AWS re:Inforce 2023 - Continuous innovation in AWS detection and response services (TDR204)
Aug 16, 2023
AWS re:Inforce 2023 - Continuous innovation in AWS detection and response services (TDR204)
Join this session to learn about the latest advancements and most recent AWS launches in detection and response. This session focuses on use cases such as automated threat detection, continual vulnerability management, continuous cloud security posture management, and unified security data management. Through these examples, gain a deeper understanding of how you can seamlessly integrate AWS services into your existing security framework to gain greater control and insight, quickly address security risks, and maintain the security of your AWS environment. Learn more about AWS re:Inforce at https://go.aws/42zqk7C . Subscribe: More AWS videos: http://bit.ly/2O3zS75 More AWS events videos: http://bit.ly/316g9t4 ABOUT AWS Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts. AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster. #reInforce2023 #AWSEvents
Content
0.15 -> - All right, welcome everyone.
1.71 -> Hopefully re:Inforce
day two is going well.
4.92 -> This is TDR 204.
7.35 -> We will cover the session that highlights
9.72 -> the continuous innovation
11.37 -> in AWS detection and response services.
14.46 -> My name is Himanshu Verma.
15.93 -> I lead the team of our world
worldwide security specialists
18.33 -> at Amazon that helps customers orchestrate
21.51 -> AWS native security services
as well as partner tools
25.32 -> and helping them with their
security journey in the cloud.
28.44 -> And I'm joined here with Ryan Holland,
31.68 -> who's the Senior Manager
for Amazon GuardDuty.
35.85 -> So the topics we'll cover
today are an overview
38.19 -> of AWS threat detection and
monitoring services portfolio.
41.85 -> What are some of the key enhancements
43.29 -> that have been announced
in the last recent months,
47.25 -> as well as late as yesterday?
49.74 -> We'll also provide a quick
technical overview and demo
52.53 -> as we go through these features.
54.15 -> And then there'll be, you know,
55.71 -> time for Q&A on the side.
57.3 -> You guys can come and
ask us some questions.
60.99 -> So diving into this,
62.1 -> all of our security services
64.17 -> that are native to AWS
are focusing on providing
67.02 -> better visibility to our customers.
69.48 -> As you move towards continuous development
72.3 -> and/or modernizing your workloads,
74.52 -> we want to make sure that you have
76.41 -> the security services in place
78.45 -> that can provide you better visibility,
80.76 -> whether it's regards
to providing detections
82.928 -> and/or providing monitoring capabilities,
86.16 -> without the operational
lift of going through
89.31 -> orchestration and/or
generating logs and telemetry.
94.65 -> Additionally, what we've seen
95.85 -> and heard from customers is that
98.19 -> there's an increasing trend in providing
100.92 -> that visibility to not
only the security persona,
103.86 -> but also to the developer personas.
105.87 -> So you'll see that some
of the enhancements
107.61 -> we've been making in our
services are moving towards
110.1 -> that direction to bring the
Dev SecOps experience together.
117.09 -> Before we dive into
118.8 -> the threat detection
and monitoring services,
120.72 -> just wanted to provide you a holistic view
123.18 -> of the breadth and depth
that AWS services provide.
127.2 -> So our goal is to provide
128.88 -> proven security to accelerate innovation.
131.4 -> And this is accomplished by
orchestrating our services
135.57 -> in a cybersecurity framework use case.
138.78 -> So for instance,
customers as they increase
141.45 -> their AWS workloads or
are adding more workloads
144.63 -> in their AWS accounts continuously,
146.91 -> whether it's one team or multiple teams,
149.34 -> they need the ability to identify
151.158 -> what all controls or what
all workloads are there,
154.11 -> and have a good inventory of
156.21 -> what all security posture
is being implemented,
160.05 -> so that you have good view of evaluating
162 -> that security posture as well.
163.56 -> This is where some of our
management and governance tools
166.08 -> come in that provide customers
the ability to evaluate
169.14 -> those controls and then
also have visibility
172.38 -> or continuous monitoring into whether
174.06 -> they're following security
best practices or not.
177.75 -> Once customers have identified
179.16 -> these workloads and inventory
181.17 -> then comes in the protection.
183 -> So this is where some of
our protection services
185.73 -> come into play, which is protecting data
187.47 -> at rest, in motion, in use,
189.48 -> or protecting the
infrastructure to and from AWS.
193.68 -> So our services provide
customers the layered defense
197.224 -> that can be applied to
protect these workloads.
202.77 -> Next, is the ability to detect proactively
205.89 -> any misconfiguration, vulnerabilities,
207.96 -> threats in your environment.
209.79 -> So this is where most
of our threat detection
212.16 -> and incident response
suite of services come in
214.74 -> that help customers detect
216.322 -> these threats in their environment.
219.57 -> Most of these services
will generate findings,
222.12 -> which is what customers can
leverage to orchestrate response
225.81 -> or respond to these events.
227.809 -> Being cloud native,
229.65 -> these services all integrate
231.18 -> with EventBus or EventBridge,
234.18 -> and then can be used to drive
event driven orchestration
237.6 -> by integrating with Lambda
and step functions, et cetera.
241.77 -> And then finally is recover.
244.38 -> So finding an incident and then recovering
247.26 -> from that incident and making it easier
249.66 -> and automated by leveraging
disaster recovery tools
252.42 -> or you know, cloud formation templates
255.36 -> and AWS backup tools is another area
258.24 -> where our services can help
260.25 -> by integrating with those tools.
262.29 -> So this is a holistic view of our breadth
264.87 -> and depth of all the AWS security services
267.81 -> that customers can leverage
to orchestrate that
270.302 -> in a cybersecurity framework.
273.36 -> Now diving into the detection
and response services,
276.84 -> this is what the portfolio looks like.
278.58 -> We're continuing to evolve
this portfolio as well.
281.25 -> You can see there are
six security services
285.21 -> highlighted here.
286.41 -> So first and foremost,
288.51 -> these services are natively
integrated with AWS workloads.
292.23 -> There are three detection services,
294.109 -> Amazon GuardDuty, which
is our primary service
296.85 -> focused on identifying known threats
299.634 -> and malicious threats or activity
302.64 -> and suspicious activity as well.
305.19 -> GuardDuty brings these findings
307.376 -> and those findings are
available in the console,
309.84 -> as well as in the EventBridge,
to take actions on.
313.56 -> The second service highlighted
here is Amazon Macie
316.62 -> that helps customers
identify the risk posture
319.89 -> associated with sensitive data
321.93 -> in their S3 workloads or S3 buckets.
325.342 -> Natively integrated with S3,
327.3 -> it allows customers to
either run on demand scans
331.44 -> or automatically using
intelligent sampling,
334.41 -> can actually identify sensitive data
337.17 -> that is matched to either
338.73 -> built-in managed
identifiers in the service
341.28 -> or customer identifiers that
customers can define as well.
344.64 -> But we've enhanced the service
346.32 -> to bring in context and risk associated
348.9 -> with the control plane activity
351.06 -> on the S3 buckets and objects as well.
354.45 -> The third service is Amazon Inspector,
356.28 -> which is our primary service
357.51 -> focus on vulnerability management.
360.12 -> Inspector natively integrates
with EC2 instances,
364.057 -> container registries like
Elastic Container Registry,
367.35 -> and lately with Lambda functions
and Lambda code functions
371.43 -> to detect vulnerabilities
and report those as well.
375.81 -> All these findings are
then can be aggregated
378.981 -> in AWS Security Hub,
381.6 -> which is our centralized
security monitoring,
383.76 -> as well as Security Cloud
Posture Assessment Service.
388.122 -> One of the core functions
that Security Hub provides is
390.63 -> evaluating the controls that
are in your environment,
394.23 -> which are organized in a very easy
396.06 -> to infer security standards.
398.25 -> So these standards are built
in aggregation of controls
401.4 -> such as AWS foundational
security best practices,
404.4 -> and/or the NIST standards
or CIS benchmarks,
408.99 -> so that customers have a high level view
411 -> of what the risk posture is.
413.19 -> And additionally they can
dive deeper into the details
415.65 -> of where do they need to
take actions to orchestrate
419.46 -> or configure those controls appropriately
421.62 -> and close that gap.
