aws · pdf file · 2017-09-12aws iam best practices (cont.) • use roles for...

74
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. DevOps Architect AWS Security 11 November 2016 Rajesh Kumar

Upload: vucong

Post on 31-Mar-2018

219 views

Category:

Documents


1 download

TRANSCRIPT

Page 1: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

DevOps Architect

AWS Security

11 November 2016

Rajesh Kumar

Page 2: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Shared Responsibility Model

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure Regions

AvailabilityZonesEdgeLocations

Client-side Data Encryption

Server-side Data Encryption

NetworkTraffic Protection

Operating System, Network, and Firewall Configuration

Customer Applications & Content

Platform, Applications, Identity, and Access Management

Cu

sto

mer

s

Customers are

responsible for

security IN the cloud

www.scmGalaxy.com 2

AWS is responsible

for the security OF

the cloud

Page 3: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Physical Security

• 24/7 trained security staff

• AWS data centers in nondescript and

undisclosed facilities

• Two-factor authentication for

authorized staff

• Authorization for data center access

www.scmGalaxy.com 3

Page 4: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Hardware, Software, and Network

• Automated change-control

process

• Bastion servers that record all

access attempts

• Firewall and other boundary

devices

• AWS monitoring tools

www.scmGalaxy.com 4

Page 5: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Certifications and Accreditations

ISO 9001, ISO 27001, ISO 27017, ISO 27018, IRAP (Australia), MLPS Level 3 (China),

MTCS Tier 3 Certification (Singapore) and more …

www.scmGalaxy.com 5

Page 6: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

SSL Endpoints

VPC

Secure Transmission

Use secure endpoints

to establish secure

communication

sessions (HTTPS).

Instance Firewalls

Use security groups

to configure firewall

rules for instances.

SSL Endpoints Security Groups

Network Control

Use public and

private subnets,

NAT, and VPN

support in your

virtual private cloud

to create low-level

networking

constraints for

resource access.

SSL Endpoints

www.scmGalaxy.com 6

Page 7: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Security Groups

SSL Endpoints Security Groups

Instance Firewalls

Use security groups

to configure firewall

rules for instances.

VPC

www.scmGalaxy.com 7

Secure Transmission

Use secure endpoints

to establish secure

communication

sessions (HTTPS).

Network Control

Use public and

private subnets,

NAT, and VPN

support in your

virtual private cloud

to create low-level

networking

constraints for

resource access.

Page 8: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

HTTPPorts 80 and 443 only

open to the Internet

SSH/RDPEngineering staff have SSH/RDP

access to Bastion Host

AWS Multi-Tier Security Groups

Bastion

All other internet ports blocked by default

www.scmGalaxy.com 8

Page 9: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Amazon Virtual Private Cloud (VPC)

VPCSSL Endpoints Security Groups

www.scmGalaxy.com 9

Use public and

private subnets,

NAT, and VPN

support in your

virtual private cloud

to create low-level

networking

constraints for

resource access.

Use security groups

to configure firewall

rules for instances.

Secure Transmission Instance Firewalls Network Control

Use secure endpoints

to establish secure

communication

sessions (HTTPS).

Page 10: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Identity and Access Management (IAM)

3

Manage federated users

and their permissions

2

Manage AWS IAM roles

and their permissions

1

MAWanSagIAeMAWS IAM users

and their access

www.scmGalaxy.com 10

Page 11: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Authentication

• Authentication

• AWS Management Console• User Name and Password

IAM User

www.scmGalaxy.com 11

Page 12: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Authentication

• Authentication

• AWS CLI or SDK API• Access Key and Secret Key

Access Key ID: AKIAIOSFODNN7EXAMPLE

Secret Access Key: wJalrXUtnFEMI/K7MDENG/bPxRfiCYEXAMPLEKEY

Java Python .NET

AWS SDK & APIAWS CLI

IAM User

www.scmGalaxy.com 12

Page 13: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM User Management - Groups

UserD

DevOpsGroup

UserC

AWS Account

TestDevGroup

UserBUserA

www.scmGalaxy.com 13

Page 14: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Authorization

Authorization

• Policies:

• Are JSON documents to describe

permissions.

