Who Owns What? Security Ownership and Responsibility at AWS | Amazon Web Services

Who Owns What? Security Ownership and Responsibility at AWS | Amazon Web Services


Who Owns What? Security Ownership and Responsibility at AWS | Amazon Web Services

How clear is security ownership in your organization? If patching needs to happen fast, will your workforce be able to act quickly or will they question who owns what? In this interview with Laura Grit, a Distinguished Engineer at AWS, we’re discussing the importance of shared security responsibility.

Join Laura and Clarke Rodgers, Director of AWS Enterprise Strategy, as they discuss the structure of the AWS security and engineering departments and how responsibilities are shared between both. Watch now or read their conversation in detail below to hear a real-life mitigation example of how AWS handled Log4J.

Learn more at: https://go.aws/3OPNqTC

Subscribe:
More AWS videos: https://go.aws/3m5yEMW
More AWS events videos: https://go.aws/3ZHq4BK

Do you have technical AWS questions?
Ask the community of experts on AWS re:Post: https://go.aws/3lPaoPb

ABOUT AWS
Amazon Web Services (AWS) is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers — including the fastest-growing startups, largest enterprises, and leading government agencies — are using AWS to lower costs, become more agile, and innovate faster.

#SecurityEngineering #SecurityOwnership #CloudSecurity #AWS #AmazonWebServices #CloudComputing


