SlideShare a Scribd company logo
Transitioning to AWS in a
hurry without getting owned
(Hopefully...)
Devina Dhawan
02/06/2017 - Women & Non-Binary Focused intro to AWS
Email: 3@etsy.com
Twitter: @theulzo
1
Introduction
2
● Etsy (Jan 2015 - Present)
● Orbitz (May 2014 - Dec 2015)
● University of Illinois in Chicago
Etsy operates a global marketplace where people around the world connect,
both online and offline, to make, sell and buy unique goods.
3
Security at Etsy
4
● Evangelizing Security at Etsy
○ Candy is a great way to make
friends
○ Allow the conversation about
security to be comfortable
and inviting.
What is this talk about?
• I will help you improve your
existing AWS infrastructure
• You will walk away with action
items
• http://bit.ly/2EnZU1q
5
“Securing
Amazon Web
Services”
6
7
- Traditional bare metal
- Minimal footprint in the clouds
Infrastructure
Where to begin?
9
● Evident.io
○ Scans of
configurations to
see if anything is
misconfigured
● Password policies?
● Multi-factor Authentication
● Jira Tickets
Evident.io
10
Low-hanging IAM Fruit
# Password Policy
# Multi-factor auth
Monitoring
# Cloudtrail Logging
EC2
# Netwerkin’
# EC2 Roles
S3
# S3 Bucket Policies
Scout2
● Github Page:
https://github.com/nccgro
up/Scout2
● Reports for all
accounts
● Tie that into alerts
manually
12
Low-hanging IAM
Fruit
# Password Policy
# Multi-factor auth
Monitoring
# Cloudtrail Logging
EC2
# Netwerkin’
# EC2 Roles
S3
# S3 Bucket Policies
Changes I made… like a goon
• Password policy to the highest
scrutiny
• Removed all admin roles from
accounts that didn’t need them (aka
hadn’t used aws in 2 yrs and didn’t
have any api keys tied to their user)
13
Password Policies
My first Etsy communication
Hello X,
Looks like you still do not have MFA set up on your AWS account.
Go ahead and go to Identity & Access Management in your Amazon Web Services console ->
find your username -> Manage MFA Device.
Note: If you no longer need your AWS account, please let me know!
Devina
Version 2.0
Hello X,
Looks like you still do not have MFA set up on your AWS
account. It looks like you used your AWS account recently
as well, so please sign up for MFA by 03/31/16 or your
account will be suspended.
Go ahead and go to Identity & Access Management in
your Amazon Web Services console -> find your username
-> Manage MFA Device.
Note: If you no longer need your AWS account, please let
me know!
Your neighborhood candy provider,
Devina
Oops...
Multiple statements which
allow you to:
● Resync MFA devices
● Deactivate MFA
devices
● List MFA devices
● Primary, management
Other policies:
● Forcing MFA
Oof…
Aws-cli for account creation
Becoming really used to the aws client is really useful too!
Using Terraform for IAM
● What is terraform?
● What can it do?
○ Static creds
○ Environment variables
○ Shared creds
○ EC2 Roles
Static Creds
23
Low-hanging IAM Fruit
# Password Policy
# Multi-factor auth
Monitoring
# Cloudtrail Logging
EC2
# Netwerkin’
# EC2 Roles
S3
# S3 Bucket Policies
Logging in AWS - Cloudtrail
Devina Dhawan's talk - Women and non binary focused intro to AWS
Devina Dhawan's talk - Women and non binary focused intro to AWS
Devina Dhawan's talk - Women and non binary focused intro to AWS
ELK
Alert Types
Email:
● Daily Roundup Emails
○ No production impacting
● High Risk Alerts
○ Enough resources to handle
IRC/Slack/Jabber:
● Slack & Dropbox
Collect the alerts:
● Splunk
● 411 / Elastalert
30
Low-hanging IAM Fruit
# Password Policy
# Multi-factor auth
Monitoring
# Scout2
# Logging
EC2
# Netwerkin’
# EC2 Roles
S3
# S3 Bucket Policies
Inbound/Outbound
EC2 Roles
33
Low-hanging IAM Fruit
# Password Policy
# Multi-factor auth
Monitoring
# Scout2
# Logging
EC2
# Netwerkin’
# EC2 Roles
S3
# S3 Bucket Policies
Bucket Policies
Devina Dhawan's talk - Women and non binary focused intro to AWS
Devina Dhawan's talk - Women and non binary focused intro to AWS
● Bug Bounties at Etsy:
https://www.etsy.com/bounty
● S3 Scanner
Github:
https://github.com/bear/s3scan
○ Report of all s3 buckets
and perms
○ Likely how bountiers are
finding out about your
misconfigured policies.
38
So… it happened, what do I do now?
❏ Write down all the systems you need to take care of
❏ Find out what you need to fix on all systems, write that down
❏ Start with the low-hanging fruit
❏ Over communicate what you are doing.
❏ Work with networking on the AWS network
❏ Create default rulesets & roles
❏ Work with IT/helpdesk to handle account provisioning
❏ Work with systems engineering to handle provisioning of
services
❏ … profit?
THANKS!
3@etsy.com
@theulzo