• Are assigned to users, groups or

roles.

IAM User IAM Group

IAM Roles

www.scmGalaxy.com 14

Page 15: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Policy Elements{

"Version": "2012-10-17",

"Statement": [

{

"Sid": "Stmt1453690971587",

"Action": [

"ec2:Describe*",

"ec2:StartInstances",

"ec2:StopInstances”

],

"Effect": "Allow",

"Resource": "*",

"Condition": {

"IpAddress": {

"aws:SourceIp": "54.64.34.65/32”

}

}

},

{

"Sid": "Stmt1453690998327",

"Action": [

"s3:GetObject*”

],

"Effect": "Allow",

"Resource": "arn:aws:s3:::example_bucket/*”

}

]

}

IAM Policy

www.scmGalaxy.com 15

Page 16: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Policy Assignment

IAM UserIAM Group

Assigned Assigned

IAM Policy

www.scmGalaxy.com 16

Page 17: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Policy Assignment

IAM UserIAM Group

IAM Roles

Assigned Assigned

Assig

ne

d

IAM Policy

www.scmGalaxy.com 17

Page 18: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Roles

• An IAM role uses a policy.

• An IAM role has no associated credentials.

• IAM users, applications, and services may assume IAM

roles.

IAM Roles

www.scmGalaxy.com 18

Page 19: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Policy Assignment

IAM UserIAM Group

IAM Roles

Assigned Assigned

Assig

ne

d

IAM Policy

IAM User

Assumed Assumed

AWS Resources

www.scmGalaxy.com 19

Page 20: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Example: Application Access to AWS

Resources

• Python application hosted on an Amazon EC2 Instance

needs to interact with Amazon S3.

• AWS credentials are required:

• Option 1: Store AWS Credentials on the Amazon EC2 instance.

• Option 2: Securely distribute AWS credentials toAWS Services

andApplications.

IAM Roles

www.scmGalaxy.com 20

Page 21: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Roles - Instance Profiles

Amazon EC2

App &EC2 MetaData Service

http://169.254.169.254/latest/meta-data/iam/security-credentials/rolename

Amazon S3

1

2

3

4

Create Instance

Se

lec

tIA

MR

ole

Ap

plic

atio

nin

tera

cts

with

S3

www.scmGalaxy.com 100

21

Page 22: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Roles – Assume Role

IAM Restricted Policy

IAM User A-1

AWS Account A

IAM Admin RoleIAM Admin Policy

Assigned

Assume

Assigned

1

2

IAM User B-1

AWS Account B

Amazon S3

Assume

4

Access

53

Access

1

www.scmGalaxy.com 22

Page 23: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Temporary Security Credentials (AWS STS)

Use Cases

• Cross account access

• Federation

• Mobile Users

• Key rotation for Amazon EC2-based apps

Session

Access Key ID

Secret Access Key

Session Token

Expiration

Temporary Security Credentials

15 minutes to 36 hours

www.scmGalaxy.com 23

Page 24: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Application Authentication

AWS IAM Application

No Support No Support

OS

www.scmGalaxy.com 24

Page 25: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Authentication and Authorization

Authentication

• AWS Management Console

• User Name and Password

• AWS CLI or SDK API

• Access Key and Secret Key

Authorization

• Policies

IAM User IAM Group

IAM Roles

www.scmGalaxy.com 25

Page 26: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Best Practices

• Delete AWS account (root) access keys.

• Create individual IAM users.

• Use groups to assign permissions to IAM users.

• Grant least privilege.

• Configure a strong password policy.

• Enable MFA for privileged users.

www.scmGalaxy.com 26

Page 27: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM Best Practices (cont.)

• Use roles for applications that run on Amazon EC2

instances.

• Delegate by using roles instead of by sharing

credentials.

• Rotate credentials regularly.

• Remove unnecessary users and credentials.

