SlideShare uma empresa Scribd logo
1 de 14
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shawn Marck, AWS Perimeter Protection
March, 2019
DDoS Response Team (DRT)
Engagement, Advanced Countermeasures
and Capabilities
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What does the DRT do?
• Own and execute DDoS mitigation runbook for supporting
Amazon properties, AWS Services and AWS Shield Advanced
Customers.
• Build automation which reduce or time to respond.
• Create tools to aid in swift mitigation of attacks.
• Provide training to AWS Support and technical field
community to share best practices and domain expertise on
DDoS mitigation in AWS.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Engagement
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Types of Engagement
• DDoS Architecture Review
• Operational Readiness Inquiry (Prior to IEM)
• Custom mitigation templates for EIPs
(EC2/NLBs)
Pre-emptive
Engagements
• Automatically engaged for availability
impacting L3/L4 events against AWS
infrastructure or impacting to AWS Services
• Customer driven support cases through AWS
Support or AWS Shield Engagement Lambda
• Manual traffic engineering and assessment of
traffic patterns
24x7 Incident
Response
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How to engage the DRT?
• Open an AWS Support case
• serviceCode = ‘distributed-denial-of-service’
• severityCode = ‘urgent’ or ‘critical’ depending on Support level
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How to engage the DRT?
• Open an AWS Support case
• serviceCode = ‘distributed-denial-of-service’
• severityCode = ‘urgent’ or ‘critical’ depending on Support level
A better way…
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How to engage the DRT?
• Open an AWS Support case
• serviceCode = ‘distributed-denial-of-service’
• severityCode = ‘urgent’ or ‘critical’ depending on Support level
A better way…
• Use ShieldEngagementLambda.js
• Opens AWS Support case for you.
• Pages Primary DRT on call operator into your case.
• Bypasses AWS Support escalation SLA
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
ShieldEngagementLambda.js
// ShieldEngagementLambda.js
// Source https://s3.amazonaws.com/aws-shield-lambda/ShieldEngagementLambda.js
// User configurable options
var config = {
// Change this to "critical" if you are subscribed to Enterprise Support
severity: 'urgent',
// Change this to 'advanced' if you are subscribed to AWS Shield Advanced
shield: 'standard',
// Change this to 'off' after testing
test: 'on',
// Modify subject and message if not subscribed to AWS Shield Advanced
// Change subject and message to the path of a .txt file that you created in S3
standardSubject: 'http://s3.amazonaws.com/aws-shield-lambda/EngagementSubject.txt',
standardMessage: 'http://s3.amazonaws.com/aws-shield-lambda/EngagementBody.txt'
}
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What to expect?
• Is the right resource on the call?
• Have someone who understands the application and understands
the architecture.
• Am I prepared to make Changes?
• Expect that some countermeasures will be more effective when
coupled with scaling techniques and sometimes additional state or
request handling layers such as CloudFront or Load Balancers.
• What is my applications health?
• Be prepared to check key health metrics for your application.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advanced Countermeasures
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advanced Countermeasures
BGP traffic engineering
Custom BlackWatch mitigations
•Pattern matching, Geo-shaping, NACLs
AWS WAF Rules
•Log Parsing to map a botnet
•DRT Managed WAF rules (A list of high severity bot IP addresses generated from retail)
Architecture GAP analysis
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: Pattern Matching
iptables -m u32 --u32 "16=0xE0000001"
The u32 module matches arbitrary byte patterns
iptables -m length --length 256:65535
The iptables length module matches packet size
Stateless filtering is powerful because AWS Shield can scale it
• Be familiar with your packet format on the wire
Implement restrictive always-on filtering using iptables
• Ensures that filtering is safe and helps you survive the first few minutes of an attack
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Q&A
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!
https://aws.amazon.com/shield/

Mais conteúdo relacionado

Mais procurados

Being Well-Architected in the Cloud
Being Well-Architected in the CloudBeing Well-Architected in the Cloud
Being Well-Architected in the CloudAmazon Web Services
 
AWS LearnUp - Intro to AWS Services - Venturesity
AWS LearnUp - Intro to AWS Services - VenturesityAWS LearnUp - Intro to AWS Services - Venturesity
AWS LearnUp - Intro to AWS Services - VenturesityDhilipsiva DS
 
Amazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watchAmazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watchDhaval Soni
 
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...Amazon Web Services
 
GPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSGPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSAmazon Web Services
 
AWS Media & Entertainment Symposium -- Los Angeles 2019
AWS Media & Entertainment Symposium -- Los Angeles 2019AWS Media & Entertainment Symposium -- Los Angeles 2019
AWS Media & Entertainment Symposium -- Los Angeles 2019Amazon Web Services
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloudAmazon Web Services
 
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018Amazon Web Services
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Amazon Web Services
 
