Title
AWS re:Invent 2023 - Zero Trust access with zero waiting, zero pain, and zero compromises (SEC329)
Summary
- The talk was presented by the co-founder and CTO of StrongDM, focusing on Zero Trust security principles.
- The speaker invited attendees to discuss one-on-one post-session and provided a self-assessment to gauge the audience's current security posture.
- Zero Trust is about continuously verifying trust, authenticating, and authorizing every action, and securing data and resources directly rather than defending the perimeter.
- StrongDM's approach to Zero Trust, called Dynamic Access, avoids the need to rewrite applications by adding API compatibility.
- Dynamic Access starts with identity and adds context from various factors like device, time, location, and network properties.
- The speaker demonstrated how StrongDM allows for passwordless access to resources, fine-grained policy enforcement, and real-time authorization without VPNs or handling secrets.
- The demo included examples of accessing Linux servers, databases, and a Windows server, as well as fine-grained policy enforcement using AWS's Cedar policy language.
- The speaker showcased how StrongDM can control access to database tables, redact sensitive information, limit query results, and require justifications or MFA for certain actions.
- The session concluded with evidence of the system's ability to collect audit trails, including SSH commands, database queries, and pixel-perfect playback of remote desktop sessions.
Insights
- The self-assessment at the beginning of the talk was a clever way to engage the audience and make them reflect on their security practices.
- StrongDM's Dynamic Access approach to Zero Trust security can significantly reduce the complexity and time required to implement Zero Trust by avoiding application rewrites.
- The use of context in access decisions is a critical aspect of Zero Trust, as it allows for more granular and situation-aware security policies.
- The demonstration of StrongDM's capabilities highlighted the practical application of Zero Trust principles in a real-world scenario, showcasing ease of use and seamless integration.
- The adoption of AWS's Cedar policy language for fine-grained policy enforcement suggests a trend towards standardization and interoperability in cloud security practices.
- The ability to provide detailed audit trails and real-time policy enforcement is crucial for compliance and can be a strong selling point for security solutions like StrongDM.
- The talk emphasized the importance of user experience in security, suggesting that solutions that minimize friction while enhancing security are likely to be more readily adopted by organizations.