More Related Content

PDF
MJ Berends talk - Women & Non-Binary Focused Intro to AWS
PDF
Introduction 2 to aws and storage options
PDF
Introduction to scaling your WordPress site past a single node using AWS
PDF
Intro To Serverless ClojureScript
PDF
WordCamp IL 2016 - WordPress Scale on AWS
PPTX
Containerize all the things!
PDF
AWS KSS
PPTX
Signal r azurepresentation
MJ Berends talk - Women & Non-Binary Focused Intro to AWS
Introduction 2 to aws and storage options
Introduction to scaling your WordPress site past a single node using AWS
Intro To Serverless ClojureScript
WordCamp IL 2016 - WordPress Scale on AWS
Containerize all the things!
AWS KSS
Signal r azurepresentation

What's hot (17)

PDF
Serverless Systems: The Future is Here
PDF
Serverless Computing with AWS
PDF
Dockercon plugins session
PDF
NDev Talk - Serverless Design Patterns
PPTX
DNN & The CloudOS: Windows Azure on your terms
PDF
A 5 Minute Intro To Weave - Software Circus July 2015
PDF
TDD a REST API With Node.js and MongoDB
PPTX
Cloud Amazon Service
PPTX
Dev-Friendly Ops
PPTX
AWS Cloudfront Fundamentals
PPTX
WordPress Development Environments
PDF
Inrastructure as Code
PDF
WordPress Deployment
PDF
Using Aws As A Game Server (AWS UG Bandung)
PPTX
Moving Viadeo to AWS (2015)
PDF
AWS systems manager | Francisco edilton
PDF
Cassandra Development Nirvana
Serverless Systems: The Future is Here
Serverless Computing with AWS
Dockercon plugins session
NDev Talk - Serverless Design Patterns
DNN & The CloudOS: Windows Azure on your terms
A 5 Minute Intro To Weave - Software Circus July 2015
TDD a REST API With Node.js and MongoDB
Cloud Amazon Service
Dev-Friendly Ops
AWS Cloudfront Fundamentals
WordPress Development Environments
Inrastructure as Code
WordPress Deployment
Using Aws As A Game Server (AWS UG Bandung)
Moving Viadeo to AWS (2015)
AWS systems manager | Francisco edilton
Cassandra Development Nirvana
Ad

Similar to Devina Dhawan's talk - Women and non binary focused intro to AWS (20)

