SlideShare uma empresa Scribd logo
1 de 73
Baixar para ler offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encrypting everything with AWS
Colm MacCáthaigh
Senior Principal Engineer
Amazon Web Services
S E P 4 0 2
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
WARNING:
CONTAINS MATH
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
• Several internal organizations with deep cryptography expertise
AWS Cryptography
AWS Security
Automated Reasoning Group
Annapurna Labs
Service teams: Amazon Elastic Compute Cloud (Amazon EC2), Amazon Elastic Block Store (Amazon EBS),
Amazon Simple Storage Service (Amazon S3), more
• Participants in NIST competitions, protocol standardization, vulnerability
research and mitigation, Open Source projects
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption basics
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption basics
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS KMS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS KMS
Import, store, control, manage access to, rotate, and delete keys at scale
Backed by FIPS 140-2 Hardware
Integrated with 117 AWS Services and more AWS SDKs
Integrated with AWS CloudTrail for auditing
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS KMS
Principle of least privilege is KMS’ core DNA
KMS only gives AWS services access to keys when they are acting on behalf of a
customer who owns those keys.
Sensitive KMS administrative actions are partitioned and require multiple
administrators
Threshold cryptography required for bootstrapping
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS KMS
Support for custom key stores
KMS generates and stores non-
extractable key material in an AWS
CloudHSM cluster that you own and
manage
Satisfy regulatory and compliance
requirements
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Client side encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Client side encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Client side encryption
Support for client-side encryption in AWS service SDKs including S3, Amazon
DynamoDB, Amazon Kinesis and more.
Encrypt data at a document, row, or field level
There are trade-offs between client-side encryption and what can be performed
on the server side
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Client side encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Clock math
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Clock math
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Clock math
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Clock Math
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Linear congruential generator
𝑐
𝑚
y
x
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Linear congruential generator
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
5
13
29
61
125
253
0
50
100
150
200
250
300
1 2 3 4 5 6
X
Linear congruential generator
𝑿 𝒏+𝟏 = 𝒂𝑿 𝒏 + 𝒄
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
0
3
4
1
0
3
4
1
0
0.5
1
1.5
2
2.5
3
3.5
4
4.5
1 2 3 4 5 6
X
Linear congruential generator
𝑿 𝒏+𝟏 = 𝒂𝑿 𝒏 + 𝒄 (mod m)
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Modern symmetric encryption
Algorithms such as AES-GCM take a very similar form
Start off with a key and a seed value, generate a deterministic pseudo-random
stream of data
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Modern symmetric encryption
⊕
=
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
XOR
x y output
0 0 0
1 0 1
0 1 1
1 1 0
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Modern symmetric encryption
⊕
=
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AES-GCM
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AES-GCM
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AES-GCM
• AES has a block size of 2128 bits
• That’s an extremely big clock, much more than there are particles in the
universe
• At AWS scale, we would still run in to this limit without workarounds
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Symmetric encryption takeaways
Key + Initialization Vector = Stream of random data
The same key and IV will produce the same stream every time
We can’t re-use the same key and IV pair
If a key is known, all data encrypted under that key can be decrypted
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Server side encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Storage encryption
• Amazon EBS encryption by default!
• Implemented as part of the AWS Nitro security system
• We’re encrypting an enormous volume of data, using reassuringly boring
cryptography
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Server-side encryption
• Available in S3, DynamoDB, Kinesis and more
• AWS performs the encryption, on AWS hardware, using similar techniques and
formats available in the cryptography SDK
• Provides defense in depth and a more secure model for data re-encryption if
necessary
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Network encryption
• Attacks on modern network encryption are usually based on side-channels
• Traffic may be encrypted, but the size of the data, and the rate of transmission
are still visible
• This makes it surprisingly easy to compromise the confidentiality of some
