Cyber Defense Advisors

Security Announcements at AWS re:Invent 2022

Some thoughts on security announcements to date at AWS re:Invent

More posts on AWS Security

Watching Werner Vogel’s Keynote

In this post I’m just compiling some of the security announcements at AWS re:Invent. I’ll have to go back and take a look at them more in detail later as, unfortunately and fortunately, someone hired me to teach a class during re:Invent.

Not sure when I will get out to speak at a large conference again but I try to keep tabs on what people are talking about based on the information I find online. These days I tend to prioritize what drives business and makes money to be honest, as I’m traveling less. But I miss seeing friends at re:Invent very much!

Here’s my initial reaction to the announcements but again, without all the details and it is a woman’s prerogative to change her mind. 🙂

VPN-less Secure Network Access to Corporate Applications

Many solutions are taking different approaches to remote access. There are a lot of solutions trying to connect people at the application layer, rather than the network layer in the OSI model. Some are interesting, others not so much. Without diving into the solution here is what you want to ask:

If someone obtains your credentials or an active session, can they use it from an alternate network location to get to the host where you ultimately are logged into and working? If so, it is an identity solution, not a network solution.Does the encryption used to connect to the remote host encrypt all network traffic to the remote host or only traffic on a particular protocol? As I’ve written about before some VPNs are better than others in that regard (SSL vs. IPSEC).Does the solution allow you to inspect all network traffic — accepted, rejected, or failed — on all ports between the remote host and the target endpoint?Can you see full packets? Some attacks below the application layer in the OSI Model may not be visible if you can’t see all those network packet details as I have explained in other posts.When someone connects to the remote endpoint, is that remote endpoint accessible via the Internet to others? When you connect to a VPN, the VPN endpoint is exposed, but no hosts within the network if you are not connected to the VPN. I once performed a penetration test where one of the objectives was to see if the bastion host was vulnerable. I essentially reverse engineered the fact that the bastion host was behind a VPN so the only way it would be vulnerable is if I could first break through the VPN. That’s what a VPN does for you. When hosts are exposed directly to the Internet with no layer between they are open to direct attack from the Internet.Can you manage all the access from one point or do you have to manage each and every host exposed to the Internet for remote access individually? If you cannot manage them centrally then you’ve exponentially increased management and risk. Errors and misconfigurations represented 13% of security incidents on the 2022 Verizon Data Breach Report so you want to reduce the chance of misconfiguration by reducing what you have to manage. A VPN does that (and so does the automation I wrote about here for per-user instances that use a single script for deployment to a certain extent — there are pros and cons to that approach vs. VPN but better than exposing every host to the Internet). I presume this new service is a centralized solution but I haven’t looked into it.

If this new solution meets all of the above criteria then it may be a VPN replacement. Most of the time when companies advertise a solution as a VPN replacement they aren’t really, but maybe Amazon has cracked that nut with this new service.

In terms of the new application-based security approaches one interesting thing about them is that when someone connects to an application, they can’t “scan the network” in the traditional sense with a tool like nmap. I haven’t inspected this yet to see if it is that type of solution or something else.

AWS Verified Access Preview – VPN-less Secure Network Access to Corporate Applications | Amazon Web Services

VPC Lattice

This looks very interesting if it can help to set up a zero-trust network for service to service communication. I’ve been writing about serverless networking in my latest blog series on automating cybersecurity metrics and this service may help. I’ll have to check it out. For people who are just getting started building applications , serverless is easier than all the configuration you need to do to set up Kubernetes or even EC2. The related networking, not so much. Maybe this will help.

Again, you’ll want to verify that it meets the same network requirements as the VPN above to determine if it is truly a network solution, or an identity solution.

Introducing VPC Lattice – Simplify Networking for Service-to-Service Communication (Preview) | Amazon Web Services

AWS KMS External Key Store

This service looks great for organizations that need to host keys on premises but want to integrate with KMS. Sometimes customers want to control their own key or they need the key to be accessible in a private network and on AWS (though I wouldn’t be too excited about latency potentially in that case). This may help some larger organizations with compliance restrictions or high-security needs.

Announcing AWS KMS External Key Store (XKS) | Amazon Web Services

AWS Inspector — Lambda Vulnerability Scanning

Awesome. You’ll need to take a look at the particular programming languages and vulnerabilities it finds but this is great news! I’ll definitely be trying it out.

Amazon Inspector Now Scans AWS Lambda Functions for Vulnerabilities | Amazon Web Services

Automated Data Discovery for Macie

Macie wants to help you find where automated data exists where you might not be aware in S3 buckets. As with data exfiltration tools I presume it will need to be monitored and tuned for false positives. Data exfiltration and identifying sensitive data is always challenging. I often have Burp identifying random strings as credit cards, for example, on penetration tests that are not really credit cards. Be prepared to invest the resources to manage this tool but it should be able to help you find your sensitive data and lock it down.

Automated Data Discovery for Amazon Macie | Amazon Web Services

Amazon Verified Permissions

Amazon calls this new feature:

a scalable, fine-grained permissions management and authorization service for custom applications

If it’s what I think it is I once wrote something like this. We had a central automation service that read in configuration files and allowed or disallowed actions based on configuration files written by developers. The developers didn’t have to write the code to authorize actions but rather define the allowed actions for a particular user type.

