how to implement data encryption at rest in compliance
play

How to implement data encryption at rest in compliance with - PowerPoint PPT Presentation

How to implement data encryption at rest in compliance with enterprise requirements Steffen Mazanek, Louay Mresheh | 09/09/2019 Community Day 2019 Sponsors About the speakers Steffen Mazanek (AWS usergroup Dresden) Louay Mresheh AWS


  1. How to implement data encryption at rest in compliance with enterprise requirements Steffen Mazanek, Louay Mresheh | 09/09/2019 Community Day 2019 Sponsors

  2. About the speakers Steffen Mazanek (AWS usergroup Dresden) Louay Mresheh AWS architecture and security • T-Systems International GmbH / Public Cloud unit • Connect on LinkedIn 2

  3. Agenda • AWS security in general • Motivation for data protection, encryption requirements and KMS overview • KMS hands-on / demos • Managed security and compliance 3

  4. Security “in” the cloud is not easy Lax or misconfiguration as #1 threat https://aws.amazon.com/compliance/shared-responsibility-model/ 4

  5. Security as a central pillar for good architecture in the “AWS Well - Architected Framework” ✓ Implement a strong identity foundation Operational Excellence ✓ Enable traceability Security Security ✓ Apply security at all layers ✓ Automate security best practices Reliability ✓ Protect data in transit and at rest ✓ Keep people away from data Performance Efficiency ✓ Prepare for security events Cost Optimization Source: https://wa.aws.amazon.com/wat.design_principles.wa-dp.en.html 5 .

  6. Security: relevant AWS services (extract) Identity and Access Temporary security Management MFA token credential IAM Organizations Cognito Detective Controls Config CloudWatch CloudTrail Security Hub Trusted Advisor Infrastructure Protection VPC Shield WAF Inspector GuardDuty Data Protection Macie KMS Secrets Manager CloudHSM Certificate Manager Incident Response IAM Config CloudWatch Lambda . 6

  7. Agenda • AWS security in general • Motivation for data protection, encryption requirements and KMS overview • KMS hands-on / demos • Managed security and compliance 7

  8. Don‘t be the company from the news https://techcrunch.com/2019/08/09/aws-ebs-cloud-backups-leak/ • Check your snapshots: • filter for public in console • Better: activate a control, AWS managed config rule is available ( https://docs.aws.amazon.com/config/latest/developerguide/ebs-snapshot-public-restorable-check.html ) • Use encryption, only unencrypted snapshots can be made publicly available ( https://docs.aws.amazon.com/AWSEC2/latest/UserGuide/ebs-modifying-snapshot-permissions.html ) 8

  9. Why data encryption? • Compliance, enterprise regulation / policies • Security best practice • Protection from hypervisor mistakes, e.g. • your disk is accidentally shared with another client • mistake in disk decommissioning process • Data confidentiality and integrity • Control/minimize access to data (keep people away from data) • Destroy large amounts of data by deleting the key 9

  10. Concepts/terminology • Data encryption in transit → IPSec/VPN, TLS (AWS Certificate Manager) • Data encryption at rest → focus of this presentation • Client-side → encrypt before submitting data to AWS, AWS encryption SDK in different programming languages, service clients etc. • Server-side → AWS encrypts the data after it is received by the service 10

  11. Enterprise data encryption requirements example For the data protection class PUBLIC encryption is not required. • For the data protection class INTERNAL encryption with AWS-managed key must be used. • For the data protection class CONFIDENTIAL encryption with customer-managed key must be used. • Keys need to be rotated on regular basis. • Management and use of keys according to least privileges principal. • A dedicated role group for key admins must be used. • Multi-factor authentication must be implemented for critical KMS API calls. • KMS key activities must be logged. • The deletion of keys must be alarmed. • If encryption context is used, no sensitive data must be used for encryption context. • → Example implementation/architecture in demo part 11

  12. CIS recommendations regarding data protection https://d1.awsstatic.com/whitepapers/compliance/CIS_Amazon_Web_Services_Three- tier_Web_Architecture_Benchmark.pdf Work with multiple CMKs → More fine-grained control … 12

  13. KMS overview and concepts • securely store the keys you use to encrypt your data in the cloud and centrally manage these keys • Envelope encryption / two-tiered key hierarchy • 4KB limit, better performance • Unique data key encrypts customer data • Customer master keys encrypt data keys • Centralized access and better auditability • Limits blast radius (compromised data key) 13

