Security Management for Cloud Computing AWS Region EU-WEST (Ireland) EU-Central (Frankfurt) US-WEST (N. California) China (Beijing) GOV CLOUD ASIA PAC (Tokyo) US-EAST (Virginia) US-WEST (Oregon) ASIA PAC (Singapore) SOUTH AMERICA (Sao Paulo) ASIA PAC (Sydney) • Regions: – Dublin (EU-West) – 3 x Availability Zones • – • Frankfurt (EU-Central) – 2 x Availability Zones Edge Locations: – • Launched in 2007 Amsterdam, The Netherlands (2), Dublin, Ireland, Frankfurt, Germany (3), London, England (3), Madrid, Spain, Marseille, France, Milan, Italy, Paris, France (2), Stockholm, Sweden, and Warsaw, Poland Direct Connect POPs: – Dublin, London, Frankfurt Your Applications Enterprise Applications Document Collaboration Virtual Desktop AWS Global Infrastructure Workspaces Deployment & Management Web Interface Zocalo Monitoring Deployment & Automation Identity & Access Human Interaction AWS Global Infrastructure Management Console Application Services Billing CloudWatch Content Delivery BeanStalk OpsWorks Cloud Formation Applications DataPipe IAM Distributed Computing Federation Mechanical Turk Libraries & SDK’s AWS Global Infrastructure CloudFront Foundation Services SES SNS Compute SQS Elastic CloudSearch Transcoder Storage SWF EMR Networking Databases AWS Global Infrastructure EC2 S3 EBS Regions Glacier Storage Gateway VPC Direct Connect ELB Route53 Availability Zones AWS Global Infrastructure AWS Global Infrastructure RDS Dynamo ElastiCache RedShift Edge Locations Security cannot be a blocker of innovative business Pace of Innovation: Security vs. All 600 40% 514 35% 500 30% 400 25% 280 300 20% 192 200 15% 159 10% 100 0 24 61 48 16 13 82 51 70 5% 23 0 0% 2008 2009 2010 Security Features 2011 2012 All Significant Features and Services 2013 Percent 2014 manages Customers Customer content Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Server-side Data Encryption Client-side Data Encryption Customers are responsible for their security and compliance IN the Cloud Network Traffic Protection AWS Foundation Services Compute AWS Global Infrastructure Storage Database Networking Availability Zones Edge Locations Regions AWS is responsible for the security OF the Cloud Customer content Client-Side Data encryption & Data Integrity Authentication Server-Side Encryption Network Traffic Protection Fire System and/or Data Encryption / Integrity / Identity Managed by Customers Operating System, Network & Firewall Configuration Customer IAM Platform & Applications Management Optional – Opaque data: 1’s and 0’s (in transit/at rest) AWS Foundation Services AWS Global Infrastructure Storage Database Availability Zones Regions Networking Edge Locations AWS IAM Compute Managed by Encryption / Integrity / Identity Optional – Opaque data: 1’s and 0’s (in transit/at rest) Platform & Applications Management Managed by Operating System, Network Configuration AWS Global Infrastructure Storage Database Availability Zones Regions Networking Edge Locations AWS IAM AWS Foundation Services Compute Customers Network Traffic Protection Firewall Configuration Client-Side Data encryption & Data Integrity Authentication Customer IAM Customer content Managed by Customers Managed by Customer content Client-Side Data Encryption & Data Integrity Authentication Optional – Opaque Data: 1’s and 0’s Network Traffic Protection by the Platform (in flight / at rest) Protection of Data at Rest Network Traffic Protection by the Platform Platform & Applications Management Operating System, Network & Firewall Configuration AWS Foundation Services Compute AWS Global Infrastructure Storage Database Availability Zones Regions Networking Edge Locations AWS IAM Protection of Data at in Transit Managed by Identity Access Management (IAM) With AWS IAM you get to control who can do what in your AWS environment and from where • • • • • • Root in AWS is the same as Root in Windows/Linux Password Policies IAM Credentials Reports Manage Access Keys Fine grained control of users, groups, roles, and permissions to resources Integrate with your existing corporate directory using SAML 2.0 and single sign-on AWS account owner Network management Security management Server management Storage management Fully managed service which provides: • An Inventory of your AWS resources • Lets you audit the resource configuration history • Notifies you of resource configuration changes • Security Analysis: Am I safe? • Config allows you to continuously monitor and evaluate configuration of workloads • Audit Compliance: Where is the evidence? • Complete inventory of all resources and their configuration attributes @ any point in time • Change Management: What will this change affect? • All resource changes (create,update,delete) streamed to SNS • Troubleshooting: What has changed? • Identify changes in resource to resource relationships AWS CLOUDTRAIL AWS CloudFormation Redshift AWS Elastic Beanstalk You are making API calls... On a growing set of services around the world… AWS CloudTrail is continuously recording API calls… And delivering log files to you AWS CloudTrail Whitepaper: https://d0.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf Singapore MTCS Accreditation & Compliance: on-prem vs on AWS On-prem On AWS • Start with bare concrete •Start on base of accredited services • Functionally optional •Functionally necessary – high watermark of requirements – (you can build a secure system without it) • Audits done by an in-house team •Audits done by third party experts • Accountable to yourself •Accountable to everyone • Typically check once a year •Continuous monitoring • Workload-specific compliance checks • •Compliance approach based on all workload scenarios Must keep pace and invest in security innovation •Security innovation drives broad compliance Customers Your own accreditation Your own certifications Your own external audits Customer scope and effort is reduced Better results through focused efforts AWS Foundation Services Compute AWS Global Infrastructure Storage Database Networking Availability Zones Edge Locations Regions Built on AWS consistent baseline controls AWS partner solutions Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure + = Your secure AWS solutions Virtualization layer (EC2) Hardened service endpoints Fine-grained IAM capability These local and global AWS partners provide wide range solutions from intrusion detection, data encryption, user management etc via SaaS and EC2 based Virtual Appliance Company: UK-based global communications platform for call centers to capture communications data Challenge: must comply with PCI DSS so their customers can process payment card data on the platform Results: PCI certified on AWS; also SOC 1 Type 2 audited, ISO 27001 certified http://d36cz9buwru1tt.cloudfront.net/Cognia-Case-Study.pdf Company: France-based insurance and healthcare coverage company, responsible for secure use and storage of confidential customer information Challenge: move critical IT to AWS and comply with the Solvency II Directive (EU insurance regulation) Results: Moved to AWS, realized cloud benefits (financial, security, scalability, availability, resiliency) and remain fully compliant with Solvency II and other compliance requirements. They are moving their other environments onto AWS. http://aws.amazon.com/solutions/case-studies/smatis/ awscompliance