SlideShare uma empresa Scribd logo
1 de 41
AWS LAMBDA SECURITY: INSIDE & OUT
Mike Deck Principal Solutions Architect, AWS
Ory Segal PureSec CTO
https://www.puresec.io/
Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec
Agenda
 AWS Lambda overview
 AWS Lambda under the hood
 Security isolation & network isolation
 Serverless security
 The evolution of the shared responsibility
model
 Protecting serverless applications
© 2019, Amazon Web Services, Inc. or its Affiliates.
SERVICES (ANYTHING)
Changes in
data state
Requests to
endpoints
Changes in
resource state
EVENT SOURCE FUNCTION
Node.js
Python
Java
C#
Go
AWS Lambda overview
© 2019, Amazon Web Services, Inc. or its Affiliates.
Lambda handles…
Load Balancing
Auto Scaling
Handling Failures
Security Isolation
Managing Utilization
(and many other things) for you
© 2019, Amazon Web Services, Inc. or its Affiliates.
Let’s take a look under the
hood
© 2019, Amazon Web Services, Inc. or its Affiliates.
© 2019, Amazon Web Services, Inc. or its Affiliates.
AWS Cloud
Region
Lambda customer
(Existing Worker,
New Sandbox)
Availability zone 2
Availability zone 1
Invoke
Front End
Invoke
Front End
Worker Mgr
Worker Mgr
Reserve Sandbox
Invoke
Worker
Worker
Worker
Init
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Sandbox isolation
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Sandbox
Lambda Runtime
YourCode
One Function
ManyAccounts
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Virtual Devices
Device Emulation
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
virtio drivers
virtio host in Firecracker
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.
Hardware
Host OS
Hypervisor
Guest OS
Virtual Devices
Device Emulation
Physical
Devices
© 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates.
Network isolation
© 2019, Amazon Web Services, Inc. or its Affiliates.
Worker
Lambda
Function
ENI in
yourVPC
YourVPC
Local
NAT
© 2019, Amazon Web Services, Inc. or its Affiliates.
Worker
Lambda
Function
ENI in
yourVPC
YourVPC
Remote
NAT
© 2019, Amazon Web Services, Inc. or its Affiliates.
© 2019, Amazon Web Services, Inc. or its Affiliates.
↓
↓
↑
Firecracker Hypervisor vs. Others
© 2019, Amazon Web Services, Inc. or its Affiliates.
Security Whitepaper
https://bit.ly/lambda-security
© 2019, Amazon Web Services, Inc. or its Affiliates.
Learn more
Available onYouTube
https://youtu.be/QdzV04T_kec
AWS LAMBDA
SECURITY
SERVERLESS
SECURITY
Shared Model Of Responsibility
CLOUD PROVIDER
Responsible for security
“of”
The cloud
REGIONS AVAILABILITY ZONES EDGE LOCATIONS
COMPUTE STORAGE DATABASE NETWORK
OPERATING SYSTEM + VIRTUAL MACHINES + CONTAINERS
APPLICATION
OWNER
Responsible for
security “in” the cloud
APPLICATIONS (FUNCTIONS)
IDENTITY & ACCESS
MANAGEMENT
CLOUD SERVICES
CONFIGURATION
CLIENT-SIDE DATA IN CLOUD DATA IN TRANSIT
Security Responsibility: When You Own The
Infrastructure (IaaS)
 Physical infrastructure, access restrictions to physical perimeter and hardware
 Secure configuration of infrastructure devices and systems
 Regularly testing the security of all systems/processes (OS, services)
 Identification and authentication of access to systems (OS, services)
 Patching and fixing flaws in OS
 Hardening OS and services
 Protecting all systems against malware and backdoors
 Patching and fixing flaws in runtime environment and related software packages
 Exploit prevention and memory protection
 Network segmentation
 Tracking and monitoring all network resources and access
 Installation and maintenance of network firewalls
 Network-layer DoS protection
 Authentication of users
 Authorization controls when accessing application and data
 Log and maintain audit trails of all access to application and data
 Deploy an application layer firewall for event-data inspection
 Detect and fix vulnerabilities in third-party dependencies
 Use least-privileged IAM roles and permissions
 Enforce legitimate application behavior
 Data leak prevention
 Scan code and configurations statically during development
 Maintain serverless/cloud asset inventory
 Remove obsolete/unused cloud services and functions
 Continuously monitor errors and security incidents
