Cloud Security on the Dollar Menu ARNEL MANALO, CISSP, AWS-CSAA - - PowerPoint PPT Presentation

cloud security on the dollar menu
SMART_READER_LITE
LIVE PREVIEW

Cloud Security on the Dollar Menu ARNEL MANALO, CISSP, AWS-CSAA - - PowerPoint PPT Presentation

Cloud Security on the Dollar Menu ARNEL MANALO, CISSP, AWS-CSAA SHELLCON 2018 Agenda Introductions What RMTS does Intro AWS security model Breaches and State Laws AWS Recon Hardening AWS About me: Arnel Manalo,


slide-1
SLIDE 1

Cloud Security on the Dollar Menu

ARNEL MANALO, CISSP, AWS-CSAA SHELLCON 2018

slide-2
SLIDE 2

Agenda

  • Introductions
  • What RMTS does
  • Intro AWS security model
  • Breaches and State Laws
  • AWS Recon
  • Hardening AWS
slide-3
SLIDE 3

About me:

Arnel Manalo, CISSP

Cybersecurity Architect

RICHEY MAY TECHNOLOGY SOLUTIONS

  • BS, Computer Systems Security, Colorado Technical

University

  • CISSP
  • AWS-CSAA
slide-4
SLIDE 4

About Richey May Technology Solutions

Richey May Technology Solutions is a results-driven consulting firm offering the full spectrum of technology solutions for your business. Led by technology experts with decades of cumulative experience in executive IT roles, our team is able to bring you pragmatic, real-world solutions that deliver value to your business.

Governance, Risk, Compliance & Privacy Cybersecurity Marketing Technology Cloud Services Technology Management Consulting

slide-5
SLIDE 5

Image Source: http://srini.karlekar.com/?p=313

slide-6
SLIDE 6

AWS Security Incident Leaderboard

  • 1. Uber – 57 million customer/drivers records compromised
  • 2. Time Warner Cable – 4m customer records exposed
  • 3. 10k GitHub users revealed their AWS secret keys
slide-7
SLIDE 7

AWS Uber Data Breach

  • Acquired AWS account credentials via GitHub
  • Restricted access and implemented controls AFTERWARDS

Image Source: https://i.imgflip.com/1pgtpk.jpg

slide-8
SLIDE 8

AWS Time Warner Breach

  • Found publicly available S3 Buckets
  • Information spanned from November 2010 – July 2017

Image Source: https://assets.rbl.ms/13622690/980x.jpg

slide-9
SLIDE 9

Breaches

dwt.com

U.S. State Data Breach Notification Statutes – Form of Data

slide-10
SLIDE 10

Breaches

dwt.com dwt.com

U.S. State Data Breach Notification Statutes - Harm Threshold

slide-11
SLIDE 11

California Breach Laws

  • California Breach Notice: California Civil Code s. 1798.29

and California Civ. Code s. 1798.82

  • CCPA (2020) allows consumers to sue companies for

“unauthorized access and exfiltration, theft, or disclosure as a result of the business’ violation of the duty to implement and maintain reasonable security procedures and practices appropriate to the nature of the information to protect the personal information.”

slide-12
SLIDE 12

Recent State Changes

States Increase Focus:

Arizona HB 2154: In 2018, Arizona expanded the coverage of their existing data breach notification law; via House Bill

  • 2154. The updated legislation expands the definition of what is considered personally identifiable

information; consumer data, as well as adds specific definitions for what the state believes to be a security incident vs a data breach. It also adds civil penalties of $10,000-$500,000 Colorado House Bill 18-1128: Colorado has also passed expanded privacy and cybersecurity legislation requiring covered entities to deploy and maintain reasonable security controls around personally indefinable information of Colorado residents. Colorado also requires defined controls that manage the data life cycle of consumer data from inception, during use, at rest and destruction at end of life. The new law which becomes effective this fall; September 1st 2018, requiring firms develop a formal cybersecurity program focused on protecting information appropriate to the nature of the personal information collected and the size of the business.

slide-13
SLIDE 13

Recent State Changes

States Increase Focus:

Ohio Senate Bill 220: Ohio recently signed into law the Ohio Data Protection Act; enabling organizations to limit their liability through a safe harbor rule if the organizations adopted and implemented a written cybersecurity program based on industry accepted frameworks such as the National Institute of Standards and Technology (NIST) 800.53, ISO 27000, or PCI-DSS.

slide-14
SLIDE 14

AWS Reconnaissance

slide-15
SLIDE 15

Shodan.io

net:"50.112.0.0/16"

slide-16
SLIDE 16

GitHub

  • https://github.com/michenriksen/gitrob
  • https://github.com/awslabs/git-secrets
slide-17
SLIDE 17

Locating Buckets

  • https://github.com/gwen001/s3-buckets-finder
  • https://github.com/eth0izzle/bucket-stream
  • https://github.com/digininja/CloudStorageFinder
  • https://github.com/RhinoSecurityLabs/Security-

