SlideShare una empresa de Scribd logo
1 de 33
Brett Miller
AWS Professional Services
December 2015
Introduction to Security-Focused
Standardized Architectures (SFSA)
Welcome & Objectives
 Understand the purpose and benefits of SFSA
 Review contents of the SFSA package
 Review common use case scenarios and implementations
 Know how to get started using SFSA in your organization
Customer Challenges
 Meeting compliance requirements (NIST, PCI, HIPAA, CJIS, etc.)
 Choosing from a myriad of options when designing for the cloud
 Making many critical decisions to ensure a secure application when
using the AWS Shared Responsibility Model
 Mapping security controls to numerous AWS services
− Example: 400 NIST 800-53 Security Controls to 42 AWS Services
 Error prone and time-consuming manual configuration of AWS
resources
AWS developed SFSA to address major customer
challenges when moving to the cloud
Customer Challenges
 Meeting compliance requirements (NIST,
PCI, HIPAA, CJIS, etc.)
 Choosing from a myriad of options when
designing for the cloud
 Making many critical decisions to ensure a
secure application when using the AWS
Shared Responsibility Model
 Mapping security controls to numerous
AWS services
− Example: 400 NIST 800-53 Security
Controls to 42 AWS Services
 Error prone and time-consuming manual
configuration of AWS resources
AWS developed SFSA to address major customer
challenges when moving to the cloud
AWS Solution: SFSA
 Standardized for specific use cases
 Address security/compliance
requirements and AWS best
practices
 Ready to be pre-approved by
customer assessment organizations
 Ready to deploy “out of the box”
 Customizable
Shared Responsibility Model
Customers are responsible for how they use AWS components in AWS
Customer Data
Platform, Applications,
Identity & Access Management
Operating System, Network &
Firewall Configuration
Client-side Data
Encryption & Data
Integrity
Authentication
Server-side Encryption
(File System and/or
Data)
Network Traffic
Protection (Encryption /
Integrity / Identity)
DatabaseStorageCompute Networking
Edge
Locations
Regions
Avail. Zones
AWS Global
Infrastructure
Customer
Responsible for
security ‘in’ the Cloud
Responsible for
security ‘of’ the Cloud
AWS
Infrastructure Services Container Services
Abstracted ServicesSecurity Controls
Inherited
Hybrid
Shared
Customer
Specific
Fully inherited by AWS
AWS provides partial implementation
AWS and customer provides their implementation
Sole Responsibility of the customer
Division of Responsibility changes depending on AWS
service
SFSA helps simplify and accelerate your AWS
migrations
Benefits
 Automate system deployments
 Address security/compliance requirements
 Follow best practices
 Decrease deployment time
 Provide Reusable Documentation
AWS built the SFSA Package to include several key
artifacts to meet customer needs
Package Overview
 CloudFormation Templates
 Guidance Documentation
 Security Controls/Requirements Matrix
− NIST SP 800-53 available now
− Coming Soon: PCI DSS, CJIS, HIPAA, ISO
27001
 Customizable Reference Architecture Diagram
AWS SFSA CloudFormation Stacks
 Multiple nested stacks
− For different types of workloads
− Modular and customizable
− Each stack builds a portion of architecture
Each package consists of multiple CloudFormation templates
reusable across different use cases
SFSA CloudFormation Stack
2,500 lines of JSON code = 126 AWS Resources, 200+ API Actions
Documentation
Included with every package is a User Guide along with an inventory
of resources deployed by the templates
Resource Inventory
User Guide
Security Controls / Compliance Mapping
 Pre-documents how security controls/requirements are addressed by the
SFSA within the VPC/infrastructure layer
− Can be included in a customer’s compliance documentation/SSP
− Can be ingested into customer security/compliance databases/workflow tools
 Contains additional guidance for each control/requirement
 Identifies which CloudFormation stack implements the control/requirement
 Identifies related AWS resources within each stack
 NIST SP 800-53 controls matrix will be followed by CJIS, SOC, PCI, and
other third-party compliance frameworks
Security Controls / Compliance Mapping: Example
Matrix
Customizable Reference Architecture
SFSA Use Cases
 Base Architectures