8%
92%
APPLICATION
OWNER
CLOUD
PROVIDER
Security Responsibility: When You Adopt
Serverless
 Physical infrastructure, access restrictions to physical perimeter and hardware
 Secure configuration of infrastructure devices and systems
 Regularly testing the security of all systems/processes (OS, services)
 Identification and authentication of access to systems (OS, services)
 Patching and fixing flaws in OS
 Hardening OS and services
 Protecting all systems against malware and backdoors
 Patching and fixing flaws in runtime environment and related software packages
 Exploit prevention and memory protection
 Network segmentation
 Tracking and monitoring all network resources and access
 Installation and maintenance of network firewalls
 Network-layer DoS protection
 Authentication of users
 Authorization controls when accessing application and data
 Log and maintain audit trails of all access to application and data
 Deploy an application layer firewall for event-data inspection
 Detect and fix vulnerabilities in third-party dependencies
 Use least-privileged IAM roles and permissions
 Enforce legitimate application behavior
 Data leak prevention
 Scan code and configurations statically during development
 Maintain serverless/cloud asset inventory
 Remove obsolete/unused cloud services and functions
 Continuously monitor errors and security incidents
52%
48%
APPLICATION
OWNER
CLOUD
PROVIDER
Top Risks for Serverless Applicationshttp://bit.ly/csa-top-12
SAS-1
Function event-data injection
Broken authentication
SAS-2
Insecure serverless deployment
SAS-3
Over-privileged function permissions
SAS-4
Inadequate function monitoring
SAS-5
Insecure 3rd party dependencies
SAS-6
Insecure app secrets storage
SAS-7
DoS & Financial exhaustion
SAS-8
Serverless business logic manipulation
SAS-9
Improper exceptions handling & errors
SAS-10
Legacy functions & cloud resources
SAS-11
Cross-execution data persistency
SAS-12
Existing Application Security Solutions Do
Not Fit
Protects applications by
being deployed on
networks and servers
TRADITIONAL SECURITY
The application owner doesn't
have any control over the
infrastructure
SERVERLESS
INFRASTRUCTURE
SERVERLESS
FUNCTIONS WAF
LAYER 7
NG-FW
INBOUND
WSG
OUTBOUND
IPS
NETWORK
EPP
BEHAVIORAL
APPLICATION
Traditional Protections Cannot Be Deployed
On Serverless
With No Infrastructure Based Protections,
Your Security is Reduced to
Good Coding and Strict Configuration
THE CHALLENGE OF ”LEAST-
PRIVILEGED” IAM ROLES
 Functions should only be allowed to do
what they are tasked with
 AWS IAM model is extremely powerful,
yet hard to get right, especially at large
scale
 Human factor
 ‘Over-privileged’ issues are the most
common problem
C O N F I G U R AT I O N
GETTING IAM PERMISSIONS RIGHT
 Adopt ‘Role-per-Function’ model
 Single responsibility principle – each
function should have a single focused task
 Use SAM managed policies where
applicable
 Automate IAM permissions scanning and
role generation (PureSec)
Your Function
Static Code
Analysis
Learn about cloud
resource interactions,
and least required
privileges
IAM Role
Configuration
Analysis
Learn about
privileges granted
Account Analysis
Learn about cloud
resources in your
account that might be
at risk
Automating Least-Privileged IAM w/ PureSec
• Remediate risks during development with the CLI-based scanner
• Enforce least-privilege policy during build (CI/CD integration)
• Continuously monitor & enforce security on deployed applications
There’s more to AWS Lambda than
AWS Gateway
HTTP
…47 services
• Web Application Firewalls inspect HTTP(s) web traffic
• Require deployment in-line between client and Lambda
• Parse and inspect HTTP messages (parameters, cookies, headers)
Cloud-native event inspection requires a
different approach.
* Where is data coming from?
Eventually from the outside…
PureSec Runtime Protection: serverless, scalable & blazing-fast
 Serverless application firewall - inspects all cloud-native events
 Serverless Behavioral Protection – enforces expected app behavior
 Protects real-world production applications with billions of invocations
ory@puresec.io
Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec

Mais conteúdo relacionado

Mais procurados

Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Puma Security, LLC
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeCSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeAlert Logic
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsPuma Security, LLC
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAmazon Web Services
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at NetflixJason Chan
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A ServiceOlav Tvedt
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelinePuma Security, LLC
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes EverywhereAmazon Web Services
 
Winning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructureWinning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructurePuma Security, LLC
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedJason Chan
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...😸 Richard Spindler
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAmazon Web Services
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Puma Security, LLC
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Amazon Web Services
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAmazon Web Services
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAlert Logic
 

Mais procurados (19)

Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2Cloud Security: Attacking The Metadata Service v2
Cloud Security: Attacking The Metadata Service v2
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeCSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
 
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated EnvironmentsLessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
Lessons Learned Deploying Modern Cloud Systems in Highly Regulated Environments
 
AWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - KeynoteAWS Summit 2014 - Perth - Keynote
AWS Summit 2014 - Perth - Keynote
 
Cloud Security at Netflix
Cloud Security at NetflixCloud Security at Netflix
Cloud Security at Netflix
 
Security As A Service
Security As A ServiceSecurity As A Service
Security As A Service
 
Weaponizing Your DevOps Pipeline
Weaponizing Your DevOps PipelineWeaponizing Your DevOps Pipeline
Weaponizing Your DevOps Pipeline
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Winning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless InfrastructureWinning in the Dark: Defending Serverless Infrastructure
Winning in the Dark: Defending Serverless Infrastructure
 
Cloud Application Security: Lessons Learned
Cloud Application Security: Lessons LearnedCloud Application Security: Lessons Learned
Cloud Application Security: Lessons Learned
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
Adding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps PipelinesAdding the Sec to Your DevOps Pipelines
Adding the Sec to Your DevOps Pipelines
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020Defending Serverless Infrastructure in the Cloud RSAC 2020
Defending Serverless Infrastructure in the Cloud RSAC 2020
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...
 
AWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App SecurityAWS Webcast - Top 3 Ways to Improve Web App Security
AWS Webcast - Top 3 Ways to Improve Web App Security
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 

Semelhante a AWS Lambda Security Inside & Out

Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Jeremy Daly
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionAmazon Web Services
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud ApplicationsIBM Security
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWSAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero Amazon Web Services
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Riyadh User Group
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountAmazon Web Services
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...Amazon Web Services Korea
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsRightScale
 
Application Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesApplication Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesRightScale
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Amazon Web Services
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Amazon Web Services
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation OverviewAmazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 

Semelhante a AWS Lambda Security Inside & Out (20)

Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
Serverless Security: Best practices and mitigation strategies (re:Inforce 2019)
 
Security: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud AdoptionSecurity: A Driving Force Behind Cloud Adoption
Security: A Driving Force Behind Cloud Adoption
 
Securing Your Cloud Applications
Securing Your Cloud ApplicationsSecuring Your Cloud Applications
Securing Your Cloud Applications
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero 3 Secrets to Becoming a Cloud Security Superhero
3 Secrets to Becoming a Cloud Security Superhero
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Lock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS AccountLock It Down: How to Secure Your Organization's AWS Account
Lock It Down: How to Secure Your Organization's AWS Account
 
AWS Security by Design
AWS Security by Design AWS Security by Design
AWS Security by Design
 
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
클라우드 환경에서의 SIEMLESS 통합 보안 서비스, Alert Logic - 채현주 보안기술본부장, Openbase :: AWS Sum...
 
Securing Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid CloudsSecuring Servers in Public and Hybrid Clouds
Securing Servers in Public and Hybrid Clouds
 
Application Security in the Cloud - Best Practices
Application Security in the Cloud - Best PracticesApplication Security in the Cloud - Best Practices
Application Security in the Cloud - Best Practices
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
Cloud Conversations: Giving Business Transformation a Voice_AWSPSSummit_Singa...
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Secure Configuration and Automation Overview
Secure Configuration and Automation OverviewSecure Configuration and Automation Overview
Secure Configuration and Automation Overview
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 

Último

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyKhushali Kathiriya
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesBoston Institute of Analytics
 

Último (20)

Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
HTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation StrategiesHTML Injection Attacks: Impact and Mitigation Strategies
HTML Injection Attacks: Impact and Mitigation Strategies
 

AWS Lambda Security Inside & Out

  • 1. AWS LAMBDA SECURITY: INSIDE & OUT Mike Deck Principal Solutions Architect, AWS Ory Segal PureSec CTO https://www.puresec.io/ Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec
  • 2. Agenda  AWS Lambda overview  AWS Lambda under the hood  Security isolation & network isolation  Serverless security  The evolution of the shared responsibility model  Protecting serverless applications
  • 3. © 2019, Amazon Web Services, Inc. or its Affiliates. SERVICES (ANYTHING) Changes in data state Requests to endpoints Changes in resource state EVENT SOURCE FUNCTION Node.js Python Java C# Go AWS Lambda overview
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. Lambda handles… Load Balancing Auto Scaling Handling Failures Security Isolation Managing Utilization (and many other things) for you
  • 5. © 2019, Amazon Web Services, Inc. or its Affiliates. Let’s take a look under the hood
  • 6. © 2019, Amazon Web Services, Inc. or its Affiliates.
  • 7. © 2019, Amazon Web Services, Inc. or its Affiliates. AWS Cloud Region Lambda customer (Existing Worker, New Sandbox) Availability zone 2 Availability zone 1 Invoke Front End Invoke Front End Worker Mgr Worker Mgr Reserve Sandbox Invoke Worker Worker Worker Init
  • 8. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Sandbox isolation
  • 9. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 10. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 11. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Sandbox Lambda Runtime YourCode One Function ManyAccounts
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Virtual Devices Device Emulation Physical Devices
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS virtio drivers virtio host in Firecracker Physical Devices
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. Hardware Host OS Hypervisor Guest OS Virtual Devices Device Emulation Physical Devices
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates.© 2019, Amazon Web Services, Inc. or its Affiliates. Network isolation
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. Worker Lambda Function ENI in yourVPC YourVPC Local NAT
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. Worker Lambda Function ENI in yourVPC YourVPC Remote NAT
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates.
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. ↓ ↓ ↑ Firecracker Hypervisor vs. Others
  • 24. © 2019, Amazon Web Services, Inc. or its Affiliates. Security Whitepaper https://bit.ly/lambda-security
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. Learn more Available onYouTube https://youtu.be/QdzV04T_kec
  • 27. Shared Model Of Responsibility CLOUD PROVIDER Responsible for security “of” The cloud REGIONS AVAILABILITY ZONES EDGE LOCATIONS COMPUTE STORAGE DATABASE NETWORK OPERATING SYSTEM + VIRTUAL MACHINES + CONTAINERS APPLICATION OWNER Responsible for security “in” the cloud APPLICATIONS (FUNCTIONS) IDENTITY & ACCESS MANAGEMENT CLOUD SERVICES CONFIGURATION CLIENT-SIDE DATA IN CLOUD DATA IN TRANSIT
  • 28. Security Responsibility: When You Own The Infrastructure (IaaS)  Physical infrastructure, access restrictions to physical perimeter and hardware  Secure configuration of infrastructure devices and systems  Regularly testing the security of all systems/processes (OS, services)  Identification and authentication of access to systems (OS, services)  Patching and fixing flaws in OS  Hardening OS and services  Protecting all systems against malware and backdoors  Patching and fixing flaws in runtime environment and related software packages  Exploit prevention and memory protection  Network segmentation  Tracking and monitoring all network resources and access  Installation and maintenance of network firewalls  Network-layer DoS protection  Authentication of users  Authorization controls when accessing application and data  Log and maintain audit trails of all access to application and data  Deploy an application layer firewall for event-data inspection  Detect and fix vulnerabilities in third-party dependencies  Use least-privileged IAM roles and permissions  Enforce legitimate application behavior  Data leak prevention  Scan code and configurations statically during development  Maintain serverless/cloud asset inventory  Remove obsolete/unused cloud services and functions  Continuously monitor errors and security incidents 8% 92% APPLICATION OWNER CLOUD PROVIDER
  • 29. Security Responsibility: When You Adopt Serverless  Physical infrastructure, access restrictions to physical perimeter and hardware  Secure configuration of infrastructure devices and systems  Regularly testing the security of all systems/processes (OS, services)  Identification and authentication of access to systems (OS, services)  Patching and fixing flaws in OS  Hardening OS and services  Protecting all systems against malware and backdoors  Patching and fixing flaws in runtime environment and related software packages  Exploit prevention and memory protection  Network segmentation  Tracking and monitoring all network resources and access  Installation and maintenance of network firewalls  Network-layer DoS protection  Authentication of users  Authorization controls when accessing application and data  Log and maintain audit trails of all access to application and data  Deploy an application layer firewall for event-data inspection  Detect and fix vulnerabilities in third-party dependencies  Use least-privileged IAM roles and permissions  Enforce legitimate application behavior  Data leak prevention  Scan code and configurations statically during development  Maintain serverless/cloud asset inventory  Remove obsolete/unused cloud services and functions  Continuously monitor errors and security incidents 52% 48% APPLICATION OWNER CLOUD PROVIDER
  • 30. Top Risks for Serverless Applicationshttp://bit.ly/csa-top-12 SAS-1 Function event-data injection Broken authentication SAS-2 Insecure serverless deployment SAS-3 Over-privileged function permissions SAS-4 Inadequate function monitoring SAS-5 Insecure 3rd party dependencies SAS-6 Insecure app secrets storage SAS-7 DoS & Financial exhaustion SAS-8 Serverless business logic manipulation SAS-9 Improper exceptions handling & errors SAS-10 Legacy functions & cloud resources SAS-11 Cross-execution data persistency SAS-12
  • 31. Existing Application Security Solutions Do Not Fit Protects applications by being deployed on networks and servers TRADITIONAL SECURITY The application owner doesn't have any control over the infrastructure SERVERLESS
  • 32. INFRASTRUCTURE SERVERLESS FUNCTIONS WAF LAYER 7 NG-FW INBOUND WSG OUTBOUND IPS NETWORK EPP BEHAVIORAL APPLICATION Traditional Protections Cannot Be Deployed On Serverless With No Infrastructure Based Protections, Your Security is Reduced to Good Coding and Strict Configuration
  • 33.
  • 34. THE CHALLENGE OF ”LEAST- PRIVILEGED” IAM ROLES  Functions should only be allowed to do what they are tasked with  AWS IAM model is extremely powerful, yet hard to get right, especially at large scale  Human factor  ‘Over-privileged’ issues are the most common problem C O N F I G U R AT I O N
  • 35. GETTING IAM PERMISSIONS RIGHT  Adopt ‘Role-per-Function’ model  Single responsibility principle – each function should have a single focused task  Use SAM managed policies where applicable  Automate IAM permissions scanning and role generation (PureSec)
  • 36. Your Function Static Code Analysis Learn about cloud resource interactions, and least required privileges IAM Role Configuration Analysis Learn about privileges granted Account Analysis Learn about cloud resources in your account that might be at risk Automating Least-Privileged IAM w/ PureSec
  • 37. • Remediate risks during development with the CLI-based scanner • Enforce least-privilege policy during build (CI/CD integration) • Continuously monitor & enforce security on deployed applications
  • 38.
  • 39. There’s more to AWS Lambda than AWS Gateway HTTP …47 services • Web Application Firewalls inspect HTTP(s) web traffic • Require deployment in-line between client and Lambda • Parse and inspect HTTP messages (parameters, cookies, headers) Cloud-native event inspection requires a different approach. * Where is data coming from? Eventually from the outside…
  • 40. PureSec Runtime Protection: serverless, scalable & blazing-fast  Serverless application firewall - inspects all cloud-native events  Serverless Behavioral Protection – enforces expected app behavior  Protects real-world production applications with billions of invocations
  • 41. ory@puresec.io Get your free 30-day trial of PureSec SSP – https://www.puresec.io/get-puresec