SlideShare una empresa de Scribd logo
1 de 18
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Moving from the Shadows
to the Throne
Vinay Bansal, Principal Security Architect, Cisco Systems
Larry Gilreath, Global Accounts Security Solution Architect
N o v e m b e r 2 9 , 2 0 1 7
AWS re:INVENT
SID310
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Rise of Shadow IT
IT
Focus
• Process and mechanisms
• Security controls
• Event management
Time to deliver
• Months (not days)
• Touchpoint security reviews
Operating in the shadows
• Business teams with budgets
• Outpace competition
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AND
Move
Fast
Stay
Secure
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Outline
1. Cisco’s journey with AWS
2. Security guardrails
3. Security automation in AWS
i. Security audit
ii. Logging and monitoring
iii. Vulnerability management
4. Risk scoring and metrics
5. Benefits and lessons learned
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cisco’s Journey with AWS
• Cisco engineering, IT, and product teams increasingly leveraging
public clouds
• Many acquisitions with existing footprint on public cloud
providers
• More than 700 AWS accounts across Cisco and growing
Security Problem:
How to Ensure Cisco’s Workloads Run Securely in AWS?
Past
Security: Past and Present
Present
Environment: Data centers Environment: Cloud
Methodology: DevOps Methodology: DevSecOps
Requirements: Written
Assessment: Manual reviews
Requirements: Security as code
Assessment: Automated
Metrics: Static reports Metrics: Real-time continuous
Securing Cisco’s Workloads on AWS
Establish
enterprise
agreement
Define
security
guardrails
Security
automation
•Audit checks
•Monitoring
•Vulnerability
management
Apply
security
guardrails
at account
provisioning
Risk
scoring and
metrics
Improve cloud security
Initial Security Guardrails for Cisco AWS Accounts (Day -1)
AWS Cisco Account/Project Space
1. Enforce
Strong
Identity
7. Create Account Level
Encryption Key
Audit Role
Audit TemplatesAudit User
10. Tagging and Automated Security
Audits
IAM
Bastion/Jump
2. Set Up Bastion/Jump
Host for Secure Access
ELB Logs CloudTrail
Logs
VPC Logs
Log Bucket
9. Trusted Advisor
Setup
5. Set Up Vul
Scanning
6. Enable Security Logging
New AWS
account
request
Cisco AWS
account
provisioned
Security Applied
3. Harden
Base OS
4. Network Zoning
to restrict external
exposure
8. Harden Core
AWS
Components
Tagging
Initial Security Guardrails for Cisco AWS Accounts (Day -N)
1. Enforce
Strong
Identity
7. Create Account Level
Encryption Key
Audit Role
Audit TemplatesAudit User
10. Tagging and Automated Security
Audits
IAM
Bastion/Jump
2. Set Up Bastion/Jump
Host for Secure Access
ELB Logs CloudTrail
Logs
VPC Logs
Log Bucket
9. Trusted Advisor
Setup
5. Set Up Vul
Scanning
6. Enable Security Logging
3. Harden
Base OS
4. Network Zoning
to restrict external
exposure
8. Harden Core
AWS
Components
Tagging
SSO/MFA
Encryption as a Service 11. Vault
1a. Cisco Enterprise
MFA/SSO
Direct Connect
12. Direct Connect
(Secure Data Flow)
5,9, 10 (Vul and
Audit Reports)
6a. Monitoring for
Incident detection,
response and
Forensics
Security Logs
10a. Security scan
automation
CSB (Continuous
Security Buddy)
Security Automation: Continuous Security Buddy (CSB)
Cisco AWS Tenant Account
Audit
Role
Continuous
Security
Validation
AWS
Lambda
Cisco CSIRT Account
(Cisco Security Incident Response Team)
Monitoring
CloudTrail
Logs
Log Bucket
Security Logs
Amazon Kinesis
Analytics
Log Monitoring
Strong Identity
IAM
Cisco Enterprise SSO Cisco SSO
(CEC)
2
1
3
Trusted
Advisor
Security
CloudFormation
Templates
Tagging
Cisco security accounts
CSB Audit Account
AWS Config Rules
Security Config Rules
4
Self Security
Validation
CSB Guardrail Validation (Audit): Automation
Runs every 24 hours across all Cisco AWS
accounts
table
Dynamo DB
Security
Assessment
Results
Amazon API
Gateway
AWS
Lambda
Security
Audit Scripts
Cross-Account
Security Audit
Role
Cisco AWS Tenant
Accounts
Risk Management
System (Jira)Nightly Reports
email
Real-time
Integration [WIP]
queue
Amazon
SQS
Cisco CSB Audit Account
Security Logging and Monitoring: Automation
Amazon
Kinesis
Cisco AWS Tenant Account
ELB
Logs*
VPC
Logs*
CloudTrail
Logs
Log BucketCloudWatch
Notifications from AWS security team
Log Bucket
Cisco security
investigator
Cisco CSIRT Account
(Cisco Security Incident Response Team)
Security Logs
Security
Plays
Exposure of insecure
services
Insecure authentication
Log cessation or
modification
Permissive network
ingress
Privileged account
compromise
*WIP
External Vulnerability Scan: Automation
Qualys Cloud
(Cisco Enterprise Account)
Cisco
Tenant-1
Cisco
Tenant-2
Cisco
Tenant-3
4. Vulnerability
Scan
1. Surface Identification: Identify
all external exposed EC2 instances
across all Cisco accounts
2. Notify AWS
(current via email)
3. Initiate Scan: Initiate
Qualys scan for external
AWS Cisco IP Addresses
5. Vulnerability Results
1
2
3
4
5
 Automated nightly
scans
 Vulnerabilities,
summarized and
reported to the
respective teams
CSB
AWS Security Risk Report Card
Overall Risk Score:
Security Metrics
Section Section Score
1. Identity and Access Management - 75.6/100
2. Network Security - 80/100
3. Storage (S3 buckets) - 100/100
4. Tagging - 90/100
5. External Vulnerabilities (Qualys) - 90/100
6. CIS AWS Benchmarks - 80/100
7. Trusted Advisor Checks - Not Scored
A B C D E F
• Consolidation of IAM users via SSO integration
• Identification and remediation of insecure S3 buckets
• Risk reporting (and grading) helps get attention and remediation
• Monitoring and vulnerability management capability extends to
cloud
• Tagging helps to improve attribution
• CSB seamlessly scale to 100s of AWS accounts
Benefits and Lessons Learned
• Identify your security guardrails
• Critical elements of security based on the enterprise needs
• Automate security in AWS cloud
• Scalability, speed, and lower cost
• Constantly evolve security automation and metrics
• Changing threat landscape, business needs
Summary
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