425.28 -> The fourth service,
426.36 -> the fifth service that's highlighted here
427.77 -> is Amazon Detective.
429.87 -> Detective is a service
that's mainly focused towards
432.57 -> the security operations persona
434.76 -> as well as the threat analyst persona.
437.13 -> Detective helps customers
investigate and identify
440.85 -> the root cause analysis
of security events.
444.27 -> Detective is collecting a lot of telemetry
447.15 -> in the backend automatically,
448.98 -> not only from findings
450.42 -> but also the raw information
452.25 -> and is creating a behavioral graph
454.8 -> that correlates all the entities
456.99 -> as well as is able to provide
a journey map to the customer
461.34 -> in the form of either visual interface
463.56 -> and/or going and identifying
465.48 -> what API actions were actually taken
467.88 -> or how did the threat manifest
itself over a period of time.
472.89 -> So Detective is collecting
all that information
474.81 -> and retaining it for at least 12 months,
477.48 -> which provides customers
478.74 -> and security investigators to go in
480.84 -> and investigate those
events back in time as well.
485.16 -> And then the final service
that's highlighted is
487.08 -> to help customers organize
488.85 -> and manage all the security data,
491.16 -> not only related to findings,
493.08 -> but also related to security logs.
495.54 -> We heard from customers
496.65 -> that this is a key challenge for them.
498.75 -> So at re:Invent last year
500.73 -> we announced a service
Amazon Security Lake,
503.37 -> which is now available as of last week
505.86 -> and has been launched.
507.3 -> Security Lake helps
customers easily centralize,
510.51 -> organize log data related
to security use cases,
514.47 -> not only from AWS workloads
516.51 -> but also non AWS workloads as well,
519.3 -> which means you can
bring in log information
521.19 -> from either hybrid environments
524.04 -> or other SaaS applications or
even other cloud providers.
527.778 -> Once that information is aggregated
530.132 -> in a customer owned S3
lake formation bucket,
533.46 -> it also automatically
transforms all that information
536.31 -> into a standard schema format,
538.32 -> making it much easier
for the security teams
541.32 -> to now use the choice of
their flexible analytic tools
545.46 -> and then reduce the time that it takes
548.46 -> to either run queries and/or infer
550.928 -> what actions need to be taken
553.603 -> or reduce the time for incident response.
557.19 -> So these six services are key
559.53 -> to our threat detection
and incident response.
562.5 -> We will actually go into details
of some of the new features
565.62 -> that have been launched in these services,
567.69 -> as well as showcase what these
look like in the AWS console.
574.41 -> Let's first focus on the
deploying these services
577.41 -> and how we are addressing
the scale of their coverage.
581.34 -> First and foremost, as I mentioned,
583.05 -> all these services are natively integrated
585.84 -> with AWS workloads.
587.49 -> What that means is that there
is no additional logging
590.221 -> and/or operationalization required.
593.22 -> Within a few clicks,
594.39 -> these services can be enabled
both at the account level
597.9 -> as well as all these
services are integrated
600.6 -> with multi account management
602.34 -> with the AWS organizations construct.
604.74 -> That means security teams
can actually delegate
607.23 -> a centralized management account
608.97 -> and can easily aggregate either findings
611.97 -> and/or logs in these services
614.82 -> and can also manage onboarding
616.95 -> other member accounts very easily as well,
619.47 -> which allows customers
and the security teams
621.33 -> the ability to make sure
622.8 -> that as new accounts
are getting onboarded,
624.978 -> these services are either
automatically enabled
628.08 -> or they have the choice
629.22 -> to turn on, off certain
features within the services.
633.382 -> So again, from an
operationalization standpoint,
636.42 -> it's very easy to enable these services
638.7 -> and none of these
services actually require
640.693 -> raw logging to be enabled.
643.5 -> So just to show you a quick overview
646.11 -> of how this looks like in the console,
648.36 -> this is an interface for Amazon GuardDuty
650.94 -> where you can see I'm in the accounts tab.
653.82 -> And most of our services have the same
655.53 -> similar user experience
where you can set up
657.45 -> a delegated management account,
659.16 -> a centralized delegated
management account.
661.29 -> And from there, you can see a rich option
663.96 -> of enabling this service.
665.631 -> Not only can you take individual actions
668.73 -> by selecting one or many accounts
671.175 -> and just enabling services on those,
674.67 -> but you can also take multiple actions
676.92 -> of auto enabling these services
either for all accounts,
681.615 -> which means anytime you're
adding new accounts,
684.51 -> the service will be automatically enabled
686.52 -> and will start monitoring
and providing the value.
689.31 -> Or you can also do that on, for example,
692.1 -> new accounts that are
added to the organization.
695.76 -> And in the case of GuardDuty,
697.89 -> as we, you know, we'll
talk more in detail,
700.32 -> you can see the rich
options that are available
702.443 -> either at the feature level
704.61 -> or in some cases also
at the sub feature level
708.42 -> that you can enable and
toggle these options
711.66 -> based upon the accounts
where these workloads reside
714.63 -> or based on how your
accounts are orchestrated
717.51 -> between dev, test, prod, et cetera.
720.96 -> So this makes it very simple and easy
723.3 -> to manage these services
and enable these services
726.06 -> across multiple member accounts
728.19 -> and then also aggregate their findings
730.47 -> in one single centralized account.
734.22 -> With that,
735.419 -> I'm going to hand it over to Ryan
736.252 -> to cover the first detection service.
739.71 -> - Thank you very much, Himanshu.
741.57 -> So the first service
we're gonna talk about
743.46 -> and go a little more in
depth is Amazon GuardDuty.
746.61 -> So Amazon GuardDuty has been around now
748.83 -> for a little over five years.
750.57 -> When we first launched GuardDuty,
752.28 -> we had three data sources.
753.66 -> So we had flow logs, DNS query logs,
758.16 -> and CloudTrail events
from the management side.
760.98 -> We had later extended that
to include data events
763.23 -> for things like S3.
765.09 -> And then most recently,
766.29 -> we've started adding additional
log sources for our EKS.
769.71 -> So last year we launched
EKS audit log protection.
773.25 -> And then the Aurora login events
777.63 -> from RDS Aurora instances.
779.85 -> And then recently we
launched Lambda Protection,
782.22 -> which looks at flow logs from Lambda
784.17 -> as well as a runtime agent
now for EKS clusters.
788.01 -> And as Himanshu mentioned,
789.06 -> one of the most important things is
790.08 -> you don't have to turn
on these log sources
791.88 -> in individual accounts.
793.11 -> So you don't have to go
turn on your flow logs
795.21 -> or turn on your EKS audit logs.
797.19 -> When you turn on these functions
798.39 -> within the GuardDuty service,
800.19 -> we're automatically gonna start
801.3 -> grabbing those from the backend.
802.68 -> So that helps save both cost
804.84 -> in turning those logs on at scale,
806.37 -> but also in management and
making sure that they're enabled.
809.447 -> It also has some security benefits
811.53 -> because you can't interrupt
our access to that data.
815.16 -> So once we have this log data,
817.08 -> the first thing we're
gonna do is run it through
818.49 -> a set of different security analytics.
820.56 -> So we look at this in different ways.
822.12 -> We have threat intelligence
based detections.
825.12 -> We partner with both
CrowdStrike and Proofpoint.
828.36 -> And we also get a lot of
very rich threat intelligence
830.85 -> from internal sources as well.
832.23 -> So we partner with our internal
threat intelligence group
835.77 -> that tracks a lot of nation state actors
837.81 -> and a lot of other very
sophisticated actors
839.82 -> to get some good threat intel
841.62 -> that we can apply to those data sources.
843.87 -> And we also have a very large
investment in machine learning
846.78 -> where it allows us to
baseline and do profiling
849.42 -> of different workloads,
850.92 -> be it a user in CloudTrail,
or a bucket in S3,
854.19 -> or an EKS cluster from EKS audit logs.
856.8 -> And learn what is normal
activity for that resource
860.94 -> and then raise anomalous findings
862.68 -> when we see things that are deviating
864.33 -> from what we consider to be normal.
867.63 -> And then we produce findings.
868.98 -> And the idea that for these findings
870.36 -> we want them to be actionable.
872.04 -> And one of the ways that we help customers
873.63 -> make these findings more
actionable is by enriching them
876.018 -> with a lot of context.
877.83 -> So for an instance that
could be information
880.17 -> about its tags or its network interfaces.
883.35 -> From an RDS perspective,
885.6 -> it could be what do we normally see?
887.55 -> Like we're telling you
888.383 -> that this particular login was unusual
890.621 -> and we now will also tell you
892.23 -> why we found it was unusual.
893.61 -> Like what is the normal activity we see?
895.572 -> Same with CloudTrail and S3,
897.99 -> if we're gonna say a user is
accessing a bucket abnormally,
901.78 -> we'll also tell you what
buckets they normally access
904.572 -> or what volume we
normally see them access.
907.14 -> And that really helps the
responder to take that alert
910.29 -> and understand, you know,
911.49 -> why we decided to send that to them.
915.19 -> And then all of these alerts go out
917.49 -> to multiple different sources.
918.99 -> So as I mentioned,
919.89 -> you can pivot directly to Detective.
922.2 -> If you wanted to go dive deeper
923.94 -> into an individual finding and learn more
925.65 -> about what other activity
that resource was doing,
928.41 -> you can investigate it
directly in Detective
930.51 -> from the GuardDuty console.
932.52 -> We also sent it to Security
Hub for aggregation.
935.19 -> And then we also sent 'em out EventBridge
936.63 -> where a lot of customers are
collecting these findings
938.85 -> and sending them to
third party partner tools
941.46 -> or other internally developed tools
943.08 -> in order to do further investigation.
946.35 -> One other good piece of
enrichment we have is
950.28 -> with our new malware protection.
952.35 -> So for EC2 based detections,
955.89 -> we can trigger an automated,
957.48 -> behind the scenes malware
scan of the volume.
960.36 -> So for example,
961.29 -> if I tell you that an instance
started doing crypto mining
963.6 -> or contacting a C2,
965.67 -> instead of having to go onto
the incidents and figure out,
967.89 -> okay, where is the mining tool,
969.87 -> or where is the malware,
971.73 -> we'll automatically snapshot that volume
974.19 -> and run a malware scan against it.
976.53 -> We partner with Bitdefender
977.76 -> and we also have one of our own engines
979.26 -> that we run against this data as well.
980.903 -> And this will allow us to send
you a detection that says,
983.97 -> we found this network
activity that was suspicious
986.94 -> and we also scanned the volume
988.47 -> and now here's the actual list of files
990.45 -> that were detected as malware.
992.16 -> That really helps speed
up the response time
994.41 -> and help the responder know exactly
996.78 -> what they need to go look at.
999.9 -> So I wanna just go a little deeper
1001.04 -> on some of the newer features
that we recently added.
1003.08 -> So I mentioned the EKS protection.
1005.15 -> This is available in
two different options.
1007.91 -> So there's the audit logs
1009.71 -> where if you turn this on, again,
1011.24 -> you don't have to change
your EKS configuration,
1014.3 -> you can turn this on in accounts
1015.71 -> that don't have EKS running today.
1017.84 -> And if somebody were to decide tomorrow
1019.94 -> to start an EKS cluster,
1021.59 -> automatically we'll
start getting those logs.
1023.9 -> And those go across all
of the different accounts
1026.81 -> within your organization when
you use that delegated admin.
1030.2 -> We're looking for things where
we'll match the source IP
1033.41 -> of request to the Kubernetes controller
1035.63 -> through threat intelligence.
1037.01 -> So coming from a malicious
or suspicious source
1040.16 -> or like a Tor exit node for example.
1042.77 -> And we also track configuration changes.
1044.78 -> So exposing your Kubernetes dashboard
1047.57 -> or making a role binding
that allows anonymous access,
1051.65 -> those can trigger policy findings.
1053.21 -> And then if somebody were
to use a Kubernetes request
1056.96 -> from an unauthenticated source,
1058.73 -> we'll also raise alerts for that too,
1060.17 -> so it can help identify
some configuration problems
1063.2 -> that could ultimately lead to
1065.3 -> someone compromising your EKS cluster.
1068.72 -> We also do some machine
learning on these logs too
1071.36 -> to understand what is normal
for a particular cluster.
1075.32 -> Some of the things we look
at are privileged pods
1078.38 -> or pods that mount host level directories.
1081.65 -> There's very good reasons to do this.
1083.87 -> A lot of security tools do need access
1086.09 -> to some of those things.
1087.44 -> However, we'll learn
what is normal for a pod
1089.3 -> and if a pod comes along that
we haven't previously seen
1092.66 -> request some of those elevated privileges
1094.4 -> we can raise an alert
on that to let you know
1096.5 -> that there's this new privilege pod
1098.21 -> and if it's a malicious
1099.08 -> or if somebody were to compromise that,
1101 -> it would have a lot more
access than you might want.
1105.5 -> The second part of EKS is
the runtime protection.
1109.1 -> So we announced this
at re:Invent last year
1111.167 -> and we went generally
available at the end of March.
1114.26 -> And this was a collaboration
between GuardDuty and EKS.
1117.47 -> So we really wanted to give customers
1120.38 -> more context to detections,
1122.54 -> but also be able to get
richer and deeper detections
1125.33 -> that really can only come
1127.1 -> from the runtime environment themselves.
1129.44 -> And so we developed a EBPF based agent.
1132.53 -> So it's a very lightweight agent
1134.27 -> that we deploy using
the EKS managed add-ons.
1137.48 -> So this really helps solve
1138.86 -> one of the biggest challenges people face
1141.08 -> with agents is getting
'em deployed is hard.
1143.51 -> Understanding where you
even need to deploy them
1145.31 -> can be difficult.
1146.66 -> And so by working with EKS
and their managed add-on,
1149.66 -> when you turn on the automatic management,
1151.79 -> if an EKS cluster comes
into your environment
1154.07 -> in any account that's has this enabled,
1156.95 -> we will automatically
go and deploy the add-on
1158.84 -> to all of the cluster worker nodes
1161 -> and start collecting the telemetry.
1163.37 -> We stream the telemetry
directly to a VPC endpoint
1166.7 -> that will deploy for you as well.
1168.5 -> And it allows us to move all
of that detection capabilities
1171.5 -> into the backend.
1172.67 -> So that helps keep the agent itself
1174.59 -> and the resources that
it needs very lightweight
1176.724 -> and it also allows us to
do more advanced detections
1179.69 -> that are looking at CIS
calls over time as well.
1182.806 -> So we launched over two
dozen new detections
1186.26 -> that are very specific to
the runtime environment.
1188.441 -> Some of them are specific
to container type of texts
1191.39 -> like container escapes,
things like reverse shells.
1194.84 -> And then also for our threat
intelligence detections
1197.46 -> in this case, you'll also
get very rich contacts
1201.44 -> that I'll show you in the demo
1202.534 -> about not just that the instance
1204.77 -> or the pod performed this activity,
1206.6 -> but also which process was involved
1209.06 -> and what are the process lineage.
1210.65 -> And this really helps with responding
1212.84 -> to these types of attacks.
1215.69 -> So when you take this all together,
1216.89 -> you really get end-to-end detection
1219.8 -> and coverage from a threat perspective
1221.99 -> for running Kubernetes on EKS.
1224.42 -> So at the control plane from CloudTrail,
1226.43 -> the interactions directly
with the EKS service itself,
1229.94 -> we're monitoring all of those.
1231.8 -> The Kubernetes control plane.
1233.3 -> So those are the audit
logs where we're watching
1235.16 -> how people are interfacing
with the Kubernetes controller.
1239.142 -> The underlying EC2 nodes themselves,
1241.49 -> we're still monitoring the flow logs
1243.02 -> and the DNS query requests
from those as well.
1245.6 -> And then the system level events
1247.062 -> that we're capturing from
the runtime agents as well.
1250.55 -> So it gives you a defense in depth
1252.29 -> and across all the different entry points
1254.39 -> for Kubernetes environment.
1259.01 -> And then the last new extension
that we made for GuardDuty,
1262.85 -> which was about in April,
was Lambda Protection.
1266.684 -> And so what we're doing here is
1268.97 -> we're looking at flow
logs from Lambda functions
1271.94 -> and applying our threat
intelligence to those flow logs.