• Use policy conditions for extra security.

• Monitor activity in your AWSaccount.

www.scmGalaxy.com 27

Page 28: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail

• Records AWS API calls for accounts.

• Delivers log files with information to an Amazon S3

bucket.

• Makes calls using the AWS Management Console,AWS

SDKs, AWS CLI and higher-level AWSservices.

AWS CloudTrail

www.scmGalaxy.com 28

Amazon S3 Bucket

Logs

Page 29: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Security Groups

A security group acts as a virtual firewall that controls the traffic for one or more instances. When you launch an instance, you associate one or more security groups with the instance.

You add rules to each security group that allow traffic to or from its associated instances. You can modify the rules for a security group at any time; the new rules are automatically applied to all instances that are associated with the security group.

Page 30: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

VPS

A virtual private cloud (VPC) is a virtual network that

closely resembles a traditional network that you'd operate

in your own data center, with the benefits of using the

scalable infrastructure of Amazon Web Services (AWS).

Page 31: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Direct

AWS Direct Connect makes it easy to establish a

dedicated network connection from your premises to AWS.

Using AWS Direct Connect, you can establish private

connectivity between AWS and your datacenter, office, or

colocation environment, which in many cases can reduce

your network costs, increase bandwidth throughput, and

provide a more consistent network experience than

Internet-based connections.

Page 32: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

VPN

You can connect your VPC to remote networks by using a

VPN connection. The following are some of the

connectivity options available to you.

AWS hardware VPN

AWS Direct Connect

AWS VPN CloudHub

Page 33: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials
Page 34: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials
Page 35: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

3 Services to Secure AWS

AWS Identity and Access Management (IAM)

AWS Config Rules

AWS CloudTrail

Page 36: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Services for todays Webinar

AWS Identity and Access Management (IAM)

AWS Config Rules

AWS CloudTrail

Page 37: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM

Page 38: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM

IAM is a web service that enables Amazon Web Services

customers to manage users and user permissions in AWS.

The service is targeted for use with AWS products. With

IAM, you can centrally manage users, and permissions that

control which AWS resources users can access.

Page 39: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Front Door

Page 40: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Overview

Users Groups Roles Policies

AWS Account

Page 41: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Resource Access

Users

AWS Account

Roles PoliciesResources

S3

Page 42: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM – Application Authentication

Operating

System

Application

Page 43: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Logging In

Page 44: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Inside the Console

Page 45: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Generator

Page 46: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Generator

Page 47: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Simulator

Page 48: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Simulator

Page 49: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Simulator

Page 50: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Policy Simulator

Page 51: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS IAM - Best Practices

Reduce or remove use of root

Create Individual IAM Users

Configure a strong password policy

Enable MFA for privileged users

Grant least privilege

Manage permissions with groups

Restrict privileged access further with conditions

Rotate security credentials regularly

Use IAM roles to share access

Use IAM roles for Amazon EC2 instances

Monitor activity

Page 52: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

DEMO

Page 53: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Services for todays Webinar

AWS Identity and Access Management (IAM)

AWS Config Rules

AWS CloudTrail

Page 54: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config Rules

Page 55: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config

AWS Config is a fully managed service that provides you

with an inventory of your AWS resources, lets you audit the

resource configuration history and notifies you of resource

configuration changes.

Page 56: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

NormalizeRecordChanging

Resources

AWS Config - Overview

Deliver

Stream

Snapshot (ex. 2014-11-05)

AWS Config

APIs

Store

History

Page 57: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config Rules

Set up rules to check configuration changes

recorded

Use pre-built rules provided by AWS

Author custom rules using AWS Lambda

Invoked automatically for continuous

assessment

Use dashboard for visualizing compliance

and identifying offending changes

Page 58: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

• Check configuration changes

• Periodic

• Event driven

• Rules

• Pre-built rules provided by AWS

• Custom rules using AWS Lambda

• Use dashboard for visualizing compliance and

identifying offending changes

Compliance guideline Action if noncompliance

All EBS volumes should be

encrypted

Encrypt volumes

Instances must be within a VPC Terminate instance

Instances must be tagged with

environment type

Notify developer (email, page,

Amazon SNS)