PDF
Moving at the Speed-of-Cloud Without Getting Owned
PDF
Moving at the Speed-of-Cloud Without Getting Owned
PPTX
It's 10pm, Do You Know Where Your Access Keys Are?
PDF
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
PPTX
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
PPTX
Moving the needle on cloud security - AWS Summit Atlanta
PDF
Netflix Open Source Meetup Season 4 Episode 3
PPTX
Cloud security best practices in AWS by: Ankit Giri
PPTX
LASCON 2016 - It's 10PM Do You Know Where Your Access Keys Are?
PPT
AWS & Infrastructure Hardening - Cloud Infrastructure Security
PPT
Aws training in bangalore
ODP
User Credential handling in Web Applications done right
PPTX
Automating AWS security and compliance
PPTX
Wrangling Security & Identity across 99+ AWS Accounts
PPTX
004 - Logging in the Cloud -- hide01.ir.pptx
PDF
Shared Security Responsibilities in AWS - LA AWS User Meetup - 2014-07-17
PPTX
Top 23 Things Not to Do in AWS
PDF
Are Multi-Cloud and Serverless Good or Bad?
PDF
Denver AWS Users' Group Meeting - July 2018 Slides
PPTX
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Moving at the Speed-of-Cloud Without Getting Owned
Moving at the Speed-of-Cloud Without Getting Owned
It's 10pm, Do You Know Where Your Access Keys Are?
Eliminating Secret Sprawl in the Cloud with HashiCorp Vault - 07.11.2018
In the Cloud, nobody can hear you scream: AWS Cloud Security for DevOps
Moving the needle on cloud security - AWS Summit Atlanta
Netflix Open Source Meetup Season 4 Episode 3
Cloud security best practices in AWS by: Ankit Giri
LASCON 2016 - It's 10PM Do You Know Where Your Access Keys Are?
AWS & Infrastructure Hardening - Cloud Infrastructure Security
Aws training in bangalore
User Credential handling in Web Applications done right
Automating AWS security and compliance
Wrangling Security & Identity across 99+ AWS Accounts
004 - Logging in the Cloud -- hide01.ir.pptx
Shared Security Responsibilities in AWS - LA AWS User Meetup - 2014-07-17
Top 23 Things Not to Do in AWS
Are Multi-Cloud and Serverless Good or Bad?
Denver AWS Users' Group Meeting - July 2018 Slides
Dirty Little Secrets They Didn't Teach You In Pentest Class v2
Ad

More from AWS Chicago (20)

PPTX
Kathie Kinde Clark - Elevate Your Professional Footprint: LinkedIn Masterclass
PDF
Jason Anderson From Dirt Roads to Highways: Simplifying DevOps and Cloud Inf...
PDF
Aman Sardana and Vijay Kumar Soni - Navigating Hybrid Cloud Challenges for ...
PDF
Ben Blair Operating Safely in a Vibe Coding World
PPTX
Joseph Morotti Enhancing customer experience through Amazon Connect and Gene...
PPTX
Craig Johnson When VPCs Attack: Real-Life Cloud Networking Fails (and Fixes)
PDF
Peter Sankauskas Access Denied: Understanding & Debugging AWS IAM
PDF
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
PDF
Bob Fornal The Impact of Testing on a DevOps Pipeline
PDF
Jason Butz Chaos Engineering with FIS and Lambda Functions
PPTX
Automated VPC migration into centralized inspection architecture with AWS Gat...
PDF
Julia Furst Morgado The Lazy Guide to Kubernetes with EKS Auto Mode + Karpenter
PDF
Bob Fornal - Active Career Management AWS Community Day Midwest 2025
PDF
Edwin Moedano Monitoring and Observability of Lambdas with Cloudwatch and Po...
PPTX
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
PPTX
Nathan Hiscock Architecting secure, scalable, cost-efficient computer vision...
PDF
AWS Community Day Midwest 2025 Julia Furst Morgado The Lazy Guide to Kuberne...
PDF
Steven Seaney - Simplifying and Streamlining AWS Control Tower Deployments
PDF
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
PPTX
Paul Chin Jr. Data Gone in 60 Seconds: A Serverless ETL Heist
Kathie Kinde Clark - Elevate Your Professional Footprint: LinkedIn Masterclass
Jason Anderson From Dirt Roads to Highways: Simplifying DevOps and Cloud Inf...
Aman Sardana and Vijay Kumar Soni - Navigating Hybrid Cloud Challenges for ...
Ben Blair Operating Safely in a Vibe Coding World
Joseph Morotti Enhancing customer experience through Amazon Connect and Gene...
Craig Johnson When VPCs Attack: Real-Life Cloud Networking Fails (and Fixes)
Peter Sankauskas Access Denied: Understanding & Debugging AWS IAM
Shuen Mei Parth Sharma Boost Productivity, Innovation and Efficiency wit...
Bob Fornal The Impact of Testing on a DevOps Pipeline
Jason Butz Chaos Engineering with FIS and Lambda Functions
Automated VPC migration into centralized inspection architecture with AWS Gat...
Julia Furst Morgado The Lazy Guide to Kubernetes with EKS Auto Mode + Karpenter
Bob Fornal - Active Career Management AWS Community Day Midwest 2025
Edwin Moedano Monitoring and Observability of Lambdas with Cloudwatch and Po...
Darren Mills The Migration Modernization Balancing Act: Navigating Risks and...
Nathan Hiscock Architecting secure, scalable, cost-efficient computer vision...
AWS Community Day Midwest 2025 Julia Furst Morgado The Lazy Guide to Kuberne...
Steven Seaney - Simplifying and Streamlining AWS Control Tower Deployments
Timothy Rottach - Ramp up on AI Use Cases, from Vector Search to AI Agents wi...
Paul Chin Jr. Data Gone in 60 Seconds: A Serverless ETL Heist