1275.42 -> And it's important to note, again,
1276.98 -> you don't have to turn on
any flow logs for these,
1279.35 -> and this works in both networking modes.
1281.54 -> So if you're using the Lambda
standard network egress
1285.71 -> and you're going out our IGW,
1287.51 -> we still get access to those flow logs.
1289.67 -> And if you're going out of VPC,
1291.29 -> so you've connected VPC
networking for your Lambdas
1293.69 -> and you're routing the
traffic out your own IGW,
1296.36 -> we see them as well.
1297.89 -> And these flow logs are enriched
1300.29 -> with all of the function details.
1301.82 -> So you have an understanding of
1303.62 -> what was the function that was impacted
1305.87 -> and when was it last updated.
1311.6 -> So I wanna show you one other thing too
1313.04 -> that we just launched yesterday in fact
1315.08 -> is another enhancement to
the GuardDuty console itself.
1318.41 -> So one of the things that
we'd heard from customers is
1320.42 -> they wanted an easier way to
consume some of the findings,
1323.03 -> especially larger customers
1324.328 -> who might get a large number
1326.54 -> of findings across their accounts.
1328.37 -> So we just released a new summary page
1330.05 -> and this again went live yesterday.
1332.48 -> It allows you to look
at data over 30 days,
1334.34 -> seven days, or two days,
and see some trends.
1337.19 -> So how am I trending from
the number of total findings
1339.683 -> or high severity findings?
1341.84 -> You can then see these findings by date
1343.97 -> and the different severities.
1345.253 -> There's a little chart that'll break down
1347.27 -> like what are the most
common types of findings
1349.31 -> that you're seeing.
1350.93 -> You can also look at it by your account.
1352.7 -> So out of all the accounts
that I might have,
1355.16 -> what are the ones that are
generating the most findings?
1357.71 -> So this will help you kind of drill down
1359.33 -> and prioritize where you maybe
want to go look initially.
1363.02 -> And then I like this one
at the bottom here too,
1365 -> because a lot of times
you might have findings
1367.19 -> that you see quite a bit,
1368.3 -> it might have something
that's activity happens a lot,
1370.389 -> sometimes it's that thing
that doesn't happen very often
1373.25 -> that is most important to you
1374.9 -> because I should never
have seen Tor access
1378.02 -> within my environment, for example.
1380 -> So we're highlighting
and bubbling up, hey,
1381.68 -> these are the least occurring findings
1384.29 -> and how often they happened.
1385.88 -> And in this case, you can
see I have a set of somewhat,
1388.94 -> you know, concerning looking findings
1390.977 -> and they've only all happened to once.
1392.15 -> And so you can then drill
down on those as well.
1395.54 -> And then the same also we'll look at
1396.98 -> all of the findings you have
across all of your accounts
1399.17 -> and identify what are
the different resources
1401.96 -> that are generating the most findings.
1403.49 -> Again, as a responder,
1405.192 -> the things that are
generating these most findings
1407.21 -> is probably something I
want to go look at first
1409.16 -> when you start to prioritize
how you're gonna go
1411.38 -> and address these.
1416.66 -> So we mentioned, you
know, the protection plans
1420.11 -> and turning on and off the EKS protection.
1422.33 -> So I just wanted to highlight here
1423.71 -> on the cluster runtime protection.
1427.49 -> So you have the ability again
1428.81 -> for all of your member
accounts to enable it
1431.24 -> for all new accounts.
1432.53 -> And then you can turn on
just the log monitoring
1435.17 -> if you don't want runtime.
1436.49 -> And if you want runtime monitoring,
1437.93 -> you have the option of
either an enabling it
1440.27 -> with automatic management
and in this case,
1442.73 -> we do everything for you.
1444.11 -> So we'll create the VPC endpoints,
1446.15 -> we'll deploy the managed add-ons.
1448.16 -> Again, as new clusters come online,
1450.08 -> they'll automatically get covered.
1451.34 -> You don't have to do anything.
1453.32 -> Optionally, if you wanna do it yourself,
1454.97 -> I know we have a lot of
customers that like tools
1456.98 -> like CloudFormation or Terraform
1458.39 -> you can do on manage it yourself.
1459.71 -> If you uncheck that, we'll
still enable that functionality,
1463.04 -> but we won't go and create
the resources for you.
1468.95 -> So I just wanted to give
you a little snapshot
1471.44 -> into some of that additional context
1472.97 -> that I was mentioning from the runtime.
1474.92 -> So in this case I have a runtime finding
1476.99 -> and one of my clusters.
1477.83 -> I executed a crypto miner
1481.28 -> and as you can see we get context
1483.02 -> about the cluster itself,
1484.46 -> so the cluster its name
1485.93 -> and then what was the
work load information.
1488.24 -> So the pod level details
1490.19 -> so you can see exactly which
pod this actually ran in.
1493.58 -> And then really importantly,
1495.14 -> we also show you information
1496.91 -> about the process that did it itself.
1499.7 -> So you can see the process,
it's executable path,
1502.7 -> it's Sha-256.
1504.53 -> So if you wanted to look at that through
1506.57 -> your own threat intelligence
or look it up elsewhere.
1509.42 -> The PID, it's working directory
1511.49 -> and then also the lineage of that finding.
1514.04 -> So this can be very
helpful in understanding
1516.08 -> how that process came to be, right?
1518.9 -> So you can see that the previous lineage,
1521.03 -> it was executed from a bash console.
1522.89 -> But you can imagine for example,
1524.72 -> if I had a remote shell detection.
1528.043 -> So your process that you
would see would probably be
1530.45 -> like something like NC,
1532.07 -> but if the parent process
is tomcat for example,
1535.04 -> that would be a good
signal that I probably,
1536.87 -> that was probably a
web-based vulnerability
1538.91 -> that allowed them to execute that.
1540.59 -> And that's helps you go trace
back where you want to go
1544.01 -> for detection.
1544.843 -> So again, we'll look at the process tree
1546.83 -> all the way back to PID 1
1548.69 -> and show you exactly how
the binary or the process
1552.92 -> that created the finding came to be.
1559.22 -> The next one I wanted to show
you was the Lambda detection.
1561.5 -> So as I mentioned with Lambda now,
1563.51 -> we're looking at flow logs
1564.65 -> and a lot of times this
could be something like
1566.87 -> a supply chain attack
1568.37 -> where you've got a compromised include.
1570.38 -> We've seen that before with crypto mining
1572.45 -> being embedded into Lambda functions.
1574.378 -> So looking at these flow logs,
1576.02 -> we can detect access to
crypto, to C2, to Tor.
1579.8 -> And again, you're gonna
get all of the context
1581.69 -> that you need about the function itself.
1584.12 -> So what was the function, ARN.
1585.89 -> When was that function last modified?
1587.99 -> And you can link directly to it.
1589.37 -> What role the function had attached to it,
1591.89 -> which could be very useful if
you're trying to investigate
1594.211 -> kind of blast radius or what that function
1596.42 -> could have access to.
1597.65 -> And then again, all the information
1599.09 -> that we have about the connection.
1603.62 -> The last one I wanted
1604.453 -> to show you was the malware protection.
1606.38 -> So as I mentioned,
1607.82 -> we can automatically
trigger a malware scan
1610.94 -> for an EC2 volume.
1612.47 -> And this is both for EC2 instances
1614.93 -> and it's also container aware.
1616.22 -> So if you're running Docker or Kubernetes
1619.117 -> or ECS on EC2 and that underlying instance
1622.58 -> generates one of the findings
1624.86 -> that is on our list to
trigger an automatic scan,
1628.07 -> we will have a GuardDuty initiated scan.
1630.53 -> And we'll snapshot that volume,
1632.15 -> run a malware scan against that,
1633.68 -> and then generate a
separate finding for you
1635.81 -> that details the paths,
1637.64 -> the locations of all of the malware
1639.35 -> that we found in that volume.
1641.15 -> And if you're using ECS or EKS,
1643.1 -> we'll also give you the EKS
and ECS details as well.
1646.76 -> So the pod data from Kubernetes
1648.781 -> or the ECS task information
if you're running ECS.
1655.04 -> All right, so after that
1656.15 -> the next thing is to investigate findings.
1657.83 -> So that'll hand it back over to Himanshu.