Content

8.19 -> - Customers today are trying to figure out
9.99 -> the best way to balance speed and security.
12.51 -> Sharing security ownership
13.71 -> across the business may be the answer.
16.05 -> I'm Clarke Rodgers, director of Enterprise Strategy at AWS
19.71 -> and your guide for a series of conversations
21.84 -> with AWS Security Leaders here on Executive Insights.
25.35 -> Today, we're talking with Laura Grit,
27.45 -> Vice President and Distinguished Engineer at AWS.
30.93 -> As an AWS leader with an engineering background
33.446 -> Laura understands how excellence in engineering contributes
36.81 -> to better security and optimal business outcomes.
39.99 -> We hope you enjoy.
56.37 -> Laura, thanks so much for joining us today.
58.05 -> - Yeah, thank you for having me.
59.37 -> - If you'd be so kind,
60.33 -> could you tell us a little bit
61.44 -> about your background and what brought you to AWS?
64.29 -> - Sure.
65.34 -> I joined Amazon almost 15 years ago
67.98 -> after getting my PhD in computer science.
70.47 -> And I actually joined on the store side of Amazon.
74.07 -> One of the early things that I did
75.6 -> was I ran Amazon's adoption of AWS-
78.266 -> - Oh wow. - The early days of AWS.
82.23 -> And so got to experience what our customers experience
86.28 -> when we look at cloud migrations
88.5 -> from the Amazon perspective.
90.54 -> From there, I joined our infrastructure organization.
93.45 -> I worked on network scaling and availability
96.9 -> and then several years ago, I came over
98.7 -> to the services part of AWS.
100.77 -> I am a distinguished engineer
102.3 -> which is an individual contributor
104.37 -> at the vice president level.
106.38 -> This is the senior most engineering role
109.05 -> that we have at Amazon,
110.64 -> and there's actually only a handful of us.
112.89 -> And as a result, all of us are very unique
116.13 -> in the different skills and what we bring to our role.
120.78 -> Something that we all have in common is we are all looking
124.14 -> across the company to see how we can influence
127.17 -> and drive the technical roadmap based on what we observe
130.41 -> from working with different teams across the board.
133.95 -> and ultimately, we're looking at how we can best deliver
137.028 -> across the company for our customers.
139.41 -> - Got it.
140.243 -> So interestingly, I didn't hear security
143.19 -> anywhere in your title
144.93 -> and this is the AWS Security Leaders Video Series.
148.77 -> - Sure.
149.603 -> - And the reason you're here today is to really talk
152.67 -> about how we spread security responsibility out
158.13 -> throughout the organization.
159.69 -> So you're not a security badge person, yet
162.09 -> you do have quite a bit of security responsibility.
164.85 -> Could you talk a little bit about that
166.38 -> and how that works at AWS?
168.205 -> - Happy to.
169.68 -> Security is our number one priority,
172.38 -> and so as a distinguished engineer,
175.38 -> I am working with security
177.09 -> and ensuring that we are secure for our customers.
180.93 -> I do a lot in collaboration with our security organization
185.31 -> especially as we look at the types of programs
188.97 -> and other work that we do that cross our engineering teams.
193.05 -> One of the things that we do at Amazon
194.734 -> is our engineering teams act very distributed.
199.23 -> They prioritize their own roadmaps
201.39 -> based on the needs of their customers.
203.94 -> And so there's work that we do that really spreads
207 -> across all of our service teams.
209.31 -> And so I partner with security
211.56 -> and the different services that we have
215.04 -> for how do we optimize that work?
217.14 -> How do we automate where possible?
219.36 -> And so kind of work collaboratively
222 -> between the different organizations.
224.16 -> - Got it.
224.993 -> So like if we take a service for example
228.6 -> how would you influence their adoption
233.038 -> of a certain security principle
234.81 -> or maybe an engineering best practice that you've seen
238.44 -> in another service for example?
240 -> - One of the things that we do is security
243.72 -> is part of all aspects of our development.
247.26 -> And so while we have a separate security organization
251.97 -> for AWS, the security engineers are partnering
255.42 -> with our software development engineers from the design
258.78 -> and architecture to put those security best practices
262.23 -> into the design.
264.42 -> So as we learn about best practices from another team
267.6 -> that then is helped communicated
270.21 -> by our security organization
272.07 -> and the other documentation they have for how they build
275.34 -> and because they're partners as we're developing,
278.1 -> as we're reviewing designs, that then is able to get
281.28 -> from the get-go as opposed to having to do it
284.1 -> at the very end when the feature is ready to go.
286.86 -> All of our features and services
288.84 -> go through a security review as process of part of launch.
293.25 -> And then as we're operating our services as well,
