Author: Sameer Ahuja

  • Three key security themes from AWS re:Invent 2022

    Three key security themes from AWS re:Invent 2022

    AWS re:Invent returned to Las Vegas, Nevada, November 28 to December 2, 2022. After a virtual event in 2020 and a hybrid 2021 edition, spirits were high as over 51,000 in-person attendees returned to network and learn about the latest AWS innovations.
    Now in its 11th year, the conference featured 5 keynotes, 22 leadership sessions, and more than 2,200 breakout sessions and hands-on labs at 6 venues over 5 days.
    With well over 100 service and feature announcements—and innumerable best practices shared by AWS executives, customers, and partners—distilling highlights is a challenge. From a security perspective, three key themes emerged.

    Turn data into actionable insights
    Security teams are always looking for ways to increase visibility into their security posture and uncover patterns to make more informed decisions. However, as AWS Vice President of Data and Machine Learning, Swami Sivasubramanian, pointed out during his keynote, data often exists in silos; it isn’t always easy to analyze or visualize, which can make it hard to identify correlations that spark new ideas.

    “Data is the genesis for modern invention.” – Swami Sivasubramanian, AWS VP of Data and Machine Learning

    At AWS re:Invent, we launched new features and services that make it simpler for security teams to store and act on data. One such service is Amazon Security Lake, which brings together security data from cloud, on-premises, and custom sources in a purpose-built data lake stored in your account. The service, which is now in preview, automates the sourcing, aggregation, normalization, enrichment, and management of security-related data across an entire organization for more efficient storage and query performance. It empowers you to use the security analytics solutions of your choice, while retaining control and ownership of your security data.
    Amazon Security Lake has adopted the Open Cybersecurity Schema Framework (OCSF), which AWS cofounded with a number of organizations in the cybersecurity industry. The OCSF helps standardize and combine security data from a wide range of security products and services, so that it can be shared and ingested by analytics tools. More than 37 AWS security partners have announced integrations with Amazon Security Lake, enhancing its ability to transform security data into a powerful engine that helps drive business decisions and reduce risk. With Amazon Security Lake, analysts and engineers can gain actionable insights from a broad range of security data and improve threat detection, investigation, and incident response processes.
    Strengthen security programs
    According to Gartner, by 2026, at least 50% of C-Level executives will have performance requirements related to cybersecurity risk built into their employment contracts. Security is top of mind for organizations across the globe, and as AWS CISO CJ Moses emphasized during his leadership session, we are continuously building new capabilities to help our customers meet security, risk, and compliance goals.
    In addition to Amazon Security Lake, several new AWS services announced during the conference are designed to make it simpler for builders and security teams to improve their security posture in multiple areas.
    Identity and networking
    Authorization is a key component of applications. Amazon Verified Permissions is a scalable, fine-grained permissions management and authorization service for custom applications that simplifies policy-based access for developers and centralizes access governance. The new service gives developers a simple-to-use policy and schema management system to define and manage authorization models. The policy-based authorization system that Amazon Verified Permissions offers can shorten development cycles by months, provide a consistent user experience across applications, and facilitate integrated auditing to support stringent compliance and regulatory requirements.
    Additional services that make it simpler to define authorization and service communication include Amazon VPC Lattice, an application-layer service that consistently connects, monitors, and secures communications between your services, and AWS Verified Access, which provides secure access to corporate applications without a virtual private network (VPN).
    Threat detection and monitoring
    Monitoring for malicious activity and anomalous behavior just got simpler. Amazon GuardDuty RDS Protection expands the threat detection capabilities of GuardDuty by using tailored machine learning (ML) models to detect suspicious logins to Amazon Aurora databases. You can enable the feature with a single click in the GuardDuty console, with no agents to manually deploy, no data sources to enable, and no permissions to configure. When RDS Protection detects a potentially suspicious or anomalous login attempt that indicates a threat to your database instance, GuardDuty generates a new finding with details about the potentially compromised database instance. You can view GuardDuty findings in AWS Security Hub, Amazon Detective (if enabled), and Amazon EventBridge, allowing for integration with existing security event management or workflow systems.
    To bolster vulnerability management processes, Amazon Inspector now supports AWS Lambda functions, adding automated vulnerability assessments for serverless compute workloads. With this expanded capability, Amazon Inspector automatically discovers eligible Lambda functions and identifies software vulnerabilities in application package dependencies used in the Lambda function code. Actionable security findings are aggregated in the Amazon Inspector console, and pushed to Security Hub and EventBridge to automate workflows.
    Data protection and privacy
    The first step to protecting data is to find it. Amazon Macie now automatically discovers sensitive data, providing continual, cost-effective, organization-wide visibility into where sensitive data resides across your Amazon Simple Storage Service (Amazon S3) estate. With this new capability, Macie automatically and intelligently samples and analyzes objects across your S3 buckets, inspecting them for sensitive data such as personally identifiable information (PII), financial data, and AWS credentials. Macie then builds and maintains an interactive data map of your sensitive data in S3 across your accounts and Regions, and provides a sensitivity score for each bucket. This helps you identify and remediate data security risks without manual configuration and reduce monitoring and remediation costs.
    Encryption is a critical tool for protecting data and building customer trust. The launch of the end-to-end encrypted enterprise communication service AWS Wickr offers advanced security and administrative controls that can help you protect sensitive messages and files from unauthorized access, while working to meet data retention requirements.
    Management and governance
    Maintaining compliance with regulatory, security, and operational best practices as you provision cloud resources is key. AWS Config rules, which evaluate the configuration of your resources, have now been extended to support proactive mode, so that they can be incorporated into infrastructure-as-code continuous integration and continuous delivery (CI/CD) pipelines to help identify noncompliant resources prior to provisioning. This can significantly reduce time spent on remediation.
    Managing the controls needed to meet your security objectives and comply with frameworks and standards can be challenging. To make it simpler, we launched comprehensive controls management with AWS Control Tower. You can use it to apply managed preventative, detective, and proactive controls to accounts and organizational units (OUs) by service, control objective, or compliance framework. You can also use AWS Control Tower to turn on Security Hub detective controls across accounts in an OU. This new set of features reduces the time that it takes to define and manage the controls required to meet specific objectives, such as supporting the principle of least privilege, restricting network access, and enforcing data encryption.
    Do more with less
    As we work through macroeconomic conditions, security leaders are facing increased budgetary pressures. In his opening keynote, AWS CEO Adam Selipsky emphasized the effects of the pandemic, inflation, supply chain disruption, energy prices, and geopolitical events that continue to impact organizations.
    Now more than ever, it is important to maintain your security posture despite resource constraints. Citing specific customer examples, Selipsky underscored how the AWS Cloud can help organizations move faster and more securely. By moving to the cloud, agricultural machinery manufacturer Agco reduced costs by 78% while increasing data retrieval speed, and multinational HVAC provider Carrier Global experienced a 40% reduction in the cost of running mission-critical ERP systems.

