SlideShare uma empresa Scribd logo
1 de 33
Module 3
Security, Identity, and Access
Management
AWS Shared Responsibility Model
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
AWS is responsible
for the security OF
the cloud
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Shared Responsibility Model
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity, and Access Management
Operating System, Network, and Firewall Configuration
Customer Applications & ContentCustomers
Customers are
responsible for
security IN the cloud
AWS is responsible
for the security OF
the cloud
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Physical Security
• 24/7 trained security staff
• AWS data centers in nondescript and
undisclosed facilities
• Two-factor authentication for
authorized staff
• Authorization for data center access
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Hardware, Software, and Network
• Automated change-control
process
• Bastion servers that record all
access attempts
• Firewall and other boundary
devices
• AWS monitoring tools
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Certifications and Accreditations
ISO 9001, ISO 27001, ISO 27017, ISO 27018, IRAP (Australia), MLPS Level 3 (China),
MTCS Tier 3 Certification (Singapore) and more …
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SSL Endpoints
VPC
Secure Transmission
Use secure endpoints
to establish secure
communication
sessions (HTTPS).
Instance Firewalls
Use security groups
to configure firewall
rules for instances.
SSL Endpoints Security Groups
Network Control
Use public and
private subnets,
NAT, and VPN
support in your
virtual private cloud
to create low-level
networking
constraints for
resource access.
SSL Endpoints
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Groups
SSL Endpoints Security Groups
Instance Firewalls
Use security groups
to configure firewall
rules for instances.
VPC
Secure Transmission
Use secure endpoints
to establish secure
communication
sessions (HTTPS).
Network Control
Use public and
private subnets,
NAT, and VPN
support in your
virtual private cloud
to create low-level
networking
constraints for
resource access.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Multi-Tier Security Groups
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
www server
www server
www server
app server
app server
app server
Database Tier
security group
Application Tier
security group
Web Tier
security group
db server
db server
db server
Internet
Corporate
Admin Network
ssh/rdp
api api
(all other ports are blocked)
AWS Identity and Access Management (IAM)
AWS IAM
3
Manage federated users
and their permissions
2
Manage AWS IAM roles
and their permissions
1
Manage AWS IAM users
and their access
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Authentication
• Authentication
• AWS Management Console
• User Name and Password
IAM User
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Authentication
• Authentication
• AWS CLI or SDK API
• Access Key and Secret Key
Access Key ID: AKIAIOSFODNN7EXAMPLE
Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY
Java Python .NET
AWS SDK & APIAWS CLI
IAM User
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM User Management - Groups
User D
DevOps Group
User C
AWS Account
TestDev Group
User BUser A
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Authorization
Authorization
• Policies:
• Are JSON documents to describe
permissions.
• Are assigned to users, groups or
roles.
IAM User IAM Group
IAM Roles
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Policy Elements
{
"Version": "2012-10-17",
"Statement": [
{
"Sid": "Stmt1453690971587",
"Action": [
"ec2:Describe*",
"ec2:StartInstances",
"ec2:StopInstances”
],
"Effect": "Allow",
"Resource": "*",
"Condition": {
"IpAddress": {
"aws:SourceIp": "54.64.34.65/32”
}
}
},
{
"Sid": "Stmt1453690998327",
"Action": [
"s3:GetObject*”
],
"Effect": "Allow",
"Resource": "arn:aws:s3:::example_bucket/*”
}
]
}
IAM Policy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Policy Assignment(1)
IAM User
IAM Group
Assigned Assigned
IAM Policy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Policy Assignment(2)
IAM User
IAM Group
IAM Roles
Assigned Assigned
Assigned
IAM Policy
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Roles
• An IAM role uses a policy.
• An IAM role has no associated credentials.
• IAM users, applications, and services may assume IAM
roles.
IAM Roles
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Policy Assignment
IAM User
IAM Group
IAM Roles
Assigned Assigned
Assigned
IAM Policy
IAM User
Assumed Assumed
AWS Resources
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: Application Access to AWS
Resources
• Python application hosted on an Amazon EC2 Instance
needs to interact with Amazon S3.
• AWS credentials are required:
• Option 1: Store AWS Credentials on the Amazon EC2 instance.
IAM Roles
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Example: Application Access to AWS
Resources
• Python application hosted on an Amazon EC2 Instance
needs to interact with Amazon S3.
• AWS credentials are required:
• Option 1: Store AWS Credentials on the Amazon EC2 instance.
• Option 2: Securely distribute AWS credentials to AWS Services
and Applications.
IAM Roles
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Roles - Instance Profiles
Amazon EC2 Amazon S3
1
Create Instance
AWS IAM Roles - Instance Profiles
Amazon EC2
App &
Amazon S3
1
2
Create Instance
SelectIAMRole
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Roles - Instance Profiles
Amazon EC2
App &
EC2 MetaData Service
http://169.254.169.254/latest/meta-data/iam/security-credentials/rolename
Amazon S3
1
2
3
Create Instance
SelectIAMRole
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Roles - Instance Profiles
Amazon EC2
App &
EC2 MetaData Service
http://169.254.169.254/latest/meta-data/iam/security-credentials/rolename
Amazon S3
1
2
3
4
Create Instance
SelectIAMRole
ApplicationinteractswithS3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Temporary Security Credentials (AWS STS)
Use Cases
• Cross account access
• Federation
• Mobile Users
• Key rotation for Amazon EC2-based apps
Session
Access Key ID
Secret Access Key
Session Token
Expiration
Temporary Security Credentials
15 minutes to 36 hours
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Application Authentication
AWS IAM Application
No Support No Support
OS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Best Practices
• Delete AWS account (root) access keys.
• Create individual IAM users.
• Use groups to assign permissions to IAM users.
• Grant least privilege.
• Configure a strong password policy.
• Enable MFA for privileged users.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM Best Practices (cont.)
• Use roles for applications that run on Amazon EC2
instances.
• Delegate by using roles instead of by sharing
credentials.
• Rotate credentials regularly.
• Remove unnecessary users and credentials.
• Use policy conditions for extra security.
• Monitor activity in your AWS account.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
DEMO TIME
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
New to AWS
Introductory labs
and videos can
help you ramp up
Start learning
Take a Class
Build technical
skills and learn
best practices from
an accredited
instructor
Find a class
AWS Certification
Validate knowledge
and show expertise
with industry
recognized
certifications
Get Certified
Online Labs
Take an online
Self-Paced Lab to
get hands-on-
practice with AWS
services
Start practicing
Learn more: aws.amazon.com/training
Thank You for Attending AWSome Day Online Conference
We hope you found it interesting! A kind reminder to complete the survey.
Let us know what you thought of today’s event and how we can improve
the event experience for you in the future.
aws-apac-marketing@amazon.com
twitter.com/AWSCloud
facbook.com/AmazonWebServices
youtube.com/user/AmazonWebServices
slideshare.net/AmazonWebServices
twitch.tv/aws

