AWS re:Invent 2020: AWS security: Where we’ve been, where we’re going

Video Statistics and Information

Video
Captions Word Cloud
Reddit Comments
Captions
[music playing] Good morning everyone and welcome to the Leadership Session For the Security, Identity, and Compliance Track. My name is Steve Schmidt and I’m very pleased you could join us this morning for a topic which I hope is as near and dear to you as it is to me. That’s AWS security, identity, and compliance. We’ve got an awful lot to cover in the next hour, so let’s jump right in. The first thing I want to get into today, with you virtual folks, is those highlights and announcements you may have missed. The AWS pace of innovation is really something to behold. Just in security I think we’ve averaging nearly a new feature or service update every day, not to mention all the other services you interact with on a day to day basis. But all that augmentation and improvement might mean you might miss something that is going to help you secure your environment. So, we went out to our security experts and asked them for the new features they found to be most impactful to their work. We’ve rounded all of those up and put them together in a title list for you today. The second item, we’ll get into the space I know lots of people will tune in to reinvent for overall. What are the net new things I can do in the cloud today, the new announcements, the fun products and features? What are the new bells and whistles I can try out and experiment a little if I haven’t seen them before? So, I’ll be breaking those down for you. Next up, I want to get into Zero Trust, that’s a place we’re seeing a lot of focus and questions from customers right now, so I thought it might be helpful to discuss how AWS thinks about the main themes of Zero Trust as well as how AWS can help you apply those concepts. Finally, I’ll leave you with a real life mix of tactical things that you can do today and a few strategic places that I think may be worthy of your time. This ten places to focus today section, drove significant positive behavior last year, so we wanted to bring it back and also update it with some new advice as well, so here we go. The 2020 security highlights, we’ve got a bunch of these to get through, so this will need to be a speedy update. Most of these should have some relevance to the security work you’re handling out there. Before we start this section now, a quote to set expectation, I would say Mario Andretti had the right idea about speed here. And AWS innovates at a pace that can feel at times as if you’re accelerating into a turn. But what’s the alternative? If our philosophical choice is between innovating for customers and not innovating, I think you can guess what the decision’s going to have to be. After all, there is reason Jeff Bezos wanted to name Amazon, Relentless, back when he was starting out. Which brings us to, Amazon GuardDuty. We announced a new capability this summer for GuardDuty. We now have S3 data events as a new log and event source that GuardDuty will continuously monitor. This gets you extremely helpful insights on data access behavior and threat intelligence. Specific things such as unusual geolocation activity, API calls from a known malicious IP address. Or API calls consistent with data discovery attempts. Basically you can now have GuardDuty monitoring both data access events and S3 configurations. You might know those as control plane APIs. GuardDuty is a security service I love. It’s using anomaly detection and machine learning and continuously updates its threat intelligence both that we get from the outside and that we develop ourselves, to accomplish all of this. To get started, if you have GuardDuty enabled in a region, you go to the GuardDuty console, select S3 protection and then click ‘enable’, that’s it. That’s the complete list of things you have to do. You repeat the same process for the other regions you’ve got your account, but it’s that simple. You’ll start seeing new findings within a few minutes. Please consider doing this, folks, you might be surprised with what you find. Now, while we’re on GuardDuty, let’s throw AWS Organizations into the mix as well. If you’re already a customer of GuardDuty, you can delegate any account as your GuardDuty administrator. And then, you can manage up to 5,000 accounts right from there. The delegated GuardDuty admin account is granted permission to enable and manage GuardDuty for all accounts in the organization within that region. The one thing to keep in mind here, though, is that GuardDuty remains a region by region service to enable. So you want a GuardDuty delegated admin account for each region that you want active. If you enable in US East that’s the only place it’ll be turned on. However this does allow you to better control granularity on cost and allows you try out a region first and then roll out developments and deployments from there. And as always you can enable your 30 day free trial of Amazon GuardDuty with a single click in the AWS management console. I’ve been in the UI meetings with Andy Jassy where he flat out told us, one click and one click only. We’ve gotten there and we’ve worked hard to make this easy as possible on your end. Okay, let’s move on now to Firewall Manager. What’s happened here is there’s now a new set of managed rules and a new version of AWS WAF available for users of Firewall Manager. Well why does this matter? Well you can now centrally enable AWS manage rules across accounts and these rules sets are curated and maintained by our threat research team. There are also rulesets out there from AWS Marketplace from customers and partners if you’d like to go that route. With Firewall Manager you’re already able to manage your DDOS protections with AWS Shield, as well as your VPC security groups all in coordination with AWS Organizations. We think that adding in this additional layer of support helps extend your protection even further. This is another AWS Firewall Manager and WAFF collaboration. Your logging can now be centralized under a single account, through Kinesis Data Firehose. Logging in this case, refers to a list of time stamps AWS resources, WAF actions and of course request details. We’ve already seen this feature is making it easier to enable logging across multiple accounts and web articles through a single firewall manager policy. We’re happy with the early returns here and we think you will be too. Another service I love, and I want you to love too, is Amazon Detective. Detective now has the ability to analyze IAM role sessions to help you understand the actions of users and applications that they performed using assumed roles. So, you can answer questions such as, what API activity did an EC2 instance perform? And which of my employees are using a cross account role? By providing answers to these questions, Detective assists your security