    “If you’re looking to tighten your belt, the cloud is the place to do it.” – Adam Selipsky, AWS CEO

    Security teams can do more with less by maximizing the value of existing controls, and bolstering security monitoring and analytics capabilities. Services and features announced during AWS re:Invent—including Amazon Security Lake, sensitive data discovery with Amazon Macie, support for Lambda functions in Amazon Inspector, Amazon GuardDuty RDS Protection, and more—can help you get more out of the cloud and address evolving challenges, no matter the economic climate.
    Security is our top priority
    AWS re:Invent featured many more highlights on a variety of topics, such as Amazon EventBridge Pipes and the pre-announcement of GuardDuty EKS Runtime protection, not to mention Amazon CTO Dr. Werner Vogels’ keynote and the security partnerships showcased on the Expo floor. It was a whirlwind week, but one thing is clear: AWS is working harder than ever to make our services better and to collaborate on solutions that ease the path to proactive security, so that you can focus on what matters most—your business.
    For more security-related announcements and on-demand sessions, see Recap to security, identity, and compliance sessions at AWS re:Invent 2022 and the AWS re:Invent Security, Identity, and Compliance playlist on YouTube.
    If you have feedback about this post, submit comments in the Comments section below.

    Anne Grahn
    Anne is a Senior Worldwide Security GTM Specialist at AWS based in Chicago. She has more than a decade of experience in the security industry, and has a strong focus on privacy risk management. She maintains a Certified Information Systems Security Professional (CISSP) certification.