It also sounds similar to Open Policy Agent (OPA) which came out later and is a concept I really like. I’ll have to try it out to see if it is what it sounds like.

AWS announces Amazon Verified Permissions (Preview)

Automated in-AWS Failback for AWS Elastic Disaster Recovery

This new feature looks interesting. Will have to see if it helps with Ransomware.

Automated in-AWS Failback for AWS Elastic Disaster Recovery | Amazon Web Services

Backup for CloudFormation Stacks

This also looks pretty interesting. Looking forward to trying it out.

New for AWS Backup – Protect and Restore Your CloudFormation Stacks | Amazon Web Services

Redshift Backup

Helpful for those using Redshift to restore when needed.

New – Amazon Redshift Support in AWS Backup | Amazon Web Services

New — Failover Controls for Amazon S3 Multi-Region Access Points

Another service to check out and test for those creating automated failover in case of an AWS outage or security incident. When S3 has issues, many applications have issues. Failover with S3 can be challenging. Hopefully this makes it easier.

New – Failover Controls for Amazon S3 Multi-Region Access Points | Amazon Web Services

Amazon Security Lake

Storing data using the OCSF standard. This is definitely something for security folks to check out who have to deal with the all the security logs in an organization. If you get in on the preview, you may be able to provide valuable feedback to help drive changes in the right direction to meet your needs.

Preview: Amazon Security Lake – A Purpose-Built Customer-Owned Data Lake Service | Amazon Web Services

Config Rules — Proactive Compliance

Proactive is better than reactive. This is definitely worth checking out. In an envirment where I worked, a network compliance tool would revert a non-compliant change within three minutes. And that was all the time someone — on the security team — needed to open up access to his instance and make a configuration change he needed. When I confronted him about it it he said it was a “dumb tool.” It wasn’t, but it shows the need need to prevent the change if possible, rather than react after it’s too late.

New – AWS Config Rules Now Support Proactive Compliance | Amazon Web Services

Control Tower — Comprehensive Controls Management

Control Tower is such a needed service but as I’ve written before some things are a bit challenging when you try to use and maintain it. But the concept is on point and I’m excited to check this out.

New for AWS Control Tower – Comprehensive Controls Management (Preview) | Amazon Web Services

Amazon EventBridge Pipes

This is not exactly a security feature but it if it helps improve consistency and reduce complexity through abstraction it may help the overall security at an organization when connecting services in an asynchrous manner.

New – Create Point-to-Point Integrations Between Event Producers and Consumers with Amazon EventBridge Pipes | Amazon Web Services

Wickr — End to End encryption for communication services

There it is! I was just looking for more information on end-to-end encryption in my last blog post on Amazon Chime. It is not clear that the communication is actually encrypted end to end based on the documentation. I’m not sure if Amazon Chime uses this service or is end-to-end encrypted or not based on what I found but if you need to be this service may help because it clearly is.

AWS Wickr – A Secure, End-to-End Encrypted Communication Service For Enterprises With Auditing And Regulatory Requirements | Amazon Web Services

New — Amazon ECS Service Connect Enabling Easy Communication Between Microservices

This service sounds similar to Lattice (above) but for ECS.

New – Amazon ECS Service Connect Enabling Easy Communication Between Microservices | Amazon Web Services

CloudWatch Logs Data Protection

Appears to detect sensitive data in logs. Definitely worth a look.

Protect Sensitive Data with Amazon CloudWatch Logs | Amazon Web Services

CloudWatch Cross-Account Observability

I wrote about some issues with cross-account logging for KMS. I think this is going to be a very, very useful feature and hope to try it out and possibly blog about it later in my latest blog series where I’m building out a cloud security architecture for batch jobs (and really anything else).

New – Amazon CloudWatch Cross-Account Observability | Amazon Web Services

Container Runtime Threat Detection in Guard Duty

This was announced in the AWS keynote by Adam Selipsky. Not seeing it yet in the AWS news announcements but I found this post from November.

How to detect security issues in Amazon EKS clusters using Amazon GuardDuty – Part 1 | Amazon Web Services

I wrote about that and some other security related features here after watching the AWS keynote.

A Few Highlights from Amazon re:Invent 2022

I might have missed something and there’s a bit more to go at AWS re:Invent. I’ll update this post if I see anything new.

Follow for updates.

Teri Radichel

If you liked this story please clap and follow:

******************************************************************

Medium: Teri Radichel or Email List: Teri Radichel
Twitter: @teriradichel or @2ndSightLab
Requests services via LinkedIn: Teri Radichel or IANS Research

******************************************************************

© 2nd Sight Lab 2022

____________________________________________

Author:

Cybersecurity for Executives in the Age of Cloud on Amazon

Need Cloud Security Training? 2nd Sight Lab Cloud Security Training

Is your cloud secure? Hire 2nd Sight Lab for a penetration test or security assessment.

Have a Cybersecurity or Cloud Security Question? Ask Teri Radichel by scheduling a call with IANS Research.

Cybersecurity & Cloud Security Resources by Teri Radichel: Cybersecurity and Cloud security classes, articles, white papers, presentations, and podcasts

Security Announcements at AWS re:Invent 2022 was originally published in Cloud Security on Medium, where people are continuing the conversation by highlighting and responding to this story.