Mais conteúdo relacionado

Mais procurados

Mais procurados (20)

Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
 
Introduction to EC2
Introduction to EC2Introduction to EC2
Introduction to EC2
 
AWS 101
AWS 101AWS 101
AWS 101
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS IAM and security
AWS IAM and securityAWS IAM and security
AWS IAM and security
 
Module 1 - AWSome Day Online Conference Thailand
Module 1 - AWSome Day Online Conference Thailand Module 1 - AWSome Day Online Conference Thailand
Module 1 - AWSome Day Online Conference Thailand
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...
 
IAM Best Practices
IAM Best PracticesIAM Best Practices
IAM Best Practices
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS와 함께하는 클라우드 컴퓨팅 (강철 AWS 매니저) :: AWS 기초 교육 온라인 세미나
AWS와 함께하는 클라우드 컴퓨팅 (강철 AWS 매니저) :: AWS 기초 교육 온라인 세미나AWS와 함께하는 클라우드 컴퓨팅 (강철 AWS 매니저) :: AWS 기초 교육 온라인 세미나
AWS와 함께하는 클라우드 컴퓨팅 (강철 AWS 매니저) :: AWS 기초 교육 온라인 세미나
 
AWS Summit Seoul 2023 | 가격은 저렴, 성능은 최대로! 확 달라진 Amazon EC2 알아보기
AWS Summit Seoul 2023 | 가격은 저렴, 성능은 최대로! 확 달라진 Amazon EC2 알아보기AWS Summit Seoul 2023 | 가격은 저렴, 성능은 최대로! 확 달라진 Amazon EC2 알아보기
AWS Summit Seoul 2023 | 가격은 저렴, 성능은 최대로! 확 달라진 Amazon EC2 알아보기
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
AWS for Backup and Recovery
AWS for Backup and RecoveryAWS for Backup and Recovery
AWS for Backup and Recovery
 
Cost Optimisation on AWS
Cost Optimisation on AWSCost Optimisation on AWS
Cost Optimisation on AWS
 
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
Introduction to AWS Cloud Computing | AWS Public Sector Summit 2016
 