    Paul Hawkins
    Paul helps customers of all sizes understand how to think about cloud security so they can build the technology and culture where security is a business enabler. He takes an optimistic approach to security and believes that getting the foundations right is the key to improving your security posture.

    Powered by WPeMatico

  • Recap to security, identity, and compliance sessions at AWS re:Invent 2022

    Recap to security, identity, and compliance sessions at AWS re:Invent 2022

    AWS re:Invent returned to Las Vegas, NV, in November 2022. The conference featured over 2,200 sessions and hands-on labs and more than 51,000 attendees over 5 days. If you weren’t able to join us in person, or just want to revisit some of the security, identity, and compliance announcements and on-demand sessions, this blog post is for you.

    Key announcements
    Here are some of the security announcements that we made at AWS re:Invent 2022.

    We announced the preview of a new service, Amazon Security Lake. Amazon Security Lake automatically centralizes security data from cloud, on-premises, and custom sources into a purpose-built data lake stored in your AWS account. Security Lake makes it simpler to analyze security data so that you can get a more complete understanding of security across your entire organization. You can also improve the protection of your workloads, applications, and data. Security Lake automatically gathers and manages your security data across accounts and AWS Regions.
    We introduced the AWS Digital Sovereignty Pledge—our commitment to offering the most advanced set of sovereignty controls and features available in the cloud. As part of this pledge, we launched a new feature of AWS Key Management Service, External Key Store (XKS), where you can use your own encryption keys stored outside of the AWS Cloud to protect data on AWS.
    To help you with the building blocks for zero trust, we introduced two new services:

    AWS Verified Access provides secure access to corporate applications without a VPN. Verified Access verifies each access request in real time and only connects users to the applications that they are allowed to access, removing broad access to corporate applications and reducing the associated risks.
    Amazon Verified Permissions is a scalable, fine-grained permissions management and authorization service for custom applications. Using the Cedar policy language, Amazon Verified Permissions centralizes fine-grained permissions for custom applications and helps developers authorize user actions in applications.

    We announced Automated sensitive data discovery for Amazon Macie. This new capability helps you gain visibility into where your sensitive data resides on Amazon Simple Storage Service (Amazon S3) at a fraction of the cost of running a full data inspection across all your S3 buckets. Automated sensitive data discovery automates the continual discovery of sensitive data and potential data security risks across your S3 storage aggregated at the AWS Organizations level.
    Amazon Inspector now supports AWS Lambda functions, adding continual, automated vulnerability assessments for serverless compute workloads. Amazon Inspector automatically discovers eligible AWS Lambda functions and identifies software vulnerabilities in application package dependencies used in the Lambda function code. The functions are initially assessed upon deployment to Lambda and continually monitored and reassessed, informed by updates to the function and newly published vulnerabilities. When vulnerabilities are identified, actionable security findings are generated, aggregated in Amazon Inspector, and pushed to Security Hub and Amazon EventBridge to automate workflows.
    Amazon GuardDuty now offers threat detection for Amazon Aurora to identify potential threats to data stored in Aurora databases. Currently in preview, Amazon GuardDuty RDS Protection profiles and monitors access activity to existing and new databases in your account, and uses tailored machine learning models to detect suspicious logins to Aurora databases. When a potential threat is detected, GuardDuty generates a security finding that includes database details and contextual information on the suspicious activity. GuardDuty is integrated with Aurora for direct access to database events without requiring you to modify your databases.
    AWS Security Hub is now integrated with AWS Control Tower, allowing you to pair Security Hub detective controls with AWS Control Tower proactive or preventive controls and manage them together using AWS Control Tower. Security Hub controls are mapped to related control objectives in the AWS Control Tower control library, providing you with a holistic view of the controls required to meet a specific control objective. This combination of over 160 detective controls from Security Hub, with the AWS Control Tower built-in automations for multi-account environments, gives you a strong baseline of governance and off-the-shelf controls to scale your business using new AWS workloads and services. This combination of controls also helps you monitor whether your multi-account AWS environment is secure and managed in accordance with best practices, such as the AWS Foundational Security Best Practices standard.
    We launched our Cloud Audit Academy (CAA) course for Federal and DoD Workloads (FDW) on AWS. This new course is a 12-hour interactive training based on NIST SP 800-171, with mappings to NIST SP 800-53 and the Cybersecurity Maturity Model Certification (CMMC) and covers AWS services relevant to each NIST control family. This virtual instructor-led training is industry- and framework-specific for our U.S. Federal and DoD customers.
    AWS Wickr allows businesses and public sector organizations to collaborate more securely, while retaining data to help meet requirements such as e-discovery and Freedom of Information Act (FOIA) requests. AWS Wickr is an end-to-end encrypted enterprise communications service that facilitates one-to-one chats, group messaging, voice and video calling, file sharing, screen sharing, and more.
    We introduced the Post-Quantum Cryptography hub that aggregates resources and showcases AWS research and engineering efforts focused on providing cryptographic security for our customers, and how AWS interfaces with the global cryptographic community.

