SlideShare une entreprise Scribd logo
1  sur  55
Operational Complexity:
The Biggest Security Threat to
Your AWS Environment
Security is kind of
a big deal…
We’ve all got them.
Are we doing the right thing to secure
them?
ON-PREMISESIN THE CLOUD HYBRID ENVIRONMENTS
And it’s no
different in AWS
Managing tightly-
controlled user access
in AWS is too complex.
But it’s hard.
And complexity
leads to errors and
sloppiness.
Why is it
so complex?
There are 6 main reasons
User access is IP-centric, and
their IP addresses change
Predicting where those users are
going to be when accessing your
network is a very big challenge; and
almost impossible if you have a
mobile workforce.
1
Think office to home, to mobile, to a coffee shop, to a plane…
Dynamic environments cause
extra administrative burdens2
As virtual machines and services
within AWS are spun up, expanded
or contracted, being able to
dynamically allocate security policies
to these resources becomes a real
challenge.
Complexity leads to shortcuts3
A lot of the time shortcuts are taken
that compromise the security
posture in the footprint of a
particular environment.
Forced use of VPN connectivity
to manage access control4
And it can create performance issues
for your end users and force
unnecessary hops from environment
to environment just to ensure that
people are coming at the
environment from appropriate
locations.
If you’re at all into the
networking space within
your organization, you know
that the use of VPNs is also
not a trivial task.
VPN
Logging correlation
complexities5
So when it comes to audit and
compliance, you have a
tremendously difficult task on your
hands to correlate these logs and
figure out who is doing what, who is
accessing which application, what
time of day and under what context
they are doing it.
All of this hopping around and all
of these different technologies
lead to logging correlation issues.
Shared AWS
responsibility model6
Do you know where AWS’s
responsibility for the cloud
ends – and yours begins?
Compute Storage Database Networking
AWS Global Infrastructure
Regions Availability Zones Edge Locations
https://aws.amazon.com/compliance/shared-responsibility-model
AWS Shared Responsibility Model
AWS is
responsible for this…
Responsible
for security
‘of’ the cloud
Customer Data
Platform, Apps, Identity & Access Management
OS, Network & Firewall Configuration
Client-Side Data
Encryption and Data
Integrity Authentication
Server-Side
Encryption (File
System and/or Data)
Network Traffic
Protection
(Encryption/
Integrity/Integrity)
Customer
Responsible for
security ‘in’ the
cloud
And you’re
responsible for this…
Anytime you take advantage of
the resources and build virtual
machines, deploy data into S3
buckets or use a feature like AWS
Snowball to push data into the
environment, security becomes
your responsibility.
Anything in the
cloud is your
responsibility
AWS gives you tools,
but you have to implement them.
AWS’s responsibility ends with the physical
components of the cloud…the data center, the
servers, the storage.
You are responsible for everything that leverages
those physical components – all the configured
services, data, deployed applications. This
includes network access security.
Security
Groups
So we turn to
You can use
Security Groups,
but they introduce
operational complexity
with negative consequences.
We either give
wide-open access
and end up with this…
No
accountability/
visibility
Increased risk
of security
breaches
Managing
compliance is
virtually impossible
Or
tightly controlled access
and end up with this…
Reduced
business agility
Friction for
DevOps
Inefficient
approval process
Consider
this scenario
Security
Groups
Four users access the
Amazon environment from
a known source.
1
73.68.25.22124
Their public IP address is
the known source. The
security groups are
configured appropriately.
2
Security
Groups
Four users access the
Amazon environment from
a known source.
1
73.68.25.22124
The challenge is when
users try to access from
other locations.
73.68.25.22124
Security
Groups
Security
Groups
Do you:
Allow
wide open
access from
anywhere?
73.68.25.22124
Or tightly control
access – force
users to VPN into a
known office and
through a 73 dot
IP address?
There’s a
better way
to do it.
It’s called a
Software-Defined
Perimeter
A Software-Defined Perimeter gives
every user on your network –
whether an internal employee or a third-party
working for you – an individualized perimeter
around themselves and the network resources
that they’re allowed to access.
And it’s a
big deal
Industry experts
suggest using it
Legacy, perimeter-based
security models are ineffective
against attacks. Security and risk
pros must make security
ubiquitous throughout the
ecosystem.”
“
It is easier and less costly
to deploy than firewalls,
VPN concentrators and
other bolt-in technologies.”
SDP enables organizations to
provide people-centric,
manageable, secure and agile
access to networked systems.
“
“
A Software-Defined Perimeter gives you:
Individualized perimeters for each user –
a Segment of One
A Software-Defined Perimeter gives you:
Fine-grained authorization to on-premises and cloud
A Software-Defined Perimeter gives you:
Context-aware driven authentication, then access
A Software-Defined Perimeter gives you:
Simpler firewall and security group rules
A Software-Defined Perimeter gives you:
Dynamic authorization adjusting to the user to access
new cloud server instances
A Software-Defined Perimeter gives you:
Consistent access policies across heterogeneous
environments
A Software-Defined Perimeter
puts the person back into the
security model.
… by taking the source IP
concept out of the equation.
The person, their identity,
the device they’re on,
the network they’re
connected to, and just about
anything else you could think
of to analyze before you allow
access resources on your
network, is checked.
73.68.25.22124
Once a person is authorized to view
resources, everything else on the
network becomes invisible.
Cryptzone delivers a
Software-Defined
Perimeter Solution
for AWS
Digital
Identity
AppGate
Imagine a user wants to access the company’s ERP system
Managed Networks
Cloud, On-premises or Hybrid
V
Secured
Email
ERP
CRM Group
File Share
Executive
Files
Enterpris
e Finance
EXEC_S
ERVER
SharePoint
AppGate
Digital
Identity
First we look at both context and identity.
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATION: OFFICEAPPLICATION
PERMISSIONS
AppGate
Digital
Identity
We confirm it matches your policies before granting access.
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATION: OFFICEAPPLICATION
PERMISSIONS
Managed Networks
Cloud, On-premises or Hybrid
V
Secured
Email
ERP
CRM Group
File Share
Executive
Files
Enterpris
e Finance
EXEC_S
ERVER
SharePoint
Digital
Identity
We then create a dynamic
Segment of One
(1:1 firewall rule).
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATION: OFFICEAPPLICATION
PERMISSIONS
ENCRYPTED & LOGGED
AppGate
And make everything else (the
applications and the rest of the
network) invisible to the user.
Digital
Identity
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
APPLICATION
PERMISSIONS
ENCRYPTED & LOGGED
AppGate
Managed Networks
Cloud, On-premises or Hybrid
ERP
LOCATION: OFFICE
Digital
Identity
And if the user goes home and wants to
continue working, AppGate automatically checks
“user-context” again, and applies the correct
“home-based” policy.
DEVICE TIME
CUSTOM
ATTRIBUTES
ANTI-VIRUS
LOCATION: HOMEAPPLICATION
PERMISSIONS
ENCRYPTED & LOGGED
AppGate
Managed Networks
Cloud, On-premises or Hybrid
ERP
The result?
Locked-down secured access to
AWS resources that is operationally
simple to manage and maintain.
Let’s look at this more closely…
Current Model
AWS Security Groups
We all know about AWS Security
Groups. The current Security
Group model is complicated and
unpredictable.
AWS Security Groups & AppGate
Using AppGate, there are multiple gateways, protecting multiple
cloud providers with split functionality.
Current Model
AWS Security Groups & AppGate
AppGate defines protected destinations, called Entitlements and protects
simple IP addresses and ports, but also ranges of IP addresses and Ports,
AWS Tag and Values as well as AWS Security Group names.
Current Model
AWS Security Groups & AppGate
AppGate offers a new Security Model inside AWS, redefining the Security Group so that
protected destinations allow traffic only from the AppGate Gateway, ensuring all users
access those resources through the contextual controls provided by AppGate.
AppGate Model
AWS Security Groups & AppGate
Authentication Policy
• If users are on corporate
network allow Single-
Factor Authentication
• If users are not on
corporate network require
Multi-Factor
Authentication
POLICY
Device Policy
• Allow access if Anti-
Virus is running
• Allow access if Device
Firewall is enabled
• Allow access if OS patch
level is current
POLICYPOLICY
Developer Access Policy
• Allow TCP Access
• On Port 22
• For all servers tagged
Dev-Project
• If users are in group
Development
Users are tied to the entitlements through Policies where we can enforce contextual
awareness before allowing specific users access to specific entitlements. This
combination allows us to get very granular on who can access what and under what
circumstances.
Because there is just
one IP address,
managing security
just got easier.
AppGate Model
Access policies across
hybrid environments
are consistent
Access is tightly secured
with a Segment
of One
Compliance
reporting is
easier and faster
Operational
agility is boosted
DevOps can
work faster
Infrastructure changes
are dynamically
protected
AppGate from Cryptzone provides user
control, operational agility and compliance
Sally M
Developer
Project Eagle
Charlie S
DB Admin
Joe R
Developer
Project Hawk
Coffee Shop
Consultant
Enterprise Headquarters
AWS Security…
Simplified!
User-centric security
policies…because
people are not IP addresses
Learn more about AppGate
AWS Security
Simplify, Scale, &
Secure User Access
WEBINAR
The Zero Trust Model of
Information Security
WHITEPAPER
Forrest Report
No More Chewy
Centers:
AppGate
VIDEO
FREE TRIAL | START NOW
Email: info@cryptzone.com
Twitter: @Cryptzone
LinkedIn:
linkedin.com/company/cryptzone
GET IN TOUCH
Get access to a 15 day free
trial on AWS marketplace.
Would you like
to know more?
Paul Campaniello
Chief Marketing Officer
Cryptzone