295.92 -> we are partnering with security for that.
298.77 -> Ultimately, it is our services teams
301.5 -> that own the security of their service.
304.11 -> We don't hand that responsibility
305.91 -> off to the security organization.
308.64 -> Instead, they're partners with us.
310.14 -> - That's fantastic. That's fantastic.
312.15 -> So, culturally I speak to a lot of different types
315.9 -> of customers in different industries.
317.64 -> And there's often a conflict
320.94 -> or almost headbutting between the security team
324.66 -> and the engineering or the development teams.
327.489 -> It's relatively easy for a security person
331.152 -> to understand how important security is
334.05 -> for the overall health of the business, so to speak.
337.35 -> But oftentimes, I run into customers where the developer,
341.1 -> the development staff is focused on,
343.177 -> "Well, I need to get this feature out the door.
345.21 -> That's why you hired me."
348.6 -> What is done at AWS and perhaps
351.57 -> the larger Amazon to make sure that there's a certain level
355.02 -> of ownership for that developer
358.26 -> around the securitization of that particular service
361.53 -> or feature that they're working on?
363.57 -> - Yeah, great question.
364.53 -> This really starts with our CEO.
368.19 -> And talking about security as our top priority
372.15 -> in all hands, in other communication that they're doing.
375.66 -> This also feeds then into our vice presidents
378.81 -> how they're talking to their organization.
380.82 -> Part of our onboarding training talks about the importance
383.55 -> of security, why it's such a high priority for us.
386.64 -> And this crosses all roles,
388.83 -> which I think is another important thing.
390.63 -> So it's not just our engineers
393.27 -> that are getting that message, it's our product managers
395.79 -> it's our managers as well that this is all of our job.
401.1 -> And it's not just the job of security, but it's the job
404.52 -> of all of us to ensure that our services are secure.
408.7 -> - Got it.
409.533 -> So again, if I'm a developer
412.23 -> and I'm putting something
414.42 -> through the CI/CD pipeline to get to that next stage
417.57 -> and I get something kicked back
419.07 -> because it didn't meet a certain security standard,
421.95 -> I imagine it's viewed more as a learning opportunity
424.86 -> and a opportunity to make the software better
428.25 -> versus, "Clarke, you're a terrible developer.
431.34 -> and can't secure."
432.63 -> - Correct.
433.5 -> And this is really where the partnership comes in.
436.02 -> Having security be part of our processes early on
440.01 -> in development and not just late helps prevent
444.06 -> some of those last minute surprises.
446.01 -> But also as we're going through when we are scoping
450.06 -> or planning the work of how long it's going to take,
453.09 -> we put in that time to be able to remediate anything
457.47 -> that security finds as they're going through
460.381 -> the review before we launch.
461.94 -> And so part of that is also just upfront planning
465.33 -> to be able to put that in so that reduces
469.29 -> some of that tension that I think others can have
472.05 -> of really pushing something to get to launch
473.82 -> when you have that as part of an expectation
476.88 -> of what it means to release a feature.
478.86 -> - So how, in that model,
481.14 -> how are conflicts managed
482.7 -> when a feature supposed to go out tomorrow
485.76 -> and then a security vulnerability has been found
488.01 -> that maybe takes two weeks to fix.
490.65 -> How does that conversation happen within the service teams?
494.34 -> - For us, that isn't a conflict.
496.77 -> That is a conversation that is figuring out
500.1 -> what we need to do to do the right thing for our customers.
502.59 -> And if we find a security vulnerability
504.99 -> that needs to be addressed, it needs to be addressed.
507.6 -> And we then have that conversation with the executives
511.56 -> whoever needs to be involved to explain what is happening,
514.35 -> what is the risk and why that's being pushed out.
517.26 -> So part of security being that top priority
521.37 -> is being able to have these conversations at all levels
525.48 -> as we get surprised or as things need to be prioritized.
529.35 -> - And then the executives get it, the product owners get it.
531.87 -> And again it's not a fist fight at the last minute.
534.307 -> - Correct, we are engaged,
536.64 -> we know that this is an important thing
539.25 -> for our products to be secure.
541.68 -> And so it really becomes part of that definition
544.56 -> of what it means to release a feature or service.
547.23 -> - So Laura, as you know, I meet with a lot of customers
550.68 -> throughout their digital transformation journey.
553.08 -> Some are starting off and they're just pointing
555.99 -> and clicking in the AWS console.
558.03 -> Some have fully built out CI/CD pipelines
561 -> and don't even know how to spell console
562.98 -> because they're hardly ever in it.
564.36 -> Integrating security and a strong engineering culture