    Watch on demand
    Were you unable to join the event in person? See the following for on-demand sessions.
    Keynotes and leadership sessions
    Watch the AWS re:Invent 2022 keynote where AWS Chief Executive Officer Adam Selipsky shares best practices for managing security, compliance, identity, and privacy in the cloud. You can also replay the other AWS re:Invent 2022 keynotes.
    To learn about the latest innovations in cloud security from AWS and what you can do to foster a culture of security in your business, watch AWS Chief Information Security Officer CJ Moses’s leadership session with guest Deneen DeFiore, Chief Information Security Officer at United Airlines.
    Breakout sessions and new launch talks
    You can watch talks and learning sessions on demand to learn about the following topics:

    See how AWS, customers, and partners work together to raise their security posture with AWS infrastructure and services. Learn about trends in identity and access management, threat detection and incident response, network and infrastructure security, data protection and privacy, and governance, risk, and compliance.
    Dive into our launches! Hear from security experts on recent announcements. Learn how new services and solutions can help you meet core security and compliance requirements.

    Consider joining us for more in-person security learning opportunities by saving the date for AWS re:Inforce 2023, which will be held June 13-14 in Anaheim, California. We look forward to seeing you there!
    If you’d like to discuss how these new announcements can help your organization improve its security posture, AWS is here to help. Contact your AWS account team today.
    If you have feedback about this post, submit comments in the Comments section below. If you have questions about this post, contact AWS Support.
    Want more AWS Security news? Follow us on Twitter.

    Katie Collins
    Katie is a Product Marketing Manager in AWS Security, where she brings her enthusiastic curiosity to deliver products that drive value for customers. Her experience also includes product management at both startups and large companies. With a love for travel, Katie is always eager to visit new places while enjoying a great cup of coffee.

    Himanshu Verma
    Himanshu is a Worldwide Specialist for AWS Security Services. In this role, he leads the go-to-market creation and execution for AWS Security Services, field enablement, and strategic customer advisement. Prior to AWS, he held several leadership roles in Product Management, engineering and development, working on various identity, information security and data protection technologies. He obsesses brainstorming disruptive ideas, venturing outdoors, photography and trying various “hole in the wall” food and drinking establishments around the globe.

    Powered by WPeMatico

  • How to query and visualize Macie sensitive data discovery results with Athena and QuickSight

    How to query and visualize Macie sensitive data discovery results with Athena and QuickSight