Deep Dive: AWS CloudFormation
Deep Dive: AWS CloudFormationDeep Dive: AWS CloudFormation
Deep Dive: AWS CloudFormation
 

Semelhante a Module 3: Security, Identity and Access Management - AWSome Day Online Conference

AWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access ManagementAWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
Amazon Web Services
 

Semelhante a Module 3: Security, Identity and Access Management - AWSome Day Online Conference (20)

HSBC and AWS Day - Security Identity and Access Management
HSBC and AWS Day - Security Identity and Access ManagementHSBC and AWS Day - Security Identity and Access Management
HSBC and AWS Day - Security Identity and Access Management
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access ManagementAWSome Day 2016 - Module 3: Security, Identity, and Access Management
AWSome Day 2016 - Module 3: Security, Identity, and Access Management
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
Module 4: Secure your cloud applications - AWSome Day Online Conference 2019
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
Data Security in the Cloud - Matt Taylor - AWS TechShift ANZ 2018
 
Identity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF LoftIdentity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
Identity Round Robin Workshop - Serverless Round: Security Week at the SF Loft
 
Module 3 - AWSome Day Online Conference 2018
Module 3 - AWSome Day Online Conference 2018Module 3 - AWSome Day Online Conference 2018
Module 3 - AWSome Day Online Conference 2018
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
Security, Identity, and Access Management - Module 3 Part 1 - AWSome Day 2017
 
AWSome Day Online Conference 2019 - Module 3 AWS Security.pdf
AWSome Day Online Conference 2019 - Module 3 AWS Security.pdfAWSome Day Online Conference 2019 - Module 3 AWS Security.pdf
AWSome Day Online Conference 2019 - Module 3 AWS Security.pdf
 
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
Cloud Adoption Framework: Security Perspective - CAF Data Protection in Trans...
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud AndaAWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
AWSome Day Online 2020_Modul 4: Mengamankan aplikasi cloud Anda
 
Understanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and GovernanceUnderstanding the Critical Building Blocks of AWS Identity and Governance
Understanding the Critical Building Blocks of AWS Identity and Governance
 
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณAWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
AWSome Day Online 2020_โมดูล 4: การรักษาความปลอดภัยแอปพลิเคชันบนระบบคลาวด์ของคุณ
 

Mais de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Module 3: Security, Identity and Access Management - AWSome Day Online Conference

