AWS Startup Security Baseline
AWS Startup Security Baseline
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Once we have our product
finished, then we will worry
about security.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Introducing the AWS Startup Security Baseline
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shared Responsibility Model
Customer data
Regions
AWS global Edge
infrastructure locations
Availability Zones
Customer
AWS
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The goal
Adhere to the principle of least privilege (POLP)
Grant users and systems the narrowest set of
privileges to complete required tasks
Goals
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Q&A
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Securing your account
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Setting account-level contacts
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Setting account-level contacts
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Pro tips
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use of the root user
1. Secure it #root
• Strong password
• Multi-factor authentication (MFA)
• Remove access keys
2. Avoid it
• Set up IAM users and groups
• Set up a password policy
• Use MFA for IAM users
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Pro tip
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Configure console access
1. Have an IAM user for each human that accesses AWS
2. Don’t share credentials
3. Require MFA for all
4. Grant access to IAM groups, not users
“Developers” “Developers”
AWS Single
shared IAM user IAM group
Sign-On
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Enforce a password policy
1. Minimum length
2. Varied characters
3. Expiration
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Logging events
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Prevent public access to private S3 buckets
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Prevent public access to private S3 buckets
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Delete unused resources
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Set up AWS Budgets
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Pro tip
Turn on AWS Cost Anomaly Detection
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How does Amazon GuardDuty work?
Amazon GuardDuty
Data sources Threat Finding types Findings
detection types Examples
Bitcoin
Amazon VPC Flow Logs Threat mining
intelligence Amazon Detective
C&C
DNS logs activity HIGH
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Pro tips
Script to turn on GuardDuty
in all the Regions
1. Turn on GuardDuty in all the
AWS Regions
2. Turn on protection for
Amazon S3 and Amazon EKS
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Monitor high-risk issues with AWS Trusted Advisor
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Securing your workload
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use IAM roles for permissions
Role
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Pro tip
Tester (role)
Staging AWS account
Engineer (role)
Production AWS account
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use ephemeral secrets
Production VPC
AWS Config
AWS CloudTrail
Availability Zone
Internet Internet Private subnet
Public subnet Application Private subnet
gateway Load Balancer
Amazon
CloudWatch
Amazon EC2 Amazon RDS
NAT gateway
Users workload read replica
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon S3
Use AWS Systems Manager instead of SSH or RDP
AWS Cloud
VPC
Amazon EC2
workload
Internet SSM AWS Systems Manager SSM endpoints
endpoints Session Manager
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Log data events for select Amazon S3 buckets
Amazon
GuardDuty
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon.com CTO Werner Vogels
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encrypt Amazon EBS volumes
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use security groups to restrict access
Internet
Public subnet
Public subnet Public subnet
Private subnet
Private subnet
Instance Instance
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Require HTTPS for all public web endpoints
Step-by-step guidance
on how to enable HTTPS
Amazon CloudFront
on public endpoints
AWS Amplify
AWS Certificate
Manager (ACM)
Amazon API Gateway
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use edge protection services
Amazon CloudFront
Application Load
Balancer
AWS AppSync
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security as code (SaC)
Security services and tooling Infra as code (IaC) templates Deployment targets
Dev account
Prod account
AWS Cloud Development Kit
(AWS CDK)
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security growth model
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS foundational and layered security services
AWS
Organizations
AWS
Security Hub
Identify
AWS AWS
Config Trusted
Advisor
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS foundational and layered security services
AWS
AWS AWS AWS AWS
Organizations
Shield Certificate KMS Network
Manager Firewall
Identify Protect
AWS AWS
Systems Lambda
AWS AWS AWS AWS Amazon AWS Manager
AWS
WAF Firewall CloudHSM Secrets Inspector Security Hub
Security Hub
Manager Manager
Automate
Identify Protect Detect Respond
Investigate
AWS
CloudTrail
AWS Systems AWS Control AWS AWS Amazon AWS Amazon
Manager Tower Single Directory VPC Direct Cognito
Sign-On Service PrivateLink Connect
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS foundational and layered security services
AWS Amazon Amazon Amazon AWS Step AWS
AWS AWS AWS AWS GuardDuty Macie CloudWatch Functions CDK
Organizations
Shield Certificate KMS Network
Manager Firewall
Amazon S3
Glacier
AWS
CloudTrail
AWS Systems AWS Control AWS AWS Amazon AWS Amazon
Manager Tower Single Directory VPC Direct Cognito
Sign-On Service PrivateLink Connect Snapshot Archive
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS SRA
AWS SRA whitepaper
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Following the AWS Startup Security Baseline, we enabled
Amazon GuardDuty in our account and it detected outside IPs
trying to access our servers via Secure Shell (SSH). We removed
port 22 (SSH) from all of our security groups and switched to
using AWS Systems Manager to access our EC2 instances now.
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Summary
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!
© 2022, Amazon Web Services, Inc. or its affiliates. All rights reserved.