    Amazon Macie is a fully managed data security service that uses machine learning and pattern matching to help you discover and protect sensitive data in Amazon Simple Storage Service (Amazon S3). With Macie, you can analyze objects in your S3 buckets to detect occurrences of sensitive data, such as personally identifiable information (PII), financial information, personal health information, and access credentials.
    In this post, we walk you through a solution to gain comprehensive and organization-wide visibility into which types of sensitive data are present in your S3 storage, where the data is located, and how much is present. Once enabled, Macie automatically starts discovering sensitive data in your S3 storage and builds a sensitive data profile for each bucket. The profiles are organized in a visual, interactive data map, and you can use the data map to run targeted sensitive data discovery jobs. Both automated data discovery and targeted jobs produce rich, detailed sensitive data discovery results. This solution uses Amazon Athena and Amazon QuickSight to deep-dive on the Macie results, and to help you analyze, visualize, and report on sensitive data discovered by Macie, even when the data is distributed across millions of objects, thousands of S3 buckets, and thousands of AWS accounts. Athena is an interactive query service that makes it simpler to analyze data directly in Amazon S3 using standard SQL. QuickSight is a cloud-scale business intelligence tool that connects to multiple data sources, including Athena databases and tables.
    This solution is relevant to data security, data governance, and security operations engineering teams.
    The challenge: how to summarize sensitive data discovered in your growing S3 storage
    Macie issues findings when an object is found to contain sensitive data. In addition to findings, Macie keeps a record of each S3 object analyzed in a bucket of your choice for long-term storage. These records are known as sensitive data discovery results, and they include additional context about your data in Amazon S3. Due to the large size of the results file, Macie exports the sensitive data discovery results to an S3 bucket, so you need to take additional steps to query and visualize the results. We discuss the differences between findings and results in more detail later in this post.
    With the increasing number of data privacy guidelines and compliance mandates, customers need to scale their monitoring to encompass thousands of S3 buckets across their organization. The growing volume of data to assess, and the growing list of findings from discovery jobs, can make it difficult to review and remediate issues in a timely manner. In addition to viewing individual findings for specific objects, customers need a way to comprehensively view, summarize, and monitor sensitive data discovered across their S3 buckets.
    To illustrate this point, we ran a Macie sensitive data discovery job on a dataset created by AWS. The dataset contains about 7,500 files that have sensitive information, and Macie generated a finding for each sensitive file analyzed, as shown in Figure 1.

    Figure 1: Macie findings from the dataset

    Your security team could spend days, if not months, analyzing these individual findings manually. Instead, we outline how you can use Athena and QuickSight to query and visualize the Macie sensitive data discovery results to understand your data security posture.
    The additional information in the sensitive data discovery results will help you gain comprehensive visibility into your data security posture. With this visibility, you can answer questions such as the following:

    What are the top 5 most commonly occurring sensitive data types?
    Which AWS accounts have the most findings?
    How many S3 buckets are affected by each of the sensitive data types?

    Your security team can write their own customized queries to answer questions such as the following:

    Is there sensitive data in AWS accounts that are used for development purposes?
    Is sensitive data present in S3 buckets that previously did not contain sensitive information?
    Was there a change in configuration for S3 buckets containing the greatest amount of sensitive data?

    How are findings different from results?
    As a Macie job progresses, it produces two key types of output: sensitive data findings (or findings for short), and sensitive data discovery results (or results).
    Findings provide a report of potential policy violations with an S3 bucket, or the presence of sensitive data in a specific S3 object. Each finding provides a severity rating, information about the affected resource, and additional details, such as when Macie found the issue. Findings are published to the Macie console, AWS Security Hub, and Amazon EventBridge.
    In contrast, results are a collection of records for each S3 object that a Macie job analyzed. These records contain information about objects that do and do not contain sensitive data, including up to 1,000 occurrences of each sensitive data type that Macie found in a given object, and whether Macie was unable to analyze an object because of issues such as permissions settings or use of an unsupported format. If an object contains sensitive data, the results record includes detailed information that isn’t available in the finding for the object.
    One of the key benefits of querying results is to uncover gaps in your data protection initiatives—these gaps can occur when data in certain buckets can’t be analyzed because Macie was denied access to those buckets, or was unable to decrypt specific objects. The following table maps some of the key differences between findings and results.

    Findings
    Results

    Enabled by default
    Yes
    No

    Location of published results
    Macie console, Security Hub, and EventBridge
    S3 bucket

    Details of S3 objects that couldn’t be scanned
    No
    Yes

    Details of S3 objects in which no sensitive data was found
    No
    Yes

    Identification of files inside compressed archives that contain sensitive data
    No
    Yes

    Number of occurrences reported per object
    Up to 15
    Up to 1,000

    Retention period
    90 days in Macie console
    Defined by customer

    Architecture
    As shown in Figure 2, you can build out the solution in three steps:

    Enable the results and publish them to an S3 bucket
    Build out the Athena table to query the results by using SQL
    Visualize the results with QuickSight

