Community Day 2019 Sponsors
How to implement data encryption at rest in compliance with enterprise requirements
Steffen Mazanek, Louay Mresheh | 09/09/2019
How to implement data encryption at rest in compliance with - - PowerPoint PPT Presentation
How to implement data encryption at rest in compliance with enterprise requirements Steffen Mazanek, Louay Mresheh | 09/09/2019 Community Day 2019 Sponsors About the speakers Steffen Mazanek (AWS usergroup Dresden) Louay Mresheh AWS
Community Day 2019 Sponsors
How to implement data encryption at rest in compliance with enterprise requirements
Steffen Mazanek, Louay Mresheh | 09/09/2019
Steffen Mazanek (AWS usergroup Dresden) Louay Mresheh
2
Connect on LinkedIn
3
4
Security “in” the cloud is not easy Lax or misconfiguration as #1 threat
https://aws.amazon.com/compliance/shared-responsibility-model/
Security Security
Source: https://wa.aws.amazon.com/wat.design_principles.wa-dp.en.html
Operational Excellence Reliability Performance Efficiency Cost Optimization
5
✓ Implement a strong identity foundation ✓ Enable traceability ✓ Apply security at all layers ✓ Automate security best practices ✓ Protect data in transit and at rest ✓ Keep people away from data ✓ Prepare for security events
Security: relevant AWS services (extract)
6
Identity and Access Management Detective Controls
Config
Infrastructure Protection Data Protection Incident Response
IAM Organizations MFA token Temporary security credential CloudWatch CloudTrail VPC WAF Shield Inspector Macie KMS IAM GuardDuty Lambda Security Hub Secrets Manager Config CloudWatch Trusted Advisor Cognito CloudHSM Certificate Manager
7
8
(https://docs.aws.amazon.com/config/latest/developerguide/ebs-snapshot-public-restorable-check.html)
(https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.html)
https://techcrunch.com/2019/08/09/aws-ebs-cloud-backups-leak/
9
different programming languages, service clients etc.
10
Enterprise data encryption requirements example
→ Example implementation/architecture in demo part
11
CIS recommendations regarding data protection
https://d1.awsstatic.com/whitepapers/compliance/CIS_Amazon_Web_Services_Three- tier_Web_Architecture_Benchmark.pdf Work with multiple CMKs → More fine-grained control
12
the cloud and centrally manage these keys
13
KMS CLI session
aws kms generate-data-key --key-id <keyarn> --key-spec AES_256 --output text --query CiphertextBlob | base64 --decode > encrEnvelopeKey envelopeKey=$(aws kms decrypt --ciphertext-blob fileb://encrEnvelopeKey --output text --query Plaintext)
Keep your encrypted data key at a safe place!! Later:
envelopeKey=$(aws kms decrypt --ciphertext-blob fileb://encrEnvelopeKey --output text --query Plaintext)
https://docs.aws.amazon.com/cli/latest/reference/kms/
detached
15
violation detected, automation is key!
and buckets
16
https://aws.amazon.com/blogs/security/are-kms-custom-key-stores-right-for-you/
CloudHSM service (FIPS 140-2 L 3)
flexibility with CloudHSM but is more complex to manage
18
{ "Sid": "Allow access for Key Administrators", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::<accountid>:role/Project_Key_Admin“ → give give access ss to to key key admin admin role role OR OR "AWS": "arn:aws:iam::<accounted>:root“ → access ss is control trolled led via IAM }, "Action": [ "kms:Create*", "kms:Describe*", "kms:List*", "kms:Enable*", "kms:Disable*", "kms:Get*", "kms:Put*", "kms:Update*", "kms:Revoke*", "kms:Delete*", "kms:ScheduleKeyDeletion", "kms:CancelKeyDeletion" ], "Resource": "*" },
https://docs.aws.amazon.com/de_de/kms/latest/developer guide/key-policies.html
20
Creation of a new S3 bucket → auto-tag with internal, disclose and encrypt
21
DPC (Data Protection Class) Encryption confidential KMS key internal S3-SSE public None
Disabling EBS encryption by default triggers a notification and automation to enable it again
22
23
Key creation triggers an automated check, right policies need to be attached and key rotation being enabled
24
Critical KMS events such as key deletion trigger an alarm
25
Building blocks for security and compliance management
Managed security and compliance by T-Systems
Use of many relevant data sources
Cloud Security and Compliance as a building block for your cloud applications
Ready to use / minimal on-boarding phase Anomaly detection Security and compliance automation Customer-specific compliance rules Continuous monitoring & near-realtime alerts Security and compliance assessment 24/7 operations and incident management
AWS community
PacBot or VM hardening scripts
T-Systems as AWS partner
Well-architected Partner Program Direct Connect Partner Program
More Information about our AWS services you find here