  14. KMS CLI session aws kms generate-data-key --key-id <keyarn> --key-spec AES_256 --output text --query CiphertextBlob | base64 --decode > encrEnvelopeKey envelopeKey=$(aws kms decrypt --ciphertext-blob fileb://encrEnvelopeKey --output text --query Plaintext) openssl enc -in confidential-data.txt -out encrypted-data.txt -e -aes256 -k $envelopeKey Keep your encrypted data key at a safe place!! Later: envelopeKey=$(aws kms decrypt --ciphertext-blob fileb://encrEnvelopeKey --output text --query Plaintext) openssl enc -in encrypted-data.txt -out confidential-data.txt -d -aes256 -k $envelopeKey https://docs.aws.amazon.com/cli/latest/reference/kms/

  15. KMS overview and concepts Regional service • Integrated with most AWS services, but in different ways • EBS -> encrypted data key stored with every volume, plaintext key in hypervisor memory until disk gets • detached S3 -> encrypted data key stored with every object • AWS managed CMK, one per service called aws/ebs, aws/rds etc. • Customer-managed CMK for more granularity and control • Cause costs (per month, per key, per version) • you can bring your own crypto material in order to keep your own copy of the key • Key aliases, key rotation • 15

  16. KMS overview and concepts • Keys can be shared across accounts • Critical KMS events can be monitered and automatically remediated in case of any violation detected, automation is key! • AWS-managed config rules can be used to check encryption settings for DBs, disks and buckets • KMS comes with a waiting period on key deletion (if you did not bring your own key) • KMS is relying on shared HSMs (FIPS 140-2 Level 2) • https://d1.awsstatic.com/whitepapers/KMS-Cryptographic-Details.pdf 16

  17. Dedicated HSM in VPC → • CloudHSM service (FIPS 140-2 L 3) Custom key store provides more • flexibility with CloudHSM but is more complex to manage https://aws.amazon.com/blogs/security/are-kms-custom-key-stores-right-for-you/

  18. Managing access to keys from two sides • Key policy • Define who can manage the key (you can even lock out root) • Define who can use the key • You can lock yourself out → AWS support case • You can delegate to IAM • Service roles might need access (e.g. Cloud9 needs access to EBS key) • IAM 18

  19. { "Sid": "Allow access for Key Administrators", "Effect": "Allow", "Principal": { "AWS": "arn:aws:iam::<accountid>:role/Project_Key_Admin “ → give give access ss to to key key admin admin role role OR OR "AWS": "arn:aws:iam ::<accounted>:root“ → access ss is control trolled led via IAM }, "Action": [ "kms:Create*", "kms:Describe*", "kms:List*", "kms:Enable*", "kms:Disable*", "kms:Get*", https://docs.aws.amazon.com/de_de/kms/latest/developer "kms:Put*", guide/key-policies.html "kms:Update*", "kms:Revoke*", "kms:Delete*", "kms:ScheduleKeyDeletion", "kms:CancelKeyDeletion" ], "Resource": "*" },

  20. Agenda • AWS security in general • Motivation for data protection, encryption requirements and KMS overview • KMS hands-on / demos • Managed security and compliance 20

  21. Demo 1 DPC (Data Protection Class) Encryption confidential KMS key Creation of a new S3 bucket internal S3-SSE → auto-tag with internal, disclose and encrypt public None 21

  22. Demo 2 Disabling EBS encryption by default triggers a notification and automation to enable it again 22

  23. Demo 3 Key creation triggers an automated check, right policies need to be attached and key rotation being enabled 23

  24. Demo 4 Critical KMS events such as key deletion trigger an alarm 24

  25. Agenda • AWS security in general • Motivation for data protection, encryption requirements and KMS overview • KMS hands-on / demos • Managed security and compliance 25

  26. Building blocks for security and compliance management .

  27. Managed security and compliance by T-Systems Use of many Anomaly detection Customer-specific Security and relevant data compliance rules compliance sources assessment Ready to use / Security and Continuous 24/7 operations minimal on-boarding compliance monitoring & and incident phase automation near-realtime alerts management Cloud Security and Compliance as a building block for your cloud applications .

  28. T-Systems as AWS partner • 200+ AWS certifications • Donating to Open Source , e.g. PacBot or VM hardening • 50+ Prof./Specialty Level scripts • Actively contributing to the • Permanent training program AWS community Well-architected Partner Program Direct Connect Partner Program We are hiring! .

  29. Thank you! Questions? More Information about our AWS services you find here

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend