability Analyzer
AWS Secrets Manager
AWS IAM policy
simulator
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inaccurate AWS account information by customer
Prevent
• Ensure AWS account email uses both
 Corporate email domain
(i.e., example.com)
 Distribution email address
• AWS account root user
 Use IAM principals for day-to-day access
 Eliminate use of root access keys
 Use an MFA device for root console use
Detect
• Leverage CloudTrail and CloudWatch
events to detect AWS account changes
• Monitor your AWS notifications
 AWS account email
 AWS Health event alerts
• Use AWS Cost Anomaly Detection for
monitoring unusual AWS account costs
Affects AWS account holder’s ability to
• Act upon AWS-provided notifications that require timely resolution
• Provide account owner verification during AWS account recovery process
• Perform break-glass access for AWS account and during root user password reset
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Insecure AWS resource configuration by customer
Prevent
• Enable public block for supported AWS services to restrict public access
• Configure backups and validate restores with AWS Backup for critical resources and data
• Use different IAM principals and roles to manage vs. operate AWS resources to reduce impacts
• Deploy AWS resources into private VPCs to reduce unintended access
• Implement AWS Organizations security control polices to restrict
 Modify and delete AWS resource changes to system admin roles
 AWS access key usage to restricted policy conditionals
Critical configuration to focus on
• AWS Foundational Security Best Practices with severity critical or high
• Public-facing assets for defense-in-depth and restricted network access
• Deny-then-allow authentication for AWS resources that contain sensitive data
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Insecure AWS resource configuration by customer
Detect
• Enable Security Hub for all regions with AWS Foundational Security Best Practices to
detect common AWS resource misconfigurations
• Prioritize GuardDuty anomalous behavior findings for unexpected resources changes
• Leverage AWS Config for recording and building inventory
 AWS resources by name and service
 Individual AWS resource configurations
Critical configuration to focus on
• AWS Foundational Security Best Practices with severity critical or high
• Public-facing assets for defense-in-depth and restricted network access
• Deny-then-allow authentication for AWS resources that contain sensitive data
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unintended disclosure of security
credentials and secrets by customer
Prevent
• Disable and delete all AWS account root access keys
• Use temporary role-based access over static credentials and keys
• Require MFA for your most sensitive operations and privileged access
• Use Secrets Manager to vault and audit use of non-IAM credentials
• Build identity-based and resource-based policies for least-privilege access to reduce impact of
unintended access and disclosure
 Use explicit deny-then-allow policy conditions in identity and resource policies
 Tailor identity-based policies to use named actions to resource names or tagged resources
 Specify resource-based policies for explicit identity-based roles and/or identity
principal tags, and/or to restrict to specific VPC endpoints or source IP addresses
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Policy evaluation logic
https://amzn.to/3CLktQQ
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Resource-based policy restrictions
{
...
"Statement": [
{
"Sid": "VPCe",
"Action": "s3:*",
"Effect": "Deny",
"Resource": [
"arn:aws:s3:::DOC-EXAMPLE-BUCKET",
"arn:aws:s3:::DOC-EXAMPLE-BUCKET/*”
],
"Condition": {
"StringNotEquals": {
"aws:SourceVpce": [ "vpce-1111111” ]
}
},
”Principal": "*"
}
]
}
{
...
"Statement": [
{
"Sid": ”SourceIP",
"Action": "s3:*",
"Effect": "Deny",
"Resource": [
"arn:aws:s3:::DOC-EXAMPLE-BUCKET",
"arn:aws:s3:::DOC-EXAMPLE-BUCKET/*”
],
"Condition": {
"NotIpAddress": {
"aws:SourceIP": [ "11.11.11.11/32” ]
}
},
”Principal": "*"
}
]
}
VPC source restriction Source IP restriction
https://amzn.to/2VObNIA
S3 Bucket
Policy
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unintended disclosure of security
credentials and secrets by customer
Detect
• Monitor for identity behavioral changes recorded in AWS CloudTrail events:
 GuardDuty IAM findings
 CloudTrail Insights for unusual mutating events
• Continuously evaluate IAM principal usage to reduce over-privileged access impact
 IAM Credential Report to disable and remove unused IAM user and access keys
 IAM Access Advisor to refine IAM principal permissions using last-accessed information to AWS services
 IAM Access Analyzer to adjust IAM principal permissions through its past actions from CloudTrail trail and identify
resources shared with an external entity
 IAM Policy Simulator to test and simulate actions for their effective permissions of identity-based policies, permission
boundaries, SCPs, and resource-based policies
• Implement application security scanning for static credentials and secrets to reduce disclosure
• Monitor your AWS account email address for AWS notifications of compromised credentials
https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example: Tools for least-access assessment
https://amzn.to/3CJZGwL
Use IAM access advisor
• Enabled per IAM principal by
default in IAM service
• Review which AWS services have
been used up to last 400 days
per IAM principal
Use IAM Access Analyzer to
generate least-access policy
• Requires CloudTrail trail is
enabled to Amazon S3
• Evaluates last 90 days of specific
IAM principal access from selected
CloudTrail trail S3 bucket
• Generates a suggested IAM policy
from evaluation to use
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inadvertent response to GuardDuty and other
detective controls by customer
Prevent and detect
• Tailor findings and detections to your threat models for criticality of data protection
https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html
• Use AWS Security Hub to aggregate, organize, review, and prioritize findings from AWS and
AWS Partners for further response, such as
Enabling GuardDuty detections of malicious activity and unauthorized behaviors from
CloudTrail management & data events, Amazon VPC Flow Logs, and Route 53 DNS logs
Enabling and reviewing AWS Security Hub findings from security checks of
standards and controls (i.e. CIS, PCI DSS, AWS Foundational)
Impacts ability for actionable incident response
• Mean times to detect, respond, and recover from a security event
• Increases scope of resources to triage and recover from security event
• Raises risk of data exfiltration and/or destruction as mean times increase to detect & respond
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Lack of continuous vulnerability management
executed by customer
Not maintaining software updates continuously – common sources of compromises
• Operating systems and their services
• Installed application software and their dependencies
• Continuous deployment and integration systems (CI/CD)
Exposing unmanaged systems and applications to public internet
• Open ports and applications with no inbound or outbound network restrictions
• Using default configuration of common applications and services
• Zero-day exploits against common applications
Prevent and detect
• Perform continuous vulnerability scanners against resources, source code, and network ports
Examples: Amazon Inspector, VPC Reachability Analyzer
• Implementing defense-in-depth approach to restrict discovery and exploitation
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Unmanaged application software security by
customer
Source of compromise when unmanaged leads to additional security issues
• For in-house, open-source, and acquired software
• For application software dependencies to build, install, and operate
Prevent and detect
• Implementing OWASP Top 10 controls for secure coding practices
• Apply static and dynamic analysis tools for application software security practice
• Mitigate risk through defense-in-depth approach to application design, network, and
identity controls
• Use third-party endpoint security clients to protect process-to-network executions
• Red team “trust, then verify” application software implementations to validate defense-in-depth
security controls to protect, detect, and respond
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Where to
go next
AWS account
Detect
Front-end application
Backend application
Public internet
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Core references
1. Top 10 security items to improve in your AWS account
https://amzn.to/3AA1RkT
2. Security Pillar – AWS Well-Architected Framework
https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/
3. AWS Security Reference Architecture (AWS SRA)
https://amzn.to/3jWjxk6
4. AWS Security Incident Response Guide
https://amzn.to/3xFXxP5
5. AWS Security Guides
https://docs.aws.amazon.com/security/
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Call to action: Top 10
1. Ensure you have a defined cloud security strategy and incident response plan,
including people, processes, and technology for cloud
2. Use business email distribution lists for AWS account contact information to
respond to AWS notifications
3. Configure backups plans with AWS Backup for critical resources and data, and
periodically verify and their order and priority for system restores
4. Ensure enablement of GuardDuty, AWS Config, Security Hub, CloudTrail, and
service access and audit logs for detection of security event observables
5. Use AWS Foundational Security Best Practices to continuously assess risks for
critical and high severities for common AWS resource misconfigurations
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Call to action: Top 10
6. Continuously assess for least-privileged access with IAM tools
7. Replace long-lived credentials with short-lived credentials to reduce risks of
security event impact and scope
8. Implement OWASP Top 10 – especially input validation and rate limits – for
applications within your code and with AWS services (e.g., AWS WAF)
9. Continuously patch to latest security patches for your OS, applications, and
dependencies
10. Routinely train and simulate for cloud security events to iterate and improve
Security is an iterative process, not a one-time project
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Brian Andrzejewski
bcandrze@amazon.com
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete
the session survey
© 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Contenu connexe

