SlideShare uma empresa Scribd logo
1 de 34
Baixar para ler offline
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Ensure the integrity of your code for
fast and secure deployments
Benjamin Andrew
Global Head, Cloud Security & Infrastructure
AWS Marketplace
S D D 3 1 9
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Quick
Get the software you need in minutes
with just a few clicks or use the 1-Click
deployment option.
Software in AWS Marketplace is ready-
to-run on AWS.
Pay-as-you-go
Pay only for what you use through
various payment options and receive
discounts on longer or custom terms.
All charges from AWS Marketplace are
consolidated into one bill from AWS.
Verified
All software in AWS Marketplace is
continuously scanned to ensure
reliability.
AWS Marketplace
A curateddigitalsoftwarecatalogthathelps
you find,buy,test,anddeploysoftware
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
A growing digital software catalog
• AWS Marketplace offers 39 software categories
• More than 4,800 software listings
• More than 1,400 ISVs (Independent Software Vendors)
• More than 230,000 active customers
• More than 1 million current subscriptions
• AWS customers use over 650 million hours a month of Amazon
EC2 for AWS Marketplace products
• AWS Marketplace is available in 18 AWS regions
• Flexible consumption and contract models
• Easy and secure deployment, almost instantly
• One consolidated bill
• Always evolving
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Operating
systems SIEMStorage BIDatabase DevOpsNetworking
Eight popular categories most often provisioned
Security
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security in the cloud
Identify
Security fundamentally anchors
on having sufficient knowledge
of your world
Protect
The best defense is an offense
but …
Detect
One must “assume breach”
and have a strong defense
Knowing and being able to act
swiftly is key in the cloud
Respond/Recover
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Speed! Collaboration! Automation!
Waterfall
Agile
DevOps
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
7
Why DevSecOps?
Business imperatives
Competing forces
Development
Build it faster
Operations
Keep it stable
Security
Make it secure
D e v O p s
Build Test Distribute
Monitor
Developers Users
D e v S e c O p s
Build Test Distribute
Monitor
Developers Users
Security
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code in the pipeline
Precommit Commit Acceptance Deploy
 Continuous compliance →
Threat modeling
Initial SAST inside IDE
Code review
“Break the build“
Compile/build checks
SCA
Container security
Additional SAST
Unit test
Secure infra build
Functional testing
SCA DAST
Unit testing
Security attacks
Deep SAST
Fuzzing, pen tests
Provision runtime
environment
Config management
RASP
Security
Compliance
CI/CD
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code in the pipeline
Precommit
Threat modeling
Initial SAST inside IDE
Code review
Security
Compliance
CI/CD
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Static Analysis Security Testing (SAST) in IDE
What it is: Automatically analyzes code for
security early without slowing down
development
Why it’s important: Introduces code
analysis as ‘far left’ as possible
Why it’s critical to security: Catches
vulnerabilities at the first point they can
enter the application pipeline to reduce
significant impacts
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: Veracode Greenlight
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code IN the pipeline
Commit
“Break the build“
Compile/build checks
SCA
Container security
Unit test
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Software Composition Analysis (SCA)
What it is: Vulnerability scanning tool for
open source
Why it’s important: Most static analysis
tools aren’t relevant for open source
Why it’s critical to security: Reduces the
threat of vulnerabilities from dependencies
on open-source components
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: WhiteSource
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
WhiteSource SaaS in AWS Marketplace
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Container Vulnerability Analysis (CVA)
What it is: Vulnerability scanning tools that