analysts in the diagnosis and understanding of root cause. That means instead of building custom tools, exporting and storing and analyzing CloudTrail activity, your staff can start quickly solving investigative questions. This functionality by the way, is included at no additional cost. Again our focus is on your security for customers, we’re always going to bias towards that. Now, you’ll notice a theme developing and it’s AWS Organizations. Hopefully, it’s not going to come as a surprise that AWS Organizations is going to be at the top of my top 10 list, near the end of this presentation. Because with security it’s all about leaning into the power of scale. How can you implement security efficiently and with less lift for you and your teams? We think Organizations is a major step towards both of those goals, which brings me to IAM Access Analyzer and AWS Organizations, yes, it’s a mouthful, sure. But access analyzer uses automated reasoning, a form of mathematical logic to determine all the possible access paths allowed by a resource policy. We call these results provable security and they represent a high level of assurance for security in the cloud. Some ease of use here, you can enable IAM Access Analyzer with one click in the IAM console and once enabled Access Analyzer will generate a report that identifies access to your resources from outside of your organization. For example, S3 buckets in your organization that are accessible publicly. This is an extremely handy little trick and as with GuardDuty you’re getting insights into your security posture at scale. This allows you to start and finish a project in the same afternoon, around asks such as, we don’t want any resource publicly accessible, make it so. Which brings me to Single Sign-On. Single Sign-On is immensely important, because it allows you to centrally manage access and user permissions in all of your accounts in AWS Organizations. There have been a number of SSO upgrades this year from a counter assignment APIs and AWS CloudFormation support, to automation of multi account access management. AWS Single Sign-On is now supporting zero downtime external IdP Certificate rotation. And this should be a best practice for you to protect against certificate compromise. How so? Well you generally want to enforce short lived certificate expiration dates as a forcing function here, but within that enforcement you don’t want to be caught in the middle of a rotation without a cert. So, the zero down timing portion of the wording here means you can install a replacement cert while the existing certificate remains in use. Once again, this comes at zero additional cost within SSO regions. Extra providers who are also happy to help in this space include, Okta, OneLogin and Ping Identity. We’ll round out the identity section with another certificate upgrade. This one means you can share a private certificate with any AWS account or within your organization. Some context here, this means that customers can manage a private CA in a central account and use AWS Resource Access Manager to share the certificate authority with other accounts or organizations where TLS certificates will be issues. Using Resource Access Manager, customer can share CAs to an account or organization at it works with Certificate Manager to allow the designated account owners to easily provision, manage and deploy private certificates from a shared private CA. One outcome of this is now AWS CM can automate renewal and deployment of private certificates, when used with integrated services. Like elastic load balancing or API gateway. This feature also provides APIs to automate the creation and renewal of private certificates for on premises resources, EC2 incidences and IoT devices, so it is a really robust feature set. This also eliminates the need to provision duplicate resources to every account in a multi account environment, thereby reducing the cost and complexity of managing resources in every other account. We found historically that driving down complexity generally leads to better security outcomes. If you can drive clarity, the vast, vast majority of people want to do the right thing. The next update is big for both IoT and audit reports. We’ve expanded the rate limit for cert requests from 5 per second to 25 per second, which maths out to around 2.1m certificates per day. This provides better security options for this use cases that require a large number of certificates in a very short period of time. Such as manufacturing IoT devices or securing service to service traffic in a service mesh. We’ve also added support for encryption of Amazon S3 buckets, which can be leveraged for certificate verification lists and audit report. Now then, we’re going to talk a lot more about enclaves coming up. But just in case you don’t have time to stick around, I wanted to bring this one up early as well. The reason we’re so excited about AWS Nitro Enclaves being generally available is now customers can create isolated computer environments that are unavailable even to their own staff and use them to protect personally identifiable information within Amazon EC2 instances. We’re talking about the kind of data here that involves healthcare, financial services and intellectual property concerns. The most important and critical things you can secure today to protect your customers. Again, a much deeper dive on this coming on later in the presentation. You’ve heard me tout our continued efforts to decrease any friction or pain points in your cloud security program. We don’t want overly complex implementation slowing you down. Nor do we want budgetary decisions playing a deciding factor in whether you secure yourself or not. That’s why you’ll see us regularly lower prices. And this was a pretty big one, even for us. What this means is Amazon Macie dashboard has been completely redesigned and features a price reduction of 80% to 90% depending on the specific workload in question. We’ve enabling discount volume tiers to get at any particular size workload and many of our customers have told us this makes the biggest difference for them in applying Macie to their work. This price reduction is achieved by completely rearchitecting Macie’s data discovery engine to perform even faster and more scalable detections. Macie is another security service that features built in native account management through AWS Organizations. So, again scale that assists with clarity, ease of use for single click consoles. And inexpensive security choices. That’s the place we want to be with our customers. Now, we’re coming down to the end of our security update, but a few more critical ones that we’ve hoped you noticed, this one involving AWS Security Hub. Security Hub has now gone GA and this is a service we think can give you a comprehensive view of your security posture across AWS accounts. If setting up CloudWatch