Tendances

AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
Simplilearn
 

Tendances (20)

AWS WAF
AWS WAFAWS WAF
AWS WAF
 
DDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS ShieldDDoS Mitigation Techniques and AWS Shield
DDoS Mitigation Techniques and AWS Shield
 
Amazon GuardDuty Lab
Amazon GuardDuty LabAmazon GuardDuty Lab
Amazon GuardDuty Lab
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
Secure your Web Applications with AWS Web Application Firewall (WAF) and AWS ...
 
AWS Storage Options
AWS Storage OptionsAWS Storage Options
AWS Storage Options
 
Introduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best PracticesIntroduction to AWS VPC, Guidelines, and Best Practices
Introduction to AWS VPC, Guidelines, and Best Practices
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
AWS Training For Beginners | AWS Certified Solutions Architect Tutorial | AWS...
 
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
Using Amazon VPC Flow Logs for Predictive Security Analytics (NET319) - AWS r...
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
AWS Cost Optimisation Solutions
AWS Cost Optimisation SolutionsAWS Cost Optimisation Solutions
AWS Cost Optimisation Solutions
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPC
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 

Similaire à AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident Response

Similaire à AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident Response (20)

Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณAWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud AndaAWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applicationsAWSome Day Online 2020_Module 4: Secure your cloud applications
AWSome Day Online 2020_Module 4: Secure your cloud applications
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 

Dernier

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Dernier (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
TrustArc Webinar - Unified Trust Center for Privacy, Security, Compliance, an...
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
AI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by AnitarajAI in Action: Real World Use Cases by Anitaraj
AI in Action: Real World Use Cases by Anitaraj
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
Introduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDMIntroduction to use of FHIR Documents in ABDM
Introduction to use of FHIR Documents in ABDM
 
How to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cfHow to Check CNIC Information Online with Pakdata cf
How to Check CNIC Information Online with Pakdata cf
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
AI+A11Y 11MAY2024 HYDERBAD GAAD 2024 - HelloA11Y (11 May 2024)
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
Modernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using BallerinaModernizing Legacy Systems Using Ballerina
Modernizing Legacy Systems Using Ballerina
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 

AWS reInforce 2021: TDR202 - Lessons learned from the front lines of Incident Response

  • 1. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. A U G . 2 4 – 2 5 , 2 0 2 1 | H O U S T O N , T X
  • 2. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Lessons learned from the front lines of incident response Brian “BasementCat” Andrzejewski T D R 2 0 2 Lead Operator, Customer Incident Response Team (CIRT) AWS Professional Services
  • 3. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Who we are Why we are here Common causes for customer security events Critical security patterns to reduce customer risks Where to go next Agenda
  • 4. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Who we are A specialized AWS Customer Incident Response team that assists and advises customers during their active security events on the customer’s side of the AWS Shared Responsibility Model Experienced team of AWS Professional Services and Solution Architects in incident response Assist in root cause analysis of a customer’s AWS service logs for their active security event Assist and advise customers with active triage & recovery of their security event on AWS Provide advise to customers for long-term recovery from their active security event
  • 5. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Available escalations during an AWS customer’s active security event 1. Validate AWS account ownership to customer(s) impacted 2. Assist with triage & recovery with customer and AWS teams 3. Investigate root cause(s) with customer for their event 4. Provide recommendations for next steps AWS support case (all tiers) AWS Account team AWS Security AWS Customer Incident Response Team (CIRT) External Internal AWS Customer Incident Response team Customer triage path
  • 6. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS shared responsibility model Customers and AWS Partners https://aws.amazon.com/compliance/shared-responsibility-model/ Security IN the cloud Managed by customers Security OF the cloud Managed by AWS
  • 7. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. The line varies. . . Hardware/AWS global infrastructure Compute/storage/ database/network Client-side data encryption/integrity Server-side encryption Network traffic protection OS, network, firewall Configuration Platform and application management Customer data AWS IAM Customer IAM Infrastructure services Client-side data encryption Network traffic protection Firewall configuration OS, network, firewall configuration Platform and application management Customer data Hardware/AWS global infrastructure Compute/storage/ database/network AWS IAM Customer IAM Container services Abstracted services Client-side data encryption Network traffic protection OS, network, firewall configuration Platform and application management Customer data Hardware/AWS global infrastructure Compute/storage/ database/network AWS IAM Customer IAM Server-side encryption More customizable + More customer responsibility Less customizable + Less customer responsibility + More best practices built in https://aws.amazon.com/whitepapers/aws-security-best-practices/
  • 8. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Additional AWS customer responsibilities All activities that occur under your account – including unauthorized access (4.1) Properly configuring and using an AWS service (4.3) Keeping AWS root account email current for notifications (13.10.a) Taking appropriate action to secure, protect, and back up your account and your content (4.3) Not disclosing login credentials and access keys to unauthorized third parties (4.4) https://aws.amazon.com/agreement/
  • 9. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why are we here? challenges 24/7 best practices seeking right AWS skillsets and knowledge share excel
  • 10. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS incident response methodology • Incident Response Phases  Prepare and prevent  Detect and assess impact  Triage and recovery  Investigate to root cause(s) • Improve and iterate  Develop people and technology  Update playbooks and runbooks  Simulate security events in environment  Apply lessons learned and iterate to improve https://docs.aws.amazon.com/whitepapers/latest/aws-security-incident-response-guide/
  • 11. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Common causes for customer security events
  • 12. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding the risk equation Threat actor: A cat that wants to scratch you Threat: The cat’s paw reaching out to scratch you Vulnerability: Your inability to defend against the scratch Risk: The likelihood of being scratched Acceptable risk: Your willingness to be scratched by the cat © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 13. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Gartner estimates that most cloud security failures will be IN the cloud on the user side Gartner “Is the Cloud Secure?” https://www.gartner.com/smarterwithgartner/is-the-cloud-secure/
  • 14. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Common causes for customer security events Insecure AWS resource configuration Inaccurate AWS account contact information Lack of continuous vulnerability management executed Unintended disclosure of security credentials and secrets Inadvertent response to Amazon GuardDuty and other detective controls Unmanaged application software security
  • 15. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Critical security patterns to reduce customer risks
  • 16. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementation goals and objectives Scenario-driven guidance to common root causes of security events • Grounded to real-world security events experienced by AWS customers • Prescriptive guidance on how prevent and detect by root cause Reduce customer’s security risks to their AWS accounts and its resources • Applicable to all AWS customers and their existing architectures • Core AWS services to start your security journey and iterate beyond • Prioritized to critical security practices observed to prevent and detect
  • 17. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Bill of materials Core AWS services AWS service tools AWS Organizations Amazon GuardDuty AWS Security Hub AWS CloudTrail AWS IAM Access Analyzer and advisor AWS IAM temporary security credential AWS Config AWS Personal Health Dashboard AWS Well-Architected Tool Amazon CloudWatch AWS Identity and Access Management (IAM) AWS Backup Amazon VPC Reachability Analyzer AWS Secrets Manager AWS IAM policy simulator
  • 18. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Inaccurate AWS account information by customer Prevent • Ensure AWS account email uses both  Corporate email domain (i.e., example.com)  Distribution email address • AWS account root user  Use IAM principals for day-to-day access  Eliminate use of root access keys  Use an MFA device for root console use Detect • Leverage CloudTrail and CloudWatch events to detect AWS account changes • Monitor your AWS notifications  AWS account email  AWS Health event alerts • Use AWS Cost Anomaly Detection for monitoring unusual AWS account costs Affects AWS account holder’s ability to • Act upon AWS-provided notifications that require timely resolution • Provide account owner verification during AWS account recovery process • Perform break-glass access for AWS account and during root user password reset
  • 19. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Insecure AWS resource configuration by customer Prevent • Enable public block for supported AWS services to restrict public access • Configure backups and validate restores with AWS Backup for critical resources and data • Use different IAM principals and roles to manage vs. operate AWS resources to reduce impacts • Deploy AWS resources into private VPCs to reduce unintended access • Implement AWS Organizations security control polices to restrict  Modify and delete AWS resource changes to system admin roles  AWS access key usage to restricted policy conditionals Critical configuration to focus on • AWS Foundational Security Best Practices with severity critical or high • Public-facing assets for defense-in-depth and restricted network access • Deny-then-allow authentication for AWS resources that contain sensitive data
  • 20. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Insecure AWS resource configuration by customer Detect • Enable Security Hub for all regions with AWS Foundational Security Best Practices to detect common AWS resource misconfigurations • Prioritize GuardDuty anomalous behavior findings for unexpected resources changes • Leverage AWS Config for recording and building inventory  AWS resources by name and service  Individual AWS resource configurations Critical configuration to focus on • AWS Foundational Security Best Practices with severity critical or high • Public-facing assets for defense-in-depth and restricted network access • Deny-then-allow authentication for AWS resources that contain sensitive data
  • 21. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unintended disclosure of security credentials and secrets by customer Prevent • Disable and delete all AWS account root access keys • Use temporary role-based access over static credentials and keys • Require MFA for your most sensitive operations and privileged access • Use Secrets Manager to vault and audit use of non-IAM credentials • Build identity-based and resource-based policies for least-privilege access to reduce impact of unintended access and disclosure  Use explicit deny-then-allow policy conditions in identity and resource policies  Tailor identity-based policies to use named actions to resource names or tagged resources  Specify resource-based policies for explicit identity-based roles and/or identity principal tags, and/or to restrict to specific VPC endpoints or source IP addresses
  • 22. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Policy evaluation logic https://amzn.to/3CLktQQ
  • 23. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Resource-based policy restrictions { ... "Statement": [ { "Sid": "VPCe", "Action": "s3:*", "Effect": "Deny", "Resource": [ "arn:aws:s3:::DOC-EXAMPLE-BUCKET", "arn:aws:s3:::DOC-EXAMPLE-BUCKET/*” ], "Condition": { "StringNotEquals": { "aws:SourceVpce": [ "vpce-1111111” ] } }, ”Principal": "*" } ] } { ... "Statement": [ { "Sid": ”SourceIP", "Action": "s3:*", "Effect": "Deny", "Resource": [ "arn:aws:s3:::DOC-EXAMPLE-BUCKET", "arn:aws:s3:::DOC-EXAMPLE-BUCKET/*” ], "Condition": { "NotIpAddress": { "aws:SourceIP": [ "11.11.11.11/32” ] } }, ”Principal": "*" } ] } VPC source restriction Source IP restriction https://amzn.to/2VObNIA S3 Bucket Policy
  • 24. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unintended disclosure of security credentials and secrets by customer Detect • Monitor for identity behavioral changes recorded in AWS CloudTrail events:  GuardDuty IAM findings  CloudTrail Insights for unusual mutating events • Continuously evaluate IAM principal usage to reduce over-privileged access impact  IAM Credential Report to disable and remove unused IAM user and access keys  IAM Access Advisor to refine IAM principal permissions using last-accessed information to AWS services  IAM Access Analyzer to adjust IAM principal permissions through its past actions from CloudTrail trail and identify resources shared with an external entity  IAM Policy Simulator to test and simulate actions for their effective permissions of identity-based policies, permission boundaries, SCPs, and resource-based policies • Implement application security scanning for static credentials and secrets to reduce disclosure • Monitor your AWS account email address for AWS notifications of compromised credentials https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  • 25. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example: Tools for least-access assessment https://amzn.to/3CJZGwL Use IAM access advisor • Enabled per IAM principal by default in IAM service • Review which AWS services have been used up to last 400 days per IAM principal Use IAM Access Analyzer to generate least-access policy • Requires CloudTrail trail is enabled to Amazon S3 • Evaluates last 90 days of specific IAM principal access from selected CloudTrail trail S3 bucket • Generates a suggested IAM policy from evaluation to use