Examples:
− Base IAM Configuration
− Base VPC Architecture for Internal VPC
 Full Applications
Examples:
− 3 Tier Linux Web Application
− Shared Services VPC with Active
Directory
Before you get started…
 Understand use cases and workload types
 Have a basic understanding of your governance model
 Have a basic cloud strategy and roadmap
 Identify relevant security standards or compliance
requirements
− Have an organizational appetite to comply with them
As a Baseline for your architectures
Plan and design the Cloud-
based infrastructure
Build the infrastructure
using AWS components
Application Deployment
Deploy applications using EC2
instances and other services
within the cloud infrastructure
SFSA
Plan and design the Cloud-based
infrastructure
Build the infrastructure using
AWS components
Application Deployment
Deploy applications using EC2
instances and other services
within the cloud infrastructure
SFSA
As a Full Application Deployment
How can SFSA be used?
Security Focused Standardized
Architectures (SFSA)
CloudFormation Intro and Tools
AWS CloudFormation
 Basic standard in AWS for automating
deployment of resources
 CloudFormation Template
− JSON-formatted document which describes
a configuration to be deployed in an AWS
account
− When deployed, refers to a “stack” of
resources
AWS
CloudFormation
CloudFormation Template Structure
 Describe detailed configuration of
a resource in AWS
 Include, but not limited to:
− IAM Policies, Users, Groups, Roles
− VPCs, Subnets, NACLs, Security
Groups
− EC2 instances, Auto Scaling Groups
− RDS Databases, S3 Buckets
− Elastic Load Balancers
− CloudWatch Alarms
− Lambda Functions
− Logging (CloudTrail, CW Logs)
SFSA CloudFormation Resources
 20+ selectable variables to
customize the AWS
infrastructure
 Variables can be immutable
based on organizational
requirements
SFSA CloudFormation Parameters
SFSA + Customer Governance Model
Managing SFSA Packages
 Templates can be kept under version control
 Establishes baselines for standard AWS
configurations
 Organizationally approved architectures can be
stored centrally
 Mandatory for many third-party security
frameworks
Deployment Options
 AWS Console
 CLI Deployment
− Deployment scripts included with package
 AWS Service Catalog
− As a Service Catalog “Product”
AWS Management Console
CLI Deployment Scripts
 “cfdeploy”
− Optional tool included with package to make deployment from CLI easier
− Simpler management of standard parameters
cfdeploy --deploy SFSA --yaml-parameters templates/parameters/example_useast1.yaml --template templates/main-webapp-linux.json --
region us-east-1
Launched Stack ID: arn:aws:cloudformation:us-east-1:979676883363:stack/ASFA/e1442430-78f8-11e5-b55e-50d5018a129a
SFSA Deployment with AWS Service Catalog
 Standardize deployment
 Allow push-button build of common architectures based on compliance and
use case
 Provide a self-service model for workload owners
 Allows administrators to create and manage approved catalogs of
resources (products) that end users can access via a personalized
portal
 A Service Catalog Product is a deployable CloudFormation template
 Managed compliance with Service Catalog
− Provide a catalog of pre-built, compliant architectures ready to deploy
− Enforce resource tagging
− Allow workload owners to deploy resources which normally require higher
levels of IAM permissions than they are given
− Separate Portfolios of Products can be used to segment products by
compliance type
AWS Service Catalog
AWS SFSA & Service Catalog
Get started with SFSA
 Contact your sales representative/SA
 AWS Quickstart Deployments (coming soon)
 Getting Help:
− Whitepapers/User Guides/SA
Included with the package
− FREE 1 day workshop provided by Solutions
Architects or Professional Services
− SOW-based 2-5 day ProServe customization
workshop
Professional Services or APN Partner
 Email: brettmi@amazon.com
Additional Resources
 AWS SFSA Quick Start Test Drive
− https://s3.amazonaws.com/quickstart-reference/security-compliance/latest/doc/Standard_NIST_800-
53_Architecture_on_the_AWS_Cloud.pdf
 AWS re:Invent 2015 Videos
(SEC312) Reliable Design and Deployment of Security and Compliance
https://youtu.be/KtMANvC7_n8
(ISM206) Modern IT Governance Through Transparency and Automation
https://youtu.be/YYiV_z9D2CE
Questions?