1660.32 -> - Thanks Ryan.
1661.22 -> So as Ryan highlighted, you know,
1663.35 -> GuardDuty has this rich capability
1665.27 -> of providing detections and findings,
1668.66 -> which includes a lot of
contextual information.
1671.39 -> But oftentimes customers have asked us
1674.03 -> and especially the security
analysts have asked us that,
1676.67 -> you know, how can they
correlate that information
1678.842 -> with other activities
that might be occurring
1681.92 -> in the account.
1682.91 -> So for instance, you know,
who launched that instance
1686.023 -> or what role was assumed
or what session was assumed
1690.77 -> to actually take the action.
1692.3 -> And then what other API calls were made
1694.61 -> or what actions were performed.
1696.53 -> This is something that Amazon Detective
1698.9 -> is natively collecting all
the information and telemetry.
1703.28 -> So all the network
activity from flow logs,
1706.07 -> all the API activity from CloudTrail,
1708.8 -> and now findings from
our own security services
1712.22 -> like GuardDuty, Inspector lately.
1714.89 -> And then just last few weeks ago,
1717.47 -> we announced the ability to integrate
1719.84 -> all of Security Hub's finding
into Detective as well,
1723.38 -> so that it can then bring
all of that information
1726.445 -> and build that correlational
behavioral graph database
1730.07 -> that customers can actually visualize
1731.922 -> within the AWS console itself as well,
1735.02 -> or leverage APIs to
integrate that information.
1739.46 -> So Amazon Detective is
focused on helping customers
1743.39 -> save time and effort,
1745.49 -> which is required to investigate
the root cause analysis
1748.586 -> of a certain event or look at the trends
1751.85 -> as to what were the
actions that a threat actor
1754.85 -> might have taken to
actually launch that threat.
1758.12 -> Using machine learning model,
1759.566 -> Amazon Detective not only creates
1761.99 -> the behavioral graph database,
1763.28 -> but also creates a baseline activity
1765.68 -> of what's happening in the account.
1768.23 -> This is both related to
either network activity
1771.11 -> as well as API activity.
1773.18 -> As I mentioned earlier,
1774.41 -> Detective is also collecting
and retaining this information
1777.59 -> for as long as 12 months.
1779.72 -> So most of the time security teams
1781.28 -> might want to go back in time
1783.02 -> and also view the trends
for the last, you know,
1786.47 -> 45 days or three months, et cetera.
1789.53 -> So easily changing the
scope time in Detective,
1792.5 -> you can actually view all that information
1795.02 -> and then the graph updates
automatically within the console.
1799.43 -> Lately we've announced a
new feature in Detective
1802.61 -> that can help aggregate
these findings collectively
1806.06 -> and then highlight them either
at the techniques tactics
1810.38 -> as well as procedures level
1812 -> or at the resource level as well.
1814.28 -> As you can imagine, you know,
1815.45 -> GuardDuty findings are automatically
1817.4 -> being ingested by Detective,
1819.23 -> so it can also highlight
at the resource level,
1822.35 -> not only the one finding
that you might see
1825.02 -> in your incident response queue,
1826.7 -> but also all the other findings
or other vulnerabilities
1830.6 -> that are potentially on that resource.
1833.957 -> So as of yesterday,
1835.85 -> there was a new
announcement that was made,
1838.22 -> which is that Detective now is
able to bring in information
1841.67 -> from new sources such as
Security Hub findings,
1845.622 -> as well as now supports all
1848.84 -> of our Amazon Security finding
format related findings,
1853.79 -> which increases the number of entities
1856.16 -> in that behavioral graph
1857.6 -> and now provides much richer context
1859.85 -> and correlation to customers.
1862.19 -> Also over the time we've added detections
1864.92 -> and the ability to investigate
events for RDS, Lambda,
1869.6 -> and EKS runtime monitoring findings
1871.94 -> from GuardDuty in Detective as well.
1875.3 -> One of the other features
that was recently announced
1877.97 -> in Detective is the finding
groups and visualizations.
1882.227 -> Although customers could actually go in
1884.72 -> and traverse that behavioral graph
1887.27 -> with regards to API activity.
1889.52 -> But we've also now created
a visual graph interface
1892.7 -> that provides that correlation element
1895.28 -> in a visual element so that
you can reduce the time
1898.46 -> further on the correlation elements,
1900.74 -> either starting from a
finding or an incident
1903.89 -> or starting from a resource or an entity,
1907.25 -> for example, an IP address, et cetera.
1910.82 -> So let's switch over and
see how this looks like
1912.92 -> in the console.
1914.96 -> So this is the Detective console
1916.82 -> and on the summary page itself now
1918.71 -> we have this findings group.
1920.63 -> The findings group is actually our way
1923 -> of aggregating these
findings automatically
1925.578 -> on the techniques, tactics,
and procedures level.
1929.45 -> This is all mapped to the
Mitre attack framework.
1933.05 -> So it tells you actually
what were the tactics
1935.51 -> that were taken, what is the path of,
1937.563 -> all the way from initial
access to exfiltration
1941.81 -> for that particular resource
1944.18 -> that is this finding group here.
1945.89 -> And then down below here
is the visualization
1949.43 -> of that finding group as well.
1952.07 -> So here you can actually
select one of these,
1955.19 -> the legend shows you
what all this stands for.
1958.43 -> So these are GuardDuty findings,
1960.08 -> which you can start and
initiate your journey from
1963.05 -> for incident response
1964.059 -> or you can go to impacted resources
1966.65 -> like the instance to view the instance ID.
1970.1 -> But more importantly,
1971.51 -> when you go to viewing the details here,
1975.35 -> it'll show you what are
the involved entities.
1978.17 -> So these involved entities
could be IP address,
1980.69 -> could be instance IDs,
or could be resource IDs.
1984.26 -> And we are showing you
here from this IP address,
1987.26 -> we observed all these threat tactics
1989.491 -> that have been reported.
1991.52 -> So all that information
is easily aggregated.
1993.792 -> Also, you can further dive and drill down
1997.13 -> into the details related
to involved findings,
2000.4 -> which mean what are the known findings
2002.41 -> that have already been
reported for this resource.
2004.63 -> And here you can see like I
have multiple known findings
2008.71 -> already reported for this instance.
2010.715 -> And from those multiple IP addresses.
2014.26 -> From here, you can actually continue
2015.82 -> to traverse your journey if you click
2017.38 -> on one of these entities
2018.64 -> like this instance ID for instance,
2020.71 -> you can see when was this instance created
2023.32 -> by who was it created,
2024.97 -> what role was assumed
to create this instance?
2029.29 -> And then here again,
2030.22 -> we are showing you all the
findings that are reported now
2032.95 -> by, not only by GuardDuty,
2034.45 -> but also by other security tools
2036.328 -> that Detective integrates with.
2039.13 -> And then what are all
the different findings
2040.99 -> that are related to that?
2042.76 -> And you can continue to
further drill down into this
2046.66 -> by looking at things like
2048.1 -> what new behavior was
observed for this instance
2051.395 -> from either geolocation or API activity.
2055.176 -> And in this case, what
all Kubernetes activity,
2057.91 -> since we are bringing in the
EKS information as well now
2061.12 -> with the container pods.
2062.74 -> The other thing you can do
is you can easily change
2064.81 -> the scope time.
2066.607 -> As I mentioned, you can go back
2067.44 -> as long as 12 months because
once Detective is enabled,
2071.05 -> it's collecting all that
information and correlating that.
2074.98 -> Detective is actually one
of our very few services
2078.07 -> which is natively all available
2080.68 -> from a user experience
standpoint within the console.
2083.65 -> That means you can actually
traverse this graph
2085.9 -> and you can look at the behavioral graph
2087.58 -> and dive down into the findings detail
2089.98 -> using the console without going,
2091.9 -> without having to go out
of the console at all.
2097.12 -> So with that I'll hand it over to Ryan
2099.01 -> for the next detection service.
2100.39 -> - Thank you.
2102.397 -> So the next service that
we're talking about is
2104.11 -> for managing vulnerabilities.
2106 -> So generally speaking,
2106.84 -> we think about vulnerabilities
in the context of,
2108.317 -> you know, software vulnerabilities.
2110.8 -> And our service that addresses
this is Amazon Inspector.