Más contenido relacionado

La actualidad más candente

Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Amazon Web Services
 
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Amazon Web Services
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWSAmazon Web Services
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Amazon Web Services
 
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Amazon Web Services
 
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...Amazon Web Services
 
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Amazon Web Services
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation OverviewAmazon Web Services
 
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Amazon Web Services
 
Incident Response in the Cloud - SID319 - re:Invent 2017
Incident Response in the Cloud - SID319 - re:Invent 2017Incident Response in the Cloud - SID319 - re:Invent 2017
Incident Response in the Cloud - SID319 - re:Invent 2017Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeAmazon Web Services
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationAmazon Web Services
 
SRV403_Serverless Authentication and Authorization
SRV403_Serverless Authentication and AuthorizationSRV403_Serverless Authentication and Authorization
SRV403_Serverless Authentication and AuthorizationAmazon Web Services
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseAmazon Web Services
 
AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017Amazon Web Services
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Amazon Web Services
 

La actualidad más candente (20)

Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
Security and DevOps: Agility and Teamwork - SID315 - re:Invent 2017
 
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
Five New Security Automation Improvements You Can Make by Using Amazon CloudW...
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
 
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
Identity Management for Your Users and Apps: A Deep Dive on Amazon Cognito - ...
 
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
How Dow Jones Identifies, Analyzes, and Remediates Security Issues with Hamme...
 