    Figure 2: Architecture diagram showing the flow of the solution

    Prerequisites
    To implement the solution in this blog post, you must first complete the following prerequisites:

    Enable Macie in your account. For instructions, see Getting started with Amazon Macie.
    Set your account as the delegated Macie administrator account by using AWS Organizations. Optionally, you can also enable Macie in additional member accounts using AWS Organizations.
    Sign up for QuickSight in the account that you set as the delegated Macie administrator. For instructions on how to sign up, see Signing up for an Amazon QuickSight subscription. You can use the QuickSight Standard Edition for this post.
    To follow along with the examples in this post, download the sample dataset. The dataset is a single .ZIP file that contains three directories (fk, rt, and mkro). For this post, we used three accounts in our organization, created an S3 bucket in each of them, and then copied each directory to an individual bucket, as shown in Figure 3.

    Figure 3: Sample data loaded into three different AWS accounts

    Note: All data in this blog post has been artificially created by AWS for demonstration purposes and has not been collected from any individual person. Similarly, such data does not, nor is it intended, to relate back to any individual person.

    Step 1: Enable the results and publish them to an S3 bucket
    Publication of the discovery results to Amazon S3 is not enabled by default. The setup requires that you specify an S3 bucket to store the results (we also refer to this as the discovery results bucket), and use an AWS Key Management Service (AWS KMS) key to encrypt the bucket.
    If you are analyzing data across multiple accounts in your organization, then you need to enable the results in your delegated Macie administrator account. You do not need to enable results in individual member accounts. However, if you’re running Macie jobs in a standalone account, then you should enable the Macie results directly in that account.
    To enable the results

    Open the Macie console.
    Select the AWS Region from the upper right of the page.
    From the left navigation pane, select Discovery results.
    Select Configure now.
    Select Create Bucket, and enter a unique bucket name. This will be the discovery results bucket name. Make note of this name because you will use it when you configure the Athena tables later in this post.
    Under Encryption settings, select Create new key. This takes you to the AWS KMS console in a new browser tab.
    In the AWS KMS console, do the following:

    For Key type, choose symmetric, and for Key usage, choose Encrypt and Decrypt.
    Enter a meaningful key alias (for example, macie-results-key) and description.
    (Optional) For simplicity, set your current user or role as the Key Administrator.
    Set your current user/role as a user of this key in the key usage permissions step. This will give you the right permissions to run the Athena queries later.
    Review the settings and choose Finish.

    Navigate to the browser tab with the Macie console.
    From the AWS KMS Key dropdown, select the new key.
    To view KMS key policy statements that were automatically generated for your specific key, account, and Region, select View Policy. Copy these statements in their entirety to your clipboard.
    Navigate back to the browser tab with the AWS KMS console and then do the following:

    Select Customer managed keys.
    Choose the KMS key that you created, choose Switch to policy view, and under Key policy, select Edit.
    In the key policy, paste the statements that you copied. When you add the statements, do not delete any existing statements and make sure that the syntax is valid. Policies are in JSON format.

    Navigate back to the Macie console browser tab.
    Review the inputs in the Settings page for Discovery results and then choose Save. Macie will perform a check to make sure that it has the right access to the KMS key, and then it will create a new S3 bucket with the required permissions.
    If you haven’t run a Macie discovery job in the last 90 days, you will need to run a new discovery job to publish the results to the bucket.

    In this step, you created a new S3 bucket and KMS key that you are using only for Macie. For instructions on how to enable and configure the results using existing resources, see Storing and retaining sensitive data discovery results with Amazon Macie. Make sure to review Macie pricing details before creating and running a sensitive data discovery job.
    Step 2: Build out the Athena table to query the results using SQL
    Now that you have enabled the discovery results, Macie will begin publishing them into your discovery results bucket in the form of jsonl.gz files. Depending on the amount of data, there could be thousands of individual files, with each file containing multiple records. To identify the top five most commonly occurring sensitive data types in your organization, you would need to query all of these files together.
    In this step, you will configure Athena so that it can query the results using SQL syntax. Before you can run an Athena query, you must specify a query result bucket location in Amazon S3. This is different from the Macie discovery results bucket that you created in the previous step.
    If you haven’t set up Athena previously, we recommend that you create a separate S3 bucket, and specify a query result location using the Athena console. After you’ve set up the query result location, you can configure Athena.
    To create a new Athena database and table for the Macie results

    Open the Athena console, and in the query editor, enter the following data definition language (DDL) statement. In the context of SQL, a DDL statement is a syntax for creating and modifying database objects, such as tables. For this example, we named our database macie_results.