568.8 -> can be a challenge depending on where you are
571.981 -> in those different stages.
572.814 -> If you look at the sort of crawl, walk
574.56 -> run and sprint of cloud adoption.
577.38 -> Do you have any sort of tips or tricks
579.24 -> from an organizational and management perspective
582.45 -> to drive these behaviors that you're looking for?
586.41 -> - One of the things that I did early on
588.63 -> in my time at Amazon was work on Amazon's adoption of AWS.
592.44 -> And I've continued to be part
595.26 -> of many migrations that we've done internally.
598.98 -> And something that we do that's been really helpful
603.06 -> is when we are looking at a migration or transformation,
606.913 -> we take a few different types of use cases.
610.44 -> A couple are ones that we think are going to be easier.
613.59 -> Ones that we can get early wins to show success.
617.28 -> And then another one we'll choose
619.08 -> is one of the hardest ones that we think
621.93 -> we need to accomplish.
623.91 -> And so we were able then to go
625.56 -> to the other teams that felt they had a hard use case
628.41 -> and say, "But we got them over the line."
630.33 -> And then that showed them,
632.49 -> oh, well we can't just say that we're too hard
634.77 -> because you actually got one
636.06 -> of the hardest use cases over the line.
638.46 -> But then we also worked with some of those ones
640.62 -> that were more straightforward
641.7 -> so that we could get early wins and publicize
644.19 -> what we were doing into the company of,
646.777 -> "Hey, check this out.
647.91 -> This is really cool.
648.743 -> Anyone want to partner with us?"
650.25 -> And really build that momentum.
652.984 -> This helped us figure out what toolings, documentation,
656.37 -> those types of things we needed to do
657.9 -> while we were also working on the harder transformation.
662.55 -> Another thing that I really focus on
665.19 -> is how I can get engineering engagement
668.73 -> and how I can kind of rally our software developers
671.79 -> to get excited about the work that we're doing.
674.58 -> And part of this is doing talks or having good white papers
679.467 -> or other conversations, whatever your company uses
682.44 -> for that type of communication.
684.06 -> I've really found a lot of great folks across the company
688.32 -> that want to partner with what I'm doing,
690.78 -> either because they're really excited
692.4 -> about it or because they know
694.38 -> that they could really help shape what we're doing
697.5 -> and they want to be part of that shaping.
699.69 -> And so finding ways to find those people
702.6 -> throughout the company can also really help you
705.21 -> because that gets the word out
708.03 -> and they can really help spread what's happening
710.34 -> better than like a single person or a team
712.53 -> of people might be able to do that are more centralized.
715.17 -> - So almost having guilds of people
717.72 -> in particular areas of expertise
720.096 -> and they just help sort of coach each other,
721.86 -> it sounds like.
722.7 -> - Yeah, because they are working
724.23 -> on their particular service,
725.7 -> which spread across the company,
728.25 -> but they'll provide feedback
730.32 -> or, "Hey we're thinking about doing this,"
731.94 -> or, "This is a challenge that we're running into."
734.22 -> And having those folks that are sounding boards
737.52 -> that provide their insights of what that would mean
740.1 -> for their service or what that would mean
741.75 -> for their space can really also help accelerate
745.26 -> and ensure that you are building the right thing
747.99 -> for a larger set of services.
749.52 -> Then you might be like the couple early adopters
752.22 -> that you're working closely with.
753.78 -> - So in that sort of transition phase,
757.05 -> for lack of a better word,
758.88 -> where do you start introducing that security early
762.03 -> in the adoption or early in the development cycle?
765.3 -> - What I have found with the work that I do
767.28 -> is it is incredibly important to engage security early
771.78 -> and to work with them as partners on that transformation.
775.38 -> Making sure that you have senior security engineers as part
778.739 -> of that core working group is really important.
782.13 -> And because they can then look at things from that angle
784.77 -> which might be different than your particular perspective
787.32 -> and help you not have to make changes after the fact.
791.28 -> And instead build those security best practices in
794.43 -> from day one can really then help you accelerate
798.18 -> and also not have to run another migration
800.76 -> or something later because you didn't engage them
803.7 -> early in the process.
804.87 -> - So as customers are trying to build out
808.17 -> their security organization
809.7 -> and a strong engineering culture as well,
812.37 -> how can strong engineering actually support
815.19 -> the security team or the overall security mission?
818.79 -> How does being a strong engineer, knowing everything
821.73 -> about the libraries I'm using and things like that,