  • 26. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Inadvertent response to GuardDuty and other detective controls by customer Prevent and detect • Tailor findings and detections to your threat models for criticality of data protection https://cheatsheetseries.owasp.org/cheatsheets/Threat_Modeling_Cheat_Sheet.html • Use AWS Security Hub to aggregate, organize, review, and prioritize findings from AWS and AWS Partners for further response, such as Enabling GuardDuty detections of malicious activity and unauthorized behaviors from CloudTrail management & data events, Amazon VPC Flow Logs, and Route 53 DNS logs Enabling and reviewing AWS Security Hub findings from security checks of standards and controls (i.e. CIS, PCI DSS, AWS Foundational) Impacts ability for actionable incident response • Mean times to detect, respond, and recover from a security event • Increases scope of resources to triage and recover from security event • Raises risk of data exfiltration and/or destruction as mean times increase to detect & respond
  • 27. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Lack of continuous vulnerability management executed by customer Not maintaining software updates continuously – common sources of compromises • Operating systems and their services • Installed application software and their dependencies • Continuous deployment and integration systems (CI/CD) Exposing unmanaged systems and applications to public internet • Open ports and applications with no inbound or outbound network restrictions • Using default configuration of common applications and services • Zero-day exploits against common applications Prevent and detect • Perform continuous vulnerability scanners against resources, source code, and network ports Examples: Amazon Inspector, VPC Reachability Analyzer • Implementing defense-in-depth approach to restrict discovery and exploitation
  • 28. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Unmanaged application software security by customer Source of compromise when unmanaged leads to additional security issues • For in-house, open-source, and acquired software • For application software dependencies to build, install, and operate Prevent and detect • Implementing OWASP Top 10 controls for secure coding practices • Apply static and dynamic analysis tools for application software security practice • Mitigate risk through defense-in-depth approach to application design, network, and identity controls • Use third-party endpoint security clients to protect process-to-network executions • Red team “trust, then verify” application software implementations to validate defense-in-depth security controls to protect, detect, and respond
  • 29. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Where to go next AWS account Detect Front-end application Backend application Public internet
  • 30. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Core references 1. Top 10 security items to improve in your AWS account https://amzn.to/3AA1RkT 2. Security Pillar – AWS Well-Architected Framework https://docs.aws.amazon.com/wellarchitected/latest/security-pillar/ 3. AWS Security Reference Architecture (AWS SRA) https://amzn.to/3jWjxk6 4. AWS Security Incident Response Guide https://amzn.to/3xFXxP5 5. AWS Security Guides https://docs.aws.amazon.com/security/
  • 31. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Call to action: Top 10 1. Ensure you have a defined cloud security strategy and incident response plan, including people, processes, and technology for cloud 2. Use business email distribution lists for AWS account contact information to respond to AWS notifications 3. Configure backups plans with AWS Backup for critical resources and data, and periodically verify and their order and priority for system restores 4. Ensure enablement of GuardDuty, AWS Config, Security Hub, CloudTrail, and service access and audit logs for detection of security event observables 5. Use AWS Foundational Security Best Practices to continuously assess risks for critical and high severities for common AWS resource misconfigurations
  • 32. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Call to action: Top 10 6. Continuously assess for least-privileged access with IAM tools 7. Replace long-lived credentials with short-lived credentials to reduce risks of security event impact and scope 8. Implement OWASP Top 10 – especially input validation and rate limits – for applications within your code and with AWS services (e.g., AWS WAF) 9. Continuously patch to latest security patches for your OS, applications, and dependencies 10. Routinely train and simulate for cloud security events to iterate and improve Security is an iterative process, not a one-time project
  • 33. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank you! © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Brian Andrzejewski bcandrze@amazon.com
  • 34. © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey © 2021, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Notes de l'éditeur

  1. In our Security Best Practices whitepaper it’s been broken down into 3 categories Infrastructure Services – Where everything from the operating system upwards is on the customer – example EC2 Container Services – not to be confused with the likes of Kubernetes/Docker, AWS handles the OS and the platform running on it – and the rest is the customer – example RDS, ECS Abstracted Services – where the customer just needs to decide where their data goes, who has access to it – and if client-side encryption is used – example S3
  2. SOURCE: https://1n0xpcas37.execute-api.us-west-2.amazonaws.com/Prod/assets/22a90603-3601-4b8d-9aad-b649f05fbc91
  3. AWS account and resource best practices: https://aws.amazon.com/premiumsupport/knowledge-center/security-best-practices/ AWS Account email reset: https://aws.amazon.com/premiumsupport/knowledge-center/admin-left-need-acct-access/ AWS Health events: https://docs.aws.amazon.com/health/latest/ug/cloudwatch-events-health.html Billing Alarms: https://aws.amazon.com/blogs/aws-cost-management/preview-anomaly-detection-and-alerting-now-available-in-aws-cost-management/
  4. AWS Secrets Manager – Creating and retrieving a secret: https://docs.aws.amazon.com/secretsmanager/latest/userguide/tutorials_basic.html Security best practices in IAM https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html
  5. GuardDuty IAM findings https://docs.aws.amazon.com/guardduty/latest/ug/guardduty_finding-types-iam.html CloudTrail insights: https://aws.amazon.com/about-aws/whats-new/2019/11/aws-cloudtrail-announces-cloudtrail-insights/ IAM Credential Report: https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_getting-report.html IAM Access Advisor: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_access-advisor.html IAM Access Analyzer: https://docs.aws.amazon.com/IAM/latest/UserGuide/what-is-access-analyzer.html IAM Policy Simulator: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html
  6. AWS Git-secrets https://github.com/awslabs/git-secrets GitRob (no longer being updated) https://github.com/michenriksen/gitrob Trufflehog https://github.com/trufflesecurity/truffleHog