Contenu connexe

Tendances

The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforcePerimeter 81
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterVishwas Manral
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Government Technology & Services Coalition
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskCyxtera Technologies
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)Robb Boyd
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trustZscaler
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and predictionVishwas Manral
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Amazon Web Services
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without FirewallsPriyanka Aash
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Samrat Das
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISERobb Boyd
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'tsMinded Security
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceGaurav "GP" Pal
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Priyanka Aash
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security BrokersAbhishek Tripathi
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudScientia Groups
 

Tendances (20)

The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern WorkforceThe Software-Defined Perimeter: Securing Network Access for the Modern Workforce
The Software-Defined Perimeter: Securing Network Access for the Modern Workforce
 
CSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined PerimeterCSA Presentation - Software Defined Perimeter
CSA Presentation - Software Defined Perimeter
 
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
Software Defined Perimeter - A New Paradigm for Securing Digital Infrastructu...
 
How VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at RiskHow VPNs and Firewalls Put Your Organization at Risk
How VPNs and Firewalls Put Your Organization at Risk
 
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
TechWiseTV Workshop: Cisco ISE 2.1 (Identity Services Engine)
 
How sdp delivers_zero_trust
How sdp delivers_zero_trustHow sdp delivers_zero_trust
How sdp delivers_zero_trust
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
AWS Security
AWS Security AWS Security
AWS Security
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
How Google Protects Its Corporate Security Perimeter without Firewalls
How Google Protects Its Corporate  Security Perimeter without FirewallsHow Google Protects Its Corporate  Security Perimeter without Firewalls
How Google Protects Its Corporate Security Perimeter without Firewalls
 
Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB Cloud Access Security Brokers - CASB
Cloud Access Security Brokers - CASB
 
TechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISETechWiseTV Workshop: Cisco Stealthwatch and ISE
TechWiseTV Workshop: Cisco Stealthwatch and ISE
 
Microservices Security: dos and don'ts
Microservices Security: dos and don'tsMicroservices Security: dos and don'ts
Microservices Security: dos and don'ts
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
Detecting Malicious Cloud Account Behavior: A Look at the New Native Platform...
 