824.64 -> how does that benefit the overall security mission
827.67 -> of the company?
829.41 -> - Having engineers that are thinking security from the start
834.3 -> and how we build our tools and how we build our processes
837.93 -> encompassing security is really important for us.
841.74 -> Part of it is bringing
843.81 -> in security engineers themselves into our conversations
848.16 -> as we're building our services, as we're architecting.
850.95 -> And also as we're building tooling.
853.5 -> One of the things that we look for is ways
856.74 -> that we can do secure practices
859.98 -> such as OS patching, software patching
863.137 -> automatically where possible.
865.5 -> And so we've built a couple systems internally
868.95 -> that are able to do that automatic patching.
872.16 -> We also have tooling that allows us to know
875.371 -> what software is being used in different locations.
878.97 -> This then helps our engineers know what they need to patch
883.44 -> what they have on their box, what that looks like,
886.08 -> and helps them have all of the information that they need
890.25 -> to do the security work for their service.
893.7 -> Despite having this decentralized structure,
896.73 -> we do use a common code base, common deployment tools,
900.81 -> common ticketing system, common dashboards.
903.84 -> And that then enables us to be able to communicate
907.95 -> in a common way to the service teams.
910.29 -> And that's a big part of our partnership
912.48 -> that we have with the security organization.
914.52 -> So they are looking to provide us those dashboards,
918 -> that visibility, so that our engineering teams can then go
921.6 -> to those dashboards and see what they need to do.
923.94 -> For example, understand their patching status.
926.31 -> This is the work that is required
929.1 -> in order to maintain the security of our services.
932.46 -> - So then it sounds like that discipline
935.07 -> around what we're building, how we're building it,
937.53 -> what we're using to build it helps
940.2 -> when a new vulnerability comes out.
942.33 -> You're not wasting a lot of time,
943.89 -> do we even use this piece of software?
945.533 -> - Exactly.
946.47 -> - It can just be boom.
947.55 -> Of course, we do, we use this version and this rev
950.67 -> and we know whether we need to patch it or not.
952.29 -> - And what host it's on and therefore what service
955.05 -> is using it and we know how to contact that service to get
957.891 -> to the engineers who will then take action on that.
961.694 -> - It's the discipline as aspect
963.811 -> of the engineering that helps the overall security mission.
967.05 -> - Exactly.
967.883 -> And really looking for those opportunities
969.81 -> to continue to provide good insights and quality data
974.58 -> to our service teams, and then also ultimately,
977.46 -> tooling to help it be easy to do this work.
980.28 -> - That's awesome. That's awesome.
981.87 -> So let's sort of shift to a real world example.
986.07 -> So the world got to experience Log4j and Log4Shell,
990.15 -> and all the quote unquote "fun" that went along with that.
993.09 -> Can you sort of walk us through how that was handled
997.11 -> at AWS from a responsibility perspective
1000.281 -> since we've touched on that a lot today.
1002.57 -> What did, let's just say AWS security do
1006.5 -> and then what did the service teams do
1009.411 -> to address that issue?
1010.79 -> - Log4j, due to the nature
1013.79 -> of the vulnerability that it didn't require sophistication
1017.42 -> in order to exploit was a very, very high priority
1022.52 -> for us to remediate as quickly as possible.
1026.39 -> And so this, we put additional mechanisms
1029.99 -> in place to get the right prioritization on this.
1034.22 -> What happened is the initial engagement involved
1037.97 -> some of our most senior engineers, most senior folks
1042.02 -> in security talking to each other
1044.63 -> and then did engagement with our senior vice presidents
1048.8 -> and CEO around what this was education.
1052.37 -> - So this is not just a run of the mill vulnerability.
1054.373 -> - Correct, this is different.
1056.69 -> We need prioritization, this is what it means
1059.15 -> and that created that top most alignment
1062.06 -> at the highest levels in Amazon for what needed to happen.
1066.53 -> At the same time, they also engaged our senior engineers
1071.3 -> because those are the folks that are going to be working
1073.73 -> with our engineers and our service teams
1075.86 -> to really make sure the right prioritization was happening
1079.76 -> while at the same time we're talking
1081.05 -> to the executives around alignment.
1082.85 -> So that we found to be really important
1085.52 -> to not just talk to management, but also to engage
1088.88 -> our senior engineers in the conversation as well.
1092.21 -> The other thing we did was engage
1094.13 -> the central tooling we have.
1095.66 -> So we have host scans that help us know
1098.18 -> what packages are deployed to what host
1100.22 -> and also we know how to contact the team
