SlideShare une entreprise Scribd logo
1  sur  47
Télécharger pour lire hors ligne
September 5th 2018
#74PRESENTS
Sponsors
What’s On Tonight
6:00 pm
1. PolarSeven
“AWS CodePipeline & multiple origins” - Jesus Rodriguez
6:20 pm
2. Evident.io
“11 Exercises To Get CloudFit” - Craig Dent
6:40 pm
Break
Have some pizza & beer, on us!
7:20 pm
3. Freshworks
“Scaling to support 150,000 businesses” - Karthikeyan Marudhachalam/Hariprasad Ellanki
7:40 pm Networking
Presentation 1
Jesus Rodriguez
Cloud Consultant
“AWS CodePipeline & multiple origins”
Built Using
Route 53 CloudFormation
CodePipeline
S3Lambda
Cloudwatch IAM SNS
VPC Load Balancer Autoscaling EC2
Solution design
It’s demo time!
Because there is nothing scarier during a presentation than a live demo
Cost of this demo
$0.50
Contact Us
hello@polarseven.com
Thank youGracias
Presentation 2
Craig Dent
Consulting Engineer
“11 Exercises To Get CloudFit”
11 Exercises To Get CloudFit
AWS Security Fitness
Why is Cloud Fitness
important?
Cloud Adoption Barriers
Cloud Security Threats
Cloud Security Headaches
Ready to Get
CloudFit?
Exercise 1:
Disable Root Account API
Access Key
Root Account has no
restrictions
Create administrative IAM users
Grant access to billing
information and tools
“Lock the door and throw away
the key” i.e. Disable/Remove
the default AWS root user API
access keys
Exercise 2:
Enable MFA Tokens Everywhere
Rotating passwords too often:
BAD
Using overly complicated
passwords no one remembers:
BAD
Using Multi-factor
Authentication:
GOOD
MFA – Physical or Virtual
Virtual has choices – Google
Authenticator, Authy, etc.
Exercise 3:
Reduce IAM Users With Admin Rights
10
Create IAM admin users. At least 2,
no more than 3 per IAM group
What is the risk if an Admin account
is lost or compromised?
Could the result impact my revenue
or reputation?
Exercise 4:
Use Roles for AWS EC2
Temporary authentication
credentials. Limited privilege
Reduce the surface area of
attack
1
2
3
4
5 Auditable activity with CloudTrail
Automatically generated
authentication credentials
Do your EC2 instances need to
contact other AWS Services?
Exercise 5:
Least Privilege
Only give minimal rights to do
things on AWS...just what is
needed to accomplish tasks or
actions
IAM can get very granular
This applies to:
● IAM Users
● IAM Groups
● IAM Roles / Instance Profiles
● Applications or Scripts
e.g. If an app only needs to write
to an S3 bucket, then only give it
permission to PutObject.
Exercise 6:
Rotate All the Keys Regularly
Rotate all credentials, passwords,
and API Access Keys on a regular
basis.
90 days minimum
Compromised API Access Keys
can cost your business dearly
14
Exercise 7:
Use IAM Roles With AWS STS
Similar to EC2 Roles
Can be used in place of privileged
IAM User Access Keys
Temporary credentials
Allows for 3rd parties to access
your account more securely
Extended version of AssumeRole
allows for Identity Federation
Exercise 8:
Use AutoScaling to
Counter DDoS
AutoScaling allows you to increase
the number of EC2 instances
automatically
More instances means your site
stays up
Small price to pay for increased
reliability
Exercise 9:
Do Not Allow 0.0.0.0/0 Unless You Mean It
SSH - Only allow the access from the origin IP and port where you will admin your instance from.
Only turn this on when needed and remove it when not.
EC2 IP Address range is a favourite of scanners
Affects not just EC2 instances but also ELB’s, ElastiCache clusters, RDS, EMR nodes, and others…
Exercise 10:
Strengthen S3 Bucket
Policies
Watch world-readable and world-
listable S3 buckets
Open S3 buckets a favourite for
trolling for API Access Keys
Check your bucket security
regularly
Watch for AuthenticatedUsers
grantee
Are your S3 Buckets Secure?
359 Million
Records Leaked
Exercise 11:
CloudTrail and Encryption
The CloudFit Regimen
⃞ Exercise 1: Disable Root Account API Access Key
⃞ Exercise 2: Enable MFA Tokens Everywhere
⃞ Exercise 3: Reduce IAM Users With Admin Rights
⃞ Exercise 4: Use Roles for AWS EC2
⃞ Exercise 5: Least Privilege
⃞ Exercise 6: Rotate All the Keys Regularly
⃞ Exercise 7: Use IAM Roles With AWS STS
⃞ Exercise 8: Use AutoScaling to Counter DDoS
⃞ Exercise 9: Do Not Allow 0.0.0.0/0 Unless You Mean It
⃞ Exercise 10: Create AWS S3 Bucket Policies
⃞ Exercise 11: Enable AWS CloudTrail and Encryption
WARNING – Sales Plug Approaching
Evident Security Platform (ESP)
Your CloudFit Tracker
How it works:
Evident Security Platform (ESP)
Your CloudFit Tracker
Start a Free Trial
Break & Networking
• Refresh your drink
• Grab some pizza
• Make new contacts
• Enter the prize draw!
Presentation 3
Karthikeyan Marudhachalam/ Hariprasad
Ellanki
“Scaling to support 150,000 businesses”
Scaling to support
150,000 businesses
Karthikeyan Marudhachalam/
Hariprasad Ellanki
● Founded in 2010
● 150,000+ businesses
● 150+ countries
● 7 products
● $249M in funding
Freshdesk ● Customer support software
● Email, social, phone & chat channels
● 2.5 million DB reads in a minute
● 3 million conversations in a day
● 44TB of data
● 750 Million requests per week
● DCs in US, Australia, EU-C & India
Architecture
Requests per
week
Database
● Started with single DB
● Read replica
● Partitions
● Sharding
● Archiving
App Servers ● Mostly Ruby-on-Rails
● OpsWorks managed
● Blue-Green deployment
● Failure isolation
○ Dedicated Layers for each request group
○ Dedicated Layer for businesses with SLA
○ Buffer Layer
○ Future: Shell
Microservices ● Go, Java, Python & Node.js
● Search: Elasticsearch
● Analytics: Redshift
● Queueing
○ SQS
○ Kafka
Thank You
Draw Prize
This weeks winner is :
Thanks For Coming
Join Us Next Month – October 3rd 2018
Presentations from
&
>> Register @ http://www.meetup.com/AWS-Sydney/ <<

Contenu connexe

Tendances

Tendances (20)

Start Up Austin 2017: Serverless Real Time Analytics
Start Up Austin 2017:  Serverless Real Time AnalyticsStart Up Austin 2017:  Serverless Real Time Analytics
Start Up Austin 2017: Serverless Real Time Analytics
 
Simple Cloud with Amazon Lightsail
Simple Cloud with Amazon LightsailSimple Cloud with Amazon Lightsail
Simple Cloud with Amazon Lightsail
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
EWUG - Something about the Cloud - Unit IT - January 14, 2020
EWUG - Something about the Cloud - Unit IT - January 14, 2020EWUG - Something about the Cloud - Unit IT - January 14, 2020
EWUG - Something about the Cloud - Unit IT - January 14, 2020
 
01_Migrate Web Sites to Azure Web Apps_GAB2019
01_Migrate Web Sites to Azure Web Apps_GAB201901_Migrate Web Sites to Azure Web Apps_GAB2019
01_Migrate Web Sites to Azure Web Apps_GAB2019
 
Launch Your Game in the Cloud in Record Time
Launch Your Game in the Cloud in Record TimeLaunch Your Game in the Cloud in Record Time
Launch Your Game in the Cloud in Record Time
 
Newt211 final project
Newt211 final projectNewt211 final project
Newt211 final project
 
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
 
Aws security Fundamentals
Aws security Fundamentals Aws security Fundamentals
Aws security Fundamentals
 
Jump Start your First Hour with AWS
Jump Start your First Hour with AWSJump Start your First Hour with AWS
Jump Start your First Hour with AWS
 
Microsoft azure bootcamp @ hpe diegem
Microsoft azure bootcamp @ hpe diegemMicrosoft azure bootcamp @ hpe diegem
Microsoft azure bootcamp @ hpe diegem
 
Aws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detailAws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detail
 
Cross platform mobile app development with Xamarin
Cross platform mobile app development with XamarinCross platform mobile app development with Xamarin
Cross platform mobile app development with Xamarin
 
Securing your Public API with AWS WAF
Securing your Public API with AWS WAFSecuring your Public API with AWS WAF
Securing your Public API with AWS WAF
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
Cloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active DirectoryCloudreach Voices - Azure Active Directory
Cloudreach Voices - Azure Active Directory
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 

Similaire à AWS User Group September

Similaire à AWS User Group September (20)

Dos and don'ts in AWS
Dos and don'ts in AWSDos and don'ts in AWS
Dos and don'ts in AWS
 
AWS Sydney Summit 2013 - Keynote
AWS Sydney Summit 2013 - KeynoteAWS Sydney Summit 2013 - Keynote
AWS Sydney Summit 2013 - Keynote
 
Aws user group #04 landing zones
Aws user group #04   landing zonesAws user group #04   landing zones
Aws user group #04 landing zones
 
Implementing the Top 10 AWS Security Best Practices
Implementing the Top 10 AWS Security Best PracticesImplementing the Top 10 AWS Security Best Practices
Implementing the Top 10 AWS Security Best Practices
 
The iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_labThe iot acdemy_awstraining_part4_aws_lab
The iot acdemy_awstraining_part4_aws_lab
 
Jump Start your First Hour with AWS
Jump Start your First Hour with AWSJump Start your First Hour with AWS
Jump Start your First Hour with AWS
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
Jump Start your First Hour with AWS
Jump Start your First Hour with AWSJump Start your First Hour with AWS
Jump Start your First Hour with AWS
 
AWS Summit Auckland 2014 | Jump Start your First Hour with AWS
AWS Summit Auckland 2014 | Jump Start your First Hour with AWS AWS Summit Auckland 2014 | Jump Start your First Hour with AWS
AWS Summit Auckland 2014 | Jump Start your First Hour with AWS
 
Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2Bootstrapping - Session 1 - Your First Week with Amazon EC2
Bootstrapping - Session 1 - Your First Week with Amazon EC2
 
AWS Summit Sydney 2014 | Jump Start your First Hour with AWS
AWS Summit Sydney 2014 | Jump Start your First Hour with AWSAWS Summit Sydney 2014 | Jump Start your First Hour with AWS
AWS Summit Sydney 2014 | Jump Start your First Hour with AWS
 
AWS November meetup Slides
AWS November meetup SlidesAWS November meetup Slides
AWS November meetup Slides
 
AWS User Group November
AWS User Group NovemberAWS User Group November
AWS User Group November
 
Best AWS Training in Marathahalli, Bengalure
Best AWS Training in Marathahalli, BengalureBest AWS Training in Marathahalli, Bengalure
Best AWS Training in Marathahalli, Bengalure
 
AWS course training with placement in Marathahalli, Bangalore
AWS course training with placement in Marathahalli, BangaloreAWS course training with placement in Marathahalli, Bangalore
AWS course training with placement in Marathahalli, Bangalore
 
Announcing Amazon Lightsail - January 2017 AWS Online Tech Talks
Announcing Amazon Lightsail - January 2017 AWS Online Tech TalksAnnouncing Amazon Lightsail - January 2017 AWS Online Tech Talks
Announcing Amazon Lightsail - January 2017 AWS Online Tech Talks
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017
 
AWS Summit Berlin 2013 - Your first week with EC2
AWS Summit Berlin 2013 - Your first week with EC2AWS Summit Berlin 2013 - Your first week with EC2
AWS Summit Berlin 2013 - Your first week with EC2
 
Aws Introduction, technology and $ sense
Aws Introduction, technology and $ senseAws Introduction, technology and $ sense
Aws Introduction, technology and $ sense
 

Plus de PolarSeven Pty Ltd

Amazon Web Services User Group Sydney - February 2018
Amazon Web Services User Group Sydney - February 2018Amazon Web Services User Group Sydney - February 2018
Amazon Web Services User Group Sydney - February 2018
PolarSeven Pty Ltd
 
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
PolarSeven Pty Ltd
 

Plus de PolarSeven Pty Ltd (20)

AWS Forcecast: DeepAR Predictor Time-series
AWS Forcecast: DeepAR Predictor Time-series AWS Forcecast: DeepAR Predictor Time-series
AWS Forcecast: DeepAR Predictor Time-series
 
Aws user group #03 - All things Iot
Aws user group #03 - All things IotAws user group #03 - All things Iot
Aws user group #03 - All things Iot
 
Aws user group #01 lets talk serverless
Aws user group #01   lets talk serverlessAws user group #01   lets talk serverless
Aws user group #01 lets talk serverless
 
AWS Reinvent Recap 2018
AWS Reinvent Recap 2018 AWS Reinvent Recap 2018
AWS Reinvent Recap 2018
 
AWS User Group October
AWS User Group OctoberAWS User Group October
AWS User Group October
 
AWS User Group August
AWS User Group AugustAWS User Group August
AWS User Group August
 
