understanding aws identity and access management | aws public sector summit 2016

57
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Mark Ryland Chief Solutions Architect Worldwide Public Sector June 21, 2016 Understanding AWS Identity and Access Management (IAM)

Upload: amazon-web-services

Post on 25-Jan-2017

494 views

Category:

Technology


3 download

TRANSCRIPT

Page 1: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

Mark RylandChief Solutions ArchitectWorldwide Public Sector

June 21, 2016

Understanding AWS Identity and Access Management (IAM)

Page 2: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Agenda

• Identity: sources, credentials, transformations, and targets

• Access control for endpoints: targets and methods

• Access control for data: introducing Ionic Security

Page 3: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (Amazon EC2, Amazon RDS,

etc.)

Abstracted services (Amazon S3, Amazon DynamoDB,

Amazon SQS, etc.)

AWS-managed (Amazon API Gateway, AWS Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

AWS Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Page 4: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

Identities sourced from IAM service Amazon Cognito user pools: major

innovation No need for separate trust configuration Multiple means for proving IAM identity

Console: username/password/MFA API/CLI: access/secret key/MFA

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Page 5: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

Derived identities from other sources Sessions/federation: IAM users Roles: SAML, WebIDs, EC2 service

Temporary credentials provided by Amazon Security Token Service

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Page 6: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

Identities from well-known sources Amazon, Facebook, Google, Twitter

No need for separate trust configuration All proofing on the IdP side with

incoming claims Temporary credentials from Amazon

Security Token Service

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Page 7: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Amazon Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

User-provided web/OID Connect

Corporate identities (AD, LDAP)

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

Corporate identities (AD, LDAP)/SAML

Identities from customer sources Separate trust configuration required All proofing on the IdP side with

incoming claims Temporary credentials from STS

Page 8: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Amazon Cognito

Security Token Service

AWS Management Console

IAM service

IAM base service stores principals & associated policies

STS used for all temp credentials

Amazon Cognito provides value-add services

Page 9: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Amazon Cognito services

Security Token Service

AWS Management Console

IAM service

IAM: username/ password[/MFA] Session token/STS

used in MFA case SAML/OIDC IdP-

initiated login

Page 10: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS, etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Scenario #1: IAM user+MFA+console access to EC2

Page 11: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Adm

inis

trativ

e us

ers

Scenario #1.1: AD user+SAML+console access to EC2

Page 12: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Adm

inis

trativ

e us

ers

Scenario #2: AD user+SAML+API/CLI access to RDS

Page 13: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

End

us

ers

Scenario #3: Web/mobile user access to S3

Page 14: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Adm

inis

trativ

e us

ers

Scenario #4: IAM CLI user/ EC2 Role to DynamoDB

Page 15: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Amazon Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS creds (STS?) in use by definition Endpoints protected by IAM PARC policies

Principal/Action/Resource/Conditions/Effect Tons of features: in-line editor, policy

generator & simulator, security intelligence Moving up the stack from indirect to direct

to user-defined behaviors

Page 16: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Three possible sources for policies

• Policies bound to principal(s)• True for most policies/services

• Policies bound to resource(s)• Only for some resource types (AWS

KMS keys, roles, S3, etc.)

• Scoped-down policies added to STS token at creation

• Creator’s privileges minus

Page 17: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Example: Three policies combined for S3 access{ "Version": "2012-10-17", "Statement": [ { "Sid": "Access-to-specific-VPCE-only", "Principal": "*", "Action": "s3:*", "Effect": "Deny", "Resource": ["arn:aws:s3:::my_bucket", "arn:aws:s3:::my_bucket/*"], "Condition": { "StringNotEquals": { "aws:sourceVpce": "vpce-1a2b3c4d" } } } ]}

{ "Version": "2012-10-17", "Statement": { “Sid": “Policy-for-Role-readonly", "Effect": "Allow", "Action": "s3:GetObject", "Resource": "*" }}

{ "Version": "2012-10-17", "Statement": { "Sid": “Dynamic-time-limit-for-use-case", "Effect": "Allow", "Condition": { "DateLessThan": { "aws:CurrentTime" : "2016-06-21T15:00:00Z" }, } }}

• Policy bound to principal(s)• Principal is implicit (this

user/group/role)• True for most policies/services• Resource policy: explicit principals

• S3, SQS, API Gateway, AWS IoT, VPC endpoints, roles, etc.

• Policy added by creator of temporary creds (caller of STS)

• Role token or federation token

Page 18: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Adm

inis

trativ

e us

ers

Scenario #5: AD user+SAML broker+API/CLI to S3

Page 19: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Amazon Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML Authn/authz using conventional means

(OS/LDAP/AD) AWS provides optimizations

AWS Directory Service Automated domain-join for Microsoft

Windows servers and Linux (via PAM) Stay tuned for improvements/integrations

Page 20: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Amazon Cognito services

Security Token Service

AWS Management Console

IAM service

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Adm

inis

trativ

e us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

OSes/DBs/etc.

“Network OSes”

Applications

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

Authn/authz using conventional means (Application/LDAP/AD)

AWS provides optimizations App code can use roles to call AWS APIs App code can be run behind AWS-managed

endpoint Stay tuned for improvements/integrations

Page 21: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM users (and root)

IAM roles

Sessions/ “federated”

Web identities

Amazon Cognito user pools

End

us

ers

Infra & container services (EC2, RDS,

etc.)

Abstracted services (S3, DDB, SQS, etc.)