AWS Config Rules - Samples

Page 59: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

NormalizeRecordChanging

Resources

AWS Config & Config Rules - OverviewDeliver

Stream

Snapshot (ex. 2014-11-05)

AWS Config

APIs

Store

History

Rules

Page 60: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Relationships

Bi-directional map of

dependencies automatically

assigned

Change to a resource

propagates to create

Configuration Items for related

resources

EC2 Instance Elastic IP

Page 61: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config Rules

AWS managed rulesDefined by AWS

Require minimal (or no) configuration

Rules are managed by AWS

Customer managed rulesAuthored by you using AWS Lambda

Rules execute in your account

You maintain the rule

A rule that checks the validity of configurations recorded

Page 62: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config Rules - Managed Rules

Page 63: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Config Rules - Triggers

Triggered by changes: Rules invoked when relevant resources

changeScoped by changes to:

• Tag key/value

• Resource types

• Specific resource ID

e.g. EBS volumes tagged “Production” should be attached to EC2 instances

Triggered periodically: Rules invoked at specified frequencye.g. Account should have no more than 3 “PCI v3” EC2 instances; every 3 hrs

Page 64: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Services for todays Webinar

AWS Identity and Access Management (IAM)

AWS Config Rules

AWS CloudTrail

Page 65: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail

Page 66: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail

AWS CloudTrail is a web service that records AWS API

calls for your account and delivers log files to you. The

recorded information includes the identity of the API

caller, the time of the API call, the source IP address of

the API caller, the request parameters, and the response

elements returned by the AWS service

Page 67: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail - Overview

Store/ archive

Troubleshoot

Monitor and alarm

You are making API

calls...

On a growing set of AWS

services around the world..

CloudTrail is continuously

recording API calls

Amazon Elastic

Block Store

(Amazon EBS)

Amazon S3

bucket

Page 68: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail – Helping You

CloudTrail can help you achieve many tasks

Security analysis

Track changes to AWS resources, for example

VPC security groups and NACLs

Compliance – log and understand AWS API

call history

Prove that you did not:

• Use the wrong region

• Use services you don’t want

Troubleshoot operational issues – quickly

identify the most recent changes to your

environment

Page 69: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS CloudTrail - Cross-Account

CloudTrail can help you achieve

many tasks

Accounts can send their trails to a

central account

Central account can then do

analytics

Central account can:

• Redistribute the trails

• Grant access to the trails

• Filter and reformat Trails (to meet

privacy requirements)

Account B Account C

Account A

S3

IAM Admin

IAM User IAM User

AWS CloudTrail AWS CloudTrail AWS CloudTrail

Logs Logs Logs

Page 70: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Services for todays Webinar

AWS Identity and Access Management (IAM)

AWS Config Rules

AWS CloudTrail

Page 71: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Show and Tell

Page 72: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Tools - Summary

AWS Security and Compliance

Security

of

the cloud

Services and tools

to aid security

in

the cloud

Service Type Use cases

Access ControlManage access to your AWS resources

Continuous evaluations

Best practices, misconfigurations, or actions

on changes

Audit

Audit trail of API activity. Who did what, when and from

where

IAM

Config

Rules

CloudTrail

Page 73: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

AWS Resources

AWS IAM:

https://aws.amazon.com/IAM

AWS Config:

https://aws.amazon.com/config/

AWS CloudTrail:

https://aws.amazon.com/cloudtrail/

AWS Policy Generator:

https://awspolicygen.s3.amazonaws.com/policygen.html

AWS IAM Policy Simulator:

https://policysim.aws.amazon.com

Page 74: AWS · PDF file · 2017-09-12AWS IAM Best Practices (cont.) • Use roles for applications that run on Amazon EC2 instances. • Delegate by using roles instead of by sharing credentials

Thank you!