Interested in learning how YOU can build more securely on AWS? Join AWS Security for two full days of security and compliance sessions and hands-on workshops led by our security experts at the NY Loft.
We'll open Monday with Simple Steps to Security Success and an overview of AWS Security Services featuring Amazon GuardDuty, AWS Security Hub, Amazon Inspector, and Amazon Detective followed by two hands-on workshops. Tuesday will open with a session on how to centralize risk based insights and a session to help customers define a measurable approach to assess their AWS Identity and Access Management (IAM) posture. Afternoon sessions will feature services like AWS Control Tower, AWS Organizations, and AWS CloudHSM.
We will end Tuesday with a Security After Hours event - which will include a customer session delivered by Comcast and a networking reception in partnership with AWS NY Meetup. Registration is open!
Business leaders from all size companies, technical founders, and developers who are eager to learn about AWS security services. Development teams, engineers, architects, and system administrators from startups looking for sessions and hands-on experience deploying secure and compliant workloads on AWS. Most content is geared toward those new to AWS or in the early stages of adoption. Session levels range from 200-300. More information on session levels here.
Please bring your laptop to participate in workshops, and make sure you have an active AWS account that you've logged into within one week of the event start date.
Security After Hours Event
Amazon Web [Security] Services enables every organization to have enterprise-grade security. You don’t need a dedicated cloud security team to have security in the cloud and having a high-security bar does not mean your teams have to slow down. This session will take you through patterns you can implement today to raise your security posture without needing to hire additional staff or break the bank. This session will also demonstrate how AWS Organizations can be leveraged to add guardrails to your AWS usage in addition to the steps needed to set up a secure data bunker.
Attendees are expected to have an understanding of the AWS shared responsibility model (https://aws.amazon.com/compliance/shared-responsibility-model/).
Level: 100
AWS Security Services Overview - Amazon GuardDuty, AWS Security Hub, Amazon Detective, and Amazon Inspector
Amazon GuardDuty and AWS Security Hub in tandem provide continuous visibility, compliance, and detection of threats for AWS accounts and workloads. Amazon GuardDuty enables customers to achieve continuous security monitoring to detect threats in the cloud. AWS Security Hub enables customers to continuously monitor their environment using automated compliance checks based on AWS best practices and industry standards. In this session, we introduce you to Amazon GuardDuty and AWS Security Hub and walk you through the detection of an event; aggregation; prioritization of security findings; and the identification of possible remediation actions and other responses.
Amazon Detective makes it easy to investigate, analyze, and quickly identify the root cause of potential security issues or suspicious activities. Amazon Detective automatically collects log data from your AWS resources and uses machine learning, statistical analysis, and graph theory to help you visualize and conduct faster and more efficient security investigations. Amazon Detective is integrated with AWS security services such as Amazon GuardDuty and AWS Security Hub as well as AWS partner security products.
Level: 100
This session covers implementation of custom actions in AWS Security Hub as well as automated remediations based on events and findings within AWS Security Hub, using Cloud Custodian to implement the remediations.
Level: 300
In this session, we will discuss security best practices followed by a hands on workshop for securing container images. You will learn to scan a container image using an automated vulnerability assessment feature available in the newly launched Amazon Elastic Container Registry (ECR). All of these would be automated through a CI/CD pipeline.
Level: 300
Using the Center for Information Security (CIS) AWS Foundations Standard and AWS Security Hub to Gain Risk-Based Insights
The Center for Internet Security (CIS) AWS Foundations Standard represents a set of best practices for securing your AWS accounts. Native integration of this standard with AWS Security Hub provides you a centralized view of your risk-based findings, whether you have one or one thousand AWS accounts.
Level: 200
In this session, we cover a set of IAM Permissions Guardrails that help customers define a measurable approach to assess their IAM posture. We want to encourage application teams to create secure policies starting in lower environments. Also, we want to reduce the blast radius due to accidental oversight and improve defense in depth, rather than relying on a single service control policy.
We walk through how customers can immediately utilize tools such as AWS Config and cfn-guard to define guardrails around usage of IAM Permissions.
Level: 300
Whether it is per business unit or per application, many AWS customers use multiple accounts to meet their infrastructure isolation, separation of duties, and billing requirements. In this session, we cover considerations, limitations, and security patterns when building a multi-account strategy. We explore topics such as thought pattern, identity federation, cross-account roles, consolidated logging, and account governance. We conclude by presenting an enterprise-ready landing-zone framework and providing the background needed to implement an AWS Landing Zone using AWS Control Tower and AWS Organizations.
Level: 300
Customers often get started in AWS without much thought of consistent security practices. What happens, then, when the barn door is open and the customer sees lots of accounts building and migrating workloads to AWS without basic security boundaries in place? Join us this evening to hear about some basic IAM features that can help put those boundaries in place, even *after* you've seen lots of accounts spring up in your organization. Then hear about how Comcast did this with hundreds of accounts, all while not disrupting developers and operations.
Register here: https://securityafterhours.splashthat.com/