Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
Managing access and resource › Service account key management › Hybrid multi-cloud network › Centralized logging on AWS › Security monitoring based on Posture Management › Next steps
integration, continuous delivery, and infrastructure as a service › DevSecOps, the CI/CD workflow can deploy software to end users rapidly, possibly several times a day, in a fully automated fashion. Cloud-Native DevOps M&A (Mergers and Acquisitions) As you know, LINE has on-premises › It is difficult to prepare the environment according to the regulations of all countries
integration, continuous delivery, and infrastructure as a service › DevSecOps, the CI/CD workflow can deploy software to end users rapidly, possibly several times a day, in a fully automated fashion. Cloud-Native DevOps M&A (Mergers and Acquisitions) As you know, LINE has on-premises › It is difficult to prepare the environment according to the regulations of all countries
integration, continuous delivery, and infrastructure as a service › DevSecOps, the CI/CD workflow can deploy software to end users rapidly, possibly several times a day, in a fully automated fashion. Cloud-Native DevOps M&A (Mergers and Acquisitions) As you know, LINE has on-premises › It is difficult to prepare the environment according to the regulations of all countries
to Cloud Computing LINE Top1. Data Breaches Top2. Misconfiguration and Inadequate Change Control Top3. Lack of Cloud Security Architecture and Strategy Top4. Insufficient Identity, Credential, Access and Key Management Top5. Account Hijacking
capacity Key3. Simplify network management Key2. On-demand self-service Key1. IAM (Identity and Access Management) › Integrated Cloud IAM › Enforce least privilege policy › User identity is managed through IDaaS › Service account management › Avoiding Key Reuse › Service account Lifecycle IDaaS : Identity as a Service, is cloud-based authentication built and operated by a third-party provider. ( ex. Okta, DUO, Azure AD)
capacity Key3. Simplify network management Key2. On-demand self-service Key1. IAM (Identity and Access Management) › Integrated Cloud IAM › Enforce least privilege policy › User identity is managed through IDaaS › Service account management › Avoiding Key Reuse › Service account Lifecycle IDaaS : Identity as a Service, is cloud-based authentication built and operated by a third-party provider. ( ex. Okta, DUO, Azure AD)
capacity Key3. Simplify network management Key2. On-demand self-service Key1. IAM (Identity and Access Management) › Integrated Cloud IAM › Enforce least privilege policy › User identity is managed through IDaaS › Service account management › Avoiding Key Reuse › Service account Lifecycle IDaaS : Identity as a Service, is cloud-based authentication built and operated by a third-party provider. ( ex. Okta, DUO, Azure AD)
capacity Key3. Simplify network management Key2. On-demand self-service Key1. IAM (Identity and Access Management) › Connect on-premises network to public cloud › private endpoint to access public cloud services › Network access control
based on Posture Management Key5. Infrastructure as Code › Infrastructure as Code using Chef, Ansible, Puppet and Terraform › layers of security to a simple DevOps pipeline
based on Posture Management Key5. Infrastructure as Code › Infrastructure as Code using Chef, Ansible, Puppet and Terraform › layers of security to a simple DevOps pipeline
based on Posture Management Key5. Infrastructure as Code › Collecting artifacts and insight into incidents for incident response › Monitoring operational policies and configuration for performance
accounts Service accounts Identity Human(=Developer, User) Robot (=Compute, Serverless…) Authentication IDaaS (IdP) Keys (JWT, Credential) Authorization IAM Role and Policy(Permission) with ResourceTag/ Label *".3PMFBOE1PMJDZ 1FSNJTTJPO XJUI3FTPVSDF5BH-BCFM Management IAM IAM
a security account structure for managing multiple accounts Granting authorization to cloud resources Managing users and authentication (Single Sign-On & Two-Factor Authentication with SAML)
a security account structure for managing multiple accounts Granting authorization to cloud resources Managing users and authentication (Single Sign-On & Two-Factor Authentication with SAML)
