aws webcast - reduce the attack surface of your aws deployments

40
December 2, 2014 Reduce the Attack Surface of your AWS Deployments

Upload: amazon-web-services

Post on 07-Jul-2015

941 views

Category:

Technology


2 download

DESCRIPTION

Enterprises and governments are increasingly running applications in the Amazon Web Services cloud to gain a competitive advantage with costs and business agility. However, these organizations recognize that running IT systems in the public and/or private clouds doesn’t mitigate security risks, or grant them a waiver from demonstrating regulatory compliance. Scanning AWS instances is not trivial due to the following challenges: • Difficulty in identifying and continually managing risk from AWS instances whose IPs can change over time • Annoyance of having to submit an AWS Vulnerability / Penetration Testing Request Form each time to scan AWS instances • Inability to perform integrated scan of vulnerabilities, compliance violations, and advanced threats for AWS instances • Complexity in managing and administering individual scanners, policies, and users in the AWS cloud To simplify this process, Tenable has worked with AWS to enable Tenable Nessus’ vulnerability scanning capabilities for the AWS cloud; available on the AWS Marketplace as: Tenable Nessus Enterprise for AWS and Tenable Nessus BYOL. In this session, you will learn about these two vulnerability management solutions and how AWS customers/ developers are leveraging them to perform integrated vulnerability and compliance scanning, as well as audit the AWS infrastructure.

TRANSCRIPT

Page 1: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

December 2, 2014

Reduce the Attack Surface

of your AWS Deployments

Page 2: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Today’s Speakers

Scott WardSolutions Architect

Amazon Web Services

Jack DanielStrategist

Tenable Network Security

Page 3: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Webinar Overview

• Submit Your Questions using the Q&A tool

• A copy of today’s presentation will be

made available on:

– AWS YouTube Channel: http://bit.ly/1BKni24

Page 4: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

What We’ll Cover

• Overview of Amazon Web Services Security

• Vulnerability Management Lifecycle

• Challenges with Traditional Scanning

• Tenable and AWS Integration

• Q&A

Page 5: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Risk Management is a Process

1) Security within AWS

2) Audit Configurations

3) Identify Vulnerabilities

4) Detect Threats

5) Remediation

Page 6: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Why Deploy in AWS?

• No upfront investment. Save time and money by paying as you go without having to buy, set-up and maintain costly and complex infrastructure

Lower

Costs

• Provision, scale up and scale down capacity as needed, on-the-fly

Flexible Capacity

• Develop, test and deploy apps fasterBusiness

Agility

Page 7: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Security within AWS

Page 8: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

A broad and deep platform that helps customers

build sophisticated, scalable applications

© 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified or distributed in whole or in part without the express consent of Amazon.com, Inc.

AWS Computing Platform

Page 9: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Shared Responsibility ModelSecurity experts are a scarce resource

Refocus security pros on a subset of the problem

Facilities

Physical security

Compute infrastructure

Storage infrastructure

Network infrastructure

Virtualization layer (EC2)

Hardened service endpoints

Rich IAM capabilities

Network configuration

Security groups

OS firewalls

Operating systems

Application security

Service configuration

AuthN & acct

management

Authorization policies

+ =More secure and

compliant systems than

any one entity could

achieve on its own.

Customers

Page 10: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Compliance

Experts auditors give an unbiased view of compliance

Constantly engaged; the overall process never stops

Continuous monitoring

Page 11: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Customers

Nothing better for the entire community

than a tough set of customers…Everyone’s Systems and Applications

The customer community benefits from tough scrutiny,

the world-class AWS security team, market-leading

capabilities, and constant improvements

Security Infrastructure

Requirements Requirements Requirements

Page 12: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Defense in Depth

Page 13: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Physical Security of Data CentersAmazon has been building large-scale data centers for many yearsImportant attributes: Non-descript facilities Robust perimeter controls

Strictly controlled physical access 2 or more levels of two-factor auth

Controlled, need-based accessAll access is logged and reviewedSegregation of Duties Employees with physical access don’t have

logical privileges

Page 14: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

AWS Security Features

EC2 Security

CloudTrail

VPC

S3 and EBS encryption

IAM

Trusted Advisor

New Services

Page 15: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Amazon EC2 Security

• Host operating system

– Individual SSH keyed logins via bastion host for

AWS admins

– All accesses logged and audited

• Guest (a.k.a. Instance) operating system

– Customer controlled (customer owns root/admin)

– AWS admins cannot log in

– Customer-generated keypairs

• Stateful firewall

– Mandatory inbound firewall, default deny mode

– Customer controls configuration via Security

Groups

• Signed API calls

– Require X.509 certificate or customer’s secret AWS key

• Storage Security

– Disks wiped upon Volume creation

– All block storage supports user-implemented encryption

– All storage devices are securely decommissioned.

Page 16: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

AWS CloudTrail

Record AWS API calls for your account and delivers log files to you.

Logs delivered (as JSON data) to your S3 Bucket

Region-by-Region API log isolation

Optionally log multiple AWS accounts to your bucket (ie, cross-account)

Currently covers API access to 21 different services

No cost beyond storage of logs

Page 17: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Amazon Virtual Private Cloud (VPC)Create a logically isolated environment within AWS

Specify your private IP address range into one or more public or private subnets

Control inbound and outbound access to and from individual subnets using stateless Network Access Control Lists

Protect your Instances with stateful filters for inbound and outbound traffic using Security Groups

Attach an Elastic IP address to any instance in your VPC so it can optionally be reached directly from the Internet

Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted IPSEC VPN connection

Page 18: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

VPC Network Security Controls

Page 19: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

S3 and EBS encryption

AWS provided for S3 and EBS

EBS encrypt at rest and in transit to EC2

S3 provide your encryption keys to S3 for encryption

Takes heavy lifting of encrypt away while retaining your keys

Encrypt yourself and manage the keys

Page 20: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

AWS Identity and Access Management (IAM)Users and Groups within AccountsUnique security credentials Access Keys Login/Password Enforce password complexity Optional MFA device

Policies control access to AWS APIsAPI calls must be signed by either: X.509 certificate or secret key

Deep integration into some services S3: policies on objects and buckets

AWS Management Console supports user logonNot for Operating Systems or Applications Use LDAP, Active Directory/ADFS, etc..

