Developers Security Survival Guide Com321

Title: AWS re:Inforce 2024 - Developer’s security survival guide (COM321)

Insights:

  • Incident Response Scenario: The speaker begins with a real-life scenario where they were unable to log into AWS, leading to production disruptions. This sets the stage for discussing incident response and threat mitigation.
  • Speaker Background: Brian Huff, an AWS DevTools hero and former AWS community builder, transitioned from a non-technical background to a security engineer, emphasizing the importance of security in development.
  • DevSecOps Primer: The talk covers a primer on DevSecOps, incident response, threat mitigation, and secure architecture patterns.
  • Security Best Practices: Emphasizes common security practices like changing passwords, using two-factor authentication, password managers, VPNs, and the principle of least privilege.
  • IAM Importance: Highlights the importance of Identity and Access Management (IAM) in DevSecOps, using JSON documents to control service permissions.
  • Managed Services and OWASP: While not the focus, the speaker mentions the importance of understanding OWASP vulnerabilities and how managed services abstract some security concerns.
  • Least Privilege Access: Stresses the importance of granting minimal necessary permissions to services and users to enhance security.
  • Threat Modeling: Encourages conducting threat modeling exercises to identify potential security vulnerabilities in applications.
  • Incident Response Checklist: Provides a detailed incident response resolution checklist, including using CloudTrail for tracking API activities and Security Hub for scanning vulnerabilities.
  • Proactive Security Measures: Discusses the importance of planning ahead and being proactive in threat mitigation, using tools like Security Hub, CloudWatch, and IAM policies.
  • Infrastructure as Code: Advocates for using infrastructure as code (e.g., SST, serverless framework) to create repeatable and secure deployment patterns.
  • Short-term Credentials: Recommends using short-term credentials and Secrets Manager for managing access securely.
  • CI/CD Pipelines: Highlights the importance of CI/CD pipelines with automation for secure and efficient deployments.
  • DDoS and Cross-Site Script Protection: Suggests using AWS Shield and WAF to protect applications against DDoS attacks and cross-site scripting.
  • Internal Tools Security: Emphasizes that internal tools should be secured with VPN and SSO to prevent unauthorized access.
  • Shift Security Left: Concludes with the importance of integrating security early in the development process, often referred to as "shifting security left."

Quotes:

  • "I was literally building the rocket ship as I'm flying it."
  • "Engineers ship applications and security engineers ship access."
  • "You really need to know what the services need at the least amount possible."
  • "No one wants to talk about incidents, but they do happen."
  • "The four top questions that I think you should immediately ask when you are in an incident are who, what, where, and why."
  • "It's important to think about these types of ways to build because there's patterns that you can replicate."
  • "Pre-signed URLs are really helpful because it creates this time-limited authentication token to the resource."
  • "We like that. It makes it really easy to just give access for a certain period of time."
  • "Shift the security focus earlier in the process. Some people call it shifting security left."
  • "I hope that this is empowering and helpful for you to architect security into your development journey and really put the dev in DevSecOps."