events and creating the cross account permissions is eating up too much of your time, or if your business has grown overly complex, Security Hub maybe a simpler solution for you. The Security Hub automated response and remediation solutions offer predefined response and remediation actions to common security controls. There are 10 pre-packaged play books in Security Hub and they’re based on the Center for Internet Security AWS Foundations Benchmark, a security standard for AWS resources. Some examples include applying recommendations that ensure you’ve got key rotation within 90 days or establish strong password policies, or perhaps enforcing encryption of event logs that you stored in AWS. We then iterated by adding in additional security standards such as PCI and their own foundational security best practices. There’s also a tabular view that makes it easier to understand your security posture relative to the security checks you have enabled in Security Hub. Within Security Hub you’ll see a visual summary of all of your security checks, as well as account of how many checks have passed or failed. And because the controls are grouped by status you can more easily focus on the failed or disabled controls. You can also filter and search the controls to pinpoint specific resource types and then sort by using any of the available table columns. Now this is an example of a better UI that’s meeting you half way on your security progress. If we tell you that 12 things aren’t best practices, but then we bury those 12 things in a list of 100 that you’ve done well, we’ve done you a disservice. This is an example of how the Security Hub team is iterating fast, based on customer feedback, to meet you where you need to be. Our last real critical Security Hub update, you can now view all Amazon EC2 instances across all your accounts that are non-compliant with your configured patch rules. In a single dashboard. AWS Systems Manager Patch Manger, allows you to automatically send patch compliance findings generated by your patch rules to AWS Security Hub. This gives you the ability to centrally monitor your patch compliance along with other security findings in a single view. Security Hub gives you a comprehensive view of your security posture across your AWS accounts and aggregates, organizes and prioritizes your security alerts or findings for multiple AWS services. Patch Manger is a feature of AWS Systems Manager. AWS Systems Manager enables visibility and control of your cloud and on premises infrastructure. Last one here, Amazon Detective now enables you to examine your Amazon Virtual Private Cloud network flows. This new capability allows you to answer questions such as, what port or network service was in use at that time? Or were any large data transfers involved? These details help security analysts investigate findings, examine unexpected network behavior and identify other AWS resources that might be affected by a potential security issue. Once enabled, Amazon Detective automatically processes all the VPC flow records from your enabled accounts, aggregates them by EC2 instance and the presents visual summaries and analytics about your network traffic. You can now drill down into selected time periods to view the details of these flows, which I highly recommend. So, those were the security features I wanted to highlight this year, but I know everyone out there also wants the latest on the newest services, so let’s get right into that. Here’s a quote from FDR that I find instructive, “To reach a port we must set sail.”, Sail, not tie an anchor, sail not drift. This is really where AWS thrives in my opinion. We don’t drift, we always have a destination in mind. Even if we know we’ll need to iterate again and again to meet that goal. And our road map is highly influenced by customer requests. If you have an idea on something we can do better on security, don’t hesitate to reach out. That said, here are the newest security service releases. As promised, I wanted to get deeper in Nitro Enclaves. Enclaves are isolated computer environments for sensitive data, featuring cryptographic attestation to verify that only authorized code is running. I also want to note here, that we now have a way to provide encryption for the various IO devices, storage and networking and the encryption case can be managed off the main board, with hardware acceleration available to minimize performance impact. Other important priorities of Nitro Enclaves, they work on standard nitro instance types. You can choose the amount of CPU and memory that is carved from your virtual private machine. There’s OS agnostic features here too as both Linux and Windows support hot unplug of CPUs and memory. This can all be done via command line as well. Plus you get all of the memory and side channel protections of a normal virtual machine. The dedicated pinned core, that’s used for Nitro Enclaves is not shared with the host. There’s no shared L1 or L2 cache. There’s no memory sharing, there’s no page coalescing. Essentially the Nitro hypervisor gets you towards that all important goal of no human access. Continuing along this feature set, inside enclaves are standard operating system boots. This could be a bring your own Windows license by the way. This gets into a very technical space very quickly. But going even deeper, Nitro Enclaves have a read only boot file system. This is about reducing your attack surface area. We do also provide an open source and TLS implementation as well as a TCP proxy, that runs inside the host to allow for secure connections to KMS and other services. When we talk about the explicit security that enclaves conveys, we start with the good image signing and attestation process, with the KMS services providing a cryptographic pivot point for outside interaction. A typical workflow here might be for enclave to use a data key to encrypt external data that can’t be decrypted by the host itself, it therefore is not available to your staff. The only way in or out of the enclave is via a Vsock channel to the host. This also allows for some interesting public key encryption use cases. As we do offer a public key enclave via an API call. So, now you’ve got access to massive amounts of processing power in an isolated computer incident that even your staff can’t get access to. This is what is so exciting about nitro enclaves, why I wanted to flag the general release again today. Next up a product you'll be able to check out today AWS Audit Manager. I know many of you out there are operating in highly regulated areas. So we hope this is a new service that offers you some easy wins. Okay, so what is AWS Audit Manager? This is a service that's going to help you access and assess your controls. In the old manner of auditing you we're often looking at snapshot audits where you're asked to provide a report on a certain day. But that's no longer a