Application of zero trust security
architecture on Amazon Web
Services
Frans Sauermann & Ernest Ketcha
Agenda
• Introduction
• Problem Statement
• Zero Trust Architecture
• Analysis
• Results
• Conclusion and Outlook
Introduction & Motivation
• Perimeter is Disappearing
• Enterprise users are no longer in office
• Work from home is the norm for organizations post COVID
• Cloud adoption is on the rise
• Moving data to Edge through Edge computing is becoming crucial
• Enterprises are now adopting a multi-cloud strategy to support their digital transformation
strategy
• On-premise data centers are also accessed by third parties
• Cloud Migration
• Workload migration to the cloud to reduce operational cost
• Requirement to ensure the same level of security pre and post migration should be
maintained
The Problem
• Two main drivers motivate for the application of zero trust security on Amazon web services:
Migration of traditional IT to cloud services; and the inversion of security architecture approaches
towards zero-trust security architecture and Continuous Adaptive Risk and Trust Assessment
(CARTA).
• An architecture in this space will assist Solution architects and developers to realize zero-trust on
customer AWS tenants.
• This paper discusses the Zero Trust reference model and indicates how it can be achieved using
AWS services.
Zero Trust Architecture
• Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing
accurate, least privilege per-request access decisions in information systems and services in the face of a
network viewed as compromised.
• Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and
encompasses component relationships, workflow planning, and access policies.
• A zero-trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in
place for an enterprise as a product of a zero-trust architecture plan.
Untrusted zone Contextual trust zone
Policy Decision/
Enforcement Point
Target Resource/
System/
Data/Application
Zero Trust Architecture – Principles
• All data sources and computing services are considered resources.
• All communication is secured regardless of network location.
• Access to individual enterprise resources is granted on a per-session basis.
• Access to resources is determined by dynamic policy—including the observable state of client identity,
application/service, and the requesting asset—and may include other behavioral and environmental
attributes.
• The enterprise monitors and measures the integrity and security posture of all owned and associated
assets.
• All resource authentication and authorization is dynamic and strictly enforced before access is allowed.
• The enterprise collects as much information as possible about the current state of assets, network
infrastructure and communications and uses it to improve its security posture.
Untrusted zone Contextual trust zone
Policy Decision/
Enforcement Point
Target Resource/
System/
Data/Application
Logical Components of a ZTA (NIST model)
Untrusted zone Contextual trust zone
Policy Enforcement
Point
Enterprise
Resources
Policy decision point
Policy Engine
Policy
Administrator
3rd parties
capabilities
Internal
capabilities and
policies
Control pane
Data pane
ZTA Variations:
• ZTA Using Enhanced Identity
Governance
• ZTA Using Micro-Segmentation
• ZTA Using Network Infrastructure and
Software Defined Perimeters
Zero Trust: Network View
• The entire enterprise private network is not considered an implicit trust zone.
• Devices on the network may not be owned or configurable by the enterprise.
• No resource is inherently trusted.
• Not all enterprise resources are on enterprise-owned infrastructure.
• Remote enterprise subjects and assets cannot fully trust their local network
connection.
• Assets and workflows moving between enterprise and non-enterprise infrastructure
should have a consistent security policy and posture.
Analysis – Business & Application Layers
Analysis – Application and Network Layers
Results and Findings
AWS Model
AWS GuardDuty
AWS IAM
AWS Inspector
Logical Overview
Conclusion and outlook
• NIST Zero Trust model outlines components to be considered for
alignment in a ZTA.
• ZTA model and principles need to be mapped to its realization.
• Services need to be aligned to match overall ZTA overlay
• AWS services can support the realization of ZTA.
The End
Thank You!

More Related Content

PPTX
Adopting A Zero-Trust Model. Google Did It, Can You?
PPTX
Zero Trust Model
PPTX
Zero trust Architecture
PDF
[Round table] zeroing in on zero trust architecture
PDF
Zero trust in a hybrid architecture
PPTX
Zero Trust Framework for Network Security​
PPTX
What is Zero Trust
PPTX
Understanding Zero Trust Security for IBM i
Adopting A Zero-Trust Model. Google Did It, Can You?
Zero Trust Model
Zero trust Architecture
[Round table] zeroing in on zero trust architecture
Zero trust in a hybrid architecture
Zero Trust Framework for Network Security​
What is Zero Trust
Understanding Zero Trust Security for IBM i

What's hot (20)