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
Continuous Compliance on AWS at Scale - SID313 - re:Invent 2017
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation Overview
 
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
 
Incident Response in the Cloud - SID319 - re:Invent 2017
Incident Response in the Cloud - SID319 - re:Invent 2017Incident Response in the Cloud - SID319 - re:Invent 2017
Incident Response in the Cloud - SID319 - re:Invent 2017
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
ThreatResponse
ThreatResponseThreatResponse
ThreatResponse
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record Change
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack Mitigation
 
SRV403_Serverless Authentication and Authorization
SRV403_Serverless Authentication and AuthorizationSRV403_Serverless Authentication and Authorization
SRV403_Serverless Authentication and Authorization
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017
 
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
Cloud Adoption Framework: Security Persepctive - Incident Response: Preparing...
 

Similar a Moving from the Shadows to the Throne - SID310 - re:Invent 2017

DevSecOps-Teams das Security-Steuer überlassen
DevSecOps-Teams das Security-Steuer überlassenDevSecOps-Teams das Security-Steuer überlassen
DevSecOps-Teams das Security-Steuer überlassenBATbern
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...Amazon Web Services
 
AWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAmazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Amazon Web Services
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) NewAmazon Web Services
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Amazon Web Services
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowAmazon Web Services
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
How We Should Think About Security
How We Should Think  About SecurityHow We Should Think  About Security
How We Should Think About SecurityAmazon Web Services
 
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentationJustin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentationTriNimbus
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the EnterpriseAmazon Web Services
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at ScaleAmazon Web Services
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 Amazon Web Services
 

Similar a Moving from the Shadows to the Throne - SID310 - re:Invent 2017 (20)

AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
DevSecOps-Teams das Security-Steuer überlassen
DevSecOps-Teams das Security-Steuer überlassenDevSecOps-Teams das Security-Steuer überlassen
DevSecOps-Teams das Security-Steuer überlassen
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...
A 360-Degree Cloud-Native Approach to Secure Your AWS Cloud Stack (SEC313-S) ...
 
AWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the Cloud
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
 
Integrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdfIntegrating_Cloud_Development_Security_And_Operations.pdf
Integrating_Cloud_Development_Security_And_Operations.pdf
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
How We Should Think About Security
How We Should Think  About SecurityHow We Should Think  About Security
How We Should Think About Security
 
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentationJustin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
Justin Fox_NuData Security_A Master_Card_Company_June 9 2017_presentation
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Moving from the Shadows to the Throne - SID310 - re:Invent 2017