common workloads
• Defense: Information hiding, Anonymization, and layered encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS—Forward secrecy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS—Forward secrecy
Forward secrecy is really about how much data is at risk if a key were to be
compromised
By default at AWS, every TLS session has forward secrecy
In real terms, this provides strong “post-compromise security”
How does it work?
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—Prerequisites
𝑥 𝑦
𝑥 𝑚𝑜𝑑 𝑦
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The magic
(𝑔 𝑎 % 𝑝) 𝑏 𝑚𝑜𝑑 𝑝
=
(𝑔 𝑏 % 𝑝) 𝑎 𝑚𝑜𝑑 𝑝
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The math
(𝑔 𝑎
𝑚𝑜𝑑 𝑝) 𝑏
𝑚𝑜𝑑 𝑝 = (𝑔 𝑏
𝑚𝑜𝑑 𝑝) 𝑎
𝑚𝑜𝑑 𝑝
Alice Bob Eve
p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The math
(𝑔 𝑎
𝑚𝑜𝑑 𝑝) 𝑏
𝑚𝑜𝑑 𝑝 = (𝑔 𝑏
𝑚𝑜𝑑 𝑝) 𝑎
𝑚𝑜𝑑 𝑝
Alice Bob Eve
p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
a = 6 b = 15
A B
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The math
(𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝
Alice Bob Eve
p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
a = 6 b = 15
A = 𝟓 𝟔
mod 23 = 8 B = 𝟓 𝟏𝟓
mod 23 = 19 A = 8 , B = 19
A B
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The math
(𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝
Alice Bob Eve
p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
a = 6 b = 15
A = 𝟓 𝟔
mod 23 = 8 B = 𝟓 𝟏𝟓
mod 23 = 19 A = 8 , B = 19
S = 𝐁 𝟔
mod 23 S = 𝐀 𝟏𝟓
mod 23
A B
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Understanding Diffie-Hellman—The math
(𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝
Alice Bob Eve
p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
a = 6 b = 15
A = 𝟓 𝟔
mod 23 = 8 B = 𝟓 𝟏𝟓
mod 23 = 19 A = 8 , B = 19
S = 𝟏𝟗 𝟔
mod 23 = 2 S = 𝟖 𝟏𝟓
mod 23
= 2
A B
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS handshake with forward secrecy
Client Hello
Server Hello
Server Cert
Client DH
Server DH
Client Finished
Server Finished
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS1.3—Let’s re-order the messages
Client Hello
Server Hello
Server Cert
Client DH
Server DH
Client Finished
Server Finished
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS1.3—1xRTT regular handshake
Client Hello
Server Hello
Server Cert
Client DH
Server DH
Server Finished
Client Finished
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS—Post quantum risks
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
TLS
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC Encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC encryption
• Implemented in AWS hardware, by Annupurna Labs, as part of Nitro
• We encrypt your data AND our network virtualization protocol
• Encryption is applied within and between availability zones
• Forward-secrecy for between hours and one day
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC inter-region peering
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC inter-region peering
• Allows peering and exchange of traffic between VPCs in different regions
• Implemented on our ”Blackfoot” layer of edge devices
• We encrypt your data AND our network virtualization protocol
• Forward-secrecy for between hours and one day
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
VPC inter-region peering
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon VPN
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon VPN
• Site-to-site and client VPN options
• Based on the IPSec and OpenVPN protocols
• Both include per-session forward secrecy that lasts ~hours
• If you’re using site-to-site VPN: watch out for “Group 2”
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Physical network encryption
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Physical network encryption
• Any link outside of AWS physical control, including between AWS datacenters,
and the AWS backbone is protected
• Reminder: all traffic between AWS regions (except China) is carried on the AWS
backbone
• Most links are protected with MACSEC and Optical encryption using AES-256
• Small number of short-distance links use laser monitoring
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
How do they fit together?
end-to-end anonymity
anti-
replay
Forward-secrecy Post-quantum
TLS
Client to
server
weak yes Seconds to hours Rarely
VPC Encryption
Instance to
Instance
Strong no Hours to one day yes
Inter-Region
Peering
Hop by hop Stronger no Hours to one day yes
Physical
Network
Encryption
Hop by hop Strongest no Hours to one day no
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure key distribution
• If AES-GCM is strong, then the security of our system rests on how securely
authentication and encryption keys can be distributed
• VPC encryption, inter-region peering, and physical network encryption each use
multi-party key distribution
• Two parties independently distribute pre-key-material, which is then only
combined where the encryption happens
• Result: no control system knows the sensitive keys
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Secure key distribution
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption at AWS
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Colm MacCárthaigh
@colmmacc

