Title: AWS re:Inforce 2024 - How organizations are actually applying AWS security best practices (COM224)
Insights:
- The session was led by Shun Yoshi, Hirokazu Yoshida, and Keisuke Usuda, core members of the Japan AWS User Group Security Branch, known as Security Jaws.
- The presentation focused on findings and takeaways from a survey on AWS security best practices in Japan, with some comparisons to South Korea.
- The survey was open to anyone in Japan involved in their company's use of AWS and was distributed via SNS, seminars, events, and meetups.
- The survey results were analyzed based on various factors such as company size, years of AWS experience, and roles within the organization.
- Experienced AWS users (10+ years) predominantly referenced AWS Web Architect documents, while some found official documents difficult to read and preferred technical books.
- In the financial industry, the security department primarily keeps up with AWS security best practices, whereas in other industries, development divisions are more involved.
- 60% of Japanese users continue risk assessments, a trend also observed in Korea, though smaller organizations do it less frequently.
- Most Japanese companies use MFA or MFA with switch roles for AWS access, but 18% of large companies (5,000+ employees) still use only IDs and passwords.
- Infrastructure protection is mainly done using AWS features, but there is a low adoption rate for AWS Shield Advanced.
- Preventive controls like AWS Organizations and AWS Control Tower show varying adoption rates, with AWS Organizations being more widely adopted.
- Detective controls such as Amazon GuardDuty have a high adoption rate (86%) among mid-sized companies, but services like AWS Security Hub and IAM Access Analyzer are underutilized.
- More experienced users tend to use a variety of tools for analyzing CloudTrail logs, with Amazon Athena and GuardDuty being common choices.
- A significant number of companies delete sensitive data without encryption, highlighting a need for better data disposal practices using cryptographic erase.
- The presentation concluded with a call to action for companies to adopt more AWS security features and improve their security practices.
Quotes:
- "Participants will be able to compare the results of this Japanese survey with your own country's AWS security implementation status."
- "We believe that the documents reference when designing and building AWS changes based on the experience of the individual user, rather than the size of the business or industry."
- "In the financial industry, the security department plays a central role in catching up on best practices. But other departments are also involved."
- "I was surprised that 18% of big companies in Japan with over 5,000 people only use IDs and passwords. This is clearly lower than the usual trend."
- "For AWS users, infrastructure protection is mainly done using AWS features for the AWS environment. It does not go inside the EC2 instances."
- "The adoption rate of Amazon GuardDuty was relatively high, but I will continue to evangelize its use to reach 100% adoption."
- "Many Korean AWS users still use AWS like an on-premise system. They do not use the helpful security features that AWS provides."
- "The results clearly show the gap between the practices that were implemented and those that were not, depending on the difficulty level of the best practices."
- "If you feel your company is lagging behind in implementation compared to these results, use this report to convince the management to take action."