Azure security basics
Azure security basicsAzure security basics
Azure security basics
 
Cloud Access Security Brokers
Cloud Access Security BrokersCloud Access Security Brokers
Cloud Access Security Brokers
 
Projecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the CloudProjecting Enterprise Security Requirements on the Cloud
Projecting Enterprise Security Requirements on the Cloud
 

Similaire à Operational Complexity: The Biggest Security Threat to Your AWS Environment

Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stackRishabh Agarwal
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDSweta Kumari Barnwal
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfProtelion
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markryAmazon Web Services LATAM
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGEditor IJMTER
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and servicesJas Preet
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...Amazon Web Services
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013STO STRATEGY
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigmfanc1985
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing securityRandall Spence
 

Similaire à Operational Complexity: The Biggest Security Threat to Your AWS Environment (20)

Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 
zscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdfzscaler-aws-zero-trust.pdf
zscaler-aws-zero-trust.pdf
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
Implementing security groups in open stack
Implementing security groups in open stackImplementing security groups in open stack
Implementing security groups in open stack
 
Module 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUDModule 5-cloud computing-SECURITY IN THE CLOUD
Module 5-cloud computing-SECURITY IN THE CLOUD
 
UNIT -V.docx
UNIT -V.docxUNIT -V.docx
UNIT -V.docx
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
CLOUD COMPUTING.pdf
CLOUD COMPUTING.pdfCLOUD COMPUTING.pdf
CLOUD COMPUTING.pdf
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARINGSURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
SURVEY ON KEY AGGREGATE CRYPTOSYSTEM FOR SCALABLE DATA SHARING
 
Cloud security and services
Cloud security and servicesCloud security and services
Cloud security and services
 
Cloud Computing
Cloud ComputingCloud Computing
Cloud Computing
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013(Pdf) yury chemerkin _i-society_2013
(Pdf) yury chemerkin _i-society_2013
 
Effectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing ParadigmEffectively and Securely Using the Cloud Computing Paradigm
Effectively and Securely Using the Cloud Computing Paradigm
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
How to implement cloud computing security
How to implement cloud computing securityHow to implement cloud computing security
How to implement cloud computing security
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 

Dernier

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEOrtus Solutions, Corp
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVshikhaohhpro
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsAlberto González Trastoy
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number SystemsJheuzeDellosa
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...OnePlan Solutions
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxComplianceQuest1
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideChristina Lin
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...ICS
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Modelsaagamshah0812
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptkotipi9215
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...aditisharan08
 

Dernier (20)

BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASEBATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
BATTLEFIELD ORM: TIPS, TACTICS AND STRATEGIES FOR CONQUERING YOUR DATABASE
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Optimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTVOptimizing AI for immediate response in Smart CCTV
Optimizing AI for immediate response in Smart CCTV
 
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time ApplicationsUnveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
Unveiling the Tech Salsa of LAMs with Janus in Real-Time Applications
 
What is Binary Language? Computer Number Systems
What is Binary Language?  Computer Number SystemsWhat is Binary Language?  Computer Number Systems
What is Binary Language? Computer Number Systems
 
Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...Advancing Engineering with AI through the Next Generation of Strategic Projec...
Advancing Engineering with AI through the Next Generation of Strategic Projec...
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
A Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docxA Secure and Reliable Document Management System is Essential.docx
A Secure and Reliable Document Management System is Essential.docx
 
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop SlideBuilding Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
Building Real-Time Data Pipelines: Stream & Batch Processing workshop Slide
 
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
The Real-World Challenges of Medical Device Cybersecurity- Mitigating Vulnera...
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Unlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language ModelsUnlocking the Future of AI Agents with Large Language Models
Unlocking the Future of AI Agents with Large Language Models
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
chapter--4-software-project-planning.ppt
chapter--4-software-project-planning.pptchapter--4-software-project-planning.ppt
chapter--4-software-project-planning.ppt
 
Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...Unit 1.1 Excite Part 1, class 9, cbse...
Unit 1.1 Excite Part 1, class 9, cbse...
 