Using Security to Build with Confidence in AWS
Using Security to Build with Confidence in AWSUsing Security to Build with Confidence in AWS
Using Security to Build with Confidence in AWSAmazon Web Services
 
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...Amazon Web Services
 
AWS: Mit Sicherheit!
AWS: Mit Sicherheit!AWS: Mit Sicherheit!
AWS: Mit Sicherheit!Andrej Maya
 
How to Determine if You Are Well-Architected for Reliability
How to Determine if You Are Well-Architected for ReliabilityHow to Determine if You Are Well-Architected for Reliability
How to Determine if You Are Well-Architected for ReliabilityAmazon Web Services
 
HK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopHK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopAmazon Web Services
 
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...Amazon Web Services LATAM
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Amazon Web Services
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFAmazon Web Services
 
A Culture Of Innovation powered by AWS
A Culture Of Innovation powered by AWSA Culture Of Innovation powered by AWS
A Culture Of Innovation powered by AWSAmazon Web Services
 

Mais procurados (20)

Being Well-Architected in the Cloud
Being Well-Architected in the CloudBeing Well-Architected in the Cloud
Being Well-Architected in the Cloud
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
AWS LearnUp - Intro to AWS Services - Venturesity
AWS LearnUp - Intro to AWS Services - VenturesityAWS LearnUp - Intro to AWS Services - Venturesity
AWS LearnUp - Intro to AWS Services - Venturesity
 
Amazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watchAmazon s3 storage lens metrics now available in amazon cloud watch
Amazon s3 storage lens metrics now available in amazon cloud watch
 
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...
Amazon Macie: Data Visibility Powered by Machine Learning for Security and Co...
 
GPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSGPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWS
 
AWS Media & Entertainment Symposium -- Los Angeles 2019
AWS Media & Entertainment Symposium -- Los Angeles 2019AWS Media & Entertainment Symposium -- Los Angeles 2019
AWS Media & Entertainment Symposium -- Los Angeles 2019
 
Aws sysops.1
Aws sysops.1Aws sysops.1
Aws sysops.1
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloud
 
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018
How Amazon WorkSpaces Powers the Hands-On Labs (BAP317) - AWS re:Invent 2018
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Using Security to Build with Confidence in AWS
Using Security to Build with Confidence in AWSUsing Security to Build with Confidence in AWS
Using Security to Build with Confidence in AWS
 
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...
EFS Performance: Maximizing Performance for Linux/Unix File Systems (STG314-R...
 
AWS: Mit Sicherheit!
AWS: Mit Sicherheit!AWS: Mit Sicherheit!
AWS: Mit Sicherheit!
 
How to Determine if You Are Well-Architected for Reliability
How to Determine if You Are Well-Architected for ReliabilityHow to Determine if You Are Well-Architected for Reliability
How to Determine if You Are Well-Architected for Reliability
 
HK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-WorkshopHK-AWS-Well-Architected-Workshop
HK-AWS-Well-Architected-Workshop
 
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
AWS Initiate - Security Framework Shakedown: Mapeie sua jornada com as melhor...
 
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
Security at Scale: How Autodesk Leverages Native AWS Technologies to Provide ...
 
Simplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAFSimplify security with Trend Micro Managed Rules for AWS WAF
Simplify security with Trend Micro Managed Rules for AWS WAF
 
A Culture Of Innovation powered by AWS
A Culture Of Innovation powered by AWSA Culture Of Innovation powered by AWS
A Culture Of Innovation powered by AWS
 

Semelhante a DDoS Response Team - Engagement, Advanced Countermeasures and Capabilities

Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF ResponseAmazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyVladimir Simek
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAmazon Web Services
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Amazon Web Services
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfAmazon Web Services
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)Amazon Web Services
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...RoiElbaz1
 
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Amazon Web Services
 
Compliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesCompliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesAmazon Web Services
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineAmazon Web Services
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSAmazon Web Services
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewEagleDream Technologies
 
Serverless use cases with AWS Lambda - More Serverless Event
Serverless use cases with AWS Lambda - More Serverless EventServerless use cases with AWS Lambda - More Serverless Event
Serverless use cases with AWS Lambda - More Serverless EventBoaz Ziniman
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAmazon Web Services
 
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Amazon Web Services
 

Semelhante a DDoS Response Team - Engagement, Advanced Countermeasures and Capabilities (20)

Automating DDoS and WAF Response
Automating DDoS and WAF ResponseAutomating DDoS and WAF Response
Automating DDoS and WAF Response
 
194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx194325_EdgeatScale_NoNotes.pptx
194325_EdgeatScale_NoNotes.pptx
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útokyAWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
AWS CZSK Webinář 2019.05: Jak chránit vaše webové aplikace před DDoS útoky
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
AWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & RemediationAWS Security Week: Intro To Threat Detection & Remediation
AWS Security Week: Intro To Threat Detection & Remediation
 
Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018Automating DDos and WAF responses - AWS Summit Cape Town 2018
Automating DDos and WAF responses - AWS Summit Cape Town 2018
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
雲端原生 (Cloud-Native) 的 DDoS Attack 防禦方案 (Level: 200)
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
Edge immersion days module 2 - protect your application at the edge using a...
Edge immersion days   module 2 - protect your application at the edge using a...Edge immersion days   module 2 - protect your application at the edge using a...
Edge immersion days module 2 - protect your application at the edge using a...
 