PPTX
Zero trust deck 2020
PPTX
Zero Trust
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PPTX
Zero Trust Network Access
PDF
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
PPTX
Cloud Security
PPTX
Cloud vs. On-Premises Security: Can you afford not to switch?
PPTX
The Zero Trust Model of Information Security
PDF
Information Security Architecture: Building Security Into Your Organziation
PPTX
Cloud security and security architecture
PPTX
Identity's Role in a Zero Trust Strategy
PDF
PaloAlto Enterprise Security Solution
PPTX
Identity and access management
PDF
Microsoft Zero Trust
PPTX
Data security
PDF
Information Security Awareness Training
PPTX
Cybersecurity Awareness Session by Adam
PDF
Microsoft Azure Cloud Services
PPTX
Azure Security Center- Zero to Hero
PPTX
Introduction to MuleSoft
Zero trust deck 2020
Zero Trust
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Zero Trust Network Access
Cybersecurity Insiders Webinar - Zero Trust: Best Practices for Securing the...
Cloud Security
Cloud vs. On-Premises Security: Can you afford not to switch?
The Zero Trust Model of Information Security
Information Security Architecture: Building Security Into Your Organziation
Cloud security and security architecture
Identity's Role in a Zero Trust Strategy
PaloAlto Enterprise Security Solution
Identity and access management
Microsoft Zero Trust
Data security
Information Security Awareness Training
Cybersecurity Awareness Session by Adam
Microsoft Azure Cloud Services
Azure Security Center- Zero to Hero
Introduction to MuleSoft
Ad

Similar to COSAC 2021 presentation - AWS Zero Trust (20)

PPTX
I am sharing 'Unit-2' with youuuuuu.PPTX
PDF
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
PDF
BATbern48_How Zero Trust can help your organisation keep safe.pdf
PPTX
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
PPTX
Cloud Computing Introduction and Awareness
PPTX
Security Architecture Best Practices for SaaS Applications
PPTX
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PPTX
PayPal Decision Management Architecture
PPTX
Trends in IT Outsourcing That Will Affect Business in the Future.pptx
PPTX
Cloud Security: A matter of trust?
PDF
Cloud Navigator
PDF
AFAC session 2 - September 8, 2014
PDF
Software Defined Networking in the ATMOSPHERE project
PPTX
Cloud Computing Gets Put to the Test
PPTX
gkkCloudtechnologyassociate(cta)day 2
PPTX
Cloud Analytics and VDI
PPTX
Zero trust model for cloud computing.pptx
PPTX
cloud computer security fundamentals Unit-5.pptx
PPTX
Ms.azure in detail
PPTX
talk6securingcloudamarprusty-191030091632.pptx
I am sharing 'Unit-2' with youuuuuu.PPTX
(SACON) Jim Hietala - Zero Trust Architecture: From Hype to Reality
BATbern48_How Zero Trust can help your organisation keep safe.pdf
10-IoT Data Analytics, Cloud Computing for IoT, Cloud Based platforms, ML for...
Cloud Computing Introduction and Awareness
Security Architecture Best Practices for SaaS Applications
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
PayPal Decision Management Architecture
Trends in IT Outsourcing That Will Affect Business in the Future.pptx
Cloud Security: A matter of trust?
Cloud Navigator
AFAC session 2 - September 8, 2014
Software Defined Networking in the ATMOSPHERE project
Cloud Computing Gets Put to the Test
gkkCloudtechnologyassociate(cta)day 2
Cloud Analytics and VDI
Zero trust model for cloud computing.pptx
cloud computer security fundamentals Unit-5.pptx
Ms.azure in detail
talk6securingcloudamarprusty-191030091632.pptx
Ad

Recently uploaded (20)

PDF
giants, standing on the shoulders of - by Daniel Stenberg
PPTX
Module 1 Introduction to Web Programming .pptx
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
Co-training pseudo-labeling for text classification with support vector machi...
PDF
Improvisation in detection of pomegranate leaf disease using transfer learni...
PDF
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
PDF
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
PDF
Advancing precision in air quality forecasting through machine learning integ...
PPTX
MuleSoft-Compete-Deck for midddleware integrations
DOCX
search engine optimization ppt fir known well about this
PDF
sustainability-14-14877-v2.pddhzftheheeeee
PDF
The influence of sentiment analysis in enhancing early warning system model f...
PPTX
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PPTX
Configure Apache Mutual Authentication
PDF
Auditboard EB SOX Playbook 2023 edition.
PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
Statistics on Ai - sourced from AIPRM.pdf
PDF
Consumable AI The What, Why & How for Small Teams.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Module 1 Introduction to Web Programming .pptx
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
Co-training pseudo-labeling for text classification with support vector machi...
Improvisation in detection of pomegranate leaf disease using transfer learni...
“A New Era of 3D Sensing: Transforming Industries and Creating Opportunities,...
Accessing-Finance-in-Jordan-MENA 2024 2025.pdf
Advancing precision in air quality forecasting through machine learning integ...
MuleSoft-Compete-Deck for midddleware integrations
search engine optimization ppt fir known well about this
sustainability-14-14877-v2.pddhzftheheeeee
The influence of sentiment analysis in enhancing early warning system model f...
AI IN MARKETING- PRESENTED BY ANWAR KABIR 1st June 2025.pptx
Enhancing plagiarism detection using data pre-processing and machine learning...
Configure Apache Mutual Authentication
Auditboard EB SOX Playbook 2023 edition.
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
Statistics on Ai - sourced from AIPRM.pdf
Consumable AI The What, Why & How for Small Teams.pdf