Recently uploaded (20)

PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PPTX
1. Introduction to Computer Programming.pptx
PPTX
Machine Learning_overview_presentation.pptx
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
NewMind AI Weekly Chronicles - August'25-Week II
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Heart disease approach using modified random forest and particle swarm optimi...
PDF
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
SOPHOS-XG Firewall Administrator PPT.pptx
PDF
Mushroom cultivation and it's methods.pdf
PPTX
cloud_computing_Infrastucture_as_cloud_p
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PPTX
TLE Review Electricity (Electricity).pptx
PPT
Teaching material agriculture food technology
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
Advanced methodologies resolving dimensionality complications for autism neur...
1. Introduction to Computer Programming.pptx
Machine Learning_overview_presentation.pptx
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
NewMind AI Weekly Chronicles - August'25-Week II
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Heart disease approach using modified random forest and particle swarm optimi...
Video forgery: An extensive analysis of inter-and intra-frame manipulation al...
Reach Out and Touch Someone: Haptics and Empathic Computing
Digital-Transformation-Roadmap-for-Companies.pptx
SOPHOS-XG Firewall Administrator PPT.pptx
Mushroom cultivation and it's methods.pdf
cloud_computing_Infrastucture_as_cloud_p
Building Integrated photovoltaic BIPV_UPV.pdf
TLE Review Electricity (Electricity).pptx
Teaching material agriculture food technology
Univ-Connecticut-ChatGPT-Presentaion.pdf
gpt5_lecture_notes_comprehensive_20250812015547.pdf