Más contenido relacionado

Destacado

Somerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)VMware
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesOllie Whitehouse
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityBob Rhubart
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Amazon Web Services
 
Li-Fi Technology PPT
Li-Fi Technology PPT Li-Fi Technology PPT
Li-Fi Technology PPT Seminar Links
 
PRESENTACIÓN BLOG
PRESENTACIÓN BLOGPRESENTACIÓN BLOG
PRESENTACIÓN BLOGmaryud
 
Bela Bartok
Bela BartokBela Bartok
Bela Bartokmarblocs
 
Ad Club Alumni Presentation 2009
Ad Club Alumni Presentation 2009Ad Club Alumni Presentation 2009
Ad Club Alumni Presentation 2009somethingtochewon
 
APMP Knowledge Sharing Tools 11 Oct07
APMP  Knowledge Sharing Tools 11 Oct07APMP  Knowledge Sharing Tools 11 Oct07
APMP Knowledge Sharing Tools 11 Oct07guest66ff7d
 
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...Callidus Software
 
Tools by Júlia Güell
Tools by Júlia GüellTools by Júlia Güell
Tools by Júlia Güellmarblocs
 
Marco T. Giordano, Identità digitale e reputazione online – pt. 3
Marco T. Giordano, Identità digitale e reputazione online – pt. 3Marco T. Giordano, Identità digitale e reputazione online – pt. 3
Marco T. Giordano, Identità digitale e reputazione online – pt. 3Andrea Rossetti
 
08 Testy První Matematické Lekce
08  Testy  První Matematické Lekce08  Testy  První Matematické Lekce
08 Testy První Matematické Lekcejedlickak07
 

Destacado (18)

Somerdata AROW Data Diode
Somerdata AROW Data DiodeSomerdata AROW Data Diode
Somerdata AROW Data Diode
 
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
Leverage Micro-Segmentation to Build a Zero Trust Network (Forrester)
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Private sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodesPrivate sector cyber resilience and the role of data diodes
Private sector cyber resilience and the role of data diodes
 
Enterprise Strategy for Cloud Security
Enterprise Strategy for Cloud SecurityEnterprise Strategy for Cloud Security
Enterprise Strategy for Cloud Security
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
 
Li-Fi Technology PPT
Li-Fi Technology PPT Li-Fi Technology PPT
Li-Fi Technology PPT
 
PRESENTACIÓN BLOG
PRESENTACIÓN BLOGPRESENTACIÓN BLOG
PRESENTACIÓN BLOG
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Bela Bartok
Bela BartokBela Bartok
Bela Bartok
 
Ad Club Alumni Presentation 2009
Ad Club Alumni Presentation 2009Ad Club Alumni Presentation 2009
Ad Club Alumni Presentation 2009
 
APMP Knowledge Sharing Tools 11 Oct07
APMP  Knowledge Sharing Tools 11 Oct07APMP  Knowledge Sharing Tools 11 Oct07
APMP Knowledge Sharing Tools 11 Oct07
 
6 Takes
6 Takes6 Takes
6 Takes
 
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...
Callidus TrueComp Implementation: Panel Discussion with the Callidus Solution...
 
Tools by Júlia Güell
Tools by Júlia GüellTools by Júlia Güell
Tools by Júlia Güell
 
Marco T. Giordano, Identità digitale e reputazione online – pt. 3
Marco T. Giordano, Identità digitale e reputazione online – pt. 3Marco T. Giordano, Identità digitale e reputazione online – pt. 3
Marco T. Giordano, Identità digitale e reputazione online – pt. 3
 
08 Testy První Matematické Lekce
08  Testy  První Matematické Lekce08  Testy  První Matematické Lekce
08 Testy První Matematické Lekce
 
I am sailing
I am sailingI am sailing
I am sailing
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