    CREATE DATABASE macie_results;

    After running this step, you’ll see a new database in the Database dropdown. Make sure that the new macie_results database is selected for the next queries.

    Figure 4: Create database in the Athena console

    Create a table in the database by using the following DDL statement. Make sure to replace with the name of the discovery results bucket that you created previously.

    CREATE EXTERNAL TABLE maciedetail_all_jobs(
    accountid string,
    category string,
    classificationdetails struct,
    createdat string,
    description string,
    id string,
    partition string,
    region string,
    resourcesaffected struct,
    schemaversion string,
    severity struct,
    title string,
    type string,
    updatedat string)
    ROW FORMAT SERDE
    ‘org.openx.data.jsonserde.JsonSerDe’
    WITH SERDEPROPERTIES (
    ‘paths’=’accountId,category,classificationDetails,createdAt,description,id,partition,region,resourcesAffected,schemaVersion,severity,title,type,updatedAt’)
    STORED AS INPUTFORMAT
    ‘org.apache.hadoop.mapred.TextInputFormat’
    OUTPUTFORMAT
    ‘org.apache.hadoop.hive.ql.io.HiveIgnoreKeyTextOutputFormat’
    LOCATION
    ‘s3:///AWSLogs/’

    After you complete this step, you will see a new table named maciedetail_all_jobs in the Tables section of the query editor.
    Query the results to start gaining insights. For example, to identify the top five most common sensitive data types, run the following query:

    select sensitive_data.category,
    detections_data.type,
    sum(cast(detections_data.count as INT)) total_detections
    from maciedetail_all_jobs,
    unnest(classificationdetails.result.sensitiveData) as t(sensitive_data),
    unnest(sensitive_data.detections) as t(detections_data)
    where classificationdetails.result.sensitiveData is not null
    and resourcesaffected.s3object.embeddedfiledetails is null
    group by sensitive_data.category, detections_data.type
    order by total_detections desc
    LIMIT 5

    Running this query on the sample dataset gives the following output.

    Figure 5: Results of a query showing the five most common sensitive data types in the dataset

    (Optional) The previous query ran on all of the results available for Macie. You can further query which accounts have the greatest amount of sensitive data detected.

    select accountid,
    sum(cast(detections_data.count as INT)) total_detections
    from maciedetail_all_jobs,
    unnest(classificationdetails.result.sensitiveData) as t(sensitive_data),
    unnest(sensitive_data.detections) as t(detections_data)
    where classificationdetails.result.sensitiveData is not null
    and resourcesaffected.s3object.embeddedfiledetails is null
    group by accountid
    order by total_detections desc

    To test this query, we distributed the synthetic dataset across three member accounts in our organization, ran the query, and received the following output. If you enable Macie in just a single account, then you will only receive results for that one account.

    Figure 6: Query results for total number of sensitive data detections across all accounts in an organization

    For a list of more example queries, see the amazon-macie-results-analytics GitHub repository.
    Step 3: Visualize the results with QuickSight
    In the previous step, you used Athena to query your Macie discovery results. Although the queries were powerful, they only produced tabular data as their output. In this step, you will use QuickSight to visualize the results of your Macie jobs.
    Before creating the visualizations, you first need to grant QuickSight the right permissions to access Athena, the results bucket, and the KMS key that you used to encrypt the results.
    To allow QuickSight access to the KMS key

    Open the AWS Identity and Access Management (IAM) console, and then do the following:

    In the navigation pane, choose Roles.
    In the search pane for roles, search for aws-quicksight-s3-consumers-role-v0. If this role does not exist, search for aws-quicksight-service-role-v0.
    Select the role and copy the role ARN. You will need this role ARN to modify the KMS key policy to grant permissions for this role.

