SlideShare una empresa de Scribd logo
1 de 34
AWS Account, Spend, and
Audit Best Practices
Ed Lee
Saradhi Sreegiriraju
Feb 23 2017 @ 10:05 PST
VOIP or Dial-in (see chat)
Questions? Hit the GTW chat or @applatix
Who are we?
Ed Lee
Founder & CTO
Saradhi Sreegiriraju
Founder & CPO
February 23, 2017 2AWS Account, Spend, and Audit Best Practices
Agenda
• AWS account & user management
• Spend monitoring & analysis
• Audit & governance
February 23, 2017 3AWS Account, Spend, and Audit Best Practices
AWS Account Management
AWS account structure
February 23, 2017 5AWS Account, Spend, and Audit Best Practices
AWS “Main”
account
“Root User” for main account
First things first – protect ‘Root User’ account
• Root User Account is the most important account
Cannot be deleted
Access cannot be limited using roles
• Best Practices
Activate MFA for the Root User account
Do not create access keys for the Root User account
Don’t use your Root User account unless specifically needed
oInstead, create separate admin user accounts
February 23, 2017 6AWS Account, Spend, and Audit Best Practices
Secure your “Main” AWS account
• Restrict use of the “Main” AWS account
 Use it primarily for user management, consolidated billing and
access control
 Activate MFA for all user accounts with any significant privilege
February 23, 2017 7AWS Account, Spend, and Audit Best Practices
Use ”sub” accounts for actual work
February 23, 2017 8AWS Account, Spend, and Audit Best Practices
AWS “dev”
account
“Root User” for dev account
AWS “qa”
account
“Root User” for qa account
AWS “prod”
account
“Root User” for prod account
AWS “Main”
account
“Root User” for main account
AWS Identity & Access Management (IAM)
February 23, 2017 9AWS Account, Spend, and Audit Best Practices
IAM Users Groups Policies
Roles Policies
Policies Roles
“Assume”
Mapping IAM Users, Groups, and Policies
February 23, 2017 10AWS Account, Spend, and Audit Best Practices
AWS “dev”
account
“Root User” for dev account
AWS “qa”
account
“Root User” for qa account
AWS “prod”
account
“Root User” for prod account
User Group Policy
Mary Kome admin dev-admin
Bob Adams admin prod-admin
Joe Smith quality qa-user
IAM Users, Groups, and Policies
Define all IAM Users in “Main” account
AWS “Main”
account
“Root User” for main account
User Group Policy
Mary Kome admin dev-admin
Bob Adams admin prod-admin
Joe Smith quality qa-admin
Mapping IAM Users, Groups, and Policies
February 23, 2017 11AWS Account, Spend, and Audit Best Practices
AWS “dev”
account
“Root User” for dev account
AWS “qa”
account
“Root User” for qa account
AWS “prod”
account
“Root User” for prod accountRoles
dev-admin-role Roles
prod-admin-role
Define all IAM Users in “Main” account
AWS “Main”
account
“Root User” for main account
IAM Users, Groups, and Policies
AWS console access to sub accounts
• Create policies to grant access to sub accounts from main
account
Example policy to allow cross-account role switching from main account
{
"Version": "2012-10-17",
"Statement": {
"Effect": "Allow",
"Action": "sts:AssumeRole",
"Resource": "arn:aws:iam::xxx-account1-xxx:role/dev-role"
}
}
February 23, 2017 12AWS Account, Spend, and Audit Best Practices
AWS console access to sub accounts
• Users log into main account and then
“switch” to sub accounts where they
do their actual work
• Require MFA to switch roles (a good
way to force users to use MFA)
• Use policies to govern which users can
switch to which accounts
February 23, 2017 13AWS Account, Spend, and Audit Best Practices
API access to sub accounts
• Create access keys only for main user accounts
• Control API access to sub AWS accounts using roles and policies
• Use policies to govern which users can make API calls to which AWS
accounts using which roles
• Specify an external_id => role cannot be used from the console
[profile dev-account]
source_profile = main-account
role_arn = arn:aws:iam::<xxx>-dev-account-id-<xxx>:role/dev-api-access
external_id = <yyy>
February 23, 2017 14AWS Account, Spend, and Audit Best Practices
Not so good alternatives
• One account for everything
 Lack of project-level visibility and accountability
 Lack of isolation between projects
oProjects members will be stepping on each other’s toes
oSome important AWS resource limits are per account and cannot be
increased
• Every user has a user account & access key on every account
 Impossible to keep track of who has access to what
 Greater likelihood a user will “leak” or lose track of their
passwords or access keys
February 23, 2017 15AWS Account, Spend, and Audit Best Practices
User Group Policy
Mary Kome admin dev-admin
Bob Adams admin prod-admin
Joe Smith quality qa-admin
In summary