constraint. Push Button audit reports are where we need to go with this. You've seen this with AWS Artifact, that's the ability to get attestation of compliance about our controls, the things we operate with AWS Audit Manager, you're now looking at your own environment, and with the ability to prove compliance against regulations that you are subject to, from your own systems, At AWS in meetings for project will often ask so what do you get for this, you know, what's the win for customers here. So the key customer problems we're looking to solve here are manual and time consuming audit evidence collection. You're gathering screenshots or logs across configurations. And then just for fun, you're also organizing it in a way that makes sense. Because you can't just hand off 1000 pages of logs to an auditor and say good luck, have a nice day. You have to show how your business is enforcing controls around data retention, or encryption or access control. Or maybe you need to prove that you're prohibiting direct access between credit cardholder data, and the internet to align with PCI. Regardless of your individual compliance use cases, AWS Audit Manager continuously collects evidence, helping you ensure your controls work as intended, so you can proactively manage and reduce risk. Under the hood, the service is gathering evidence based on pre-built or custom assessment frameworks that determine what evidence from which resources should be collected. You'll see we're launching with CIS, GDPR and PCI here with partners such as Algress, CIS, Coalfire, Deloitte, Jacoby Engineering, Smartronics, and TeleTech. So what are some use cases here? Well, you can move from manually managing evidence in spreadsheets to an automated evidence collection method. That's first off, you can now continuously collect evidence, monitor your compliance posture against a desired state, and proactively reduce risk by introducing or fine tuning controls. And lastly, if you need to perform risk assessments, we think it's a great place for the service to help you. In addition to the pre-built frameworks I just mentioned, you can also build your own assessments as well. To get started, go to the management console and activate Audit Manager, you can then choose one of the pre-built assessments that I just mentioned, or you can build your own. You'll then delegate evidence review to the appropriate stakeholders. Once you've done a sanity check on the inputs and the outputs, you're then ready to look at the reporting side of audit manager. We want this to be simple. So this is the runbook. Please give it a try. Let us know what's working for you where we can go for future feature set. We have Fiona Williams, Deloitte AWS Alliance Lead and former CISO joining us on a call today, Fiona Welcome and thank you, I know you've been engaged with the AWS Audit Manager beta? What are your thoughts about the benefits of this service, and what it brings to our customers? Thanks for having me, Steve, and I'm thrilled to discuss Audit Manager, which I believe should help technology professionals and auditors improve the efficiency of their audits. The cloud is the new normal, and many organizations want to move to the cloud at an even faster pace. Often that speed is impacted by concerns about security and controls which sometimes can be a blocker for companies to move workloads to the cloud. And for organizations to test their controls and confirm that they're adequate, they need to rethink how they do that, as traditional audit practices don't scale to dynamic cloud environments, audit management helps companies address this by proactively collecting relevant audit and control evidence from a cloud environment. And because it's a cloud native service, it allows customers to get started quickly and to scale as the business and cloud usage grows. Thank you, Fiona, can you expand a bit on how AWS Audit Manager helps solve the common challenges arising from traditional audit practices applied to cloud environments? There are three features that I really like, it should help to make audits of the cloud more efficient and effective. The first is the predefined assessment templates. These templates are based on industry standards, such as CIS, HIPAA, PCI and High Trust to name a few. And they should allow you to accelerate the development of your own testing templates. These can be customized, you can add your own custom controls and add your own custom templates based on what your audit requirements are. The second feature, and probably the biggest time saver is the automatic collection of audit data. So instead of manually reviewing and collecting audit data, the system automatically does that for you. It continuously gathers and tracks control data from sources such as CloudTrail, CloudWatch, Security Hub, and Config. So it's doing continuous monitoring and gathering of data, rather than at a point in time. And finally, the built in workflow. This allows auditors to add comments to collaborate to document their reviews to delegate tasks during the audit. And one of these features I think will help you deliver a more efficient and effective audit. Thanks, Fiona, we really appreciate your time today. Okay, continuing along the audit front, I'm really excited to feature a new training program that we've launched, AWS Cloud Audit Academy. So what is Cloud Audit Academy? Well, basically, this is a training curriculum for audit risk and compliance professionals, that narrows in scope as you progress through the training, starting with cloud as a concept across the general industry, all the way down to the specifics on how to audit AWS, and industry specific components about auditing the cloud. Here's some of the topics the Cloud Audit Academy gets into. None of these are going to be shocking. These are the building blocks of any security program. And both levels of training are aligned to the GDPR privacy directive, as well as global industry security and compliance domains such as the Cloud Security Alliance controls matrix, ISO 27,001, NIST 853, and SOC 1 and SOC 2. As you can see, there's a comprehensive list of topics within the security compliance and privacy domains here. And in the grand tradition of AWS training, there's something for everyone. It's meant to be a deep dive for your folks in compliance to understand how their work interacts with the cloud. Clearly automating is one of the last spaces out there where there are still people doing work that should have been optimized for them. The benefits of the cloud are massive for security, but we want to see those wins conveyed here too. And both AWS Audit Manager and the AWS Cloud Audit Academy are steps in that direction. In terms of levels, you can choose both e-learning and instructor led training format. Attendees can receive continuing professional education units for these as well. And you can see on