Mais conteúdo relacionado

Mais procurados

FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...Amazon Web Services
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloudaccenture
 
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...Amazon Web Services
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAmazon Web Services
 
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCapgemini
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsAmazon Web Services
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journeyAmazon Web Services
 
AWS Financial Governance Practice
AWS Financial Governance Practice AWS Financial Governance Practice
AWS Financial Governance Practice Amir Arama
 
Building a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to CloudBuilding a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to CloudAmazon Web Services
 
HUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfHUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfDanyMochtar
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...Amazon Web Services
 
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit Sydney
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit SydneyCloud Operating Models for Accelerated Cloud Transformation - AWS Summit Sydney
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit SydneyAmazon Web Services
 

Mais procurados (20)

FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
FinOps: A Culture Transformation to Bring DevOps, Finance and the Business To...
 
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise CloudAccenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
Accenture Cloud Platform: Control, Manage and Govern the Enterprise Cloud
 
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
Reduce Costs and Build a Strong Operational Foundation with the AWS Migration...
 
AWS Cloud Migration Insights Forum
AWS Cloud Migration Insights ForumAWS Cloud Migration Insights Forum
AWS Cloud Migration Insights Forum
 
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness AssessmentCloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
Cloud Journey Roadmap: Capgemini's Cloud Readiness Assessment
 
Winning Enterprise Cloud Engagements
Winning Enterprise Cloud EngagementsWinning Enterprise Cloud Engagements
Winning Enterprise Cloud Engagements
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
Getting started on your AWS migration journey
Getting started on your AWS migration journeyGetting started on your AWS migration journey
Getting started on your AWS migration journey
 
AWS Managed Services - BlazeClan Technologies
AWS Managed Services - BlazeClan TechnologiesAWS Managed Services - BlazeClan Technologies
AWS Managed Services - BlazeClan Technologies
 
AWS Financial Governance Practice
AWS Financial Governance Practice AWS Financial Governance Practice
AWS Financial Governance Practice
 
Machine Learning on AWS
Machine Learning on AWSMachine Learning on AWS
Machine Learning on AWS
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
Building a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to CloudBuilding a Better Business Case for Migrating to Cloud
Building a Better Business Case for Migrating to Cloud
 
HUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdfHUAWEI CLOUD General Introduction-for partner.pdf
HUAWEI CLOUD General Introduction-for partner.pdf
 
Cloud Foundations
Cloud FoundationsCloud Foundations
Cloud Foundations
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Artificial Intelligence on AWS
Artificial Intelligence on AWSArtificial Intelligence on AWS
Artificial Intelligence on AWS
 
Azure Migration .pptx
Azure Migration .pptxAzure Migration .pptx
Azure Migration .pptx
 
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit Sydney
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit SydneyCloud Operating Models for Accelerated Cloud Transformation - AWS Summit Sydney
Cloud Operating Models for Accelerated Cloud Transformation - AWS Summit Sydney
 
Value, TCO & Cost Optimisation
Value, TCO & Cost OptimisationValue, TCO & Cost Optimisation
Value, TCO & Cost Optimisation
 

Semelhante a Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019

Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...
Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...
Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...Amazon Web Services
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Amazon Web Services
 
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverIntroduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverAmazon Web Services
 
Introduction to the AWS Cloud - AWSome Day 2019 - Charlotte
Introduction to the AWS Cloud - AWSome Day 2019 - CharlotteIntroduction to the AWS Cloud - AWSome Day 2019 - Charlotte
Introduction to the AWS Cloud - AWSome Day 2019 - CharlotteAmazon Web Services
 
