Security
Security
u Which is better?
u SQL databases provide great benefits for transactional data whose structure doesn’t
change frequently (or at all) and where data integrity is paramount
u NoSQL databases provide much more flexibility and scalability, which lends itself to
rapid development and iteration
u Bottom-line: You’ll need to think about what your data looks like, how you’ll query
your data, and the scalability you’ll need in the future
Security and Compliance in the Cloud
Source: https://www.helpnetsecurity.com/2015/06/30/security-concerns-continue-to-dog-the-cloud-industry/
…and for good reason 8
u Accenture (2017) - World’s first Cyber Resilience startup UpGuard discovered in its Cyber Risk
survey that Accenture left at least 4 AWS S3 storage buckets unsecured. As a result of this flaw,
the data on these storage media was available for download. The data exposed in this security
goof-up were authentication credentials, secret API data, digital certificates, decryption keys,
customer data, and other meta info which could be easily used by cyber crooks to mint money.
u Verizon (2017) - Nice Systems, which is a 3rd party vendor working for Verizon, committed a
configuration blunder on an AWS S3 bucket which exposed names, addresses, account details,
and pin numbers of millions of US-based Verizon customers.
u Booz Allen Hamilton (2017) - In this year, technology consulting firm Booz Allen hired UpGuard to
carry out security assessment on both its internal and external computer systems. To our surprise,
the assessment discovered that 60,000 files were on a public access on AWS S3 bucket owned
by an intelligence and defense contract of Booz Allen.
u Election Systems & Software (ES&S) (2017) - Virtually every registered voter
information from Chicago was available for public access when the
engineer working for ES&S left the AWS S3 bucket for public access. The
data was in downloadable format and is said to have compromised
personal info of more than 1.8 million Chicago voters so far.
Source: https://www.cybersecurity-insiders.com/top-5-cloud-security-related-data-breaches/
Cloud Data Breaches 9
u According to the 300 CISOs (Chief Information Security Officers) that
participated in the survey, top concerns were:
u Security misconfiguration
u Lack of adequate visibility into access settings and activities
u Identity and access management (IAM)
u Permission errors
Source: https://www.helpnetsecurity.com/2020/06/03/cloud-data-breach/ /
So, who is at fault here? 10
u More than 100 million customers have had their data compromised by a hacker after a
cloud misconfiguration at Capital One
u Thanks to a cloud misconfiguration, a hacker
was able to access to credit applications, Social
Security numbers and bank account numbers in
one of the biggest data breaches to ever hit a
financial services company
u Amazon, for its part, pointed to the admission of
misconfiguration in the court documents and
the Capital One statement, with a spokesman
telling Bloomberg that Capital One’s data was
not accessed through a vulnerability in AWS
systems
u “The Capital One breach is proof that
companies have a lot to learn when it comes to
deploying security technology effectively” Source: https://threatpost.com/aws-arrest-data-breach-capital-one/146758/
What is the cloud provider (AWS) responsible 11
for?
u Protecting the network through automated monitoring systems and
robust internet access, to prevent Distributed Denial of Service
(DDoS) attacks
u Performing background checks on employees
who have access to sensitive areas
u Decommissioning storage devices by physically
destroying them after end of life
u Ensuring the physical and environmental
security of data centers, including fire
protection and security staff
What are you responsible for? 12
u Implementing access management that restricts access to AWS
resources like S3 and EC2 to a minimum
u Encrypting data at rest (e.g. database or other storage systems)
u Encrypting network traffic to prevent attackers from reading or
manipulating data (for example, using HTTPS)
u Configuring a firewall for your virtual network that
controls incoming and out- going traffic with security
groups and Access Control Lists (ACLs)
u Managing patches for the OS and additional
software on virtual machines
u AWS won’t apply updates for you on your EC2 instance
– you are responsible for this
Shared Responsibility Model - Infrastructure 13
u AWS is responsible for security of the cloud
u The customer is responsible for security in the cloud
Shared Responsibility Model – Service Models 14
15
Shared Responsibility Model - Infrastructure
u Example of a typical Cloud Application
Another Security Challenge…Compliance 16
u HIPPA (Health Insurance Portability and
Accountability Act) - a series of regulatory
standards that outline the lawful use and
disclosure of protected health information
u SOX (Sarbanes-Oxley Act) - established rules to
protect the public from fraudulent or erroneous
practices by corporations and other business
entities
u GDPR (General Data Protection Regulation) -
regulation that requires businesses to protect
the personal data and privacy of EU citizens for
transactions that occur within EU member states
u PCI Compliance (Payment Card Industry) -
applies to companies of any size that accept
credit card payments
Key Questions that need to be answered for 17
Compliance (and proven)
u Where in the world is the data center?
u During an audit, you need to prove the location of your data along with the
measures that are in place to protect it
u How do you enforce access controls?