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
Orchestrate Perimeter Security Across Distributed Applications (SEC326) - AWS...
 
Mitigating techniques
Mitigating techniquesMitigating techniques
Mitigating techniques
 
Compliance and Security Mitigation Techniques
Compliance and Security Mitigation TechniquesCompliance and Security Mitigation Techniques
Compliance and Security Mitigation Techniques
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
Serverless use cases with AWS Lambda - More Serverless Event
Serverless use cases with AWS Lambda - More Serverless EventServerless use cases with AWS Lambda - More Serverless Event
Serverless use cases with AWS Lambda - More Serverless Event
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
 
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
Enabling Your Organization’s Amazon Redshift Adoption – Going from Zero to He...
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

DDoS Response Team - Engagement, Advanced Countermeasures and Capabilities

  • 1. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Shawn Marck, AWS Perimeter Protection March, 2019 DDoS Response Team (DRT) Engagement, Advanced Countermeasures and Capabilities
  • 2. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What does the DRT do? • Own and execute DDoS mitigation runbook for supporting Amazon properties, AWS Services and AWS Shield Advanced Customers. • Build automation which reduce or time to respond. • Create tools to aid in swift mitigation of attacks. • Provide training to AWS Support and technical field community to share best practices and domain expertise on DDoS mitigation in AWS.
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Engagement
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Types of Engagement • DDoS Architecture Review • Operational Readiness Inquiry (Prior to IEM) • Custom mitigation templates for EIPs (EC2/NLBs) Pre-emptive Engagements • Automatically engaged for availability impacting L3/L4 events against AWS infrastructure or impacting to AWS Services • Customer driven support cases through AWS Support or AWS Shield Engagement Lambda • Manual traffic engineering and assessment of traffic patterns 24x7 Incident Response
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How to engage the DRT? • Open an AWS Support case • serviceCode = ‘distributed-denial-of-service’ • severityCode = ‘urgent’ or ‘critical’ depending on Support level
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How to engage the DRT? • Open an AWS Support case • serviceCode = ‘distributed-denial-of-service’ • severityCode = ‘urgent’ or ‘critical’ depending on Support level A better way…
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How to engage the DRT? • Open an AWS Support case • serviceCode = ‘distributed-denial-of-service’ • severityCode = ‘urgent’ or ‘critical’ depending on Support level A better way… • Use ShieldEngagementLambda.js • Opens AWS Support case for you. • Pages Primary DRT on call operator into your case. • Bypasses AWS Support escalation SLA
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. ShieldEngagementLambda.js // ShieldEngagementLambda.js // Source https://s3.amazonaws.com/aws-shield-lambda/ShieldEngagementLambda.js // User configurable options var config = { // Change this to "critical" if you are subscribed to Enterprise Support severity: 'urgent', // Change this to 'advanced' if you are subscribed to AWS Shield Advanced shield: 'standard', // Change this to 'off' after testing test: 'on', // Modify subject and message if not subscribed to AWS Shield Advanced // Change subject and message to the path of a .txt file that you created in S3 standardSubject: 'http://s3.amazonaws.com/aws-shield-lambda/EngagementSubject.txt', standardMessage: 'http://s3.amazonaws.com/aws-shield-lambda/EngagementBody.txt' }
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What to expect? • Is the right resource on the call? • Have someone who understands the application and understands the architecture. • Am I prepared to make Changes? • Expect that some countermeasures will be more effective when coupled with scaling techniques and sometimes additional state or request handling layers such as CloudFront or Load Balancers. • What is my applications health? • Be prepared to check key health metrics for your application.
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advanced Countermeasures
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advanced Countermeasures BGP traffic engineering Custom BlackWatch mitigations •Pattern matching, Geo-shaping, NACLs AWS WAF Rules •Log Parsing to map a botnet •DRT Managed WAF rules (A list of high severity bot IP addresses generated from retail) Architecture GAP analysis
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Example: Pattern Matching iptables -m u32 --u32 "16=0xE0000001" The u32 module matches arbitrary byte patterns iptables -m length --length 256:65535 The iptables length module matches packet size Stateless filtering is powerful because AWS Shield can scale it • Be familiar with your packet format on the wire Implement restrictive always-on filtering using iptables • Ensures that filtering is safe and helps you survive the first few minutes of an attack
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Q&A
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you! https://aws.amazon.com/shield/

Notas do Editor

  1. aws.amazon.com/firewall-manager/pricing