Introduction to the AWS Cloud - AWSome Day 2019 - Toronto
Introduction to the AWS Cloud - AWSome Day 2019 - TorontoIntroduction to the AWS Cloud - AWSome Day 2019 - Toronto
Introduction to the AWS Cloud - AWSome Day 2019 - TorontoAmazon Web Services
 
Introduction to the AWS Cloud - AWSome Day 2019 - Chicago
Introduction to the AWS Cloud - AWSome Day 2019 - ChicagoIntroduction to the AWS Cloud - AWSome Day 2019 - Chicago
Introduction to the AWS Cloud - AWSome Day 2019 - ChicagoAmazon Web Services
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Amazon Web Services
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS servicesRuncy Oommen
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Amazon Web Services
 
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Amazon Web Services LATAM
 
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSSecurity Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSAmazon Web Services LATAM
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
 
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...Amazon Web Services Japan
 
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...Amazon Web Services Korea
 
Introduction to the AWS Cloud - AWSome Day 2019 - Denver
Introduction to the AWS Cloud - AWSome Day 2019 - Denver Introduction to the AWS Cloud - AWSome Day 2019 - Denver
Introduction to the AWS Cloud - AWSome Day 2019 - Denver Amazon Web Services
 
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 Amazon Web Services
 
AWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAmazon Web Services
 

Semelhante a Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019 (20)

Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...
Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...
Automate & Audit Cloud Governance & Compliance in Your Landing Zone (ENT315-R...
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
 
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverIntroduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
 
Introduction to the AWS Cloud - AWSome Day 2019 - Charlotte
Introduction to the AWS Cloud - AWSome Day 2019 - CharlotteIntroduction to the AWS Cloud - AWSome Day 2019 - Charlotte
Introduction to the AWS Cloud - AWSome Day 2019 - Charlotte
 
Introduction to the AWS Cloud - AWSome Day 2019 - Toronto
Introduction to the AWS Cloud - AWSome Day 2019 - TorontoIntroduction to the AWS Cloud - AWSome Day 2019 - Toronto
Introduction to the AWS Cloud - AWSome Day 2019 - Toronto
 
AWSome Day 2019 - Mexico City
AWSome Day 2019 - Mexico CityAWSome Day 2019 - Mexico City
AWSome Day 2019 - Mexico City
 
Introduction to the AWS Cloud - AWSome Day 2019 - Chicago
Introduction to the AWS Cloud - AWSome Day 2019 - ChicagoIntroduction to the AWS Cloud - AWSome Day 2019 - Chicago
Introduction to the AWS Cloud - AWSome Day 2019 - Chicago
 
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
Securing enterprise-grade serverless applications - SDD401 - AWS re:Inforce 2...
 
Security hardening of core AWS services
Security hardening of core AWS servicesSecurity hardening of core AWS services
Security hardening of core AWS services
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
Security framework shakedown_-_chart_your_journey_with_aws_best_practices_ini...
 
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSSecurity Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
 
Security Framework Shakedown
Security Framework ShakedownSecurity Framework Shakedown
Security Framework Shakedown
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...
20190402 AWS Black Belt Online Seminar Let's Dive Deep into AWS Lambda Part1 ...
 
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...
교육, 연구 개발자가 직접 전하는 AWS를 선택한 이유 Part.3 - 김재동 교사, IndiSchool (NPO) :: AWS Summi...
 
Introduction to the AWS Cloud - AWSome Day 2019 - Denver
Introduction to the AWS Cloud - AWSome Day 2019 - Denver Introduction to the AWS Cloud - AWSome Day 2019 - Denver
Introduction to the AWS Cloud - AWSome Day 2019 - Denver
 
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019 Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
Achieving security goals with AWS CloudHSM - SDD333 - AWS re:Inforce 2019
 