February 23, 2017 16AWS Account, Spend, and Audit Best Practices
AWS “dev”
account
“Root User” for dev account
AWS “qa”
account
“Root User” for qa account
AWS “prod”
account
“Root User” for prod accountRoles
dev-admin-role Roles
prod-admin-role
Define all IAM Users in “Main” account
AWS “Main”
account
“Root User” for main account
IAM Users, Groups, and Policies
Spend Monitoring & Analysis
Monitor your spending
• Regularly monitor spending and investigate changes in
spending
• Use AWS Cost Explorer (or third party applications/services)
 It’s free!
 Provides useful information related to Reserved Instances
 Does not provide hourly granularity
 Does not break out enough items
 Limited usefulness in categorizing spending
February 23, 2017 18AWS Account, Spend, and Audit Best Practices
Example AWS cost explorer report
February 23, 2017 19AWS Account, Spend, and Audit Best Practices
Enable AWS cost and usage reports
• Enable consolidated billing report on main account
 Choose hourly granularity
 Enable resource ids (useful for analyzing RI usage)
February 23, 2017 20AWS Account, Spend, and Audit Best Practices
Enable AWS cost and usage reports
February 23, 2017 21AWS Account, Spend, and Audit Best Practices
Use the new AWS cost and usage reports
• Two types of billing report formats
Detailed billing reports – old format
AWS cost & usage reports – new format
Mainly differ in how RI usage is reported
• Best practice: AWS recommends using the new format
February 23, 2017 22AWS Account, Spend, and Audit Best Practices
Tag your resources
• Choose a scheme for tagging your resources
User, project, application etc.
• Enable the tags you want in your billing reports
• Allows you to group spending by tags
Very useful for analyzing and allocating costs
• Challenge is to systematically tag your resources
Automation may be required
February 23, 2017 24AWS Account, Spend, and Audit Best Practices
Limitations of AWS billing reports
• Even at hourly granularity, report is generated twice a day
• 2-3 day delay for the last day of the month
• Daily S3 usage is attributed to a particular hour in the day
• The upfront payments for RIs are not amortized
February 23, 2017 25AWS Account, Spend, and Audit Best Practices
Claudia – Free AWS cost management
February 23, 2017 26AWS Account, Spend, and Audit Best Practices
Application granular resource usage metrics
February 23, 2017 27AWS Account, Spend, and Audit Best Practices
Audit & Governance
Enable logs for Audit and Governance
• Enable Cloud Trail on all accounts (including sub-accounts)
 Who did what when
 Also very useful when you hit API call limits
February 23, 2017 29AWS Account, Spend, and Audit Best Practices
Use roles instead of access keys
• Keys can be leaked, roles cannot
• Keys can be unknowingly shared
• Roles can be revoked more easily
• If you must use keys
 Grant the minimum required permissions
 Do not share keys
 Use a separate key per user/entity
oBetter audit trail
oEasier to revoke
February 23, 2017 30AWS Account, Spend, and Audit Best Practices
Create a network map early
• Helps you access your AWS infrastructure using private IP
addresses
• Create a CIDR map and avoid overlapping network addresses
for subnets that you want to route to
 Having this in place early will save you time and effort later
• VPC peering is a convenient way to route between accounts
 Management can be difficult
 VPCs must be in the same region
February 23, 2017 32AWS Account, Spend, and Audit Best Practices
Regularly check for security exposures
• Security groups open to the Internet
 E.g. Ports open to 0.0.0.0/0
• Log incoming connections
 Useful for analyzing potential threats and for forensics in the event of a break in
• Log outgoing connections
 Useful for detecting a break in
 A compromised instance is often used to attack other systems (DDoS, port scans)
• Use software for regular vulnerability scanning & testing
 Often requires pre-approval from AWS
• Carefully design and configure any Internet facing services
February 23, 2017 33AWS Account, Spend, and Audit Best Practices
Key Takeaways
• Setting up proper account management is critical
• Enable consolidated billing and reporting for tracking use
• Create network maps from the get go and keep them updated
• Enable audit logging and regularly perform security checks
February 23, 2017 34AWS Account, Spend, and Audit Best Practices
Thank you!
• For more resources see http://applatix.com/resources
• Feedback? Questions? info@applatix.com or @applatix
• Our next Webinar
 March 16th, 2017
 Cloud Management and Spend Analysis
February 23, 2017 35AWS Account, Spend, and Audit Best Practices
Thank you