Operational Complexity: The Biggest Security Threat to Your AWS Environment

  • 1. Operational Complexity: The Biggest Security Threat to Your AWS Environment
  • 2. Security is kind of a big deal… We’ve all got them. Are we doing the right thing to secure them? ON-PREMISESIN THE CLOUD HYBRID ENVIRONMENTS
  • 3. And it’s no different in AWS Managing tightly- controlled user access in AWS is too complex. But it’s hard. And complexity leads to errors and sloppiness.
  • 4. Why is it so complex? There are 6 main reasons
  • 5. User access is IP-centric, and their IP addresses change Predicting where those users are going to be when accessing your network is a very big challenge; and almost impossible if you have a mobile workforce. 1 Think office to home, to mobile, to a coffee shop, to a plane…
  • 6. Dynamic environments cause extra administrative burdens2 As virtual machines and services within AWS are spun up, expanded or contracted, being able to dynamically allocate security policies to these resources becomes a real challenge.
  • 7. Complexity leads to shortcuts3 A lot of the time shortcuts are taken that compromise the security posture in the footprint of a particular environment.
  • 8. Forced use of VPN connectivity to manage access control4 And it can create performance issues for your end users and force unnecessary hops from environment to environment just to ensure that people are coming at the environment from appropriate locations. If you’re at all into the networking space within your organization, you know that the use of VPNs is also not a trivial task. VPN
  • 9. Logging correlation complexities5 So when it comes to audit and compliance, you have a tremendously difficult task on your hands to correlate these logs and figure out who is doing what, who is accessing which application, what time of day and under what context they are doing it. All of this hopping around and all of these different technologies lead to logging correlation issues.
  • 10. Shared AWS responsibility model6 Do you know where AWS’s responsibility for the cloud ends – and yours begins?
  • 11. Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations https://aws.amazon.com/compliance/shared-responsibility-model AWS Shared Responsibility Model AWS is responsible for this… Responsible for security ‘of’ the cloud
  • 12. Customer Data Platform, Apps, Identity & Access Management OS, Network & Firewall Configuration Client-Side Data Encryption and Data Integrity Authentication Server-Side Encryption (File System and/or Data) Network Traffic Protection (Encryption/ Integrity/Integrity) Customer Responsible for security ‘in’ the cloud And you’re responsible for this…
  • 13. Anytime you take advantage of the resources and build virtual machines, deploy data into S3 buckets or use a feature like AWS Snowball to push data into the environment, security becomes your responsibility. Anything in the cloud is your responsibility AWS gives you tools, but you have to implement them. AWS’s responsibility ends with the physical components of the cloud…the data center, the servers, the storage. You are responsible for everything that leverages those physical components – all the configured services, data, deployed applications. This includes network access security.
  • 15. You can use Security Groups, but they introduce operational complexity with negative consequences.
  • 16. We either give wide-open access and end up with this… No accountability/ visibility Increased risk of security breaches Managing compliance is virtually impossible
  • 17. Or tightly controlled access and end up with this… Reduced business agility Friction for DevOps Inefficient approval process
  • 19. Security Groups Four users access the Amazon environment from a known source. 1 73.68.25.22124
  • 20. Their public IP address is the known source. The security groups are configured appropriately. 2 Security Groups Four users access the Amazon environment from a known source. 1 73.68.25.22124
  • 21. The challenge is when users try to access from other locations. 73.68.25.22124 Security Groups
  • 22. Security Groups Do you: Allow wide open access from anywhere? 73.68.25.22124 Or tightly control access – force users to VPN into a known office and through a 73 dot IP address?
  • 25. A Software-Defined Perimeter gives every user on your network – whether an internal employee or a third-party working for you – an individualized perimeter around themselves and the network resources that they’re allowed to access.
  • 27. Industry experts suggest using it Legacy, perimeter-based security models are ineffective against attacks. Security and risk pros must make security ubiquitous throughout the ecosystem.” “ It is easier and less costly to deploy than firewalls, VPN concentrators and other bolt-in technologies.” SDP enables organizations to provide people-centric, manageable, secure and agile access to networked systems. “ “
  • 28. A Software-Defined Perimeter gives you: Individualized perimeters for each user – a Segment of One
  • 29. A Software-Defined Perimeter gives you: Fine-grained authorization to on-premises and cloud