u An organization must be able to demonstrate the level of access that each user
has and how those levels are maintained
u It’s crucial for a cloud provider to have sound access controls in place and to
implement them properly
u How are you protecting the data?
u What type of encryption does a cloud provider use, and
how and when it's applied
u Companies are responsible for the protection of data in
motion and data at rest using proper encryption techniques
Source: https://www.cio.com/article/2901034/your-guide-to-compliance-in-the-cloud.html
Security on AWS 18
u When you sign up for your own AWS account, you are the root user
u For your AWS Academy account, you are not root user
u The root user has unrestricted access to all AWS resources
u Permissions are not restricted in any way
u As a best practice, you should
lock the root user access so no
one can access it
u Create users/groups that have
more restrictive access
Identity and Access Management (IAM) 20
u IAM is an AWS service that helps an administrator securely control access to
AWS resources
u IAM administrators control who can be authenticated (signed in) and
authorized (have permissions) to use certain AWS resources
u AWS IAM provides the following:
u Manage IAM users and their access
u You can create users in IAM, assign them individual security credentials and manage permissions in
order to control which operations a user can perform
u Manage IAM roles and their permissions
u You can create roles in IAM and manage permissions to control which operations
can be performed by the entity, or AWS service, that assumes the role
There are hundreds of policies They provide more precise control over your
available policies than AWS managed policies
IAM Policy – Inline Policies 24
Source: https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_managed-vs-inline.html
IAM Policy Categories 25
Policy Categories
Defined by Admin
or Security Team Define Boundary Define Access Defined by Admin or
Developers
u You did the same thing for the BONUS part of “Create a DynamoDB” activity
IAM Role 28
u An IAM Role is an IAM identity that you can create in your account that
has specific permissions (policies)
u Roles can be created to act as a proxy to allow users or services (e.g
EC2 instance or Lambda function) to access resources
Assign
Policy
IAM Role
employees
IAM Group –
ACME Developers
S3 {
”Sid”: “limitedSize”,
u ”Action”: “ec2:RunInstances”,
”Resource”: “arn:aws:ec2:*:*instance/*”,
“Condition”: {
Managed Policy
IAM Example #2 – Resource Access 30
IAM Role –
AccessS3Image
IAM Policy –
S3 Read-only
S3 ”image”
bucket
Role: AccessS3Image
IAM Example #2 – Application Access 31
u The two main components of Amazon Cognito are user pools and
identity pools
AWS Cognito – User Pools 34
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/cognito-scenarios.html
AWS Cognito – Identity Pools 35
Source: https://docs.aws.amazon.com/cognito/latest/developerguide/what-is-amazon-cognito.html
Protecting Data with Encryption – Overview 36
u To encrypt data message, you need a key to start an encryption and you need a key
to decrypt the message
u If someone is listening and hijacks the data, they can’t read it because they don’t
have the proper keys to unlock the message
This type of encryption both the sender and the This type of encryption has two keys one public and one
receiver need to have the same key in order to private, they public key is available to anyone who wants to
make an encryption or decryption. send you data but the private key only the receiver has it, this
way only the owner of that key can decrypt the message
Encryption on AWS 37
u You could easily encrypt data when you write it to disk, when you send
it down a wire, and so on
u Encrypting everything in a comprehensive way considerably reduces
your exposure to data theft. Hackers can’t cover their tracks because
they’re not able to decrypt the log files
u Encryption poses a performance penalty, so be sure to focus
encryption on specific data that needs protection
Compliance and Audit - CloudTrail 41
u AWS CloudTrail is a service that enables governance, compliance, operational
auditing, and risk auditing of your AWS account
u It provides event history of your AWS account activity, including actions taken through
the AWS Management Console, SDKs, command line tools, and other AWS services
u It can also provide the logs of all key usage, which may be required for regulatory and
compliance needs
u This event history simplifies security analysis, resource change tracking, and
troubleshooting to even detect unusual activity in your AWS accounts
How secure are you? 42
u Amazon Inspector is an automated security assessment service that helps improve
the security and compliance of applications deployed on AWS
u Amazon Inspector automatically assesses applications for exposure, vulnerabilities,
and deviations from best practices
u After performing an assessment, Amazon Inspector produces a detailed list of security
findings prioritized by level of severity
u Going back to your scenarios, you’ve been asked to identify what areas might
have security risks and what your plan is to address them
u What type of Compliance issues would you need to deal with?
u Identify 2-3 potential security issues/threats that might be associated with your
scenario
u What features of IAM could help with your scenario?
u What other types of checks or precautions would you recommend in order to
protect against these threats?
u You have ~10 minutes to discuss a plan
u Download the template from Assignments > Activity #15 - Security Plan
u 1 submission per team
u Scenarios located at: Assignment > Activity #7 > Cost Estimating Scenarios