screen that we've got some levels within the levels. Within e-learning and in person, there's also a breakout among general cloud auditing versus AWS specific. I should also mention that any in person training would of course, be incumbent on us being able to offer this in a manner that's safe for our customers. We've taken a lot of steps internal to AWS and Amazon at large in terms of safety. And so we've learned a lot and clearly, we won't be getting back to in-person instructor led training until it works completely for our customers and our staff. To learn more head to our compliance page, and then to the auditor learning path. We look forward to working with you in this critical space. Okay, next on to the new services that we've got going on with AWS Network Firewall. First up, here's how it works within the context of your overall security services. This is a native firewall service that allows you to apply blanket protections for your entire VPC, regardless of the application type or protocol. This means AWS Network Firewall gives you control and visibility across both the network and application layer. Crucially, Network Firewall allows you to broadly inspect traffic flows to and from your VPC and also over the internet and over Direct Connect and VPN we’ve got all the different network paths covered. From a technical perspective, AWS Network Firewall is a zonal service consisting of AZ isolated inspection points. The critical things here for customers is it's managed by AWS, features load balancing, and has zonal symmetric flow forwarding. From a customer point of view, the main thing that you want to pay attention to is your endpoint policies. We're managing the fleet of EC2 host for you, including failover and auto scaling, we're maintaining OS updates, and the other work that you would have to do if you are maintaining your own firewall. Going a bit deeper into those cloud native controls. IP port and protocol gives you baseline segmentation capabilities with the ability to allow or deny traffic based on the domain name of the destination, instead of an IP address. Furthermore, the service has a stateful inspection engine that allows you to defend against common network threats such as malware intrusion and protocol abuse. You can also do things like identify if encrypted traffic is trying to leave through a port that's typically reserved for unencrypted traffic. Lastly, you can choose to allow flows through drop unauthorized flows, or simply observe traffic patterns by using the alert action. So the tool set is very much aligned with a practical application of real security. This service is available now we've got a few of the benefits listed here on the slide. In terms of network security. This makes it easy to deploy protection at scale across your Amazon Virtual Private Clouds. Network Firewall is also a managed service that scales with network traffic and can support hundreds of thousands of connections at the same time. Finally, it comes with a highly flexible rules engine that supports thousands of customer rules for intrusion prevention, detection and web filtering. And it's all native to your cloud environment. Once again, this is going to be an easy implementation. If you'd like to try it out, you can find AWS Network Firewall and the Amazon VPC console. From there you'll have a number of options around your policies as well as the places that you want the service active. Okay, so those are the big announcements that I've got for you today on the topic of security. But we've got a bit more time to get into the strategy of security before we end the session with some best practices, we'd like you to consider. Zero trust is a term you hear often these days. And Zero Trust can mean different things in different contexts. One key reason there's so much ambiguity is the diversity of use cases to which it applies. Here's a quote from Alvin Toffler on the need to focus on the smaller things in order to do big things. Toffler, by the way, was the person who coined the term information overload. So he clearly would want this section to be efficient and full of clarity. Just from a definition standpoint, Zero Trust is, to me, a set of mechanisms that focus on providing security controls around digital access, and assets, while not solely depending on traditional network controls, or network perimeters. In other words, we aren't going to trust a user based only on their location within a traditional network. Instead, we want to augment network centric models with additional techniques, which we would describe as identity centric controls. Now, keep in mind that another primary concept of Zero Trust is it should include attributes such as usability and flexibility. We all know that you can secure a safe at the bottom of the ocean if you put in a block of concrete. But it's not a very usable tool at that point is it? In terms of the keys to Zero Trust, let's look at two key dimensions. The first being the network itself, you're always going to have some notion of a perimeter in security, the thing that surrounds the thing you're protecting, or the things it may be more than one. For example, in many scenarios, a proxy is trusted, in part, based on its network properties. Most of the time, people are designing systems so that traffic from specific internal IPs is considered trusted. Or maybe you have a set of containers on the same host running as part of the same application deployed by a single Dev Ops team. And that's within a trusted perimeter. So the question becomes, where is my perimeter? How big or small is it? And you should make it as small as possible. And how easy is it to monitor an audit? And in terms of effectiveness and user interface, should we use a VPN for network isolation, but make it dynamic and hidden from the user experience, so that users don't even notice that network boundaries are being created and torn down as needed? Or perhaps we break systems down into even smaller logical components and go with tighter network segments or even packet level controls around some applications? What we consider micro segments or micro perimeters, do we add in some kind of a gateway or proxy technology that enforces a newer kind of a trust boundary down the road? How about a combination of those techniques? And if those are the questions that come up when you're securing your network, a second consideration is always identity and access management. This again runs the gamut of use cases from humans with PCs or tablets or phones, to machine to machine or software to software communication. across those types of use cases, we can see that identity authentication and authorization techniques can be much more different in practice, right? People don't talk to machines the same way that software talks to machines. And this leaves us with open questions around how to secure. Should we organize