2115.09 -> So this is an automated
vulnerability assessment.
2117.22 -> So it's a lot different
2118.6 -> than a traditional
vulnerability assessment
2120.34 -> where you have to schedule
scans and things like that.
2122.79 -> It is run automatically
2124.45 -> and it's run almost continuously.
2126.88 -> We leveraged the systems manager agent
2129.1 -> in order to collect
information about the packages
2131.77 -> that are on the EC2 instance.
2133.99 -> Recently we extended that
too to do deep scanning.
2136.6 -> So previously it would
look at the EC2 instance
2139.6 -> and it would look at the package managers
2141.37 -> to understand what software was installed.
2143.26 -> Now we can actually go
scan the volumes themselves
2145.51 -> and understand if there's
other pieces of software
2147.7 -> that were installed outside
of the package manager itself.
2151.12 -> It also has a direct integration
2153.04 -> with the Elastic Container Registry.
2154.93 -> So there's nothing, there's no agents
2156.43 -> or nothing involved to scan the ECR.
2158.17 -> If you turn on ECR scanning,
2159.656 -> we will automatically start scanning
2161.38 -> all of the ECR repos
across your organization
2164.11 -> and identify vulnerabilities
that are there.
2166.84 -> At re:Invent last year,
2168.1 -> we announced support
for AWS Lambda as well.
2170.38 -> So Lambda, especially with Lambda layers
2172.24 -> that we could already
scan some of the packages
2175.3 -> if they were in ECR Repos,
2178.96 -> but with the standard scanning now
2180.25 -> we can also scan the code that you push
2182.56 -> up into the function itself.
2184.36 -> So what we had launched last year
2186.04 -> at re:Invent was the standard scanning.
2187.63 -> So we're looking at the
package dependencies
2189.79 -> that are within the
functions code definition,
2193.03 -> looking for CVEs.
2194.62 -> What we announced yesterday
2196.57 -> at our keynote was the code scanning.
2198.52 -> So this is really cool,
it's an integration
2200.65 -> we worked with CodeGuru
on to actually scan
2204.73 -> the source code itself and
look for vulnerabilities
2208.48 -> like injection flaws or data
leaks, weak cryptography,
2212.14 -> other best practice misses
that can be identified
2214.89 -> in the source code to
raise findings about that,
2218.8 -> that aren't necessarily
packaged vulnerabilities.
2220.51 -> It's more a software
development vulnerability.
2224.29 -> And for both of these,
2225.25 -> it happens again automatically.
2226.6 -> So once this is turned on,
2228.19 -> we scan all of your functions.
2229.87 -> If somebody updates the function
or creates a new function,
2232.36 -> they're automatically
scanned at that time as well.
2236.35 -> So these have to be enabled.
2237.58 -> And again, like with GuardDuty
as we were showing you,
2239.89 -> you have the ability to manage
2242.181 -> all of these features and functionality,
2244.441 -> not just for a single account,
2246.34 -> but across your organization.
2248.056 -> And for Lambda, you can
choose whether or not
2250.24 -> you want just the package level scanning,
2252.31 -> the standard scanning,
2253.3 -> or if you want us to do the
code level scanning as well.
2255.91 -> And again, you can do that
at the organization level
2258.13 -> or on individual accounts as well.
2261.04 -> So I'll show you the
findings in the console here
2262.75 -> in a minute with more detail.
2264.28 -> But as you can see,
2265.36 -> you get a lot of context
about these findings.
2267.46 -> What is the package,
2268.6 -> what is the required update
2270.07 -> in order to fix that vulnerability?
2273.58 -> And then the other ones
2274.87 -> that are really important
is exploit availability.
2277.09 -> So this really helps when it comes to
2279.088 -> looking at prioritizing
which of vulnerabilities
2282.22 -> maybe you wanna start with.
2283.27 -> Right, there can often be more work to do
2286.45 -> than you have time to complete,
2287.83 -> especially when it comes to
vulnerability management.
2289.78 -> So we try to help give you clues
2291.37 -> as to which ones you
might want to prioritize.
2294.04 -> And then the code scanning
2295.42 -> as you can see over there as well,
2296.74 -> will show you the exact line of code
2298.801 -> that needs to be addressed
2300.4 -> and a recommended suggested fix
2302.83 -> for that line of code.
2304.12 -> So it really helps identify
2306.37 -> these vulnerabilities in your code.
2308.74 -> The other thing that we
launched for Inspector yesterday
2312.07 -> is the Software Bill of Materials.
2313.57 -> So we're scanning all of your instances,
2315.79 -> we're scanning all of
your Lambda functions
2317.47 -> and your ACR Repos.
2318.73 -> We're looking for vulnerabilities,
2320.23 -> but we can also then collect
very rich information
2323.05 -> about what you have installed across
2325.09 -> to your entire compute landscape.
2327.19 -> This can be very useful if you know,
2329.02 -> you suddenly wanted to know, hey,
2330.43 -> do we have a particular
version of a piece of software
2333.13 -> running anywhere in my environment?
2335.02 -> Well, software bill materials
will help you do that.
2337.21 -> We support two of the most common
2339.97 -> industry supported formats.
2341.62 -> So CycloneDX and SPDX.
2343.709 -> This is a free service,
2345.61 -> so you export this directly to S3.
2348.7 -> It'll put the S3 bucket and
then you can run Athena queries.
2351.16 -> You can use QuickSight to visualize it.
2352.96 -> You can run your own
tools against the data
2354.58 -> if you wish as well.
2355.627 -> And this again will help you understand
2358.33 -> exactly what software you have
2359.71 -> and if there's any vulnerabilities
2361.21 -> identified for those packages,
2363.22 -> will include that as well
in the Bill of Materials
2366.82 -> that gets written out.
2368.98 -> I'll just show you what
some of the looks like here.
2371.35 -> So again, on the Inspector console,
2373.845 -> we have a summary page that gives you
2376.3 -> at first an understanding
2377.38 -> of how your environment is coverage looks.
2380.05 -> So how many of your
accounts have it enabled,
2382.451 -> how many instances you don't have
2384.664 -> the Inspector reporting on.
2387.1 -> So like if you don't have
the SSM agent active,
2389.8 -> then you'll have instances
that aren't covered.
2391.78 -> Same for your ECR repositories
and Lambda functions.
2395.11 -> We highlight what your most
critical findings are up top.
2397.27 -> So again, give you a
way to help prioritize
2399.383 -> and put focus where you
need to start first.
2402.53 -> And we do some risk-based remediation.
2405.19 -> So these are vulnerabilities
that are impacting
2407.95 -> lots of different resources
within your environment
2410.59 -> and then are either high or critical
2412.3 -> from a vulnerability standpoint.
2413.98 -> Again, just to help focus people
2415.69 -> on where you might wanna start.
2418.24 -> And then again,
2419.073 -> will show you the top
findings by ECR repo,
2423.19 -> by instances, by AMIs.
2425.71 -> So if you're using common
images across your environment
2428.62 -> and you're using auto scaling for example,
2430.33 -> you might have a large number of instances
2431.95 -> that have the same vulnerability,
2433.36 -> but it's path to fixing that
2434.71 -> is probably in an image somewhere.
2436.18 -> So, knowing which AMIs you
might want to go update
2439.21 -> and re-spin is a very useful
way of tackling those.
2442.66 -> And then again, for your Lambda functions,
2444.73 -> so I'll take a look at
a couple of these here.
2446.68 -> So I can look at these Lambda functions
2449.59 -> and you can see the
vulnerability that's on there.
2451.9 -> And again, we will tell you whether or not
2453.67 -> there's a fix for it,
2454.57 -> and also if we've seen it
being exploited in the wild.
2458.98 -> And also when the last time
2460.51 -> we saw it publicly being exploited.
2462.82 -> Again, all very useful for
understanding what it is,
2465.34 -> which of the vulnerabilities
2466.72 -> you might want to go address
in your environment first,
2469.24 -> and then the remediation step.
2470.95 -> So what version do you need to run
2472.69 -> versus what version are you running
2474.07 -> in order to be not vulnerable anymore?
2476.77 -> Links to external data
sources for the CVE itself.
2479.963 -> And then all the information
2482.14 -> that you need about that function.
