CSA Talk May 2018: Difference between revisions

From Federal Burro of Information
Jump to navigationJump to search
No edit summary
No edit summary
Line 3: Line 3:


== A Grab Bag of Security Practices ==
== A Grab Bag of Security Practices ==
* tools to help with securoty
** some free some not free
** cloudcheckr
** aws-config-rules https://github.com/awslabs/aws-config-rules
*** Sample implement 2 of these


* root mfa
* root mfa
* using roles to access account from a cetnral place.
* using roles to access account from a central place.
* using peering to central manage
* using peering to central manage.
** Diagram
* using config rules
* using config rules
* IAM policy best practices.
* IAM policy best practices.
* Auditing and forensics.
* Auditing and forensics.
** the cloudtrail -> s3 -> cloudwatch trinity
** the cloudtrail -> s3 -> cloudwatch trinity
Line 14: Line 22:
** s3 imutablity
** s3 imutablity
** Anomaly detection datadog
** Anomaly detection datadog
* anti patterns
* anti patterns
** egress backhaul.
** egress backhaul
 
* Partners and Vendor: what can my vendor do?
* Partners and Vendor: what can my vendor do?

Revision as of 17:50, 17 April 2018

Sca

A Grab Bag of Security Practices

  • root mfa
  • using roles to access account from a central place.
  • using peering to central manage.
    • Diagram
  • using config rules
  • IAM policy best practices.
  • Auditing and forensics.
    • the cloudtrail -> s3 -> cloudwatch trinity
    • s3 replication
    • s3 imutablity
    • Anomaly detection datadog
  • anti patterns
    • egress backhaul
  • Partners and Vendor: what can my vendor do?