+ All Categories
Home > Documents > Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob...

Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob...

Date post: 14-Dec-2015
Category:
Upload: jana-hooker
View: 215 times
Download: 1 times
Share this document with a friend
Popular Tags:
36
Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA
Transcript
Page 1: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Amazon Web ServicesSecurity & Compliance Overview

Attila Lengyel Enterprise Account Manager

Dob Todorov Principal Security & Compliance Architect EMEA

Page 2: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

undifferentiated heavy lifting

Page 3: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

utility computing

Page 4: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

AWS provides broad and deep services to support any cloud workload

AWS Global Infrastructure

Application Services

Networking

Deployment & Administration

DatabaseStorageCompute

Page 5: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Hundreds of Thousands of Customers in 190 Countries…

Page 6: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Free steak campaign

Facebook page

Mars exploration

ops

Consumer social app

Ticket pricing optimization

SAP & Sharepoint

Securities Trading Data Archiving

Gene sequencing

Marketing web site

Interactive TV apps

Financial markets analytics

R&D data analysis

Consumer social app

Big data analytics

Web site & media sharing

Disaster recovery

Media streaming

Web and mobile apps

Streaming webcasts

Facebook app

Consumer social app

Every Imaginable Use Case

Page 7: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” Lydia Leong, Douglas Toombs, Bob Gill, Gregor Petri, Tiny Haynes, August 19, 2013. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report.. The Gartner report is available upon request from Steven Armstrong ([email protected]). Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

“AWS is the overwhelming market share

leader, with more than five times the compute capacity in use than the aggregate total of the other fourteen

providers.”

Page 8: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Notable Financial Services Stories

Page 9: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Dutch National Bank (regulator)

Page 10: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

US West(Northern California)

US East(Northern Virginia)

EU(Ireland)

Asia Pacific(Singapore)

Asia Pacific(Tokyo)

AWS Regions

AWS Edge Locations

GovCloud(US ITAR Region)

US West(Oregon)

South America(Sao Paulo)

Asia Pacific(Sydney)

Page 11: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

A B

A BC

A BC

A BC

A B

A B A B A BUS West

(Northern California)US West

(Oregon)South America

(Sao Paolo)Asia Pacific

(Singapore)

EU West(Dublin)

US East(Virginia)

Asia Pacific(Tokyo)

Asia Pacific(Australia)

Page 12: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Personal Data Protection in Europe

•EC Directive 95/46/EC: Personal Data Protection• Use Amazon Web Services Dublin Region

•Safe Harbour EU Compliant

•Safe Harbour Switzerland Compliant

Page 13: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

The Shared Responsibility Model in the Cloud

Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability ZonesEdge Locations

Client-side Data Encryption & Data Integrity Authentication

Server-side Encryption (File System and/or Data)

Network Traffic Protection(Encryption/Integrity/Identity)

Optional -- Opaque Data: 0s and 1s (in flight/at rest)

Platform, Applications, Identity & Access Management

Operating System, Network & Firewall Configuration

Customer Data

Page 14: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

The Shared Responsibility Model in the Cloud

Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability ZonesEdge Locations

Client-side Data Encryption & Data Integrity Authentication

Server-side Encryption (File System and/or Data)

Network Traffic Protection(Encryption/Integrity/Identity)

Optional -- Opaque Data: 0s and 1s (in flight/at rest)

Platform, Applications, Identity & Access Management

Operating System, Network & Firewall Configuration

Customer Data

Security OF the Cloud

Security IN the Cloud

Page 15: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Customer-managed Controls on Amazon EC2

OS-level Firewalls/IDS/IPS Systems/Deep Security

Data

Security Groups &Network Access Control Lists

Industry Standard Protocols: IPSec, SSL, SSH

OS-level: Encrypted File System, Bitlocker, dm-crypt, Secure Cloud

Security OF the Cloud

Security IN the Cloud

Applications

Platforms

Operating Systems

Network Security

Encryption of Data at Rest

Encryption of data in Flight

Page 16: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Data Protection at Rest and in Flight

OS-level Firewalls/IDS/IPS Systems/Deep Security

Data

Security Groups &Network Access Control Lists

Industry Standard Protocols: IPSec, SSL, SSH

OS-level: Encrypted File System, Bitlocker, dm-crypt, Secure Cloud

Applications

Platforms

Operating Systems

Network Security

Encryption of Data at Rest

Encryption of data in Flight

Application-level Encryption

Platform-level Encryption

Volume-level Encryption

Network Traffic Encryption

Page 17: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

AWS Certifications & Accreditations

SOC 1 (SSAE 16 & ISAE 3402) Type II Audit

SOC 2

SOC 3 Audit (new in 2013)