Research/tree/master/tools/aws-pentest-tools/s3

  • https://github.com/glen-mac/goGetBucket
slide-18
SLIDE 18

gwen001

Image source: https://github.com/gwen001/s3-buckets-finder/blob/master/README.md

slide-19
SLIDE 19

eth0izzle

Image source: https://github.com/eth0izzle/bucket-stream/blob/master/README.md

slide-20
SLIDE 20

Other

  • https://github.com/marpaia/AWSome
  • https://github.com/dagrz/aws_pwn
  • https://github.com/nccgroup/Scout2
  • https://github.com/toniblyx/my-arsenal-of-aws-security-tools
slide-21
SLIDE 21

Hardening AWS

slide-22
SLIDE 22

IAM Roles

  • Lock Away Your AWS Account Root User Access Keys
  • Create Individual IAM Users
  • Use Groups to Assign Permissions to IAM Users
  • Use AWS Defined Policies to Assign Permissions

Whenever Possible

  • Grant Least Privilege
  • Use Access Levels to Review IAM Permissions
  • Configure a Strong Password Policy for Your Users
  • Video Presentation About IAM Best Practices
  • Enable MFA for Privileged Users
  • Use Roles for Applications That Run on

Amazon EC2 Instances

  • Use Roles to Delegate Permissions
  • Do Not Share Access Keys
  • Rotate Credentials Regularly
  • Remove Unnecessary Credentials
  • Use Policy Conditions for Extra Security
  • Monitor Activity in Your AWS Account

More reading: https://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html

slide-23
SLIDE 23

S3 Bucket Hardening

  • Restrict Access to buckets
  • Monitor S3 resources
  • Use Encryption
slide-24
SLIDE 24

S3 Bucket Policy Examples

  • Permit only specific IP address or website
slide-25
SLIDE 25

S3 Bucket Events

  • Emailed when an object gets created or deleted
  • Completed easily with a few steps:
  • Create SNS topic to email events
  • Permit access of s3 bucket to SNS topic
  • Configure Events which to trigger off of
slide-26
SLIDE 26

Create SNS Topic

  • SNS Console -> Create new topic
  • Select newly created topic -> create subscription*
slide-27
SLIDE 27

S3 Access to SNS Topic

  • Select topic -> edit topic Policy
slide-28
SLIDE 28

Configure S3 Bucket Events

  • Go to S3 console
  • Select desired bucket
  • Select properties
  • Scroll down and select events
slide-29
SLIDE 29

Alert Examples

slide-30
SLIDE 30

VPC NACL vs. EC2 Security Groups

  • VPC NACL are what define general outbound and inbound

rules for the specified VPC or network. Default allow

  • EC2 Security Groups are what are assigned to specific EC2

instances within VPCs and define inbound/outbound traffic. Default deny

slide-31
SLIDE 31

When to use NACL vs Security Group

  • NACL for generic inbound-outbound to entire VPC
  • Security Group for specific host or hosts traffic
  • Sometimes both
slide-32
SLIDE 32

CloudTrail

  • Audit, compliance, operational risk
  • Marks API calls as Events
  • Can forward events to store in S3 or make alerts in

CloudWatch

  • Two Non-API actions captured:
  • Service Events – Spot Instance bid prices
  • Console Login Attempts
slide-33
SLIDE 33

CloudWatch

  • Monitors AWS services and resources real-time
  • Collect and track metrics and/or logs
  • Can send off alarms or automatically make changes or start

workflows

slide-34
SLIDE 34

Monitor Root Account Usage

  • From the CloudWatch console -> Logs
  • Select CloudTrail logs group
  • Create Metric Filter
  • Assign the metric -> Metric Filter box: RootAccountUsage ->

Metric Namespace: CloudTrailMetrics -> Metrics Name: RootAccountUsage -> Metric Value: 1

slide-35
SLIDE 35

Monitor Root Account Usage cont.

  • Create Alarm
  • Enter notification

information as desired

slide-36
SLIDE 36

TrustedAdvisor

  • AWS Service that scans and compares it to best practices.
  • Cost Optimization
  • Performance
  • Fault Tolerance
  • Service Limits
  • Security
slide-37
SLIDE 37

Trusted Advisor Security – FREE!!

  • Security Groups – Specific Ports
  • IAM
  • S3 Buckets
  • EBS Snapshots
  • RDS Snapshots
  • More specifics on different best practices:

https://aws.amazon.com/premiumsupport/trustedadvisor/best

  • practices/
slide-38
SLIDE 38

Billing Alarms

  • Must be signed in with root account -> billing -> preferences
  • > receive billing alerts.
  • After it’s enabled – go to cloudwatch console and create

alarm specific to billing and set to your desired threshold.

slide-39
SLIDE 39

Thank you!

ARNEL MANALO (@ARNSEC) HTTPS://WWW.RICHEYMAYTECH.COM