AWS
AWSAWS
AWS
 
AWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management ToolsAWS re:Invent Comes to London 2019 - Management Tools
AWS re:Invent Comes to London 2019 - Management Tools
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Encrypting everything with AWS - SEP402 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encrypting everything with AWS Colm MacCáthaigh Senior Principal Engineer Amazon Web Services S E P 4 0 2
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS WARNING: CONTAINS MATH
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS • Several internal organizations with deep cryptography expertise AWS Cryptography AWS Security Automated Reasoning Group Annapurna Labs Service teams: Amazon Elastic Compute Cloud (Amazon EC2), Amazon Elastic Block Store (Amazon EBS), Amazon Simple Storage Service (Amazon S3), more • Participants in NIST competitions, protocol standardization, vulnerability research and mitigation, Open Source projects
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption basics
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption basics
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS KMS
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS KMS Import, store, control, manage access to, rotate, and delete keys at scale Backed by FIPS 140-2 Hardware Integrated with 117 AWS Services and more AWS SDKs Integrated with AWS CloudTrail for auditing
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS KMS Principle of least privilege is KMS’ core DNA KMS only gives AWS services access to keys when they are acting on behalf of a customer who owns those keys. Sensitive KMS administrative actions are partitioned and require multiple administrators Threshold cryptography required for bootstrapping
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS KMS Support for custom key stores KMS generates and stores non- extractable key material in an AWS CloudHSM cluster that you own and manage Satisfy regulatory and compliance requirements
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Client side encryption
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Client side encryption
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Client side encryption Support for client-side encryption in AWS service SDKs including S3, Amazon DynamoDB, Amazon Kinesis and more. Encrypt data at a document, row, or field level There are trade-offs between client-side encryption and what can be performed on the server side
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Client side encryption
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Clock math
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Clock math
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Clock math
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Clock Math
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Linear congruential generator 𝑐 𝑚 y x
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Linear congruential generator
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 5 13 29 61 125 253 0 50 100 150 200 250 300 1 2 3 4 5 6 X Linear congruential generator 𝑿 𝒏+𝟏 = 𝒂𝑿 𝒏 + 𝒄
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 0 3 4 1 0 3 4 1 0 0.5 1 1.5 2 2.5 3 3.5 4 4.5 1 2 3 4 5 6 X Linear congruential generator 𝑿 𝒏+𝟏 = 𝒂𝑿 𝒏 + 𝒄 (mod m)
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Modern symmetric encryption Algorithms such as AES-GCM take a very similar form Start off with a key and a seed value, generate a deterministic pseudo-random stream of data
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Modern symmetric encryption ⊕ =
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. XOR x y output 0 0 0 1 0 1 0 1 1 1 1 0
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Modern symmetric encryption ⊕ =
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AES-GCM
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AES-GCM
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AES-GCM • AES has a block size of 2128 bits • That’s an extremely big clock, much more than there are particles in the universe • At AWS scale, we would still run in to this limit without workarounds
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Symmetric encryption takeaways Key + Initialization Vector = Stream of random data The same key and IV will produce the same stream every time We can’t re-use the same key and IV pair If a key is known, all data encrypted under that key can be decrypted
  • 34. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Server side encryption
  • 35. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Storage encryption • Amazon EBS encryption by default! • Implemented as part of the AWS Nitro security system • We’re encrypting an enormous volume of data, using reassuringly boring cryptography
  • 36. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Server-side encryption • Available in S3, DynamoDB, Kinesis and more • AWS performs the encryption, on AWS hardware, using similar techniques and formats available in the cryptography SDK • Provides defense in depth and a more secure model for data re-encryption if necessary
  • 37. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 38. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Network encryption • Attacks on modern network encryption are usually based on side-channels • Traffic may be encrypted, but the size of the data, and the rate of transmission are still visible • This makes it surprisingly easy to compromise the confidentiality of some common workloads • Defense: Information hiding, Anonymization, and layered encryption