Amazon Web Services User Group Sydney - March 2018
Amazon Web Services User Group Sydney - March 2018Amazon Web Services User Group Sydney - March 2018
Amazon Web Services User Group Sydney - March 2018
 
Amazon Web Services User Group Sydney - February 2018
Amazon Web Services User Group Sydney - February 2018Amazon Web Services User Group Sydney - February 2018
Amazon Web Services User Group Sydney - February 2018
 
Deep Dive on Cloud Policies and Automation
Deep Dive on Cloud Policies and AutomationDeep Dive on Cloud Policies and Automation
Deep Dive on Cloud Policies and Automation
 
Securing Traffic Leaving A VPC
Securing Traffic Leaving A VPCSecuring Traffic Leaving A VPC
Securing Traffic Leaving A VPC
 
Telstra Programmable Networks & Scaling a Serverless Team with Automation
 Telstra Programmable Networks & Scaling a Serverless Team with Automation Telstra Programmable Networks & Scaling a Serverless Team with Automation
Telstra Programmable Networks & Scaling a Serverless Team with Automation
 
AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60
 
Shared Security in AWS
Shared Security in AWSShared Security in AWS
Shared Security in AWS
 
Visibility, Optimization & Governance for Cloud Services
Visibility, Optimization & Governance for Cloud ServicesVisibility, Optimization & Governance for Cloud Services
Visibility, Optimization & Governance for Cloud Services
 
AWS OpsWorks for Chef Automate
AWS OpsWorks for Chef AutomateAWS OpsWorks for Chef Automate
AWS OpsWorks for Chef Automate
 
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
AWS CloudFormation Automation, TrafficScript, and Serverless architecture wit...
 
AWS User Group December 2016
AWS User Group December 2016AWS User Group December 2016
AWS User Group December 2016
 
AWS User Group Sydney - Atlassian 5-10-16
AWS User Group Sydney - Atlassian 5-10-16AWS User Group Sydney - Atlassian 5-10-16
AWS User Group Sydney - Atlassian 5-10-16
 
The Internet of Things - PolarSeven
The Internet of Things - PolarSevenThe Internet of Things - PolarSeven
The Internet of Things - PolarSeven
 
How our AWS account got hacked and what we did to ensure it never happened ag...
How our AWS account got hacked and what we did to ensure it never happened ag...How our AWS account got hacked and what we did to ensure it never happened ag...
How our AWS account got hacked and what we did to ensure it never happened ag...
 

Dernier

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
Enterprise Knowledge
 

Dernier (20)

A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Evaluating the top large language models.pdf
Evaluating the top large language models.pdfEvaluating the top large language models.pdf
Evaluating the top large language models.pdf
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 