Page 21: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Trusted Advisor

Security Checks

EC2 Security Group Rules

(Hosts & Ports)

IAM Use

S3 Policies

MFA

Password Policy

RDS Security Groups

Cloud Trail auditing

Route SPF for email

Page 22: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

AWS Key Management Service

Centralized Key Management

Integrated with AWS S3, AWS EBS and AWS Redshift for encryption of data at rest.

SDK to provide programmatic integration of encryption and key management within your own applications

Built in auditing. Integrated with Amazon Cloudtrail to log all API calls made to or by the AWS Key Management service

Fully managed. AWS takes care of the availability, physical security and hardware maintenance of the underlying infrastructure

Low cost. No charge for storage of default keys. Pay only for additional master keys and key usage

Secure. KMS keys are never transmitted outside of the AWS region in which they were created

Page 23: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

AWS ConfigView continuously updated details of all configuration attributes associated with AWS resources.

Notifications via Amazon Simple Notification Service (SNS) of every configuration change

Fully Managed. No software agents to install or databases to manage

Accessible via Management Console, CLI or SDKs

Enabled by two clicks

Use for:• Discovery

• Change Management

• Audit and Compliance

• Troubleshooting

• Security and Incident Analysis

Page 24: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Partner Ecosystem Security

Page 25: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Partner Ecosystem Security

Facilities

Physical security

Compute infrastructure

Storage infrastructure

Network infrastructure

Virtualization layer (EC2)

Hardened service endpoints

Rich IAM capabilities

Network configuration

Security groups

OS firewalls

Operating systems

Application security

Service configuration

AuthN & acct

management

Authorization policies

+ =More secure and

compliant systems than

any one entity could

achieve on its own.

Customers

Page 26: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Vulnerability Management and AWS

Jack Daniel- Strategist

Page 27: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Why is VA Important?

Enables AWS customers to find vulnerabilities, the threats that exploit them, and the systems already compromised for immediate response.

Provides vulnerability scanning for the AWS cloud computing platform and all the 3rd party AMIs that run on it.

It helps secure AMIs throughout the SDLC (software development lifecycle)

Page 28: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Concerns with AWS Deployments

1 How do I ensure that my AWS

instances are configured correctly?

How do I identify AWS instances

that are running vulnerable operating

systems?

3How do I identify compromised

AWS instances?

4How do I routinely scan AWS

instances without the overhead of

scan authorization each time?

5Can I run an integrated scan

(threats, vulns, compliance) without

separate scan authorization?

6Can I identify vulnerable web

applications running in the AWS

cloud?

2

Page 29: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Scanning AWS Instances

Installation

• Inconvenience of manually installing scanning software

AWS Instances

• Continually managing risk from AWS instances vs. IPs

Scan Request Form

• Submit AWS scan request form

Integrated Scans

• Perform integrated scans (VA, Compliance, Threats, WAS)

Page 30: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

When is VA Scanning Performed?

• Scan AMI images after each build to ensure secure codingDevelopment

• Scan AMI images during testing, before deploying to production on the AWS Cloud

Staging

• Scan AMI images for the latest patches and leverage other Tenable products to monitor continuously

Production

Page 31: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Tenable Solutions on AWS Marketplace

• A virtual machine (AMI) that is installed in AWS and scans AMI assets within the AWS cloud.

• This AMI is purchased directly and the subscription is renewed automatically from the AWS Marketplace.

Nessus Enterprise for AWS

• A virtual machine (AMI) that is installed in AWS and can scan assets outside of the AWS cloud.

• This AMI is available as BYOL – Bring Your Own License. This means customers can apply their existing Nessus licenses (purchased from store, reseller, etc.) to this AMI.

Nessus AMI

https://aws.amazon.com/marketplace (search for “Tenable”)

Page 32: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Nessus Enterprise for AWS

Page 33: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Scan Policy

Page 34: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Scan Policy

Page 35: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Scan results

Page 36: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Remediation Advice

Page 37: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Key Benefits

Low OverheadAvoid the manual approval process for scanning AWS

instances

IntegratedIntegrated assessment of vulnerabilities, advanced threats, web application security, and compliance

violations

DeploymentQuickly roll out Nessus

scanners in the AWS cloud

AdministrationSimplify administration of multiple Nessus scanners,

users, and policies

CentralizedCentralize cloud and on-premise scan results for security and compliance assessment across the

organization

Page 38: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Recommendations

• Risk Management is a process – not a product

• Start with basics and reduce your attack surface

(Config audit, VM, etc.)

• Use vulnerability management solutions designed

for AWS

• Patching is crucial. Use VMs to validate patching

• Perform regular scans and monitor continuously

Page 39: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Purchase on the AWS Marketplace

• Visit the AWS Marketplaceo https://aws.amazon.com/marketplace

• Search for “Tenable”

• Select the Nessus AMI for your needs

o Nessus Enterprise for AWS: Pre-authorized for scanning AWS instances• Annual Pricing

• Hourly Pricing

o Nessus (BYOL): Scan assets outside of AWS

Page 40: AWS Webcast - Reduce the Attack Surface of Your AWS Deployments

Questions