  • 39. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 40. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 41. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 42. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 43. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 44. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS—Forward secrecy
  • 45. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS—Forward secrecy Forward secrecy is really about how much data is at risk if a key were to be compromised By default at AWS, every TLS session has forward secrecy In real terms, this provides strong “post-compromise security” How does it work?
  • 46. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—Prerequisites 𝑥 𝑦 𝑥 𝑚𝑜𝑑 𝑦
  • 47. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The magic (𝑔 𝑎 % 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 % 𝑝) 𝑎 𝑚𝑜𝑑 𝑝
  • 48. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The math (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Alice Bob Eve p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5
  • 49. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The math (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Alice Bob Eve p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5 a = 6 b = 15 A B
  • 50. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The math (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Alice Bob Eve p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5 a = 6 b = 15 A = 𝟓 𝟔 mod 23 = 8 B = 𝟓 𝟏𝟓 mod 23 = 19 A = 8 , B = 19 A B
  • 51. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The math (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Alice Bob Eve p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5 a = 6 b = 15 A = 𝟓 𝟔 mod 23 = 8 B = 𝟓 𝟏𝟓 mod 23 = 19 A = 8 , B = 19 S = 𝐁 𝟔 mod 23 S = 𝐀 𝟏𝟓 mod 23 A B
  • 52. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Understanding Diffie-Hellman—The math (𝑔 𝑎 𝑚𝑜𝑑 𝑝) 𝑏 𝑚𝑜𝑑 𝑝 = (𝑔 𝑏 𝑚𝑜𝑑 𝑝) 𝑎 𝑚𝑜𝑑 𝑝 Alice Bob Eve p = 23 , g = 5 p = 23 , g = 5 p = 23 , g = 5 a = 6 b = 15 A = 𝟓 𝟔 mod 23 = 8 B = 𝟓 𝟏𝟓 mod 23 = 19 A = 8 , B = 19 S = 𝟏𝟗 𝟔 mod 23 = 2 S = 𝟖 𝟏𝟓 mod 23 = 2 A B
  • 53. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS handshake with forward secrecy Client Hello Server Hello Server Cert Client DH Server DH Client Finished Server Finished
  • 54. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS1.3—Let’s re-order the messages Client Hello Server Hello Server Cert Client DH Server DH Client Finished Server Finished
  • 55. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS1.3—1xRTT regular handshake Client Hello Server Hello Server Cert Client DH Server DH Server Finished Client Finished
  • 56. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS—Post quantum risks
  • 57. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 58. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. TLS
  • 59. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC Encryption
  • 60. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC encryption • Implemented in AWS hardware, by Annupurna Labs, as part of Nitro • We encrypt your data AND our network virtualization protocol • Encryption is applied within and between availability zones • Forward-secrecy for between hours and one day
  • 61. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC inter-region peering
  • 62. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC inter-region peering • Allows peering and exchange of traffic between VPCs in different regions • Implemented on our ”Blackfoot” layer of edge devices • We encrypt your data AND our network virtualization protocol • Forward-secrecy for between hours and one day
  • 63. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. VPC inter-region peering
  • 64. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon VPN
  • 65. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon VPN • Site-to-site and client VPN options • Based on the IPSec and OpenVPN protocols • Both include per-session forward secrecy that lasts ~hours • If you’re using site-to-site VPN: watch out for “Group 2”
  • 66. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Physical network encryption
  • 67. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Physical network encryption • Any link outside of AWS physical control, including between AWS datacenters, and the AWS backbone is protected • Reminder: all traffic between AWS regions (except China) is carried on the AWS backbone • Most links are protected with MACSEC and Optical encryption using AES-256 • Small number of short-distance links use laser monitoring
  • 68. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. How do they fit together? end-to-end anonymity anti- replay Forward-secrecy Post-quantum TLS Client to server weak yes Seconds to hours Rarely VPC Encryption Instance to Instance Strong no Hours to one day yes Inter-Region Peering Hop by hop Stronger no Hours to one day yes Physical Network Encryption Hop by hop Strongest no Hours to one day no
  • 69. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 70. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure key distribution • If AES-GCM is strong, then the security of our system rests on how securely authentication and encryption keys can be distributed • VPC encryption, inter-region peering, and physical network encryption each use multi-party key distribution • Two parties independently distribute pre-key-material, which is then only combined where the encryption happens • Result: no control system knows the sensitive keys
  • 71. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Secure key distribution
  • 72. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption at AWS
  • 73. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Colm MacCárthaigh @colmmacc