Introduction to Security-Focused Standardized Architecture

  • 1. Brett Miller AWS Professional Services December 2015 Introduction to Security-Focused Standardized Architectures (SFSA)
  • 2. Welcome & Objectives  Understand the purpose and benefits of SFSA  Review contents of the SFSA package  Review common use case scenarios and implementations  Know how to get started using SFSA in your organization
  • 3. Customer Challenges  Meeting compliance requirements (NIST, PCI, HIPAA, CJIS, etc.)  Choosing from a myriad of options when designing for the cloud  Making many critical decisions to ensure a secure application when using the AWS Shared Responsibility Model  Mapping security controls to numerous AWS services − Example: 400 NIST 800-53 Security Controls to 42 AWS Services  Error prone and time-consuming manual configuration of AWS resources AWS developed SFSA to address major customer challenges when moving to the cloud
  • 4. Customer Challenges  Meeting compliance requirements (NIST, PCI, HIPAA, CJIS, etc.)  Choosing from a myriad of options when designing for the cloud  Making many critical decisions to ensure a secure application when using the AWS Shared Responsibility Model  Mapping security controls to numerous AWS services − Example: 400 NIST 800-53 Security Controls to 42 AWS Services  Error prone and time-consuming manual configuration of AWS resources AWS developed SFSA to address major customer challenges when moving to the cloud AWS Solution: SFSA  Standardized for specific use cases  Address security/compliance requirements and AWS best practices  Ready to be pre-approved by customer assessment organizations  Ready to deploy “out of the box”  Customizable
  • 5. Shared Responsibility Model Customers are responsible for how they use AWS components in AWS Customer Data Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System and/or Data) Network Traffic Protection (Encryption / Integrity / Identity) DatabaseStorageCompute Networking Edge Locations Regions Avail. Zones AWS Global Infrastructure Customer Responsible for security ‘in’ the Cloud Responsible for security ‘of’ the Cloud AWS
  • 6. Infrastructure Services Container Services Abstracted ServicesSecurity Controls Inherited Hybrid Shared Customer Specific Fully inherited by AWS AWS provides partial implementation AWS and customer provides their implementation Sole Responsibility of the customer Division of Responsibility changes depending on AWS service
  • 7. SFSA helps simplify and accelerate your AWS migrations Benefits  Automate system deployments  Address security/compliance requirements  Follow best practices  Decrease deployment time  Provide Reusable Documentation
  • 8. AWS built the SFSA Package to include several key artifacts to meet customer needs Package Overview  CloudFormation Templates  Guidance Documentation  Security Controls/Requirements Matrix − NIST SP 800-53 available now − Coming Soon: PCI DSS, CJIS, HIPAA, ISO 27001  Customizable Reference Architecture Diagram
  • 9. AWS SFSA CloudFormation Stacks  Multiple nested stacks − For different types of workloads − Modular and customizable − Each stack builds a portion of architecture Each package consists of multiple CloudFormation templates reusable across different use cases
  • 10. SFSA CloudFormation Stack 2,500 lines of JSON code = 126 AWS Resources, 200+ API Actions
  • 11. Documentation Included with every package is a User Guide along with an inventory of resources deployed by the templates Resource Inventory User Guide
  • 12. Security Controls / Compliance Mapping  Pre-documents how security controls/requirements are addressed by the SFSA within the VPC/infrastructure layer − Can be included in a customer’s compliance documentation/SSP − Can be ingested into customer security/compliance databases/workflow tools  Contains additional guidance for each control/requirement  Identifies which CloudFormation stack implements the control/requirement  Identifies related AWS resources within each stack  NIST SP 800-53 controls matrix will be followed by CJIS, SOC, PCI, and other third-party compliance frameworks
  • 13. Security Controls / Compliance Mapping: Example Matrix
  • 15. SFSA Use Cases  Base Architectures Examples: − Base IAM Configuration − Base VPC Architecture for Internal VPC  Full Applications Examples: − 3 Tier Linux Web Application − Shared Services VPC with Active Directory
  • 16. Before you get started…  Understand use cases and workload types  Have a basic understanding of your governance model  Have a basic cloud strategy and roadmap  Identify relevant security standards or compliance requirements − Have an organizational appetite to comply with them
  • 17. As a Baseline for your architectures Plan and design the Cloud- based infrastructure Build the infrastructure using AWS components Application Deployment Deploy applications using EC2 instances and other services within the cloud infrastructure SFSA Plan and design the Cloud-based infrastructure Build the infrastructure using AWS components Application Deployment Deploy applications using EC2 instances and other services within the cloud infrastructure SFSA As a Full Application Deployment How can SFSA be used?
  • 18. Security Focused Standardized Architectures (SFSA) CloudFormation Intro and Tools
  • 19. AWS CloudFormation  Basic standard in AWS for automating deployment of resources  CloudFormation Template − JSON-formatted document which describes a configuration to be deployed in an AWS account − When deployed, refers to a “stack” of resources AWS CloudFormation
  • 21.  Describe detailed configuration of a resource in AWS  Include, but not limited to: − IAM Policies, Users, Groups, Roles − VPCs, Subnets, NACLs, Security Groups − EC2 instances, Auto Scaling Groups − RDS Databases, S3 Buckets − Elastic Load Balancers − CloudWatch Alarms − Lambda Functions − Logging (CloudTrail, CW Logs) SFSA CloudFormation Resources
  • 22.  20+ selectable variables to customize the AWS infrastructure  Variables can be immutable based on organizational requirements SFSA CloudFormation Parameters
  • 23. SFSA + Customer Governance Model
  • 24. Managing SFSA Packages  Templates can be kept under version control  Establishes baselines for standard AWS configurations  Organizationally approved architectures can be stored centrally  Mandatory for many third-party security frameworks
  • 25. Deployment Options  AWS Console  CLI Deployment − Deployment scripts included with package  AWS Service Catalog − As a Service Catalog “Product”
  • 27. CLI Deployment Scripts  “cfdeploy” − Optional tool included with package to make deployment from CLI easier − Simpler management of standard parameters cfdeploy --deploy SFSA --yaml-parameters templates/parameters/example_useast1.yaml --template templates/main-webapp-linux.json -- region us-east-1 Launched Stack ID: arn:aws:cloudformation:us-east-1:979676883363:stack/ASFA/e1442430-78f8-11e5-b55e-50d5018a129a
  • 28. SFSA Deployment with AWS Service Catalog  Standardize deployment  Allow push-button build of common architectures based on compliance and use case  Provide a self-service model for workload owners
  • 29.  Allows administrators to create and manage approved catalogs of resources (products) that end users can access via a personalized portal  A Service Catalog Product is a deployable CloudFormation template  Managed compliance with Service Catalog − Provide a catalog of pre-built, compliant architectures ready to deploy − Enforce resource tagging − Allow workload owners to deploy resources which normally require higher levels of IAM permissions than they are given − Separate Portfolios of Products can be used to segment products by compliance type AWS Service Catalog
  • 30. AWS SFSA & Service Catalog
  • 31. Get started with SFSA  Contact your sales representative/SA  AWS Quickstart Deployments (coming soon)  Getting Help: − Whitepapers/User Guides/SA Included with the package − FREE 1 day workshop provided by Solutions Architects or Professional Services − SOW-based 2-5 day ProServe customization workshop Professional Services or APN Partner  Email: brettmi@amazon.com
  • 32. Additional Resources  AWS SFSA Quick Start Test Drive − https://s3.amazonaws.com/quickstart-reference/security-compliance/latest/doc/Standard_NIST_800- 53_Architecture_on_the_AWS_Cloud.pdf  AWS re:Invent 2015 Videos (SEC312) Reliable Design and Deployment of Security and Compliance https://youtu.be/KtMANvC7_n8 (ISM206) Modern IT Governance Through Transparency and Automation https://youtu.be/YYiV_z9D2CE