AWS-managed (API Gateway, Lambda,

AWS IoT)

AWS Directory Service

OSes/DBs/etc.

ArcGIS

Amazon Cognito services

Security Token Service

App identities

User-provided web/OID Connect

Corporate identities (AD, LDAP)/SAML

AWS Management Console

IAM service

Adm

inis

trativ

e us

ers

Scenario #6: User+AWS Directory Srv+access to Esri/S3

Page 22: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Adam Ghetti/Founder, Ionic Security @AdamGhetti/www.ionic.com

Page 23: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IN MATH WE TRUST

Page 24: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

First and last milehigh-assurance data security

Page 25: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

A federal agency needs tocollaborate with other appropriatefederal, state, and local agencies.

Page 26: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

A federal agency needs to ensuretheir data is accessed only by

appropriate humans, applications,and infrastructure

while in appropriate locations.

Page 27: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Goal = f (Appropriately + Securely Collaborating)

Page 28: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

v

Page 29: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016
Page 30: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016
Page 31: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

AgencyUser

AgencyUser

AgencyUser

Page 32: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM for Infrastructure and Apps

IAM for Data

Page 33: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

A federal agency needs to ensuretheir data is accessed only by

appropriate humans, applications,and infrastructure

while in appropriate locations.

Page 34: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

A federal agency needs all otherscenarios to fail closed.

Page 35: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Unstructured DataDocuments, Email, and Media

Structured DataDatabases, Applications, and IoT

Page 36: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Unstructured DataDocuments, Email, and Media

Structured DataDatabases, Applications, and IoT

.DOCX

.PPTX

.XLSX

.PDF

.CSV

.INI

.JPEG

.CPP

.PY

.MOV

.VSD

OracleRDS

S3ICON

MSSQL

HADOOPMONGO

MySQL

SENSOR SALESFORCE

SLACK

OUTLOOK

GMAIL

SCADA

Custom Applications

.XML

NETWORK APPLIANCE

.JAVA

.CAD

iPhone

BlackBerry

ANROID

Page 37: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Unstructured DataDocuments, Email, and Media

.DOCX

.PPTX

.XLSX

.PDF

.CSV

.INI

.JPEG

.CPP

.PY

.MOV

.VSD

OracleRDS

S3ICON

MSSQL

HADOOPMONGO

MySQL

SENSOR SALESFORCE

SLACK

OUTLOOK

GMAIL

SCADA

Custom Applications

.XML

NETWORK APPLIANCE

.JAVA

.CAD

iPhone

BlackBerry

ANROID

INTERNALUSERS

EXTERNALUSERS ON-PREM SHARED HYBRID REGULATED CLASSIFIED

Structured DataDatabases, Applications, and IoT

Page 38: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Data

Users

Rights

= f (Digital assets + Classification)

= f (Infrastructure + Applications + Humans + Locations)

= f (Data + Users)

Page 39: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Managed rights in a digital worldare like the law; they are only as

good as their enforcement.

Page 40: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)

Page 41: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

ENCRYPTION

Page 42: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

ENCRYPTION

Page 43: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

ENCRYPTION

Page 44: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

DECRYPTION

Page 45: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)Data + UsersData + UsersData + Users

A federal agency needs tocollaborate with other appropriatefederal, state, and local agencies.

Page 46: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)Data + UsersData + UsersData + Users

A federal agency needs tocollaborate with other appropriatefederal, state, and local agencies.

Page 47: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)

ENCRYPTED DECRYPTEDKEYSKEYSKEYSKEYS

CLASSIFICATION

POLICYPOLICYPOLICYPOLICY

USERSUSERSUSERSUSERS

DIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETS

Page 48: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

KEYSKEYSKEYSKEYS

CLASSIFICATION

POLICYPOLICYPOLICYPOLICY

USERSUSERSUSERSUSERS

DIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETS

Globally Unique IDs: Keys, Digital Assets, Policies, and UsersVerifiable, Federated, and Blinded Global Orchestration Service

Distributed and Hybrid Key Generation/Storage

CloudHSMs On-premHSMs

On-prem HSMs CloudHSMs No HSMs

Page 49: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

KEYSKEYSKEYSKEYS

CLASSIFICATION

POLICYPOLICYPOLICYPOLICY

USERSUSERSUSERSUSERS

DIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETSDIGITAL ASSETS

Globally Unique IDs: Keys, Digital Assets, Policies, and UsersVerifiable, Federated, and Blinded Global Orchestration Service

Distributed and Hybrid Key Generation/Storage

CloudHSMs On-prem HSMs On-prem

HSMsCloudHSMs No HSMs

Portable, Flexible, and Verifiable Data Protection and IAM Protocol

Page 50: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016
Page 51: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)

Page 52: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016
Page 53: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

• ISO/IEC 27001

• ISO/IEC 27018

• SOC 2 Type 2

• FIPS 140-2 Certified Modules

• EAR, Category 5, Part 2

CERTIFICATIONS

• Over 2,000,000 seats in Global 100

across the US and Europe.

• Goldman Sachs and US DoD

• Eight different industry verticals

• Billions of production API calls

CUSTOMER STATS

Page 54: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

IAM for Infrastructure and Apps

Protection and IAM for Data

Page 55: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Rights = f (Data + Users)Data + UsersData + UsersData + Users

A federal agency needs tocollaborate with other appropriatefederal, state, and local agencies.

Page 56: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

First and last milehigh-assurance data security

www.ionic.com

Page 57: Understanding AWS Identity and Access Management | AWS Public Sector Summit 2016

Thank you!