2483.58 -> So the context of where that lives,
2485.11 -> what account it lives in,
what the function ARN is,
2488.11 -> the runtime that was used.
2490.78 -> So what type of code,
that's Python for example.
2493.15 -> And then any of the tag data
that's associated with it.
2497.38 -> And then similarly on the
code scanning as I mentioned,
2501.07 -> this is where we're gonna
look at the actual source code
2503.38 -> that's uploaded into the Lambda function.
2506.574 -> Show you what was found.
2508.75 -> So this was a CWE, and in this case,
2512.05 -> I'm binding a socket to
any IP address, right?
2515.74 -> So that means basically
anyone can come along
2517.93 -> and it will accept a connection from that.
2520.15 -> And then it gives you the recommendation
2521.62 -> on how you should go about fixing that,
2523.54 -> highlighting the exact line of code
2525.61 -> where that particular software
vulnerability was identified.
2528.55 -> And then again, all the context
about the function itself.
2533.77 -> - From these detection services,
2535.57 -> you can see that as the
findings are generated
2537.736 -> once they're available in the console,
2540.52 -> they're also available
through the EventBridge,
2542.718 -> EventBus queue to orchestrate them
2545.62 -> and aggregate them in
downstream automation.
2548.86 -> More importantly, they all are
aggregated in Security Hub.
2553.18 -> So Security Hub is our
centralized monitoring service
2556.45 -> that is bringing in findings
2559.54 -> from native AWS Security Services
2562.39 -> as well as partner integrated tools.
2564.61 -> So you can actually have one place
2566.59 -> to aggregate all these findings.
2568.75 -> Additionally, Security Hub
normalizes these findings
2571.15 -> into Amazon security finding format,
2573.94 -> which as I mentioned earlier,
2575.02 -> then Detective leverages to correlate
2577.33 -> that information easily as well.
2580.3 -> More importantly, what
Security Hub is doing
2582.4 -> is helping customers stay secure
2585.01 -> by providing an overarching
view of controls
2588.28 -> that are being evaluated.
2589.93 -> So Security Hub uses
2591.409 -> at the foundation AWS configure recorder
2594.49 -> to continuously monitor new workloads,
2597.52 -> new controls that are
implemented automatically,
2600.97 -> and then help customers
understand that risk
2604.99 -> or evaluate those controls
on built-in standards.
2608.47 -> So some of the standards
that are already available
2610.54 -> in the service are things
2612.22 -> like the AWS foundational
security best practices,
2615.13 -> which is our collection of these controls
2618.25 -> telling customers where they can go
2620.11 -> and address some of the security gaps.
2623.08 -> Additionally, we will also
launch a NIST standard now
2625.96 -> that's available based
on customer feedback.
2628.54 -> And then the CIS benchmarks
have been updated
2631.51 -> to the latest version based on
2633.55 -> the new controls and definitions.
2635.582 -> Additionally, Security Hub also integrates
2638.2 -> with Control Tower,
which is our governance
2640.603 -> and baselining service
that helps customers
2643.195 -> define now either preventative
or detective controls.
2647.83 -> So those evaluations and those findings
2650.14 -> can also be integrated into Security Hub.
2653.74 -> Using all these findings,
2655.24 -> customers can then automatically
orchestrate operations
2659.2 -> that could be either as
simple as defining workflows
2662.62 -> for ticketing and/or using
chat based operations,
2666.7 -> sending it to the incident response teams,
2668.846 -> and taking event-based actions
2672.97 -> by integrating them with
either step functions
2675.25 -> or Lambdas or defining CloudWatch,
2678.01 -> custom CloudWatch actions
that can then take
2680.59 -> collective response actions as well.
2684.01 -> Customers and we have published
GitHub library of, you know,
2688.75 -> these runbooks and playbooks
that actually customers
2691.36 -> can easily import and also
add them to the workflow
2694.72 -> within Security Hub's interface
to take those actions.
2699.91 -> Most recently we've added a new feature
2702.22 -> that was just announced yesterday,
2703.57 -> which is the Automation Rules
in Security Hub as well.
2706.39 -> Oftentimes, you know,
customers will receive findings
2709.127 -> which they would want to go
2711.46 -> and change the attributes on conditions on
2713.98 -> before they are routed
downstream for taking actions.
2717.43 -> So that's where now Security
Hub allows customers
2720.43 -> to create those automation rules as well.
2722.89 -> And then they can also see the history
2725.11 -> of what changed in those findings.
2728.23 -> So Security Hub is essentially focused on
2731.2 -> providing not only their risk view,
2733.54 -> but also helping customers
to orchestrate a response
2736.9 -> and remediation across
their full AWS workload.
2741.422 -> And then it allows customers to either
2743.89 -> leverage custom CloudWatch actions
2745.99 -> for that automated response
2747.58 -> or leverage built-in
native partner integrations
2750.94 -> to either SIM and/or SOAR platforms
2754 -> or XDR platforms where you
can send these findings.
2757.262 -> And this is again to help
customers easily integrate
2760.9 -> with existing workflows
2762.52 -> so that you can enable the
incident response teams.
2767.05 -> Going back to the console
here for Security Hub.
2771.298 -> On the summary page of Security Hub,
2773.53 -> you can see all the
standards that are enabled
2777.16 -> and then a high level aggregated view
2779.5 -> of the risk posture
across those standards.
2782.8 -> Additionally, we'll give
you more information
2784.87 -> around what regions these findings
2787.42 -> are getting aggregated from.
2788.8 -> Security Hub is actually
one of our other services
2791.2 -> where not only are we bringing information
2793.42 -> from multiple accounts,
2795.19 -> but also multiple regions as well.
2797.05 -> So since AWS organizations
is a regional construct,
2800.74 -> we've enabled a cross-regional aggregation
2803.41 -> of these findings so
that there's one place
2805.87 -> to view that across all regions as well.
2808.6 -> Additionally, customers
can create insights
2810.771 -> which could be useful
for their security teams
2813.7 -> based on either a resource type
2815.32 -> or based on a workload type.
2818.32 -> From here, you can
either dive into controls
2821.53 -> or go into a specific standard
2824.11 -> and you can view what are
all the different findings
2828.37 -> and what exactly are the controls
2830.446 -> that are evaluated as passed or fail.
2834.19 -> These are all automatically ordered
2837.28 -> in the order of severity.
2838.75 -> So from here you can see like, you know,
2840.43 -> I have a user, a root user,
who does not have MFA.
2844.12 -> Again, a critical finding.
2845.56 -> And then you can actually
dive into these findings
2848.11 -> from here based on either
filter them by resource.
2852.25 -> So if you just wanna look
at your failed findings
2855.18 -> and from here dive deeper in,
2857.355 -> you can actually click in
on this finding as well
2860.89 -> and look at, you know,
2862.09 -> what are the controls that were failing.
2864.67 -> And then from here you can dive
2866.11 -> into the finding itself as well.
2868.45 -> Also, all the findings are available
2870.603 -> in one single view here as well.
2874.18 -> So you can see here the finding detail.
2877.6 -> These are all organized
2879.07 -> in the Amazon security finding format
2881.35 -> and most recently we've
actually included a feature
2884.41 -> where you can not only see
the details of the finding,
2887.23 -> but you can also view the
history of the finding as well,
2890.41 -> which is how has this finding, you know,
2893.77 -> manifested itself and
then what are the changes
2895.84 -> that have been happening.
2897.22 -> So here you can actually see
2899.23 -> one of the new features that
was announced yesterday,
2901.24 -> which is automation rules.
2903.677 -> This finding has been changed and edited
2906.4 -> or evaluated by that automation rule.
2908.86 -> So automation rules is a
way of helping customers
2912.01 -> define their own custom actions
2914.657 -> that they want to take on these attributes
2918.958 -> before these findings are then either sent
2921.94 -> to the incident response
team and/or downstream tools.
2925.39 -> So things like, you know,
2926.44 -> changing the severity of the finding
2928.428 -> based on certain either
product that it came from
2933.34 -> or the resource that it came from,
2935.32 -> or elevating that finding.
2937.03 -> And also enriching that finding
2938.56 -> with security defined information.
2940.18 -> So here you can see what was
the rule that was defined,
2943.419 -> giving it a name to enrich that finding,
2946.15 -> and then also the criteria that was used,
2948.67 -> in this case, the product name.