  • 30. A Software-Defined Perimeter gives you: Context-aware driven authentication, then access
  • 31. A Software-Defined Perimeter gives you: Simpler firewall and security group rules
  • 32. A Software-Defined Perimeter gives you: Dynamic authorization adjusting to the user to access new cloud server instances
  • 33. A Software-Defined Perimeter gives you: Consistent access policies across heterogeneous environments
  • 34. A Software-Defined Perimeter puts the person back into the security model. … by taking the source IP concept out of the equation.
  • 35. The person, their identity, the device they’re on, the network they’re connected to, and just about anything else you could think of to analyze before you allow access resources on your network, is checked. 73.68.25.22124
  • 36. Once a person is authorized to view resources, everything else on the network becomes invisible.
  • 38. Digital Identity AppGate Imagine a user wants to access the company’s ERP system Managed Networks Cloud, On-premises or Hybrid V Secured Email ERP CRM Group File Share Executive Files Enterpris e Finance EXEC_S ERVER SharePoint
  • 39. AppGate Digital Identity First we look at both context and identity. DEVICE TIME CUSTOM ATTRIBUTES ANTI-VIRUS LOCATION: OFFICEAPPLICATION PERMISSIONS
  • 40. AppGate Digital Identity We confirm it matches your policies before granting access. DEVICE TIME CUSTOM ATTRIBUTES ANTI-VIRUS LOCATION: OFFICEAPPLICATION PERMISSIONS
  • 41. Managed Networks Cloud, On-premises or Hybrid V Secured Email ERP CRM Group File Share Executive Files Enterpris e Finance EXEC_S ERVER SharePoint Digital Identity We then create a dynamic Segment of One (1:1 firewall rule). DEVICE TIME CUSTOM ATTRIBUTES ANTI-VIRUS LOCATION: OFFICEAPPLICATION PERMISSIONS ENCRYPTED & LOGGED AppGate
  • 42. And make everything else (the applications and the rest of the network) invisible to the user. Digital Identity DEVICE TIME CUSTOM ATTRIBUTES ANTI-VIRUS APPLICATION PERMISSIONS ENCRYPTED & LOGGED AppGate Managed Networks Cloud, On-premises or Hybrid ERP LOCATION: OFFICE
  • 43. Digital Identity And if the user goes home and wants to continue working, AppGate automatically checks “user-context” again, and applies the correct “home-based” policy. DEVICE TIME CUSTOM ATTRIBUTES ANTI-VIRUS LOCATION: HOMEAPPLICATION PERMISSIONS ENCRYPTED & LOGGED AppGate Managed Networks Cloud, On-premises or Hybrid ERP
  • 44. The result? Locked-down secured access to AWS resources that is operationally simple to manage and maintain. Let’s look at this more closely…
  • 45. Current Model AWS Security Groups We all know about AWS Security Groups. The current Security Group model is complicated and unpredictable.
  • 46. AWS Security Groups & AppGate Using AppGate, there are multiple gateways, protecting multiple cloud providers with split functionality. Current Model
  • 47. AWS Security Groups & AppGate AppGate defines protected destinations, called Entitlements and protects simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names. Current Model
  • 48. AWS Security Groups & AppGate AppGate offers a new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate Gateway, ensuring all users access those resources through the contextual controls provided by AppGate. AppGate Model
  • 49. AWS Security Groups & AppGate Authentication Policy • If users are on corporate network allow Single- Factor Authentication • If users are not on corporate network require Multi-Factor Authentication POLICY Device Policy • Allow access if Anti- Virus is running • Allow access if Device Firewall is enabled • Allow access if OS patch level is current POLICYPOLICY Developer Access Policy • Allow TCP Access • On Port 22 • For all servers tagged Dev-Project • If users are in group Development Users are tied to the entitlements through Policies where we can enforce contextual awareness before allowing specific users access to specific entitlements. This combination allows us to get very granular on who can access what and under what circumstances.
  • 50. Because there is just one IP address, managing security just got easier. AppGate Model
  • 51. Access policies across hybrid environments are consistent Access is tightly secured with a Segment of One Compliance reporting is easier and faster Operational agility is boosted DevOps can work faster Infrastructure changes are dynamically protected AppGate from Cryptzone provides user control, operational agility and compliance
  • 52. Sally M Developer Project Eagle Charlie S DB Admin Joe R Developer Project Hawk Coffee Shop Consultant Enterprise Headquarters AWS Security… Simplified! User-centric security policies…because people are not IP addresses
  • 53. Learn more about AppGate AWS Security Simplify, Scale, & Secure User Access WEBINAR The Zero Trust Model of Information Security WHITEPAPER Forrest Report No More Chewy Centers: AppGate VIDEO
  • 54. FREE TRIAL | START NOW Email: info@cryptzone.com Twitter: @Cryptzone LinkedIn: linkedin.com/company/cryptzone GET IN TOUCH Get access to a 15 day free trial on AWS marketplace. Would you like to know more?
  • 55. Paul Campaniello Chief Marketing Officer Cryptzone