1103.4 -> that owns and operates that service.
1106.94 -> And so we were able to leverage
1108.35 -> that central tooling that we use
1110.36 -> for other patching mechanisms
1113.15 -> in order to cut high severity tickets
1116.087 -> through this common ticketing system to our engineers.
1120.23 -> One of the other things that we have found
1121.73 -> over time that really is important
1123.86 -> when we have something that requires engagement
1126.56 -> from this many teams is we first have some engineers
1131.3 -> run through the documentation
1132.71 -> and instructions that we're going to be sending out.
1134.907 -> Because you want to get those tickets out
1136.498 -> as soon as you can.
1138.015 -> But taking that extra half hour,
1140.03 -> that extra hour to really review and ensure
1143.54 -> that it's clear, can help save some of the questions,
1147.08 -> confusion and ultimately get things
1149.27 -> out faster even though it feels upfront
1152.06 -> like you're going a little bit slower.
1153.71 -> - So the work doesn't start until that engineer
1156.32 -> receives the ticket.
1157.22 -> So you have to make sure that the ticket itself
1159.38 -> is as clear as possible so there's no back and forth.
1161.75 -> - Exactly.
1162.583 -> You want to make sure
1163.49 -> that the engineer that receives the ticket
1165.08 -> has all of the information that they need.
1167.36 -> The other thing we did is we set up chat rooms
1169.67 -> as well as calls that our engineers could join 24/7
1173.9 -> to be able to get the information they needed
1177.23 -> to remain unblocked.
1178.46 -> We're a global company and so it's important
1181.01 -> that we had these opportunities for conversation,
1184.46 -> for engagement, for clarification available
1186.89 -> to engineers all of the time that they're working.
1189.89 -> We also continue to engage with our vice presidents,
1193.4 -> with our general managers
1195.29 -> around how their teams were progressing.
1198.74 -> And so we had regular calls with them throughout the day
1202.391 -> being able to update them
1204.41 -> as to where we were so that they could then enable
1207.29 -> that driving of the patching within their service teams.
1210.86 -> So really helping both our managers
1213.62 -> and our engineers get access to as much information
1216.65 -> as we could and being very clear and crisp.
1219.59 -> We also then had status reporting
1221.48 -> up to the senior vice president and CEO level
1223.88 -> so that we kept them inform
1225.56 -> as to what our status was as well.
1227.99 -> - So that's pretty incredible.
1229.49 -> So it sounds like there was a strong partnership
1234.11 -> between AWS security and all the service teams
1237.74 -> and the engineering teams to actually get this done
1240.14 -> and it kind of sounds like the actual security team was more
1244.67 -> of a observe and report the status of the Log4j fixes
1250.22 -> while the engineering and development teams
1253.79 -> are actually doing the quote unquote "work"
1256.01 -> of patching, etc.
1258.2 -> - Exactly.
1259.337 -> Log4j was an example of the great partnership
1262.07 -> that we have between the services part
1264.38 -> of AWS and the security organization.
1267.14 -> We really were in all of this together.
1269.9 -> So the conversations and the calls that we had
1272.63 -> with our executives were being driven
1274.94 -> by both the security organization and the services team
1278.09 -> so that we were reporting where we were
1280.28 -> and addressing anything that we needed their help
1282.8 -> with prioritization or things like that.
1285.17 -> We were getting our status reports,
1286.85 -> the data from the security organization,
1289.37 -> partnering with them, on the tickets that needed to get cut,
1292.7 -> the documentation. And then really
1294.77 -> on the services side, doing the deployment
1297.32 -> doing the actual patching and making sure
1299.48 -> that our software development engineers
1300.98 -> had what they needed.
1301.82 -> So a great example of us coming together
1304.55 -> in order to really make this change very rapidly.
1307.721 -> - Yeah, so that's great to hear
1309.905 -> because a lot of the customers I speak to they think,
1312.35 -> well in order to have a strong security organization
1314.63 -> we need to 10x the population on the security team
1317.54 -> when in fact, you have your extended security team
1320.24 -> in your engineering organization.
1321.74 -> It's just making sure that the partnership
1323.99 -> and the culture supports all that stuff.
1325.73 -> - Exactly.
1326.563 -> Really creating that partnership,
1328.28 -> really helping engineers, managers, product managers
1331.82 -> understand how critical security is for your business,
1335.69 -> really helps create that joint work
1338.75 -> that we're able to do together.
1340.01 -> - Well Laura, thanks so much
1341 -> for spending some time with me today.
1342.83 -> - Thank you so much for inviting me.
1344 -> It was great chatting.

Source: https://www.youtube.com/watch?v=iLr8roESv5Y