around security relevant properties of the end user profile, or maybe we want to alter access dynamically through some other factors, such as the strength of the authentication, the device type, the network location, the time of day, day of week, etc. Now then, identity centric perimeters can be used to interact with AWS API endpoints, and they uniquely authenticate and authorize each API request. However, network centric tools such as Amazon Virtual Private Cloud, security groups, PrivateLink and VPC endpoints are also easy to implement, to filter out unnecessary noise, which allows your security inspection services and your staff to focus on just the components that are important. But really what we want is for these two types of controls to not only coexist but be aware of and augment one another. A real world example here is VPC endpoints provide the ability to attach a policy to enforce identity centric rules at a logical network boundary. So the two concepts, network and identity share the same underlying principles even if they differ in what they're trying to achieve for an organization. We want to focus on the problem we're trying to solve because Zero Trust can mean different things in different contexts. One key reason there's so much ambiguity and confusion around the term might be the diversity of use cases to which it applies. But by focusing on the problem you're trying to solve, we'll spend our time improving security posture and outcomes, and avoid getting mired in low value discussions. One of the discussions we have in Amazon quite frequently is around not trying to solve the entirety of the problem will at once. And I'll tell my teams give me an 80% solution right now. And let's iterate towards the final outcome. The same is true here, constant steps of improvement. We believe it's best to think of Zero Trust concepts as additive to existing security controls and concepts really, rather than replacements. Because one size does not fit all. We want to focus on the value of the systems and the data that are being protected. Over time, the application of a Zero Trust conceptual model will continue to improve defense in depth and continue to make security controls we already have, work better. Use Zero Trust concepts to raise your security bar, but don't issue blanket standards that lack flexibility. For many business systems, network controls and network perimeters will continue to be important and sometimes adequate controls. If we begin to look at the three use cases I just referenced, the first is to consider machine to machine communications. This is about authorizing specific flows between components to eliminate lateral network mobility risk. Basically, if two components don't need to talk to one another across the network, they shouldn't be able to talk, even if those systems happen to coexist within the same network or network segment. This greatly reduces the overall surface area of connected systems and eliminates unnecessary or unneeded pathways that an adversary might take advantage of, particularly those that lead to sensitive data. For this use case, our discussion should begin with security groups, which have been a part of Amazon EC2 since it launched. The point of security groups is to provide software defined micro perimeters. They also act as a kind of identity system which group membership becomes relevant for determining whether or not to permit a particular network flow. Allowing for extremely granular rules without the burden of keeping them up to date as membership in the group ebbs and flows. Another way to get at this would be AWS PrivateLink. Using PrivateLink, a load balanced endpoints can be exposed as a narrow one way gateway between two VPCs. With tight identity based controls on who can access the gateway, as well as where any incoming packets can land. VPC's don't even need to have routes between one another so the outcome here is going to be robust machine to machine network security. Our second Zero Trust use case human to application is about improving workforce mobility without compromising security. Right now, especially with higher levels of work from home this is one that's clearly on everybody's mind. Now traditionally, these applications existed behind a strong VPN front door. However, VPNs aren't always compatible with the full range of mobile devices that modern workforces leverage. So the objective here is to make the locks on applications effective. Enough that we can eliminate a VPN based front door altogether. Depending on your risk tolerance and developer maturity, there are a lot of options out there. At one end of the spectrum, you may want a desktop as a service, which we offer as AWS Workspaces. Or you prefer an end user application as a service product like AWS AppStream. Once you've got into that place, traditional security controls are then applied to the intermediary services. So a user with a PC or an HTML5 client can reach virtualized applications over the internet. Now you've got a desktop like experience, without having to worry about the security of the final device in the user’s hands. On the other end of the spectrum is connecting internal web applications directly to the internet. For this, we recommend a combination of AWS Shield, AWS WAF, and Application Load Balancer. Going down the line that would be leveraging AWS Shield for a managed DDoS protection service, AWS WAF as a web application firewall, and then authentication through the application load balancer in order to integrate with an identity provider to offload the work of authenticating your users. Using this combination, your internal custom applications quickly become just as flexible as software as a service applications. Allowing your workforce to enjoy the same from a coffee shop flexibility, while unifying your application portfolio under a common security model. And finally, our third Zero Trust use case which is markedly different from the first two because it involves securing digital transformation projects such as IoT. This could be a connected vehicle use case where a car needs to relay a stream of instrumentation data over the Internet to a cloud based analytics environment. Historically, these types of workloads have always existed entirely outside the traditional enterprise network. So they require a security model that accounts for that particular situation. Here's where you want to use services that can issue unique device identities to every device in your fleet, and then use those identities and associated access policies to securely control how they communicate and interact with the cloud. And of course, I'm recommending services like that. But I'm also recommending you take a look at our IoT device defender service. But sales recommendations aside, we do think this use case will continue to expand as we see more workloads move closer to the edge to