Stelligent Amazon Pollycast
Voiced by Amazon Polly

Are you a cloud security expert or enthusiast? Were you at the first-ever security-focused AWS conference in Boston? If your answers are Yes and No respectively, I have just one more question for you; Where were you?

The first-ever AWS re:Inforce was definitely a success by all means (aside from all the free t-shirts I got). It highlighted all the security components you need to properly secure your account, infrastructure, and application in AWS.

Here are my key takeaways that will highlight features to help you better secure your workload.

10 Security Pillars of AWS

Access Layer

Who has access to your account and what can they do?
  1. Federated Access
  2. Programmatic Key Rotation
  3. Enforce Multi-Factor Authentication
  4. Disable Root Account Programmatic Access
  5. Utilize IAM Groups to grant permissions
  6. Cognito – Identity management for your apps

Account Layer

Is my account exposed or compromised?
  1. Amazon GuardDuty to detect intrusion
  2. AWS Config to monitor changes to Account
  3. AWS Trusted Advisor to audit security best practices
  4. AWS Organizations to manage multiple accounts
  5. AWS Control Tower to secure and enforce security standards across accounts

Network Layer

Is my network properly secured?
  1. Network ACLs to control VPC incoming and outgoing traffic
  2. VPC to isolate cloud resources
  3. AWS Shield for DDoS protection
  4. Web Application Firewall (WAF): Filter malicious web traffic
  5. PrivateLink: Securely access services hosted on AWS
  6. Firewall Manager: Manage WAF rules across accounts

Compute Layer

Can my compute infrastructure be hacked for bitcoin mining?
  1. AWS Systems Manager for patching
  2. AMI Hardening using CIS Standards
  3. Security Groups to limit port access
  4. AWS Inspector to identify security vulnerabilities
  5. AWS CloudFront to limit exposure of your origin servers
  6. Application Load Balancers to limit direct traffic to your app servers

Application Layer

Can my application be compromised or brought down by hackers?
  1. AWS Shield and Shield Advanced for DDoS protection
  2. AWS X-Ray for application request tracing
  3. AWS Cloudwatch for application logs
  4. Application runtime monitoring – Contrast e.t.c.
  5. AWS Inspector to identify application vulnerabilities

Pipeline Layer

Am I enforcing security standards in my build and deploy systems?
  1. Infrastructure code analysis with cfn_nag
  2. Application code analysis – Spotbugs, Fortify
  3. Dependency vulnerability Checks – OWASP
  4. Docker image scanning (if using docker) – Twistlock, Anchore CLI

Storage Layer

Always encrypt everything!
  1. KMS encryption for EBS volumes
  2. Server-Side Encryption for S3 Buckets
  3. RDS Encryption

Data Layer

Is my data safe? Am I leaking secrets?
  1. AWS Secrets Manager to rotate and manage secrets
  2. Amazon Macie to discover and classify data
  3. Regular Data backups and replication across regions
  4. Data Integrity Checks
  5. Client-side encryption

Transport Layer

Am I securely moving my data?
  1. Enforce SSL/TLS Encryption of all traffic
  2. AWS Certificate Manager to generate SSL Certificates
  3. ACM Private CA to create and deploy private certificates

Operation Layer

Are my engineers ready for security threats and breaches?
  1. Use PlayBooks and Runbooks to plan and prepare for security threats and breaches
  2. Utilize Cloud Native services when possible to leverage AWS best security practices

Other Noteworthy Mentions

Nitro Innovation

Nitro allows micro-services concepts to be applied to hardware. This enables faster development and deployment of new instance types; while creating higher throughput and stability. Some security features include:

  • Utilizes nitro controller as the root of trust
  • Hardware acceleration of encryption
  • Firmware is cryptographically validated
  • Encryption keys are secured into nitro devices
  • No SSH, hence, no human access

Nitro with FireCracker

This is most notably being used for running serverless workload (Lambda) by enabling the sharing of hardware infrastructure between multiple accounts. The security features of Nitro makes this possible. Some features include:

  • Minimal device model reduces memory footprint and attack surface area
  • User-space code in <125ms, 150microVM per second per host
  • Low memory overhead with a high density of VMs on each server

AWS Control Tower

The easiest way to set up and govern a secure, compliant multi-account AWS environment. Features include

  • Prescriptive guidance on IAM, Landing Zones
  • Workflows to provision compliant accounts
  • Set up AWS with multi-account structure
  • Pre-configured architectures

 

That’s all folks! I’m looking forward to AWS re:Inforce 2020 in Houston. Until then, Stay Secured My Friends!