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

AWSome Day Intro - Copenhagen 20160309
AWSome Day Intro - Copenhagen 20160309AWSome Day Intro - Copenhagen 20160309
AWSome Day Intro - Copenhagen 20160309
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
SEC309 Secure Your Cloud Investment: Mastering AWS Identity Access Management...
 
IAM Recommended Practices
IAM Recommended PracticesIAM Recommended Practices
IAM Recommended Practices
 
AWS re:Invent 2016: Reduce Your Blast Radius by Using Multiple AWS Accounts P...
AWS re:Invent 2016: Reduce Your Blast Radius by Using Multiple AWS Accounts P...AWS re:Invent 2016: Reduce Your Blast Radius by Using Multiple AWS Accounts P...
AWS re:Invent 2016: Reduce Your Blast Radius by Using Multiple AWS Accounts P...
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Account Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWSAccount Separation and Mandatory Access Control on AWS
Account Separation and Mandatory Access Control on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Wrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS OrganizationsWrangling Multiple AWS Accounts with AWS Organizations
Wrangling Multiple AWS Accounts with AWS Organizations
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
Integrate Social Login Into Mobile Apps (SEC401) | AWS re:Invent 2013
 
Protecting Our Data on AWS
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Using AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your CloudUsing AWS Organizations to Ensure Compliance in Your Cloud
Using AWS Organizations to Ensure Compliance in Your Cloud
 
Getting Started with Amazon Enterprise Applications
Getting Started with Amazon Enterprise ApplicationsGetting Started with Amazon Enterprise Applications
Getting Started with Amazon Enterprise Applications
 
Architecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi AccountsArchitecting Security and Governance Across Multi Accounts
Architecting Security and Governance Across Multi Accounts
 
(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud(SEC203) Journey to Securing Time Inc's Move to the Cloud
(SEC203) Journey to Securing Time Inc's Move to the Cloud
 
Account Separation and Mandatory Access Control
Account Separation and Mandatory Access ControlAccount Separation and Mandatory Access Control
Account Separation and Mandatory Access Control
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 

Destacado

Destacado (20)

AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Webcast: AWS Sticker Shock? How can containers and automation help?
Webcast: AWS Sticker Shock?  How can containers and automation help?Webcast: AWS Sticker Shock?  How can containers and automation help?
Webcast: AWS Sticker Shock? How can containers and automation help?
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
AWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan NaydenovAWS VPC best practices 2016 by Bogdan Naydenov
AWS VPC best practices 2016 by Bogdan Naydenov
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
Shared Security in AWS
Shared Security in AWSShared Security in AWS
Shared Security in AWS
 
(SEC201) AWS Security Keynote Address | AWS re:Invent 2014
(SEC201) AWS Security Keynote Address | AWS re:Invent 2014(SEC201) AWS Security Keynote Address | AWS re:Invent 2014
(SEC201) AWS Security Keynote Address | AWS re:Invent 2014
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
A guide on Aws Security Token Service
A guide on Aws Security Token ServiceA guide on Aws Security Token Service
A guide on Aws Security Token Service
 
From One to Many: Evolving VPC Design
From One to Many: Evolving VPC DesignFrom One to Many: Evolving VPC Design
From One to Many: Evolving VPC Design
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
The Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
The Fundamentals of Networking in AWS: VPC and Connectivity Options - BusinessThe Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
The Fundamentals of Networking in AWS: VPC and Connectivity Options - Business
 