Notes de l'éditeur

  1. Individual perimeters Fine grained control Contextual awareness Simplified security group rules Dynamic Adjustments based on Tags or Security Group names Consistent access, logging and control across heterogeneous environments
  2. Individual perimeters Fine grained control Contextual awareness Simplified security group rules Dynamic Adjustments based on Tags or Security Group names Consistent access, logging and control across heterogeneous environments
  3. On clicks: We all know about AWS Security Groups <click> Security Group before AppGate: complicated, can’t predict all sources. A mess. <click> Introduce AppGate. <click> Notice multiple gateways, protecting multiple cloud providers, split functionality <click> Next, we define protected destinations, called Entitlements. <click> Notice, we can protect simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names <click> That allows us to introduce a whole new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate gateway, ensuring all users access those resources through the contextual controls provided by AppGate. <click> And finally, we tie the users to the entitlements through Policies where we can enforce contextual awareness before allowing access to specific users to specific entitlements. <click> This combination allows us to get very granular on who can access what and under what circumstances.
  4. On clicks: We all know about AWS Security Groups <click> Security Group before AppGate: complicated, can’t predict all sources. A mess. <click> Introduce AppGate. <click> Notice multiple gateways, protecting multiple cloud providers, split functionality <click> Next, we define protected destinations, called Entitlements. <click> Notice, we can protect simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names <click> That allows us to introduce a whole new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate gateway, ensuring all users access those resources through the contextual controls provided by AppGate. <click> And finally, we tie the users to the entitlements through Policies where we can enforce contextual awareness before allowing access to specific users to specific entitlements. <click> This combination allows us to get very granular on who can access what and under what circumstances.
  5. On clicks: We all know about AWS Security Groups <click> Security Group before AppGate: complicated, can’t predict all sources. A mess. <click> Introduce AppGate. <click> Notice multiple gateways, protecting multiple cloud providers, split functionality <click> Next, we define protected destinations, called Entitlements. <click> Notice, we can protect simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names <click> That allows us to introduce a whole new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate gateway, ensuring all users access those resources through the contextual controls provided by AppGate. <click> And finally, we tie the users to the entitlements through Policies where we can enforce contextual awareness before allowing access to specific users to specific entitlements. <click> This combination allows us to get very granular on who can access what and under what circumstances.
  6. On clicks: We all know about AWS Security Groups <click> Security Group before AppGate: complicated, can’t predict all sources. A mess. <click> Introduce AppGate. <click> Notice multiple gateways, protecting multiple cloud providers, split functionality <click> Next, we define protected destinations, called Entitlements. <click> Notice, we can protect simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names <click> That allows us to introduce a whole new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate gateway, ensuring all users access those resources through the contextual controls provided by AppGate. <click> And finally, we tie the users to the entitlements through Policies where we can enforce contextual awareness before allowing access to specific users to specific entitlements. <click> This combination allows us to get very granular on who can access what and under what circumstances.
  7. On clicks: We all know about AWS Security Groups <click> Security Group before AppGate: complicated, can’t predict all sources. A mess. <click> Introduce AppGate. <click> Notice multiple gateways, protecting multiple cloud providers, split functionality <click> Next, we define protected destinations, called Entitlements. <click> Notice, we can protect simple IP addresses and ports, but also ranges of IP addresses and Ports, AWS Tag and Values as well as AWS Security Group names <click> That allows us to introduce a whole new Security Model inside AWS, redefining the Security Group so that protected destinations allow traffic only from the AppGate gateway, ensuring all users access those resources through the contextual controls provided by AppGate. <click> And finally, we tie the users to the entitlements through Policies where we can enforce contextual awareness before allowing access to specific users to specific entitlements. <click> This combination allows us to get very granular on who can access what and under what circumstances.