minimize latency and to improve user experiences. So to wrap this topic up, what I really like to see security practitioners focusing on the principles of Zero Trust, that increase your security posture. Don't segment out your identity and network security, instead make them complimentary. Your control should coexist and augment each other. And then it's about the use case itself. Is it machine to machine? Are humans involved? Is it IoT? This is going to be where you're making security decisions that are appropriate for the things you are trying to protect against and to protect. And lastly, something we always advocate for is AWS, don't put inflexible mandates in place, give yourself and your team room to grow with the technology that's out there. Okay, as we near the end, here, we've had a lot of success last year with a list that we published around the top 10 places your security group should focus. So I want to revisit that concept again today with a refresher. Excellence is to do a common thing in an uncommon way. For security, that means fighting for each inch or centimeter, and really knowing your environment. So taking a list like I'm about to present you and doing a few of them, gets you a few wins. But there are a lot of themes and tactical things you can do to put yourself in an excellent position for 2021. That might be the uncommon action, you should commit to today really doubling down on your security mechanisms to make this guidance, something that has actual tactical impact. Before we move on to this year's recommendations, I wanted to take you back to 2019s list because these are still relevant, and they aren't items that you can now ignore. So if this is your first time seeing one of these security lists, you may now have 20 things to do. Hey, let’s reinvent, this is awesome. You can expect the security advice to be prolific from a company that takes it as seriously as we do. Seriously, everyone do take note of these if you haven't seen them before. And if you did take action on these items last year, maybe take some time and reconfirm you're still in a great place in these areas. And now on for our new top 10. We noted them this year as strategic versus tactical. Clearly the strategic ones might require a bit more introspection, more planning, more time, and the tactical items feature things that you can begin implementing today. So let's take a look at each one of these right now. I've mentioned it a few times already we think AWS Organizations is a place you can really pick up some security wins at scale. Because it's a place you can configure centrally, you're going to gain a lot more ability to rapidly up level your environment. Organizations has a feature called service control policies, that will make your life better. For all of the accounts you have in Organizations, you can use these policies to do great things like prevent deletion or modification of IAM rules, prevent tampering with CloudTrail, and prevent public S3 access. In this sense, you're replacing reactive controls with preventative and proactive ones. And that's a place we want your security posture to be. Next up, deeply understand your environment. This is very close to something I mentioned last year. Your monitoring shouldn't just be for when a bad thing happened. Instead, you can use tools like Security Hub, which is of course compatible with Organizations to implement a set of standards across like PCI or CIS and output a security score and identify the specific accounts and resources that require your attention. It is impossible to improve upon something without measuring it first. When you've got a security score, you can then, as a business, decide how to improve that score. Or if you're okay with any security tradeoffs you might have made when building your systems and tools. Now, you've heard the buzzword and phrasing around, just encrypt everything. And the reason you hear that is because oftentimes, it is the last line of defense against an adversary. If all else fails, data that's improperly accessed can still be protected via encryption, if done properly. We've got a few tools to help you that are listed on the screen here. And none of these should look entirely surprising to you. Our KMS service is now integrated with the vast majority of our services including GuardDuty Macie and Certificate Manager. And of course, at the very minimum, you need to have a robust encryption plan for your sensitive storage. We offer a huge array of options on encryption for data at rest, in motion, where you're able to maintain the key and only allow access to the users you specifically choose and prove who has had access over time. Next up Federation. This can be handled through our AWS security token service or STS, where you're granting temporary limited privileged credentials with IAM for authentication. STS also has CloudTrail support, so you're then logging all of your calls for access as well. You're getting the time, the ID and the access requested so that you've got a record of potentially abnormal access requests. I spoke about Zero Trust earlier. And this is a building block for Zero Trust because 100% knowledge of your environment, in other words knowing what you're protecting, is the foundational basis to establishing a Zero Trust environment. Another quick win here is AWS Single Sign On. From a single portal, you're centrally managing access across accounts and applications. Your users have access to the things they need access to which they like, but they don't have access to the part of the business they shouldn't have access to which surely your security team will like. You can assign user permissions based on common job functions and customize these permissions to meet your specific security requirements. And this isn't even about AWS. Our SSO also includes built in integrations to Salesforce, Box and Office 365. Or you can create and manage user identities in AWS SSOs identity store. Or easily connect your existing identity source, including Microsoft Active Directory, and Okta Universal Directory, and Azure Active Directory or Azure AD. I mentioned exactly how to do this earlier through Organizations, but you can also handle this through S3 itself with our block public access feature. So there's really not a good reason anymore to be caught unaware by public access. We've made it a space where we explicitly want you to choose if you want your storage buckets open to the world, we closed them by default, when you establish the bucket. You are secure by default. New buckets and access points don't allow public access. So this is about having yet another confirmation and another audit point in this area. If you do absolutely have to serve public content, do that from a small number of specifically chosen and exempted buckets. Do not make it a blanket thing. I cannot stress this one enough. We hear the