  • 1.
  • 2. Module 3 Security, Identity, and Access Management
  • 3. AWS Shared Responsibility Model AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations AWS is responsible for the security OF the cloud © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 4. AWS Shared Responsibility Model AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity, and Access Management Operating System, Network, and Firewall Configuration Customer Applications & ContentCustomers Customers are responsible for security IN the cloud AWS is responsible for the security OF the cloud © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 5. Physical Security • 24/7 trained security staff • AWS data centers in nondescript and undisclosed facilities • Two-factor authentication for authorized staff • Authorization for data center access © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 6. Hardware, Software, and Network • Automated change-control process • Bastion servers that record all access attempts • Firewall and other boundary devices • AWS monitoring tools © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 7. Certifications and Accreditations ISO 9001, ISO 27001, ISO 27017, ISO 27018, IRAP (Australia), MLPS Level 3 (China), MTCS Tier 3 Certification (Singapore) and more … © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 8. SSL Endpoints VPC Secure Transmission Use secure endpoints to establish secure communication sessions (HTTPS). Instance Firewalls Use security groups to configure firewall rules for instances. SSL Endpoints Security Groups Network Control Use public and private subnets, NAT, and VPN support in your virtual private cloud to create low-level networking constraints for resource access. SSL Endpoints © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 9. Security Groups SSL Endpoints Security Groups Instance Firewalls Use security groups to configure firewall rules for instances. VPC Secure Transmission Use secure endpoints to establish secure communication sessions (HTTPS). Network Control Use public and private subnets, NAT, and VPN support in your virtual private cloud to create low-level networking constraints for resource access. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 10. AWS Multi-Tier Security Groups © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. www server www server www server app server app server app server Database Tier security group Application Tier security group Web Tier security group db server db server db server Internet Corporate Admin Network ssh/rdp api api (all other ports are blocked)
  • 11. AWS Identity and Access Management (IAM) AWS IAM 3 Manage federated users and their permissions 2 Manage AWS IAM roles and their permissions 1 Manage AWS IAM users and their access © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 12. AWS IAM Authentication • Authentication • AWS Management Console • User Name and Password IAM User © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 13. AWS IAM Authentication • Authentication • AWS CLI or SDK API • Access Key and Secret Key Access Key ID: AKIAIOSFODNN7EXAMPLE Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY Java Python .NET AWS SDK & APIAWS CLI IAM User © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 14. AWS IAM User Management - Groups User D DevOps Group User C AWS Account TestDev Group User BUser A © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 15. AWS IAM Authorization Authorization • Policies: • Are JSON documents to describe permissions. • Are assigned to users, groups or roles. IAM User IAM Group IAM Roles © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 16. AWS IAM Policy Elements { "Version": "2012-10-17", "Statement": [ { "Sid": "Stmt1453690971587", "Action": [ "ec2:Describe*", "ec2:StartInstances", "ec2:StopInstances” ], "Effect": "Allow", "Resource": "*", "Condition": { "IpAddress": { "aws:SourceIp": "54.64.34.65/32” } } }, { "Sid": "Stmt1453690998327", "Action": [ "s3:GetObject*” ], "Effect": "Allow", "Resource": "arn:aws:s3:::example_bucket/*” } ] } IAM Policy © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 17. AWS IAM Policy Assignment(1) IAM User IAM Group Assigned Assigned IAM Policy © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 18. AWS IAM Policy Assignment(2) IAM User IAM Group IAM Roles Assigned Assigned Assigned IAM Policy © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 19. AWS IAM Roles • An IAM role uses a policy. • An IAM role has no associated credentials. • IAM users, applications, and services may assume IAM roles. IAM Roles © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 20. AWS IAM Policy Assignment IAM User IAM Group IAM Roles Assigned Assigned Assigned IAM Policy IAM User Assumed Assumed AWS Resources © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 21. Example: Application Access to AWS Resources • Python application hosted on an Amazon EC2 Instance needs to interact with Amazon S3. • AWS credentials are required: • Option 1: Store AWS Credentials on the Amazon EC2 instance. IAM Roles © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 22. Example: Application Access to AWS Resources • Python application hosted on an Amazon EC2 Instance needs to interact with Amazon S3. • AWS credentials are required: • Option 1: Store AWS Credentials on the Amazon EC2 instance. • Option 2: Securely distribute AWS credentials to AWS Services and Applications. IAM Roles © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 23. AWS IAM Roles - Instance Profiles Amazon EC2 Amazon S3 1 Create Instance
  • 24. AWS IAM Roles - Instance Profiles Amazon EC2 App & Amazon S3 1 2 Create Instance SelectIAMRole © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 25. AWS IAM Roles - Instance Profiles Amazon EC2 App & EC2 MetaData Service http://169.254.169.254/latest/meta-data/iam/security-credentials/rolename Amazon S3 1 2 3 Create Instance SelectIAMRole © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 26. AWS IAM Roles - Instance Profiles Amazon EC2 App & EC2 MetaData Service http://169.254.169.254/latest/meta-data/iam/security-credentials/rolename Amazon S3 1 2 3 4 Create Instance SelectIAMRole ApplicationinteractswithS3 © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 27. Temporary Security Credentials (AWS STS) Use Cases • Cross account access • Federation • Mobile Users • Key rotation for Amazon EC2-based apps Session Access Key ID Secret Access Key Session Token Expiration Temporary Security Credentials 15 minutes to 36 hours © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 28. Application Authentication AWS IAM Application No Support No Support OS © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 29. AWS IAM Best Practices • Delete AWS account (root) access keys. • Create individual IAM users. • Use groups to assign permissions to IAM users. • Grant least privilege. • Configure a strong password policy. • Enable MFA for privileged users. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 30. AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials. • Rotate credentials regularly. • Remove unnecessary users and credentials. • Use policy conditions for extra security. • Monitor activity in your AWS account. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 31. DEMO TIME © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
  • 32. New to AWS Introductory labs and videos can help you ramp up Start learning Take a Class Build technical skills and learn best practices from an accredited instructor Find a class AWS Certification Validate knowledge and show expertise with industry recognized certifications Get Certified Online Labs Take an online Self-Paced Lab to get hands-on- practice with AWS services Start practicing Learn more: aws.amazon.com/training
  • 33. Thank You for Attending AWSome Day Online Conference We hope you found it interesting! A kind reminder to complete the survey. Let us know what you thought of today’s event and how we can improve the event experience for you in the future. aws-apac-marketing@amazon.com twitter.com/AWSCloud facbook.com/AmazonWebServices youtube.com/user/AmazonWebServices slideshare.net/AmazonWebServices twitch.tv/aws