specifically target containers
Why it’s important: Security needs to be
tailored to containerized applications
Why it’s critical to security: A vulnerability in
one container can spread to others without
isolation between containers
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: Aqua
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Aqua SaaS in AWS Marketplace
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code in the pipeline
Acceptance
Secure infra build
Functional testing
SCA DAST
Unit testing
Security attacks
Deep SAST
Fuzzing, pen tests
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Dynamic Analysis Security Testing (DAST)
What it is: Tests web applications for exposed
HTTP and HTML interfaces while they are
running
Why it’s important: Dynamic, for running
applications, vulnerability scanning in testing,
staging, and production
Why it’s critical to security: Looks for a broad
range of vulnerabilities, such as input/output
validation issues leading to cross-site scripting
(XSS) or SQL injection
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: Qualys Web Application Scanner
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Qualys WAS SaaS in AWS Marketplace
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code in the pipeline
Provision runtime
environment
Config management
RASP
Security
Compliance
CI/CD
Precommit Commit Acceptance Deploy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Runtime Application Self-Protection (RASP)
What it is: Controls execution and prevents
real-time attacks in application runtime
environment
Why it’s important: Targets application code
security at runtime (powerful addition to a
WAF)
Why it’s critical to security: Protects against
OWASP top runtime threats. Can capture zero-
day vulnerabilities
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: Prevoty
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Prevoty AMI in AWS Marketplace
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security and compliance of the code in the pipeline
 Continuous compliance →
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Continuous compliance
What it is: Automate the compliance of your
*infrastructure* code
Why it’s important: Ensure regulatory
compliance
Why it’s critical to security: Secure application
code can run on compliant/
safe infrastructure
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Vendor highlight: Dome9
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Dome9 in AWS Marketplace
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Making DevOps Sec-sy
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Customize the way you provision software
Find
Machine learning
Containers
Networking
Security
Storage
DevOps
Database
Operating systems
BI and Big Data
From a breadth
of categories:
Buy
Free trial
Pay-as-you-go
Hourly
Monthly
Annual and multi-year
Bring your own license (BYOL)
Seller private offers
Through flexible
pricing options:
Deploy
Amazon Elastic Container Service (Amazon
ECS)
Amazon Elastic Container Service for
Kubernetes (Amazon EKS)
Amazon Machine Image (AMI)
Application Program Interface (API)
Amazon SageMaker
AWS Fargate
AWS CloudFormation template
SaaS
With multiple
deployment options:
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
“The ability to deploy software instantaneously anywhere in the world means we’re able to scale
immediately, and stretch or shrink the environment to accommodate our needs.”
“Integrated billing on AWS Marketplace is very slick, very straightforward. One place, one
dashboard where all my costs appear.”
Why customers buy in AWS Marketplace?
Flexible
consumption and
contract models
Easy and secure
deployment, almost
instantly
Single, consolidated
bill
Speed, simplicity, and scalability
“One benefit of the pay-as-you-go model is the ability to deploy anywhere without having to do a
capital approval process to pay for infrastructure that may or may not be used.”
—Rob Gillan, CTO, SimplePay
—Briley James Yetter, Director of Technology, Goodwill Industries
—Richard Williams, Sr. Engineer, MakerBot
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Benjamin Andrew
Global Lead Security, Networking & DevSecOps
AWS Marketplace
benand@amazon.com
www.linkedin.com/in/benandrew