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Moving from the Shadows to the Throne Vinay Bansal, Principal Security Architect, Cisco Systems Larry Gilreath, Global Accounts Security Solution Architect N o v e m b e r 2 9 , 2 0 1 7 AWS re:INVENT SID310
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Rise of Shadow IT IT Focus • Process and mechanisms • Security controls • Event management Time to deliver • Months (not days) • Touchpoint security reviews Operating in the shadows • Business teams with budgets • Outpace competition
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AND Move Fast Stay Secure
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Outline 1. Cisco’s journey with AWS 2. Security guardrails 3. Security automation in AWS i. Security audit ii. Logging and monitoring iii. Vulnerability management 4. Risk scoring and metrics 5. Benefits and lessons learned
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cisco’s Journey with AWS • Cisco engineering, IT, and product teams increasingly leveraging public clouds • Many acquisitions with existing footprint on public cloud providers • More than 700 AWS accounts across Cisco and growing Security Problem: How to Ensure Cisco’s Workloads Run Securely in AWS?
  • 7. Past Security: Past and Present Present Environment: Data centers Environment: Cloud Methodology: DevOps Methodology: DevSecOps Requirements: Written Assessment: Manual reviews Requirements: Security as code Assessment: Automated Metrics: Static reports Metrics: Real-time continuous
  • 8. Securing Cisco’s Workloads on AWS Establish enterprise agreement Define security guardrails Security automation •Audit checks •Monitoring •Vulnerability management Apply security guardrails at account provisioning Risk scoring and metrics Improve cloud security
  • 9. Initial Security Guardrails for Cisco AWS Accounts (Day -1) AWS Cisco Account/Project Space 1. Enforce Strong Identity 7. Create Account Level Encryption Key Audit Role Audit TemplatesAudit User 10. Tagging and Automated Security Audits IAM Bastion/Jump 2. Set Up Bastion/Jump Host for Secure Access ELB Logs CloudTrail Logs VPC Logs Log Bucket 9. Trusted Advisor Setup 5. Set Up Vul Scanning 6. Enable Security Logging New AWS account request Cisco AWS account provisioned Security Applied 3. Harden Base OS 4. Network Zoning to restrict external exposure 8. Harden Core AWS Components Tagging
  • 10. Initial Security Guardrails for Cisco AWS Accounts (Day -N) 1. Enforce Strong Identity 7. Create Account Level Encryption Key Audit Role Audit TemplatesAudit User 10. Tagging and Automated Security Audits IAM Bastion/Jump 2. Set Up Bastion/Jump Host for Secure Access ELB Logs CloudTrail Logs VPC Logs Log Bucket 9. Trusted Advisor Setup 5. Set Up Vul Scanning 6. Enable Security Logging 3. Harden Base OS 4. Network Zoning to restrict external exposure 8. Harden Core AWS Components Tagging SSO/MFA Encryption as a Service 11. Vault 1a. Cisco Enterprise MFA/SSO Direct Connect 12. Direct Connect (Secure Data Flow) 5,9, 10 (Vul and Audit Reports) 6a. Monitoring for Incident detection, response and Forensics Security Logs 10a. Security scan automation CSB (Continuous Security Buddy)
  • 11. Security Automation: Continuous Security Buddy (CSB) Cisco AWS Tenant Account Audit Role Continuous Security Validation AWS Lambda Cisco CSIRT Account (Cisco Security Incident Response Team) Monitoring CloudTrail Logs Log Bucket Security Logs Amazon Kinesis Analytics Log Monitoring Strong Identity IAM Cisco Enterprise SSO Cisco SSO (CEC) 2 1 3 Trusted Advisor Security CloudFormation Templates Tagging Cisco security accounts CSB Audit Account AWS Config Rules Security Config Rules 4 Self Security Validation
  • 12. CSB Guardrail Validation (Audit): Automation Runs every 24 hours across all Cisco AWS accounts table Dynamo DB Security Assessment Results Amazon API Gateway AWS Lambda Security Audit Scripts Cross-Account Security Audit Role Cisco AWS Tenant Accounts Risk Management System (Jira)Nightly Reports email Real-time Integration [WIP] queue Amazon SQS Cisco CSB Audit Account
  • 13. Security Logging and Monitoring: Automation Amazon Kinesis Cisco AWS Tenant Account ELB Logs* VPC Logs* CloudTrail Logs Log BucketCloudWatch Notifications from AWS security team Log Bucket Cisco security investigator Cisco CSIRT Account (Cisco Security Incident Response Team) Security Logs Security Plays Exposure of insecure services Insecure authentication Log cessation or modification Permissive network ingress Privileged account compromise *WIP
  • 14. External Vulnerability Scan: Automation Qualys Cloud (Cisco Enterprise Account) Cisco Tenant-1 Cisco Tenant-2 Cisco Tenant-3 4. Vulnerability Scan 1. Surface Identification: Identify all external exposed EC2 instances across all Cisco accounts 2. Notify AWS (current via email) 3. Initiate Scan: Initiate Qualys scan for external AWS Cisco IP Addresses 5. Vulnerability Results 1 2 3 4 5  Automated nightly scans  Vulnerabilities, summarized and reported to the respective teams CSB
  • 15. AWS Security Risk Report Card Overall Risk Score: Security Metrics Section Section Score 1. Identity and Access Management - 75.6/100 2. Network Security - 80/100 3. Storage (S3 buckets) - 100/100 4. Tagging - 90/100 5. External Vulnerabilities (Qualys) - 90/100 6. CIS AWS Benchmarks - 80/100 7. Trusted Advisor Checks - Not Scored A B C D E F
  • 16. • Consolidation of IAM users via SSO integration • Identification and remediation of insecure S3 buckets • Risk reporting (and grading) helps get attention and remediation • Monitoring and vulnerability management capability extends to cloud • Tagging helps to improve attribution • CSB seamlessly scale to 100s of AWS accounts Benefits and Lessons Learned
  • 17. • Identify your security guardrails • Critical elements of security based on the enterprise needs • Automate security in AWS cloud • Scalability, speed, and lower cost • Constantly evolve security automation and metrics • Changing threat landscape, business needs Summary
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!