Devina Dhawan's talk - Women and non binary focused intro to AWS

  • 1. Transitioning to AWS in a hurry without getting owned (Hopefully...) Devina Dhawan 02/06/2017 - Women & Non-Binary Focused intro to AWS Email: [email protected] Twitter: @theulzo 1
  • 2. Introduction 2 ● Etsy (Jan 2015 - Present) ● Orbitz (May 2014 - Dec 2015) ● University of Illinois in Chicago
  • 3. Etsy operates a global marketplace where people around the world connect, both online and offline, to make, sell and buy unique goods. 3
  • 4. Security at Etsy 4 ● Evangelizing Security at Etsy ○ Candy is a great way to make friends ○ Allow the conversation about security to be comfortable and inviting.
  • 5. What is this talk about? • I will help you improve your existing AWS infrastructure • You will walk away with action items • http://bit.ly/2EnZU1q 5
  • 7. 7 - Traditional bare metal - Minimal footprint in the clouds Infrastructure
  • 9. 9 ● Evident.io ○ Scans of configurations to see if anything is misconfigured ● Password policies? ● Multi-factor Authentication ● Jira Tickets Evident.io
  • 10. 10 Low-hanging IAM Fruit # Password Policy # Multi-factor auth Monitoring # Cloudtrail Logging EC2 # Netwerkin’ # EC2 Roles S3 # S3 Bucket Policies
  • 11. Scout2 ● Github Page: https://github.com/nccgro up/Scout2 ● Reports for all accounts ● Tie that into alerts manually
  • 12. 12 Low-hanging IAM Fruit # Password Policy # Multi-factor auth Monitoring # Cloudtrail Logging EC2 # Netwerkin’ # EC2 Roles S3 # S3 Bucket Policies
  • 13. Changes I made… like a goon • Password policy to the highest scrutiny • Removed all admin roles from accounts that didn’t need them (aka hadn’t used aws in 2 yrs and didn’t have any api keys tied to their user) 13
  • 15. My first Etsy communication Hello X, Looks like you still do not have MFA set up on your AWS account. Go ahead and go to Identity & Access Management in your Amazon Web Services console -> find your username -> Manage MFA Device. Note: If you no longer need your AWS account, please let me know! Devina
  • 16. Version 2.0 Hello X, Looks like you still do not have MFA set up on your AWS account. It looks like you used your AWS account recently as well, so please sign up for MFA by 03/31/16 or your account will be suspended. Go ahead and go to Identity & Access Management in your Amazon Web Services console -> find your username -> Manage MFA Device. Note: If you no longer need your AWS account, please let me know! Your neighborhood candy provider, Devina
  • 18. Multiple statements which allow you to: ● Resync MFA devices ● Deactivate MFA devices ● List MFA devices ● Primary, management Other policies: ● Forcing MFA
  • 20. Aws-cli for account creation Becoming really used to the aws client is really useful too!
  • 21. Using Terraform for IAM ● What is terraform? ● What can it do? ○ Static creds ○ Environment variables ○ Shared creds ○ EC2 Roles
  • 23. 23 Low-hanging IAM Fruit # Password Policy # Multi-factor auth Monitoring # Cloudtrail Logging EC2 # Netwerkin’ # EC2 Roles S3 # S3 Bucket Policies
  • 24. Logging in AWS - Cloudtrail
  • 28. ELK
  • 29. Alert Types Email: ● Daily Roundup Emails ○ No production impacting ● High Risk Alerts ○ Enough resources to handle IRC/Slack/Jabber: ● Slack & Dropbox Collect the alerts: ● Splunk ● 411 / Elastalert
  • 30. 30 Low-hanging IAM Fruit # Password Policy # Multi-factor auth Monitoring # Scout2 # Logging EC2 # Netwerkin’ # EC2 Roles S3 # S3 Bucket Policies
  • 33. 33 Low-hanging IAM Fruit # Password Policy # Multi-factor auth Monitoring # Scout2 # Logging EC2 # Netwerkin’ # EC2 Roles S3 # S3 Bucket Policies
  • 37. ● Bug Bounties at Etsy: https://www.etsy.com/bounty ● S3 Scanner Github: https://github.com/bear/s3scan ○ Report of all s3 buckets and perms ○ Likely how bountiers are finding out about your misconfigured policies.
  • 38. 38 So… it happened, what do I do now? ❏ Write down all the systems you need to take care of ❏ Find out what you need to fix on all systems, write that down ❏ Start with the low-hanging fruit ❏ Over communicate what you are doing. ❏ Work with networking on the AWS network ❏ Create default rulesets & roles ❏ Work with IT/helpdesk to handle account provisioning ❏ Work with systems engineering to handle provisioning of services ❏ … profit?