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
 
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
 
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
Leadership session - Governance, risk, and compliance - GRC326-L - AWS re:Inf...
 
Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...Capital One case study: Addressing compliance and security within AWS - FND21...
Capital One case study: Addressing compliance and security within AWS - FND21...
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019 Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
Audibility in Kubernetes with Amazon EKS - GRC302 - AWS re:Inforce 2019
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
 
Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...Architecting security and governance through policy guardrails in Amazon EKS ...
Architecting security and governance through policy guardrails in Amazon EKS ...
 
Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...Design for compliance: Practical patterns for meeting your IT compliance requ...
Design for compliance: Practical patterns for meeting your IT compliance requ...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...Serverless identity management, authentication, and authorization - SDD405-R ...
Serverless identity management, authentication, and authorization - SDD405-R ...
 
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
 
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
Permissions boundaries: how to truly delegate permissions on AWS - SDD406-R -...
 
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
Enforcing security invariants with AWS Organizations - SDD314 - AWS re:Inforc...
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
 

Semelhante a Ensure the integrity of your code for fast and secure deployments - SDD319 - AWS re:Inforce 2019

Semelhante a Ensure the integrity of your code for fast and secure deployments - SDD319 - AWS re:Inforce 2019 (20)

Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...Safeguarding the integrity of your code for fast, secure deployments - SVC301...
Safeguarding the integrity of your code for fast, secure deployments - SVC301...
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
DevConZM - Modern Applications Development in the Cloud
DevConZM - Modern Applications Development in the CloudDevConZM - Modern Applications Development in the Cloud
DevConZM - Modern Applications Development in the Cloud
 
CI/CD for Modern Applications
CI/CD for Modern ApplicationsCI/CD for Modern Applications
CI/CD for Modern Applications
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_haveHow_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
How_to_build_your_cloud_enablement_engine_with_the_people_you_already_have
 
CICDforModernApplications-Oslo.pdf
CICDforModernApplications-Oslo.pdfCICDforModernApplications-Oslo.pdf
CICDforModernApplications-Oslo.pdf
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
 
Executing a Large-Scale Migration to AWS
Executing a Large-Scale Migration to AWSExecuting a Large-Scale Migration to AWS
Executing a Large-Scale Migration to AWS
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
AWS Accra Meetup - Developing Modern Applications in the Cloud
AWS Accra Meetup - Developing Modern Applications in the CloudAWS Accra Meetup - Developing Modern Applications in the Cloud
AWS Accra Meetup - Developing Modern Applications in the Cloud
 
[CPT DevOps Meetup] Developing Modern Applications in the Cloud
[CPT DevOps Meetup] Developing Modern Applications in the Cloud[CPT DevOps Meetup] Developing Modern Applications in the Cloud
[CPT DevOps Meetup] Developing Modern Applications in the Cloud
 
AWS Jozi Meetup Developing Modern Applications in the Cloud
AWS Jozi Meetup Developing Modern Applications in the CloudAWS Jozi Meetup Developing Modern Applications in the Cloud
AWS Jozi Meetup Developing Modern Applications in the Cloud
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 

