Slide 1

Slide 1 text

MASTERING SECURITY AND COMPLIANCE ON AWS_ JON TOPPER | @jtopper | he/him/his

Slide 2

Slide 2 text

Image: rupixen on Unsplash

Slide 3

Slide 3 text

Image: Mika Baumeister on Unsplash

Slide 4

Slide 4 text

Image: Irwan on Unsplash

Slide 5

Slide 5 text

Image: Joshua Mayo on Unsplash

Slide 6

Slide 6 text

Image: Ahmed Hindawi on Unsplash

Slide 7

Slide 7 text

“ SECURITY IS JOB ZERO WERNER VOGELS CTO, AMAZON.COM Photo: Vaughn Ridley/Web Summit via Sportsfile

Slide 8

Slide 8 text

COMPLIANCE_ Focuses on actually protecting your data and other assets. SECURITY_ Focuses on meeting documented standards and regulations.

Slide 9

Slide 9 text

Photo:Joanna Penn on Flickr

Slide 10

Slide 10 text

ENTERPRISE SAAS SALES ARE DIFFICULT TO WIN WITHOUT COMPLIANCE_

Slide 11

Slide 11 text

VENDOR QUESTIONNAIRES_

Slide 12

Slide 12 text

WITH COMPLIANCE_ Questionnaires are easier to answer …or avoided altogether Sales cycle is shorter Close bigger deals

Slide 13

Slide 13 text

AWS supports 143 security standards and compliance certifications

Slide 14

Slide 14 text

No content

Slide 15

Slide 15 text

YOUR AREAS_ Security Foundations Identity & access management Detection Infrastructure protection Data protection Incident response Application security

Slide 16

Slide 16 text

SECURITY FOUNDATIONS_ AWS account management Secure your root accounts Figure out what you need to secure Evaluate new security services regularly

Slide 17

Slide 17 text

IDENTITY & ACCESS MANAGEMENT_ Use central identity services Use temporary credentials where possible Store secrets securely, rotate them Least privilege access

Slide 18

Slide 18 text

DETECTION_ Service & application logging Make logs available to query Automate detection

Slide 19

Slide 19 text

INFRASTRUCTURE PROTECTION_ Secure VPC and network design Fine grained policies DDoS protection / WAF Vulnerability management

Slide 20

Slide 20 text

DATA PROTECTION_ Data classification Access controls Encryption at rest Encryption in transit

Slide 21

Slide 21 text

INCIDENT RESPONSE_ Build incident management plans Build forensic capabilities Simulate, rehearse, drill Learn from incidents

Slide 22

Slide 22 text

APPLICATION SECURITY_ Train your teams Automate security testing & deployments Pen test regularly Run code reviews for security Manage your BOM Encourage security ownership

Slide 23

Slide 23 text

AWS Well-Architected Framework Security Pillar Copyright © 2024 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. AWS WELL-ARCHITECTED FRAMEWORK_

Slide 24

Slide 24 text

Photo by Pascal Meier on Unsplash

Slide 25

Slide 25 text

LANDING ZONE_ A well-architected, self-service multi-account AWS environment providing: Account & network structure Identity & access services Security baseline and guardrails Cost guardrails Centralised management Logging and monitoring Account/application blueprints

Slide 26

Slide 26 text

AWS CONTROL TOWER MAKES IT EASIER TO BUILD A LANDING ZONE_

Slide 27

Slide 27 text

Workload OU Security OU Infrastructure OU Non-prod OU Prod OU Developer Sandbox OU logs flow network path Transitional OU Policy Staging OU Suspended OU Amazon Athena Backup vault Backup snapshots Management account Log Archive account Audit account Shared Services account Backups account Security Tooling account Bob's sandbox account Alice's sandbox account Test account Staging account Production account AWS Control Tower AWS Organizations AWS Config AWS IAM Identity Center Logs Baseline Baseline Baseline Baseline Baseline Baseline Baseline Baseline AWS Chatbot AWS Backup Amazon GuardDuty Admin AWS Budgets AWS Budgets VPC VPC Baseline VPC Baseline VPC

Slide 28

Slide 28 text

SECURITY CONTROLS_ Preventive (e.g. Service Control Policies) Detective (e.g. AWS Config Rules) Proactive (e.g. AWS CloudFormation Hooks)

Slide 29

Slide 29 text

COMPLIANCE APPROACH_ Perform a security risk assessment Score and prioritise those risks Identify controls from the standard that you wish to adopt. Map these controls to those available in AWS Control Tower Roll these out

Slide 30

Slide 30 text

No content

Slide 31

Slide 31 text

No content

Slide 32

Slide 32 text

WRAPPING UP_ Everything is software these days, security is important Security & compliance are related, and both may be important to your business. On AWS, you’re responsible for a lot of your security position. The AWS Well-Architected framework provides detailed guidance. You should be using AWS Control Tower for some of your security approach.

Slide 33

Slide 33 text

AWS PARTNER SINCE 2014 We work exclusively with AWS, no other cloud vendors. AWARD WINNING AWS SaaS SI Global Partner of the Year 2023 ISO/IEC 27001 CERTIFIED Robust approach to information security.