ISO 27001

Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider

Security IN the Cloud

Security OF the Cloud

Page 18: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Q&A

Page 19: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

User Identification, Authentication and Authorisation in the Cloud

Amazon Identity & Access

ManagementIAM Users

EC2

DynamoDB

S3

Active Directory/LDAP

AD/LDAP Users

Enterprise Applications

Corporate Systems

Page 20: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

User Identification, Authentication and Authorisation in the Cloud

Amazon Identity & Access

Management

Access Token for Federated

Access

EC2

DynamoDB

S3

Active Directory/LDAP

AD/LDAP Users

Enterprise Applications

Corporate Systems

Page 21: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

User Identification, Authentication and Authorisation in the Cloud

Amazon Identity & Access

Management

Access Token for Federated

Access

EC2

DynamoDB

S3

Shibboleth

AD/LDAP Users

Enterprise Applications

Corporate Systems

Page 22: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

CBA

Defined byBusiness

System Design

Managed byAWS

SLAs, RTOs/RPOs

EC2 SLA

System SLAs

S3 SLA

CloudFront

SLA

RDS SLA

RTO RPO

Business Processes

Page 23: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Physical Security

ISO 27001

Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider

• Amazon has been building large-scale data centers for many years

• Important attributes:• Non-descript facilities• Robust perimeter controls• Strictly controlled physical access• 2 or more levels of two-factor auth

• Controlled, need-based access • All access is logged and reviewed• Separation of Duties• employees with physical access don’t have logical

privileges• Maps to an Availability Zone

Page 24: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Storage Device Decommissioning

•All storage devices go through this process•Uses techniques from

•DoD 5220.22-M (“National Industrial Security Program Operating Manual”)

•NIST 800-88 (“Guidelines for Media Sanitization”)•Ultimately

•degaussed•physically destroyed

Page 25: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

AWS CloudHSMDedicated access to HSM appliances managed &

monitored by AWS, but you control the keys

Increase performance for applications that use HSMs

for key storage or encryption

Comply with stringent regulatory and contractual

requirements for key protection

EC2 Instance

AWS CloudHSM

AWS CloudHSM

Page 26: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Security of Data at Rest• S3

• Server side encryption (AES-256) – per object keys managed by AWS

• Client-side asymmetric encryption – integrated within APIs

• Client-side encryption: Amazon stores 0s and 1s

• EC2 + EBS

• Enable partition/disk level encryption

• Windows: use EFS (local certificates/centralised X.509)

• Linux: use cryptsetup/dm-crypt/others

• RDS MySQL

• Use SQL native encryption (server side)

• Client side encryption

• RDS Oracle

• Client-side encryption

Page 27: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Security of Data in Flight• AWS APIs are Web services

• SOAP over HTTPS

• REST over HTTPS

• User and data authentication through request signatures

• User access to Web Console

• Admin access to Servers

• Use SSH with asymmetric keys, or X.509 certificates

• Use RDP + MPPE or SSL protection

• Secure Application-level Protocols

Page 28: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Network Traffic Flow Security• Security Groups- Inbound traffic must be explicitly specified

by protocol, port, and security group-VPC adds outbound filters

• VPC also adds Network Access Control Lists (ACLs): inbound and outbound stateless filters

• OS Firewall (e.g., iptables) may be implemented

-completely user controlled security layer -granular access control of discrete hosts- logging network events

Encrypted File System

Encrypted Swap File

OS

Fire

wal

l

Amaz

on S

ecur

ity G

roup

s

Inbound & Outbound Traffic

Page 29: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Amazon EC2 Instance Isolation

Physical Interfaces

Customer 1

Hypervisor

Customer 2 Customer n…

… Virtual Interfaces

Firewall

Customer 1Security Groups

Customer 2Security Groups

Customer nSecurity Groups

Page 30: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Multi-tier Security Approach Example Web Tier

Application Tier

Database Tier

Ports 80 and 443 only open to the Internet

Engineering staff have ssh access to the App Tier, which acts as Bastion

All other Internet ports blocked by default

Sync with on-premises database

Amazon EC2 Security Group

Firewall

Page 31: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Amazon VPC Network Security Controls

Page 32: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Layered Defence

Page 33: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

AWS Multi-Factor Authentication

• Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you

• Additional protection for account information• Works with

• Master Account• IAM Users

• Integrated into• AWS Management Console• Key pages on the AWS Portal• S3 (Secure Delete)

Page 34: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

AWS Trusted Advisor

Available Programmatically via AWS Support APIs

Page 35: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

Manage and Monitor Your Environments from Anywhere

Page 36: Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA.

• Answers to many security & privacy questions

• Security Whitepaper• Risk and Compliance Whitepaper• Security Best Practices Whitepaper• AWS Auditing Checklist

•Security Blog•Security bulletins•Penetration Testing http://aws.amazon.com/security/

http://aws.amazon.com/compliance/

Security & Compliance Resources


Recommended