a security account structure for managing multiple accounts Granting authorization to cloud resources Managing users and authentication (Single Sign-On & Two-Factor Authentication with SAML)
Available when running inside CSP - Keys cannot be downloaded - Keys are automatically rotated - Created, downloaded, and managed by users - User must store, revoke, and rotate keys - Rotate/Audit keys via API CSP-managed keys User-managed keys
subnet Private subnet Public subnet AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 Amazon EC2 Amazon EC2 Amazon EC2 Internet Internet gateway NAT gateway › Speed, Reliability › Enhanced Security › Scalability AWS Direct Connect Server Server Server Multi Cloud Network
subnet Private subnet Public subnet AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 Amazon EC2 Amazon EC2 Amazon EC2 Internet Internet gateway NAT gateway › On-Premise or AWS environment connection AWS Direct Connect Multi Cloud Network Server Server Server
subnet Private subnet Public subnet AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 Amazon EC2 Amazon EC2 Amazon EC2 Internet Internet gateway NAT gateway › Access to EC2 through an existing authentication server authentication server users LINE Network › 10.1.1.0/24 › 10.1.2.0/24 › 10.1.3.0/24 Multi Cloud Network
AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 VPC ( Account #2 ) Availability Zone Private subnet Amazon EC2 VPC ( Account #3 ) Availability Zone Private subnet Amazon EC2 Virtual gateway Direct Connect Gateway AWS Cloud EU Region › Simplify management › Multi-account support AWS Direct Connect Gateway Virtual gateway Multi Cloud Network Server Server Server
AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 VPC ( Account #2 ) Availability Zone Private subnet Amazon EC2 VPC ( Account #3 ) Availability Zone Private subnet Amazon EC2 Virtual gateway Direct Connect Gateway AWS Cloud EU Region › Simplify management › Multi-account support AWS Direct Connect Gateway Virtual gateway AWS Lambda Amazon Elasticsearch Service Public Service Amazon DynamoDB Public VIF Multi Cloud Network Server Server Server
Zone Private subnet AWS Direct Connect Direct Connect Location Router On Premises WAN Virtual gateway Amazon EC2 VPC ( Account #2 ) Availability Zone Private subnet Amazon EC2 VPC ( Account #3 ) Availability Zone Private subnet Amazon EC2 Virtual gateway DX Gateway AWS Cloud EU Region › inter-VPC communication AWS Transit Gateway Virtual gateway AWS Transit Gateway Server Server Server
detection of unwanted configuration modifications › Other member accounts within an organization, the logs are never compromised. › Centralized logging is a very important factor in a multi-account environment.
Premises Centralized Logging Account Amazon Simple Notification Service Amazon Simple Queue Service Amazon Simple Storage Service (S3) Log Server AWS Lambda System Admin Account Amazon Elasticsearch Service AWS CloudTrail Service Logs Amazon CloudWatch Centralized Logging on AWS
Account Amazon Simple Notification Service Amazon Simple Queue Service LogGW AWS Lambda System Admin Account Amazon Elasticsearch Service KR On Premises SIEM Server Elasticsearch Service Amazon Simple Storage Service (S3) Elasticsearch Service AWS CloudTrail Security Logs AWS CloudTrail Service Logs AWS Cloud Member Accounts #2 AWS CloudTrail Security Logs AWS CloudTrail Service Logs Amazon CloudWatch Centralized Logging on AWS
CSPM (Cloud Security Posture Management ) › Asset inventory and classification speed and accuracy › Continuously monitor and assess compliance policies › Monitoring operational policies and configuration for performance › Collecting artifacts and insight into incidents for incident response
CSPM (Cloud Security Posture Management ) › Asset inventory and classification speed and accuracy › Continuously monitor and assess compliance policies › Monitoring operational policies and configuration for performance › Collecting artifacts and insight into incidents for incident response
CSPM (Cloud Security Posture Management ) › Asset inventory and classification speed and accuracy › Continuously monitor and assess compliance policies › Monitoring operational policies and configuration for performance › Collecting artifacts and insight into incidents for incident response