2950.95 -> And then what automated
action is being used,
2953.753 -> in this case to be tagged
2956.303 -> so that once it's received by
the incident response team,
2960.58 -> they have this additional
enrichment that they can use.
2963.55 -> So these automation rules
should help customers define
2967.038 -> or add more context to these findings
2969.73 -> before they're sent to this.
2972.76 -> Moving forward, we wanted
to also help customers
2975.76 -> centralize the management of security data
2978.37 -> for all your workloads
across your enterprise.
2981.16 -> So not only just AWS workloads,
2983.29 -> and not only just findings,
2984.58 -> but also the log information,
2986.5 -> which is often required
by the security teams.
2989.59 -> So last year at re:Invent,
2992.08 -> we announced a service
Amazon Security Lake,
2994.9 -> which is now generally
available as of last week.
2997.599 -> Security Lake helps customers
3000.03 -> centralize all the log information,
3002.387 -> not only from AWS native
logs and workloads,
3005.94 -> but also non AWS logs,
3008.758 -> either from on-premise applications
3011.31 -> or SaaS applications or other
cloud providers as well.
3015.48 -> Easily aggregate that and centralize that
3017.94 -> and optimize all that information
3019.86 -> in a standard format called
3021.75 -> the Open Cybersecurity Schema Framework.
3024.45 -> That's an initiative that
Amazon actually partnered
3026.7 -> with industrial leaders
3028.44 -> and then it's an open standard schema
3030.33 -> or our way of democratizing
the finding format
3033.6 -> for all the tools that
are generating findings.
3037.95 -> Once it's normalized,
3039.15 -> then it's available for analysis
3040.86 -> that customers can integrate
3042.6 -> with multiple different analytic tools.
3044.61 -> So whether it's a SIM tool
that you might be using
3046.98 -> or a Soil tool.
3049.05 -> One of the common objections
3050.16 -> we heard from customers was that
3052.2 -> they often didn't have control
over their security data
3055.83 -> to either enrich that or they
were spending too much cost
3059.64 -> on either ingress or egress
of that data to other tools.
3064.59 -> So the way this service works
is that at the center of it,
3068.79 -> once it's enabled at the account level,
3071.94 -> it can automatically create
3074.31 -> a centralized S3 lake formation bucket.
3077.04 -> It can be integrated
with AWS organizations
3081.69 -> for centralized management
3083.228 -> and aggregation across multiple accounts.
3086.49 -> And automatically the AWS log sources
3089.25 -> that are today integrated are all
3091.677 -> the API activity from CloudTrail,
3094.14 -> network activity from flow logs,
3096.21 -> and also data plane
events from S3 and Lambda
3099.24 -> and the security findings
from Security Hub.
3101.91 -> So all that information
3103.14 -> is actually automatically integrated,
3104.91 -> which means customers do not have to go
3106.95 -> and exclusively enable
any of these log sources.
3110.73 -> In addition to that,
3111.671 -> our partners and other solution providers
3114.93 -> have built integrations that can bring in
3117.9 -> their log information as well.
3119.97 -> So whether it's from, you know,
3121.44 -> endpoint telemetry or whether
it's from SaaS applications
3125.13 -> like firewall, gateway providers,
3127.44 -> and/or identity providers, et cetera,
3129.723 -> all that log information
can also be integrated
3132.87 -> into that centralized S3
lake formation bucket.
3136.32 -> And then we also have
options for customers
3138.6 -> to add their own custom sources.
3140.73 -> So either you might have existing data
3142.77 -> that your security team is using,
3144.54 -> or in the future you might wanna bring in
3146.67 -> not only your corporate workforce data,
3148.86 -> but consumer logs as well.
3150.51 -> So there are options to
bring in that data as well.
3153.45 -> For the AWS log sources,
3155.7 -> we will automatically
normalize that into OCSF,
3158.76 -> and then our partners are
integrating and you know,
3162.21 -> providing integrations to bring in
3163.89 -> their logs in OCSF format as well.
3167.04 -> Also, in the center of the service,
3168.72 -> you can actually set up
the lifecycle management,
3171.06 -> which means you can define
3172.59 -> what you want to do with that data
3174.51 -> and who should use that data
and how they should use it.
3178.26 -> For example, security
teams might need, you know,
3181.14 -> 30 days worth of data or
three months worth of data
3184.38 -> for active analytics.
3186 -> So you can keep that in hot storage
3188.07 -> and the rest can be stored
3189.75 -> for longer term retention in cold storage.
3192.78 -> So those are configurations
that you can define easily.
3196.339 -> All the data is then
automatically standardized schema
3200.37 -> as well as directory structure,
3201.87 -> so you can actually go in
and per region or per account
3205.41 -> traverse the data all the way
down to the parque objects,
3208.71 -> which is automatically done.
3210.3 -> So as I mentioned,
3211.29 -> once you enable the
service in your account,
3214.2 -> we do all the operationalization
in the backend
3216.54 -> so that you don't have to
create multiple S3 buckets
3219.21 -> and you don't have to run
glue tables or Lambdas.
3222.18 -> That is all automatically done
3223.95 -> and the information from the AWS logs
3225.9 -> is brought automatically in.
3228.39 -> What you see on the right
hand side is the flexibility
3230.46 -> of what you can do with that data.
3232.23 -> There are two ways that
data can be accessed.
3234.48 -> The first one is direct S3 access,
3236.76 -> where you can stream S3
objects to an integrated tool.
3241.11 -> Or the second one is
in place query access,
3243.6 -> which means you don't have
to move the data anywhere
3246.06 -> because we are supporting virtual indexing
3248.19 -> and virtual querying in the service,
3250.59 -> you can actually query the
data from where it is as well.
3253.95 -> So using native AWS
analytic tools like Athena,
3257.28 -> you can actually run standard SQL queries
3259.29 -> because all the data is now transformed
3262.11 -> in a standard schema.
3263.79 -> So you're no longer
writing complex queries
3266.34 -> to look for IP address, for example,
3268.44 -> which might be different
in format for AWS logs
3271.53 -> versus a firewall log.
3273.42 -> All of that is automatically
normalized and ETL into OCSF.
3278.82 -> That helps reduce quarry times,
3281.124 -> that helps reduce the time to respond,
3283.86 -> and create much more richer
analytics downstream.
3287.13 -> Also, customers can leverage
tools like OpenSearch,
3289.68 -> QuickSight, Kibana, et cetera,
3291.3 -> to build their own custom dashboards
3293.34 -> and use native integrations
with tools like,
3296.513 -> you know, Splunk or QRadar, et cetera.
3300.12 -> So there's a list of variety of partners
3302.52 -> that are already available
3303.69 -> both as sources as well as
subscribers in the service.
3307.86 -> So we hope customers will leverage
3309.12 -> this service to orchestrate
3311.19 -> and easily manage all the data
3313.86 -> that's needed for security analytics.
3315.9 -> And this will actually give
them control of their data
3319.02 -> as well as easily allow to aggregate
3321.63 -> and centralize that data
for their security teams.
3325.199 -> So to summarize,
3326.46 -> all of our security services
are here to help customers
3329.28 -> protect their workloads.
3330.75 -> One of the key aspects of protection
3332.94 -> is to first be able to
detect some of the elements.
3336.759 -> So security tools that
are natively available
3339.57 -> in AWS are integrated with AWS workloads
3342.81 -> that eliminate the need
of any operationalization.
3345.45 -> It also helps reduce the
burden from the security team
3348.586 -> by allowing them to
easily centrally manage
3351.69 -> all these security services,
3353.19 -> easily enable these services as well.
3355.47 -> And then finally, to allow for scale
3358.359 -> and then centralized
management of security data,
3361.53 -> we now have a service
that can allow customers
3363.63 -> to do that as well.
3365.52 -> Like I said, most of these services
3366.96 -> can be deployed at a single click,
3369.27 -> so there's no additional log enablement
3371.22 -> or operationalization required.
3373.911 -> So with that, thanks for your time
3375.66 -> and thanks for joining.
3377.04 -> Please take the session survey
3378.39 -> and appreciate you joining us today.
3380.25 -> Thank you.
Source: https://www.youtube.com/watch?v=t22IzUgPq78