aws security best practices, saas and compliance

18
Tuesday, 9 th Feb 2016 AWS Security Best Practices, Real-world examples and Common Mistakes GP CEO and Founder www.stackArmor.com @cloudpalgp https:// www.linkedin.com/in/gppal [email protected]

Upload: gaurav-gp-pal

Post on 15-Apr-2017

798 views

Category:

Business


0 download

TRANSCRIPT

Page 1: AWS Security Best Practices, SaaS and Compliance

Tuesday, 9th Feb 2016

AWS Security Best Practices, Real-world examples and Common Mistakes

GPCEO and Founder

www.stackArmor.com@cloudpalgp

https://www.linkedin.com/in/[email protected]

Page 2: AWS Security Best Practices, SaaS and Compliance

SaaS, Security and AWS

2PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR

Cloud Solutions Architect and Technology Strategist• Focused on full-stack security and operations management • Cloud automation and business process acceleration• Cybersecurity Policies, Procedures and Tactics

Supported the first AWS cloud migration in 2009 for Recovery.gov and have successfully led multiple large enterprise cloud modernization programs in regulated industries, Financial Services and Healthcare.

GPCEO and Founder

www.stackArmor.com@cloudpalgp

https://www.linkedin.com/in/[email protected]

Page 3: AWS Security Best Practices, SaaS and Compliance

What we do

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 3

Page 4: AWS Security Best Practices, SaaS and Compliance

Business Landscape• Data breaches are “daily” news

• Regulators are starting to take notice◦ FTC versus Henry Schein Practice Solutions, Inc - Jan 5th , 2016◦ SEC versus R.T. Jones Capital Equities Management Sep 22nd , 2015

• NIST Cybersecurity Framework is “standard of care”◦ http://www.nist.gov/cyberframework/◦ HIPAA, FISMA, FedRAMP, PCI-DSS, ISO 27001

• Cybersecurity is a Board level issue

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 4

Page 5: AWS Security Best Practices, SaaS and Compliance

Technology Landscape

• AWS/Cloud “takes care of everything”!!◦ Shared Responsibility Model

• Managed Services and Processes required◦ Patching and Vulnerability Management◦ Boundary protection and monitoring◦ Logging and Centralized log analysis◦ Backups/Restore

• SaaS shops tend to be strong on the Dev but weak on Ops

• Network Engineering, Security Zoning, Boundary Protection and Enclave Hardening are not well understood

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 5

Page 6: AWS Security Best Practices, SaaS and Compliance

What??

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 6

“…while doing cloud hosting cost analysis for a venture funded start-up, wenoticed heavy data egress charges. A simple analysis revealed that a hacker hadpenetrated the platform and downloaded the firms’ database and IP. Thevulnerability was traced to an un-patched server”.

“The Technology team of a SaaS startup with Fortune 500 customers is operatingtheir environment in a cloud environment without any intrusion detection andprevention systems such as web application firewalls thereby creating third-partyrisk.”

“…a SaaS startup exposed their access secret key in their web application in plainview for anyone to access. This could have caused someone to wipe out the firmsentire production and operational platform…”

Page 7: AWS Security Best Practices, SaaS and Compliance

Hmm…

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 7

Page 8: AWS Security Best Practices, SaaS and Compliance

Top Security “Booboos”Common poor security mistakes Comment

1 Creating unnecessary access and secret keys for IAM Users

Console users don’t need keys

2 Using developer keys instead of instance roles for accessing instance

Use roles for to allow for credentials for accessing AWS resources that provide temporary credentials

3 Wide open inbound rules in security groups Restrict entry to specific ports and IP addresses as required

4 Lack of restrictions on production instances Any user can perform actions on production instances. Provision IAM roles that allow for separation of duties.

5 Poor segmentation and zoning of application and data components through the use of public and private sub-nets

Proper zoning through sub-nets allows for segregating netflow and blackholing requests in the event of an attack

6 Lack of boundary protection IDS, IPS, VPN Consider using WAF, IPS/IDS and VPN solutions

7 Inconsistent patch management and vulnerability scanning

Create an information security policy with a patching schedule with roles, responsibilities and reporting

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 8

Page 9: AWS Security Best Practices, SaaS and Compliance

Vulnerability Scanning

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 9

• Good operational hygiene keeps the hacker away!?!

Page 10: AWS Security Best Practices, SaaS and Compliance

Logging and Monitoring…

• AWS VPC Flow Logs◦ Most Talkers

◦ Rejected Traffic

• AWS CloudTrail◦ Who deleted my instances?

◦ Who is asking for old or deleted keys?

• AWS Config◦ Configuration Management

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 10

Page 11: AWS Security Best Practices, SaaS and Compliance
Page 12: AWS Security Best Practices, SaaS and Compliance
Page 13: AWS Security Best Practices, SaaS and Compliance
Page 14: AWS Security Best Practices, SaaS and Compliance

Tools of our Trade

1 Web Application Firewalls Fortiweb, Sophos, AWS WAF

2 IDS Snort

3 Monitoring Splunk, Elasticsearch, Sensui, Pallera, sumologic

4 Vulnerability Scanning Nessus, Retina, OpenVAS

5 Web Application Scanning Acunetix, Nessus

6 Compliance openSCAP

7 QA/Code Quality SonarQube

8 Static Code Scanning CheckMarx

9 Security Operations Center OpenSOC

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 14

Page 15: AWS Security Best Practices, SaaS and Compliance

Compliance

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 15

Document Description

Basic Security PolicyThis document provides a basic set of high level security policies that allow client to state that they have a security policy in place that can serve as an initial baseline.

Assessment PlanThis is a checklist security assessment, basically a self-assessment with questions asked by an experienced Information Assurance Analyst to demonstrate understanding and maturity of Cybersecurity posture.

High Level Security Assessment Report

Security Assessment Report (SAR) that summarizes the scope, approach, and high level findings.

Vulnerability and Penetration Testing

Automated scans with basic parameters with provided auto-generated reports. This includes working with the technology team to perform a test to ensure that any technical remediation that have been applied adequately addressed the vulnerabilities found.

Attestation LetterGenerally speaking an external third-party should be engaged to execute the assessment and be asked to provide an attestation letter that describes the nature of the assessment, findings and remediation conducted.

Page 16: AWS Security Best Practices, SaaS and Compliance

A questionnaire coming soon…

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 16

Page 17: AWS Security Best Practices, SaaS and Compliance

Reference Links- SEC Charges Investment Adviser With Failing to Adopt Proper Cybersecurity Policies and Procedures Prior To Breach

https://www.sec.gov/news/pressrelease/2015-202.html

- Dental Practice Software Provider Settles FTC Charges It Misled Customers About Encryption of Patient Data

https://www.ftc.gov/news-events/press-releases/2016/01/dental-practice-software-provider-settles-ftc-charges-it-misled

- FTC has power to police cyber security: appeals court

http://www.reuters.com/article/us-wyndham-ftc-cybersecurity-idUSKCN0QT1UP20150824

- Contractor breach gave hackers keys to OPM data

http://www.federaltimes.com/story/government/omr/opm-cyber-report/2015/06/23/keypoint-usis-opm-breach/28977277/

- Great security blog

http://krebsonsecurity.com/

PROPRIETARY AND CONFIDENTIAL INFORMATION OF STACKARMOR 17

Page 18: AWS Security Best Practices, SaaS and Compliance

questions?

Gaurav “GP” Pal

Founder

www.stackArmor.com

Email: [email protected]

18