Notas del editor

  1. SFSA provides AWS customers with pre-built “golden” reference architectures. These are deployable architectures for applications and use cases that have been pre-vetted by AWS and in addition a 3PAO (third party assessment) to be compliant and secure and help ensure customers have a proper starting point for deploying their applications.
  2. How many heard of shared responsibility model?
  3. Reality for customers
  4. What customers ask/need A way to easily automate architectures and configurations on AWS While ensuring compliance and best practices Decreasing deployment time – also making it easier to validate what is being deployed is compliant Ultimately – drive adoption and accelerate customers transition to AWS
  5. The fundamental part of the SFSA package is a set of structured, reusable CloudFormation templates which have been validated for the specific compliance of the package and are built for the use case. In addition included is user documentation, reference architectures, as well as a security controls mapping to help speed up accreditation as proof for auditors that the architecture deployed is compliant.
  6. Modular, reusable template design Use cases take advantage of nested templates
  7. Documentation to make the package easier for customers to get started with
  8. The SFSA packages include automated templates which can be used for either base architectures – starting points which can be built upon. Or can be used in some cases to deploy configurations for entire applications.
  9. AWS SFSA, formerly Trusted Architect
  10. Resources is only required section
  11. In this example you can optionally just use different base layers of a SFSA deployment. Very often you might have a provisioning team which simply provisions accounts for workload owners or developers and wants to keep the standards and guardrails in place from which the application can be deployed into. This means that at a minimum each workload will meet a certain number of controls and have a baseline level of compliance.