Mais de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Ensure the integrity of your code for fast and secure deployments - SDD319 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Ensure the integrity of your code for fast and secure deployments Benjamin Andrew Global Head, Cloud Security & Infrastructure AWS Marketplace S D D 3 1 9
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Quick Get the software you need in minutes with just a few clicks or use the 1-Click deployment option. Software in AWS Marketplace is ready- to-run on AWS. Pay-as-you-go Pay only for what you use through various payment options and receive discounts on longer or custom terms. All charges from AWS Marketplace are consolidated into one bill from AWS. Verified All software in AWS Marketplace is continuously scanned to ensure reliability. AWS Marketplace A curateddigitalsoftwarecatalogthathelps you find,buy,test,anddeploysoftware
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. A growing digital software catalog • AWS Marketplace offers 39 software categories • More than 4,800 software listings • More than 1,400 ISVs (Independent Software Vendors) • More than 230,000 active customers • More than 1 million current subscriptions • AWS customers use over 650 million hours a month of Amazon EC2 for AWS Marketplace products • AWS Marketplace is available in 18 AWS regions • Flexible consumption and contract models • Easy and secure deployment, almost instantly • One consolidated bill • Always evolving
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Operating systems SIEMStorage BIDatabase DevOpsNetworking Eight popular categories most often provisioned Security
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security in the cloud Identify Security fundamentally anchors on having sufficient knowledge of your world Protect The best defense is an offense but … Detect One must “assume breach” and have a strong defense Knowing and being able to act swiftly is key in the cloud Respond/Recover
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Speed! Collaboration! Automation! Waterfall Agile DevOps
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. 7 Why DevSecOps? Business imperatives Competing forces Development Build it faster Operations Keep it stable Security Make it secure D e v O p s Build Test Distribute Monitor Developers Users D e v S e c O p s Build Test Distribute Monitor Developers Users Security
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code in the pipeline Precommit Commit Acceptance Deploy  Continuous compliance → Threat modeling Initial SAST inside IDE Code review “Break the build“ Compile/build checks SCA Container security Additional SAST Unit test Secure infra build Functional testing SCA DAST Unit testing Security attacks Deep SAST Fuzzing, pen tests Provision runtime environment Config management RASP Security Compliance CI/CD
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code in the pipeline Precommit Threat modeling Initial SAST inside IDE Code review Security Compliance CI/CD
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Static Analysis Security Testing (SAST) in IDE What it is: Automatically analyzes code for security early without slowing down development Why it’s important: Introduces code analysis as ‘far left’ as possible Why it’s critical to security: Catches vulnerabilities at the first point they can enter the application pipeline to reduce significant impacts
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: Veracode Greenlight
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code IN the pipeline Commit “Break the build“ Compile/build checks SCA Container security Unit test Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Software Composition Analysis (SCA) What it is: Vulnerability scanning tool for open source Why it’s important: Most static analysis tools aren’t relevant for open source Why it’s critical to security: Reduces the threat of vulnerabilities from dependencies on open-source components
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: WhiteSource
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. WhiteSource SaaS in AWS Marketplace
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Container Vulnerability Analysis (CVA) What it is: Vulnerability scanning tools that specifically target containers Why it’s important: Security needs to be tailored to containerized applications Why it’s critical to security: A vulnerability in one container can spread to others without isolation between containers
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: Aqua
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Aqua SaaS in AWS Marketplace
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code in the pipeline Acceptance Secure infra build Functional testing SCA DAST Unit testing Security attacks Deep SAST Fuzzing, pen tests Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Dynamic Analysis Security Testing (DAST) What it is: Tests web applications for exposed HTTP and HTML interfaces while they are running Why it’s important: Dynamic, for running applications, vulnerability scanning in testing, staging, and production Why it’s critical to security: Looks for a broad range of vulnerabilities, such as input/output validation issues leading to cross-site scripting (XSS) or SQL injection
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: Qualys Web Application Scanner
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Qualys WAS SaaS in AWS Marketplace
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code in the pipeline Provision runtime environment Config management RASP Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 24. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Runtime Application Self-Protection (RASP) What it is: Controls execution and prevents real-time attacks in application runtime environment Why it’s important: Targets application code security at runtime (powerful addition to a WAF) Why it’s critical to security: Protects against OWASP top runtime threats. Can capture zero- day vulnerabilities
  • 25. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: Prevoty
  • 26. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Prevoty AMI in AWS Marketplace
  • 27. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Security and compliance of the code in the pipeline  Continuous compliance → Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 28. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Continuous compliance What it is: Automate the compliance of your *infrastructure* code Why it’s important: Ensure regulatory compliance Why it’s critical to security: Secure application code can run on compliant/ safe infrastructure
  • 29. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Vendor highlight: Dome9
  • 30. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Dome9 in AWS Marketplace
  • 31. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Making DevOps Sec-sy
  • 32. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Customize the way you provision software Find Machine learning Containers Networking Security Storage DevOps Database Operating systems BI and Big Data From a breadth of categories: Buy Free trial Pay-as-you-go Hourly Monthly Annual and multi-year Bring your own license (BYOL) Seller private offers Through flexible pricing options: Deploy Amazon Elastic Container Service (Amazon ECS) Amazon Elastic Container Service for Kubernetes (Amazon EKS) Amazon Machine Image (AMI) Application Program Interface (API) Amazon SageMaker AWS Fargate AWS CloudFormation template SaaS With multiple deployment options:
  • 33. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. “The ability to deploy software instantaneously anywhere in the world means we’re able to scale immediately, and stretch or shrink the environment to accommodate our needs.” “Integrated billing on AWS Marketplace is very slick, very straightforward. One place, one dashboard where all my costs appear.” Why customers buy in AWS Marketplace? Flexible consumption and contract models Easy and secure deployment, almost instantly Single, consolidated bill Speed, simplicity, and scalability “One benefit of the pay-as-you-go model is the ability to deploy anywhere without having to do a capital approval process to pay for infrastructure that may or may not be used.” —Rob Gillan, CTO, SimplePay —Briley James Yetter, Director of Technology, Goodwill Industries —Richard Williams, Sr. Engineer, MakerBot
  • 34. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Benjamin Andrew Global Lead Security, Networking & DevSecOps AWS Marketplace benand@amazon.com www.linkedin.com/in/benandrew