Presentation AWS Quick+Start+ +A+Practitioner+Guide+to+Securing+Your+Cloud+ +

User Manual:

Open the PDF directly: View PDF PDF.
Page Count: 57

DownloadPresentation AWS-Quick+Start+-+A+Practitioner+Guide+to+Securing+Your+Cloud+-+
Open PDF In BrowserView PDF
AWS Quick Start
A Practitioner’s Guide to Securing Your Cloud
(Like an Expert)
Gabe Hollombe, Senior Technical Evangelist, AWS, APAC

Agenda: Develop your cloud security know-how
• Become familiar with the different types of AWS resources
• Quickly get up to speed with a practical overview of AWS’s identity-based
and network-based security controls
• Know how to interpret and implement AWS security controls

IAM

VPC
controls
AWS cloud

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Where’s my [AWS] stuff?

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Availability Zone

Availability Zone

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Availability Zone

Availability Zone

Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Availability Zone

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

EC2 instance
EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

EC2 instance
EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

RDS DB
instance

EC2 instance

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

AWS Directory
Service

EC2 instance

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

AWS Directory
Service

EC2 instance

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

Amazon S3
bucket

Amazon SQS queue

AWS Directory
Service

EC2 instance

Amazon DynamoDB
table

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

$ dig mydatabase.cumxp40klozz.us-east2.rds.amazonaws.com +short
Amazon S3
bucket

Amazon SQS queue

AWS Directory
Service

EC2 instance

10.0.51.81

Amazon DynamoDB
table

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

Amazon S3
bucket

Amazon SQS queue

Amazon DynamoDB
table

$ dig sqs.us-east-2.amazonaws.com +short

52.95.18.51
AWS Directory
Service

EC2 instance

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

Amazon S3
bucket

Amazon SQS queue

AWS Directory
Service

EC2 instance

Amazon DynamoDB
table

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

Determining a method for securing AWS resources
• If it’s in your VPC
• Identity and Access Management
(IAM) permissions
• VPC network security controls

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

• If it’s not in your VPC
• Identity and Access Management
(IAM) permissions

Practical introduction to IAM:
Identity and Access Management

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

The ABCs of AWS Identity and Access
Management (IAM)
• I: Identity. IAM lets you create identities in your AWS Account who can make
authenticated requests to AWS.
• AM: Access Management. IAM is your tool for defining who has permissions to do
what to which resources in IAM.
• IAM is the AWS-wide permissions control system. So you need to know it.

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

I is for Identity: Humans  IAM Users
IAM

long-term
security
credential

Human user

IAM user

Amazon
DynamoDB

long-term
security
credential

Human user

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM user

I is for Identity: Robots  IAM roles
IAM

EC2 instance

IAM Role

Amazon
DynamoDB

Lambda
function

IAM Role

Application
Auto Scaling

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

I is for Identity: Humans with external identities
IAM

Corporate identities
(developers)

IAM Role:
Developers

Amazon
DynamoDB
Corporate
Identification
Provider

Corporate identities
(analysts)

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM Role:
Analysts

Term: IAM principal

IAM

• An IAM principal is an identity defined within an AWS Account

IAM Roles

IAM Users

IAM roles authenticate using
short-lived credentials

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM users authenticate using
long-lived credentials

Term: IAM policy

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Where does IAM policy matter?
Everywhere in AWS
For an authenticated call to succeed
• The request must have a valid signature for an IAM principal

• IAM policy must specifically authorize the call

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

AWS-managed IAM policies

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Reading an IAM policy

IAM

{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"dynamodb:*"
],
"Resource": "*"
}
]
}

In English: Allowed to take all
DynamoDB actions

© 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved.

Writing more granular IAM Policies:
Actions
{
"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:GetItem",
"dynamodb:Query"
],
"Resource": "*"
}
]
}

© 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved.

In English: Allowed to take
only a few specific DynamoDB
actions

IAM

Writing more granular IAM Policies:
Resource-level IAM Policies In English: Allowed to take
{

specific DynamoDB actions on

"Version": "2012-10-17",
a specific table and its indexes
"Statement": [
{
"Effect": "Allow",
"Action": [
"dynamodb:BatchGetItem",
"dynamodb:GetItem",
"dynamodb:Query",
],
"Resource": [
"arn:aws:dynamodb:us-east-2:111122223333:table/MyTableName",
"arn:aws:dynamodb:us-east-2:111122223333:table/MyTableName/index/*"
]
}
]
}
© 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Term: Amazon Resource Name (ARN)
• Resource: A thing in AWS. Examples: S3 bucket, DynamoDB table, EC2
instance, VPC. Even IAM principals have ARNs.
• ARN: A fully-qualified name for that resource, used throughout AWS

• arn:aws:dynamodb:us-east-2:111122223333:table/MyTableName

•

service

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

region

accountId

service-specific name

IAM

Writing more granular IAM policies:
Conditions
In English: Allowed to use
{

"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Action": [
"dynamodb:*“
],
"Resource": "*",
"Condition": {
"StringEquals": {
"aws:RequestedRegion": [
"us-east-2"
]
}
}
]
}
© 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved.

DynamoDB only in the useast-2 region

IAM

Securing AWS resources across multiple accounts

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Securing AWS resources across multiple accounts

AWS
Organizations

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Example: Resource-based policy
{

In English: The “MyRole” IAM
Role in account 444455556666
(a different account) can read
objects from this bucket under
/some/path/

"Version": "2012-10-17",
"Statement": [
{
"Effect": "Allow",
"Principal“: {
"AWS": [ {
"arn:aws:iam::444455556666:role/MyRole"
} ],
"Action": [
"s3:GetObject"
],
"Resource": "arn:aws:s3:::my-s3-bucket/some/path/*"
}
]
}

© 2019 Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

IAM Authorization of cross-account access
S3 bucket
IAM principal
IAM principal
S3 bucket

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

IAM authorization of cross-account access

Amazon
DynamoDB

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

The IAM Reference

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

IAM

Practical introduction to Virtual Private Cloud
network security

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Amazon S3
bucket

Amazon SQS queue

AWS Directory
Service

EC2 instance

Amazon DynamoDB
table

RDS DB
instance

AWS Directory
Service

RDS DB
instance standby

EC2 instance

EC2 instance

VPC subnet
Availability Zone

VPC subnet
Availability Zone

Virtual private cloud

AWS region

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC subnet
Availability Zone

Secure connectivity with Amazon VPC

VPC subnet

Virtual private cloud

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

• Security Groups: Authorize
only the traffic you expect
• Routing: Route traffic headed
out of your VPC only to
expected destinations
• VPC Endpoints: Create
specific, least-privilege points
of connectivity

Secure connectivity with Amazon VPC

VPC subnet

Virtual private cloud

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

• Security Groups: Authorize
only the traffic you expect
• Routing: Route traffic headed
out of your VPC only to
expected destinations
• VPC Endpoints: Create
specific, least-privilege points
of connectivity

Security groups: Stateful network firewalls
Port 443 (HTTPS)

Security Group
sg-08eec15c2101526a1
Port 8443 (HTTPS)

Application Load
Balancer

Security Group
sg-0bbef9ea1db9d2ddf
Backend EC2 instances
Port 3306 (MySQL)

Security Group
sg-0b0a4f8118aa5d450

RDS database

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Security groups: Stateful network firewalls
Port 443 (HTTPS)

Security Group
sg-08eec15c2101526a1
Port 8443 (HTTPS)

Application Load
Balancer

Security Group
sg-0bbef9ea1db9d2ddf
Backend EC2 instances
Port 3306 (MySQL)

Security Group
sg-0b0a4f8118aa5d450

RDS database

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Security groups: Stateful network firewalls
Port 443 (HTTPS)

Security Group
sg-08eec15c2101526a1
Port 8443 (HTTPS)

Application Load
Balancer

Security Group
sg-0bbef9ea1db9d2ddf
Backend EC2 instances
Port 3306 (MySQL)

Security Group
sg-0b0a4f8118aa5d450

RDS database

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Security Groups: Stateful network firewalls
Port 443 (HTTPS)

Security Group
sg-08eec15c2101526a1
Port 8443 (HTTPS)

Application Load
Balancer

Security Group
sg-0bbef9ea1db9d2ddf
Backend EC2 instances
Port 3306 (MySQL)

Security Group
sg-0b0a4f8118aa5d450

RDS database

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Secure connectivity with Amazon VPC

VPC subnet

Virtual private cloud

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

• Security Groups: Authorize
only the traffic you expect
• Routing: Route traffic headed
out of your VPC only to
expected destinations
• VPC Endpoints: Create
specific, least-privilege points
of connectivity

Routing for least-privilege connectivity

VPC subnet: 10.0.1.0/24

VPC subnet: 10.0.2.0/24

VPC subnet: 10.0.3.0/24

VPC subnet: 10.0.51.0/24

VPC subnet: 10.0.52.0/24

VPC subnet: 10.0.53.0/24

Availability Zone

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Availability Zone

Availability Zone

Routing for least-privilege connectivity

VPC subnet: 10.0.2.0/24

VPC subnet: 10.0.52.0/24
Availability Zone

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Routing: No outbound connectivity

VPC Subnet: 10.0.2.0/24

AWS Elasticache
- Redis

EC2 instances

VPC Subnet: 10.0.52.0/24
Availability Zone

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Routing: Full internet connectivity
Internet
gateway

Public IP address

Public-facing EC2
instance

Application Load
Balancer

VPC subnet: 10.0.2.0/24

AWS Elasticache Redis

EC2 instances

VPC subnet: 10.0.52.0/24
Availability Zone

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Routing: Outbound-only internet connectivity
Internet
gateway
Public IP
address

VPC NAT
gateway
VPC Subnet: 10.0.2.0/24

AWS Elasticache
- Redis

EC2 instances

VPC Subnet: 10.0.52.0/24
Availability Zone

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Routing for least privilege: Summary
• AWS offers a variety of routing options
• Determine the different routing needs of
different parts of your workload, and put
them in different subnets
• Have only the routes you need in each
subnet.

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Secure connectivity with Amazon VPC

VPC subnet

Virtual private cloud

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

• Security Groups: Authorize
only the traffic you expect
• Routing: Route traffic headed
out of your VPC only to
expected destinations
• VPC Endpoints: Create
specific, least-privilege points
of connectivity

What we didn’t talk about
• Encryption
• Visibility and detective controls
• Higher-level security services

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

VPC Flow logs

Thank You
Gabe Hollombe, AWS
Twitter & LinkedIn: @gabehollombe

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Thank You for Attending AWS Quick Start
We hope you found it interesting! A kind reminder to complete the survey.
Let us know what you thought of today’s event and how we can improve
the event experience for you in the future.
aws-apac-marketing@amazon.com
twitter.com/AWSCloud

facebook.com/AmazonWebServices
youtube.com/user/AmazonWebServices
slideshare.net/AmazonWebServices
twitch.tv/aws

© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.



Source Exif Data:
File Type                       : PDF
File Type Extension             : pdf
MIME Type                       : application/pdf
PDF Version                     : 1.5
Linearized                      : No
Page Count                      : 57
Language                        : en-US
Tagged PDF                      : Yes
Title                           : PowerPoint Presentation
Author                          : Clarissa Lim
Create Date                     : 2019:03:19 19:18:21+08:00
Modify Date                     : 2019:03:19 19:18:21+08:00
Producer                        : Microsoft® PowerPoint® 2013
Creator                         : Microsoft® PowerPoint® 2013
EXIF Metadata provided by EXIF.tools

Navigation menu