aws re:invent 2016: the aws hero’s journey to achieving autonomous, self-healing security (sac402)

40
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Evident.io: John Martinez / Tim Prendergast Ellie Mae: Anthony Johnson November 30, 2016 SAC402 The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security

Upload: amazon-web-services

Post on 11-Jan-2017

67 views

Category:

Technology


4 download

TRANSCRIPT

Page 1: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Evident.io: John Martinez / Tim Prendergast

Ellie Mae: Anthony Johnson

November 30, 2016

SAC402

The AWS Hero’s Journeyto Achieving Autonomous, Self-Healing

Security

Page 2: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

What to expect from the session

• Evident.io and programmatic security

• The journey to

security automation maturity

• CIS AWS foundations benchmark

• AWS security by design

• Evident.io custom signatures

• Exploiting the bots

• Taking stock of your environment

• The Ellie Mae journey

Page 3: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Anthony Johnson @ Ellie Mae

• Cloud Computing and Security

expert

• Works at Ellie Mae

• Previously at Nokia

• Extensive automation

experience

Introductions

John Martinez @ Evident.io

• I’ve worked “in the cloud” since

2010

• At Evident.io since early 2014

• Background in Unix wizardry

and all things related

• I love making latte art (or at

least trying!)

Page 4: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

The Ellie Mae story

Page 5: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io and programmatic

security

Page 6: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io ESP and programmatic security

• Evident.io ESP is a new-generation security platform

designed in the cloud for the cloud

• All security data is derived from the AWS service APIs

and AWS CloudTrail

• Performs continuous security monitoring

• Provides continuous compliance testing and reporting

• Covers all AWS services

Page 7: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io ESP and programmatic security

API for

programmatic

access to both

control plane and

data plane

Page 8: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io ESP and programmatic security

Output integrations

for doing interesting

things with report

data

Amazon

SNSSlack

Jira Hip Chat Pager Duty

Webhook

Service Now

Page 9: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io ESP and programmatic security

Example API use case

• Automatically add new

AWS accounts to

Evident.io

https://github.com/EvidentSecurity/esp_sdk

Page 10: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io ESP and programmatic security

Example integration

use case:

Analyze ESP data in

Sumo Logic

http://docs.evident.io/#sumo

Page 11: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

The journey to

security automation maturity

Page 12: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Security automation maturity

Proactive

CI/CD toolchain

AWS CloudFormation

templates

Code analysis and

review

Pre/post deploy

testing

Continuous

Infrastructure testing

and alerting

Application logging

Auto Scaling

HISA/NIDS

FIM

Config management

Self-healing

Auto-remediation via

AWS Lambda

Automatic rollback to

known good state

Automatic failover to

other regions

Page 13: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Security automation maturity

Proactive

CI/CD toolchain

AWS CloudFormation

templates

Code analysis and

review

Pre/post deploy

testing

Continuous

Infrastructure testing

and alerting

Application logging

Auto Scaling

HISA/NIDS

FIM

Config management

Self-healing

Auto-remediation via

AWS Lambda

Automatic rollback to

known good state

Automatic failover to

other regions

Most of us are here

Page 14: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Ellie Mae’s automation story

Page 15: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

CIS AWS foundations

benchmark

Page 16: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

CIS AWS Foundations Benchmark

• CIS AWS Foundations Benchmark is a great place to

start for automated infrastructure testing and alerting

• Benchmark is the result of months of hard work by AWS,

CIS, Evident.io, and a lot of other dedicated contributors

• Use the benchmark as a base set of controls to test and

use to enforce security of your AWS accounts

https://d0.awsstatic.com/whitepapers/compliance/AWS_CIS_Foundations_Benchmark.pdf

Page 17: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

CIS AWS Foundations Benchmark

Evident.io ESP

provides continuous

testing of CIS AWS

Foundations

Benchmark controls and

helps prevent security

“drift”

Included in all Evident.io ESP accounts

Page 18: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

How Ellie Mae does compliance

Page 19: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

AWS security by design

Page 20: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

AWS security by design

• The AWS recommended approach to proactive security

in AWS

• Provides a practical approach to creating your security

controls matrix and enforcing those controls

• Heavy on the proactive automation via AWS

CloudFormation

https://aws.amazon.com/compliance/security-by-design/

Page 21: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

AWS security by design

Avoid security

automation pitfalls

Page 22: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

AWS security by design

Avoid security

automation pitfalls

Page 23: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Evident.io’s custom signatures

to the rescue

Page 24: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Custom signatures

• Evident.io’s platform includes checks of many different

AWS services, but you can extend with your own custom

signatures

• Check services on included

• Create conditional tests that make sense for your

environment

• Refine our built-in signatures

• If you can write it in the AWS Ruby SDK, it should work

Page 25: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Custom signatures

Example use cases:

• Enforcing tagging standards

• Checking corporate egress IP spaces in EC2 security

groups

• Enforcing ELB SSL ciphers

• Even useful for general operational automation

Open-source custom signatures repo:

https://github.com/EvidentSecurity/custom_signatures

Page 26: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Custom signatures

Example:

Checking for EC2

AMIs that are shared

publicly

Page 27: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

How Ellie Mae is using

Evident.io for success

Page 28: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Exploiting the bots

Page 29: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Exploiting the bots

• Take advantage of AWS’ serverless compute

service, Lambda, to self-heal your environment

• Immediately react to changes in your

environment

• Auto-remediation of AWS resources by revoking

change or rolling back to a known good state

Page 30: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Exploiting the bots

Example:

Auto-remediating global

SSH port on an EC2

security group

https://github.com/EvidentSecurity/aws-

lambda/blob/master/autoremediate/autoremediate-EC2-002.py

Page 31: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Exploiting the bots

+

Evident.io

feeds the

bots

Page 32: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Exploiting the bots

Other areas to exploit:

• Automatic rollback

• Failover to other regions

• Automatic creation of quarantined environments

for forensic testing

Page 33: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Ellie Mae’s bots rising

Page 34: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Taking stock of your

environment

Page 35: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

How would you rate yourself?

Page 36: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

A great journey in the making:

Ellie Mae

Page 37: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Come see us at Evident.io booth #404!

[email protected]

https://www.linkedin.com/in/antho

ny-johnson-566b356

[email protected]

@johnmartinez

https://www.linkedin.com/in/johnm

artinez

https://github.com/EvidentSecurity/reinvent2016

Page 38: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Thank you!

Page 39: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Remember to complete

your evaluations!

Page 40: AWS re:Invent 2016: The AWS Hero’s Journey to Achieving Autonomous, Self-Healing Security (SAC402)

Related sessions