AWS User Group September

  • 3. What’s On Tonight 6:00 pm 1. PolarSeven “AWS CodePipeline & multiple origins” - Jesus Rodriguez 6:20 pm 2. Evident.io “11 Exercises To Get CloudFit” - Craig Dent 6:40 pm Break Have some pizza & beer, on us! 7:20 pm 3. Freshworks “Scaling to support 150,000 businesses” - Karthikeyan Marudhachalam/Hariprasad Ellanki 7:40 pm Networking
  • 4. Presentation 1 Jesus Rodriguez Cloud Consultant “AWS CodePipeline & multiple origins”
  • 5. Built Using Route 53 CloudFormation CodePipeline S3Lambda Cloudwatch IAM SNS VPC Load Balancer Autoscaling EC2
  • 7. It’s demo time! Because there is nothing scarier during a presentation than a live demo
  • 8. Cost of this demo $0.50
  • 10. Presentation 2 Craig Dent Consulting Engineer “11 Exercises To Get CloudFit”
  • 11. 11 Exercises To Get CloudFit AWS Security Fitness
  • 12. Why is Cloud Fitness important?
  • 13.
  • 18. Exercise 1: Disable Root Account API Access Key Root Account has no restrictions Create administrative IAM users Grant access to billing information and tools “Lock the door and throw away the key” i.e. Disable/Remove the default AWS root user API access keys
  • 19. Exercise 2: Enable MFA Tokens Everywhere Rotating passwords too often: BAD Using overly complicated passwords no one remembers: BAD Using Multi-factor Authentication: GOOD MFA – Physical or Virtual Virtual has choices – Google Authenticator, Authy, etc.
  • 20. Exercise 3: Reduce IAM Users With Admin Rights 10 Create IAM admin users. At least 2, no more than 3 per IAM group What is the risk if an Admin account is lost or compromised? Could the result impact my revenue or reputation?
  • 21. Exercise 4: Use Roles for AWS EC2 Temporary authentication credentials. Limited privilege Reduce the surface area of attack 1 2 3 4 5 Auditable activity with CloudTrail Automatically generated authentication credentials Do your EC2 instances need to contact other AWS Services?
  • 22. Exercise 5: Least Privilege Only give minimal rights to do things on AWS...just what is needed to accomplish tasks or actions IAM can get very granular This applies to: ● IAM Users ● IAM Groups ● IAM Roles / Instance Profiles ● Applications or Scripts e.g. If an app only needs to write to an S3 bucket, then only give it permission to PutObject.
  • 23. Exercise 6: Rotate All the Keys Regularly Rotate all credentials, passwords, and API Access Keys on a regular basis. 90 days minimum Compromised API Access Keys can cost your business dearly
  • 24. 14 Exercise 7: Use IAM Roles With AWS STS Similar to EC2 Roles Can be used in place of privileged IAM User Access Keys Temporary credentials Allows for 3rd parties to access your account more securely Extended version of AssumeRole allows for Identity Federation
  • 25. Exercise 8: Use AutoScaling to Counter DDoS AutoScaling allows you to increase the number of EC2 instances automatically More instances means your site stays up Small price to pay for increased reliability
  • 26. Exercise 9: Do Not Allow 0.0.0.0/0 Unless You Mean It SSH - Only allow the access from the origin IP and port where you will admin your instance from. Only turn this on when needed and remove it when not. EC2 IP Address range is a favourite of scanners Affects not just EC2 instances but also ELB’s, ElastiCache clusters, RDS, EMR nodes, and others…
  • 27. Exercise 10: Strengthen S3 Bucket Policies Watch world-readable and world- listable S3 buckets Open S3 buckets a favourite for trolling for API Access Keys Check your bucket security regularly Watch for AuthenticatedUsers grantee
  • 28. Are your S3 Buckets Secure? 359 Million Records Leaked
  • 30. The CloudFit Regimen ⃞ Exercise 1: Disable Root Account API Access Key ⃞ Exercise 2: Enable MFA Tokens Everywhere ⃞ Exercise 3: Reduce IAM Users With Admin Rights ⃞ Exercise 4: Use Roles for AWS EC2 ⃞ Exercise 5: Least Privilege ⃞ Exercise 6: Rotate All the Keys Regularly ⃞ Exercise 7: Use IAM Roles With AWS STS ⃞ Exercise 8: Use AutoScaling to Counter DDoS ⃞ Exercise 9: Do Not Allow 0.0.0.0/0 Unless You Mean It ⃞ Exercise 10: Create AWS S3 Bucket Policies ⃞ Exercise 11: Enable AWS CloudTrail and Encryption
  • 31. WARNING – Sales Plug Approaching
  • 32. Evident Security Platform (ESP) Your CloudFit Tracker
  • 34. Evident Security Platform (ESP) Your CloudFit Tracker Start a Free Trial
  • 35. Break & Networking • Refresh your drink • Grab some pizza • Make new contacts • Enter the prize draw!
  • 36. Presentation 3 Karthikeyan Marudhachalam/ Hariprasad Ellanki “Scaling to support 150,000 businesses”
  • 37. Scaling to support 150,000 businesses Karthikeyan Marudhachalam/ Hariprasad Ellanki
  • 38. ● Founded in 2010 ● 150,000+ businesses ● 150+ countries ● 7 products ● $249M in funding
  • 39. Freshdesk ● Customer support software ● Email, social, phone & chat channels ● 2.5 million DB reads in a minute ● 3 million conversations in a day ● 44TB of data ● 750 Million requests per week ● DCs in US, Australia, EU-C & India
  • 42. Database ● Started with single DB ● Read replica ● Partitions ● Sharding ● Archiving
  • 43. App Servers ● Mostly Ruby-on-Rails ● OpsWorks managed ● Blue-Green deployment ● Failure isolation ○ Dedicated Layers for each request group ○ Dedicated Layer for businesses with SLA ○ Buffer Layer ○ Future: Shell
  • 44. Microservices ● Go, Java, Python & Node.js ● Search: Elasticsearch ● Analytics: Redshift ● Queueing ○ SQS ○ Kafka
  • 46. Draw Prize This weeks winner is :
  • 47. Thanks For Coming Join Us Next Month – October 3rd 2018 Presentations from & >> Register @ http://www.meetup.com/AWS-Sydney/ <<