term edge protection thrown around a lot, but this is just another term for those technologies and applications that are near to the internet in your architecture. That's why you often hear IoT and edge protection the same sentence because a single transmitter device is considered to be the edge of your protected network. Which means the tools here are the ones on the front lines of security. And services such as Amazon CloudFront, WAF, and API gateway are the easiest ways to get at this type of protection. CloudFront is a content delivery network that companies like Hulu or Slack, Prime Video and PBS all use to deliver content. So it's going to be a robust solution with considerable security baked in. I've listed the threat dashboard as a feature here because you no longer need Shield Advanced to access this, you can see a near real time summary of the AWS threat landscape through the shield console itself, by going to global threat dashboard. It's definitely worth a look. We've also published a threat landscape report with an all up analysis by time period, size, type and so on. Our seventh recommendation today, please, please, please consider automating your patching program. This can be accomplished via AWS Systems Manager, and building it in to AWS CodeBuild using a code pipeline. There are entire blogs, white papers and videos dedicated to how to set this up in your environment, including one that's jazzily titled, AWS prescriptive guidance automated patching for non-immutable instances using AWS Systems Manager. So I won't belabor the point. But I will ask you to look into how you do this today. Because patching your systems are security vegetables, you may not like it, but you have to do it. Now this one, in contrast, is more philosophical and strategic. So it's a place you want to dedicate some resources to long term, as opposed to a set it and forget it kind of security control. What we're getting at here is multi layered defense. And there are Zero Trust concepts in this one as well. But essentially, it does you no good to have a robust firewall system without encryption. It's not effective to require a VPN, but then allow your user base to access PII, no matter what the role, and so on. What you don't want is the idea of a coconut with a hard shell, but a soft and tasty inside. Make things difficult on potential adversaries don't rely on just one or two controls. This one's a lot for one little slide. But again, it's more about a way of operating and security as opposed to something tactical right this minute. This guidance comes about because we often have conversations with customers on how we do security to AWS. Well, these are some of our key concepts. We're making sure leadership is aware of security projects and opportunities. every single week. Everyone from our CEO down is deeply aware of the places we want to improve, as well as why we feel that way. We're never a blocker in the security team for speed. Instead, we want to be the group that works with teams to make security easier and more efficient for them. And I think the first one here is critically important, be optimistic and accountable. It's really easy to get caught up in a headline about security where something went wrong. Or when a number of things went wrong to create one big mess. But what you don't see are the trillions of distinct activities and decisions that are going right each and every day. There is simply no way to measure just how much positive goodness is happening around us all the time. You're watching Netflix while you're on your phone, and you get a Slack notification. So many untold hours of work have gone into that one quick scenario to make all of our lives better. And as you're doing all that it's almost always going to be 100% right and in a secure manner. The bad days are outliers, they're not the norm. But with that comes accountability. When things do go wrong, own them and make the decision to do better. That's really our daily task and security, get a little bit better at our jobs, about protecting our customers every single day. Get a little smarter. And that's where root cause comes in. Whenever you see something is not quite right, the solution isn't just to fix it. Fixing it makes it go away, but it may not lead to the eventual outcome that you want. Instead, figure out why things are happening in your environment. That's the sort of activity that can pay huge dividends when you solve the true root problem. The last thing I want to highlight today is diversity in hiring and training. This is a space that I'm passionate about. I fundamentally believe that a broad range of perspectives makes us far better as an industry. We must reflect the communities that we serve. We often see the new and creative thought comes from places that aren't thinking alike where group think hasn't set in. The other part of this is about having a training program that allows for security engineers to be created internally. The shortage for security personnel is projected to hit over 3 million people in the next decade, there aren't going to be enough people studying this discipline, for us to make up that gap with college graduates alone. So we need to do it with the talent that we have. If you have customer service people or physical security personnel, or really any other operational domain, where your people are showing drive and aptitude, have a pathway to security engineer for them. Invest in robust training for the employees who already embody your culture. External hires in this area are competitive and time consuming. So we're in the process of implementing multiple pathways to security engineering for our people internally. These are great jobs with a lot of autonomy and creativity. We've got to show people the way to get there first. People want to do the right thing. And they want to be helpful in the realm of security. It's up to us to support the transition. So that's our session for today. I want to thank everyone for listening and I hope I've given you a few items you can take back to your work and implement. You can follow me on twitter at @Steven Schmidt. I post there every so often with my take on security. That said I hope you have a safe and secure day you enjoy the rest of re:Invent. The security track has a bunch of great offerings this year. So please do check out a few more security sessions if you've got the time. Thank you everyone. Please make sure you complete the session survey. [music playing]
Info
Channel: AWS Events
Views: 6,233
Rating: undefined out of 5
Keywords: re:Invent 2020, Amazon, AWS re:Invent, SEC291-L, Leadership, Security Compliance, Identity, Deloitte
Id: ScybA4Zb4kA
Channel Id: undefined
Length: 56min 41sec (3401 seconds)
Published: Fri Feb 05 2021
Related Videos
Note
Please note that this website is currently a work in progress! Lots of interesting data and statistics to come.