COSAC 2021 presentation - AWS Zero Trust

  • 1. Application of zero trust security architecture on Amazon Web Services Frans Sauermann & Ernest Ketcha
  • 2. Agenda • Introduction • Problem Statement • Zero Trust Architecture • Analysis • Results • Conclusion and Outlook
  • 3. Introduction & Motivation • Perimeter is Disappearing • Enterprise users are no longer in office • Work from home is the norm for organizations post COVID • Cloud adoption is on the rise • Moving data to Edge through Edge computing is becoming crucial • Enterprises are now adopting a multi-cloud strategy to support their digital transformation strategy • On-premise data centers are also accessed by third parties • Cloud Migration • Workload migration to the cloud to reduce operational cost • Requirement to ensure the same level of security pre and post migration should be maintained
  • 4. The Problem • Two main drivers motivate for the application of zero trust security on Amazon web services: Migration of traditional IT to cloud services; and the inversion of security architecture approaches towards zero-trust security architecture and Continuous Adaptive Risk and Trust Assessment (CARTA). • An architecture in this space will assist Solution architects and developers to realize zero-trust on customer AWS tenants. • This paper discusses the Zero Trust reference model and indicates how it can be achieved using AWS services.
  • 5. Zero Trust Architecture • Zero trust (ZT) provides a collection of concepts and ideas designed to minimize uncertainty in enforcing accurate, least privilege per-request access decisions in information systems and services in the face of a network viewed as compromised. • Zero trust architecture (ZTA) is an enterprise’s cybersecurity plan that utilizes zero trust concepts and encompasses component relationships, workflow planning, and access policies. • A zero-trust enterprise is the network infrastructure (physical and virtual) and operational policies that are in place for an enterprise as a product of a zero-trust architecture plan. Untrusted zone Contextual trust zone Policy Decision/ Enforcement Point Target Resource/ System/ Data/Application
  • 6. Zero Trust Architecture – Principles • All data sources and computing services are considered resources. • All communication is secured regardless of network location. • Access to individual enterprise resources is granted on a per-session basis. • Access to resources is determined by dynamic policy—including the observable state of client identity, application/service, and the requesting asset—and may include other behavioral and environmental attributes. • The enterprise monitors and measures the integrity and security posture of all owned and associated assets. • All resource authentication and authorization is dynamic and strictly enforced before access is allowed. • The enterprise collects as much information as possible about the current state of assets, network infrastructure and communications and uses it to improve its security posture. Untrusted zone Contextual trust zone Policy Decision/ Enforcement Point Target Resource/ System/ Data/Application
  • 7. Logical Components of a ZTA (NIST model) Untrusted zone Contextual trust zone Policy Enforcement Point Enterprise Resources Policy decision point Policy Engine Policy Administrator 3rd parties capabilities Internal capabilities and policies Control pane Data pane ZTA Variations: • ZTA Using Enhanced Identity Governance • ZTA Using Micro-Segmentation • ZTA Using Network Infrastructure and Software Defined Perimeters Zero Trust: Network View • The entire enterprise private network is not considered an implicit trust zone. • Devices on the network may not be owned or configurable by the enterprise. • No resource is inherently trusted. • Not all enterprise resources are on enterprise-owned infrastructure. • Remote enterprise subjects and assets cannot fully trust their local network connection. • Assets and workflows moving between enterprise and non-enterprise infrastructure should have a consistent security policy and posture.
  • 8. Analysis – Business & Application Layers
  • 9. Analysis – Application and Network Layers
  • 10. Results and Findings AWS Model AWS GuardDuty AWS IAM AWS Inspector
  • 12. Conclusion and outlook • NIST Zero Trust model outlines components to be considered for alignment in a ZTA. • ZTA model and principles need to be mapped to its realization. • Services need to be aligned to match overall ZTA overlay • AWS services can support the realization of ZTA.