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
You Can’t Protect What You Can’t See: AWS Security Monitoring & Compliance Va...
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar Series
 

Similar a Webcast: AWS account setup tips for audit, governance, and security

Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptxTrack 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
Amazon Web Services
 

Similar a Webcast: AWS account setup tips for audit, governance, and security (20)

Governance at Scale
Governance at Scale Governance at Scale
Governance at Scale
 
Applying AWS Organizations to Complex Account Structures - April 2017 AWS Onl...
Applying AWS Organizations to Complex Account Structures - April 2017 AWS Onl...Applying AWS Organizations to Complex Account Structures - April 2017 AWS Onl...
Applying AWS Organizations to Complex Account Structures - April 2017 AWS Onl...
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
 
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
 
AWS Organizations & Service Control Policy
AWS Organizations & Service Control PolicyAWS Organizations & Service Control Policy
AWS Organizations & Service Control Policy
 
Centralized IAM Governance using CloudFormation StackSets and AWS Organizatio...
Centralized IAM Governance using CloudFormation StackSets and AWS Organizatio...Centralized IAM Governance using CloudFormation StackSets and AWS Organizatio...
Centralized IAM Governance using CloudFormation StackSets and AWS Organizatio...
 
AWS Windsor User Group - June 7th 2018 - Amazon Web Services IAM
AWS Windsor User Group - June 7th 2018 - Amazon Web Services IAMAWS Windsor User Group - June 7th 2018 - Amazon Web Services IAM
AWS Windsor User Group - June 7th 2018 - Amazon Web Services IAM
 
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech TalksLaunch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
Launch AWS Faster using Automated Landing Zones - AWS Online Tech Talks
 
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptxSteve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
Steve Seaney_AWS Control Tower - 2023 Midwest Community Day - Final.pptx
 
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
Using AWS CloudTrail to Enhance Governance and Compliance of Amazon S3 - DEV3...
 
How to Manage Multiple AWS Accounts using AWS Organizations
How to Manage Multiple AWS Accounts using AWS OrganizationsHow to Manage Multiple AWS Accounts using AWS Organizations
How to Manage Multiple AWS Accounts using AWS Organizations
 
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
How to Enable Single Sign On to Multiple AWS Accounts and Business Applicatio...
 
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
 
Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptxTrack 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
Track 5 Session 2_SEC01 多重帳戶安全策略與方針.pptx
 
Benefits of Cloud Computing
Benefits of Cloud ComputingBenefits of Cloud Computing
Benefits of Cloud Computing
 
SID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategySID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account Strategy
 
Controlling Access to your Resources
Controlling Access to your ResourcesControlling Access to your Resources
Controlling Access to your Resources
 
AWS Community Day Chicago 2019 - Well Architected
AWS Community Day Chicago 2019 - Well ArchitectedAWS Community Day Chicago 2019 - Well Architected
AWS Community Day Chicago 2019 - Well Architected
 
AWS Community Day - David Matthews - Living Well-Architected
AWS Community Day - David Matthews - Living Well-ArchitectedAWS Community Day - David Matthews - Living Well-Architected
AWS Community Day - David Matthews - Living Well-Architected
 

Último

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 

Último (20)

Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 

Webcast: AWS account setup tips for audit, governance, and security

  • 1. AWS Account, Spend, and Audit Best Practices Ed Lee Saradhi Sreegiriraju Feb 23 2017 @ 10:05 PST VOIP or Dial-in (see chat) Questions? Hit the GTW chat or @applatix
  • 2. Who are we? Ed Lee Founder & CTO Saradhi Sreegiriraju Founder & CPO February 23, 2017 2AWS Account, Spend, and Audit Best Practices
  • 3. Agenda • AWS account & user management • Spend monitoring & analysis • Audit & governance February 23, 2017 3AWS Account, Spend, and Audit Best Practices
  • 5. AWS account structure February 23, 2017 5AWS Account, Spend, and Audit Best Practices AWS “Main” account “Root User” for main account
  • 6. First things first – protect ‘Root User’ account • Root User Account is the most important account Cannot be deleted Access cannot be limited using roles • Best Practices Activate MFA for the Root User account Do not create access keys for the Root User account Don’t use your Root User account unless specifically needed oInstead, create separate admin user accounts February 23, 2017 6AWS Account, Spend, and Audit Best Practices
  • 7. Secure your “Main” AWS account • Restrict use of the “Main” AWS account  Use it primarily for user management, consolidated billing and access control  Activate MFA for all user accounts with any significant privilege February 23, 2017 7AWS Account, Spend, and Audit Best Practices
  • 8. Use ”sub” accounts for actual work February 23, 2017 8AWS Account, Spend, and Audit Best Practices AWS “dev” account “Root User” for dev account AWS “qa” account “Root User” for qa account AWS “prod” account “Root User” for prod account AWS “Main” account “Root User” for main account
  • 9. AWS Identity & Access Management (IAM) February 23, 2017 9AWS Account, Spend, and Audit Best Practices IAM Users Groups Policies Roles Policies Policies Roles “Assume”
  • 10. Mapping IAM Users, Groups, and Policies February 23, 2017 10AWS Account, Spend, and Audit Best Practices AWS “dev” account “Root User” for dev account AWS “qa” account “Root User” for qa account AWS “prod” account “Root User” for prod account User Group Policy Mary Kome admin dev-admin Bob Adams admin prod-admin Joe Smith quality qa-user IAM Users, Groups, and Policies Define all IAM Users in “Main” account AWS “Main” account “Root User” for main account
  • 11. User Group Policy Mary Kome admin dev-admin Bob Adams admin prod-admin Joe Smith quality qa-admin Mapping IAM Users, Groups, and Policies February 23, 2017 11AWS Account, Spend, and Audit Best Practices AWS “dev” account “Root User” for dev account AWS “qa” account “Root User” for qa account AWS “prod” account “Root User” for prod accountRoles dev-admin-role Roles prod-admin-role Define all IAM Users in “Main” account AWS “Main” account “Root User” for main account IAM Users, Groups, and Policies
  • 12. AWS console access to sub accounts • Create policies to grant access to sub accounts from main account Example policy to allow cross-account role switching from main account { "Version": "2012-10-17", "Statement": { "Effect": "Allow", "Action": "sts:AssumeRole", "Resource": "arn:aws:iam::xxx-account1-xxx:role/dev-role" } } February 23, 2017 12AWS Account, Spend, and Audit Best Practices
  • 13. AWS console access to sub accounts • Users log into main account and then “switch” to sub accounts where they do their actual work • Require MFA to switch roles (a good way to force users to use MFA) • Use policies to govern which users can switch to which accounts February 23, 2017 13AWS Account, Spend, and Audit Best Practices
  • 14. API access to sub accounts • Create access keys only for main user accounts • Control API access to sub AWS accounts using roles and policies • Use policies to govern which users can make API calls to which AWS accounts using which roles • Specify an external_id => role cannot be used from the console [profile dev-account] source_profile = main-account role_arn = arn:aws:iam::<xxx>-dev-account-id-<xxx>:role/dev-api-access external_id = <yyy> February 23, 2017 14AWS Account, Spend, and Audit Best Practices
  • 15. Not so good alternatives • One account for everything  Lack of project-level visibility and accountability  Lack of isolation between projects oProjects members will be stepping on each other’s toes oSome important AWS resource limits are per account and cannot be increased • Every user has a user account & access key on every account  Impossible to keep track of who has access to what  Greater likelihood a user will “leak” or lose track of their passwords or access keys February 23, 2017 15AWS Account, Spend, and Audit Best Practices
  • 16. User Group Policy Mary Kome admin dev-admin Bob Adams admin prod-admin Joe Smith quality qa-admin In summary February 23, 2017 16AWS Account, Spend, and Audit Best Practices AWS “dev” account “Root User” for dev account AWS “qa” account “Root User” for qa account AWS “prod” account “Root User” for prod accountRoles dev-admin-role Roles prod-admin-role Define all IAM Users in “Main” account AWS “Main” account “Root User” for main account IAM Users, Groups, and Policies
  • 17. Spend Monitoring & Analysis
  • 18. Monitor your spending • Regularly monitor spending and investigate changes in spending • Use AWS Cost Explorer (or third party applications/services)  It’s free!  Provides useful information related to Reserved Instances  Does not provide hourly granularity  Does not break out enough items  Limited usefulness in categorizing spending February 23, 2017 18AWS Account, Spend, and Audit Best Practices
  • 19. Example AWS cost explorer report February 23, 2017 19AWS Account, Spend, and Audit Best Practices
  • 20. Enable AWS cost and usage reports • Enable consolidated billing report on main account  Choose hourly granularity  Enable resource ids (useful for analyzing RI usage) February 23, 2017 20AWS Account, Spend, and Audit Best Practices
  • 21. Enable AWS cost and usage reports February 23, 2017 21AWS Account, Spend, and Audit Best Practices
  • 22. Use the new AWS cost and usage reports • Two types of billing report formats Detailed billing reports – old format AWS cost & usage reports – new format Mainly differ in how RI usage is reported • Best practice: AWS recommends using the new format February 23, 2017 22AWS Account, Spend, and Audit Best Practices
  • 23. Tag your resources • Choose a scheme for tagging your resources User, project, application etc. • Enable the tags you want in your billing reports • Allows you to group spending by tags Very useful for analyzing and allocating costs • Challenge is to systematically tag your resources Automation may be required February 23, 2017 24AWS Account, Spend, and Audit Best Practices
  • 24. Limitations of AWS billing reports • Even at hourly granularity, report is generated twice a day • 2-3 day delay for the last day of the month • Daily S3 usage is attributed to a particular hour in the day • The upfront payments for RIs are not amortized February 23, 2017 25AWS Account, Spend, and Audit Best Practices
  • 25. Claudia – Free AWS cost management February 23, 2017 26AWS Account, Spend, and Audit Best Practices
  • 26. Application granular resource usage metrics February 23, 2017 27AWS Account, Spend, and Audit Best Practices
  • 28. Enable logs for Audit and Governance • Enable Cloud Trail on all accounts (including sub-accounts)  Who did what when  Also very useful when you hit API call limits February 23, 2017 29AWS Account, Spend, and Audit Best Practices
  • 29. Use roles instead of access keys • Keys can be leaked, roles cannot • Keys can be unknowingly shared • Roles can be revoked more easily • If you must use keys  Grant the minimum required permissions  Do not share keys  Use a separate key per user/entity oBetter audit trail oEasier to revoke February 23, 2017 30AWS Account, Spend, and Audit Best Practices
  • 30. Create a network map early • Helps you access your AWS infrastructure using private IP addresses • Create a CIDR map and avoid overlapping network addresses for subnets that you want to route to  Having this in place early will save you time and effort later • VPC peering is a convenient way to route between accounts  Management can be difficult  VPCs must be in the same region February 23, 2017 32AWS Account, Spend, and Audit Best Practices
  • 31. Regularly check for security exposures • Security groups open to the Internet  E.g. Ports open to 0.0.0.0/0 • Log incoming connections  Useful for analyzing potential threats and for forensics in the event of a break in • Log outgoing connections  Useful for detecting a break in  A compromised instance is often used to attack other systems (DDoS, port scans) • Use software for regular vulnerability scanning & testing  Often requires pre-approval from AWS • Carefully design and configure any Internet facing services February 23, 2017 33AWS Account, Spend, and Audit Best Practices
  • 32. Key Takeaways • Setting up proper account management is critical • Enable consolidated billing and reporting for tracking use • Create network maps from the get go and keep them updated • Enable audit logging and regularly perform security checks February 23, 2017 34AWS Account, Spend, and Audit Best Practices
  • 33. Thank you! • For more resources see http://applatix.com/resources • Feedback? Questions? info@applatix.com or @applatix • Our next Webinar  March 16th, 2017  Cloud Management and Spend Analysis February 23, 2017 35AWS Account, Spend, and Audit Best Practices

Notas del editor

  1. Create sub accounts for actual projects or teams Do not create users or access keys on sub accounts Instead, use cross-account roles & policies to grant access to sub accounts from main account Protect “Root User” account of sub accounts as well
  2. Number of resources in an AWS account affects size of the reports Hourly granularity with resource & tags enabled generates large reports Alternatively, enable both hourly and daily granularity but enable resource and tags only for daily granularity
  3. Lots of landmines in the public cloud; beware. Applatix can help