    Open the AWS KMS console and then do the following:

    Select Customer managed keys.
    Choose the KMS key that you created.
    Paste the following statement in the key policy. When you add the statement, do not delete any existing statements, and make sure that the syntax is valid. Replace and with your own information. Policies are in JSON format.

    { “Sid”: “Allow Quicksight Service Role to use the key”,
    “Effect”: “Allow”,
    “Principal”: {
    “AWS”:
    },
    “Action”: “kms:Decrypt”,
    “Resource”:
    }

    To allow QuickSight access to Athena and the discovery results S3 bucket

    In QuickSight, in the upper right, choose your user icon to open the profile menu, and choose US East (N.Virginia). You can only modify permissions in this Region.
    In the upper right, open the profile menu again, and select Manage QuickSight.
    Select Security & permissions.
    Under QuickSight access to AWS services, choose Manage.
    Make sure that the S3 checkbox is selected, click on Select S3 buckets, and then do the following:

    Choose the discovery results bucket.
    You do not need to check the box under Write permissions for Athena workgroup. The write permissions are not required for this post.
    Select Finish.

    Make sure that the Amazon Athena checkbox is selected.
    Review the selections and be careful that you don’t inadvertently disable AWS services and resources that other users might be using.
    Select Save.
    In QuickSight, in the upper right, open the profile menu, and choose the Region where your results bucket is located.

    Now that you’ve granted QuickSight the right permissions, you can begin creating visualizations.
    To create a new dataset referencing the Athena table

    On the QuickSight start page, choose Datasets.
    On the Datasets page, choose New dataset.
    From the list of data sources, select Athena.
    Enter a meaningful name for the data source (for example, macie_datasource) and choose Create data source.
    Select the database that you created in Athena (for example, macie_results).
    Select the table that you created in Athena (for example, maciedetail_all_jobs), and choose Select.
    You can either import the data into SPICE or query the data directly. We recommend that you use SPICE for improved performance, but the visualizations will still work if you query the data directly.
    To create an analysis using the data as-is, choose Visualize.

    You can then visualize the Macie results in the QuickSight console. The following example shows a delegated Macie administrator account that is running a visualization, with account IDs on the y axis and the count of affected resources on the x axis.

    Figure 7: Visualize query results to identify total number of sensitive data detections across accounts in an organization

    You can also visualize the aggregated data in QuickSight. For example, you can view the number of findings for each sensitive data category in each S3 bucket. The Athena table doesn’t provide aggregated data necessary for visualization. Instead, you need to query the table and then visualize the output of the query.
    To query the table and visualize the output in QuickSight

    On the Amazon QuickSight start page, choose Datasets.
    On the Datasets page, choose New dataset.
    Select the data source that you created in Athena (for example, macie_datasource) and then choose Create Dataset.
    Select the database that you created in Athena (for example, macie_results).
    Choose Use Custom SQL, enter the following query below, and choose Confirm Query.

    select resourcesaffected.s3bucket.name as bucket_name,
    sensitive_data.category,
    detections_data.type,
    sum(cast(detections_data.count as INT)) total_detections
    from macie_results.maciedetail_all_jobs,
    unnest(classificationdetails.result.sensitiveData) as t(sensitive_data),unnest(sensitive_data.detections) as t(detections_data)
    where classificationdetails.result.sensitiveData is not null
    and resourcesaffected.s3object.embeddedfiledetails is null
    group by resourcesaffected.s3bucket.name, sensitive_data.category, detections_data.type
    order by total_detections desc

    You can either import the data into SPICE or query the data directly.
    To create an analysis using the data as-is, choose Visualize.

    Now you can visualize the output of the query that aggregates data across your S3 buckets. For example, we used the name of the S3 bucket to group the results, and then we created a donut chart of the output, as shown in Figure 6.

    Figure 8: Visualize query results for total number of sensitive data detections across each S3 bucket in an organization

    From the visualizations, we can identify which buckets or accounts in our organizations contain the most sensitive data, for further action. Visualizations can also act as a dashboard to track remediation.
    If you encounter permissions issues, see Insufficient permissions when using Athena with Amazon QuickSight and Troubleshooting key access for troubleshooting steps.
    You can replicate the preceding steps by using the sample queries from the amazon-macie-results-analytics GitHub repo to view data that is aggregated across S3 buckets, AWS accounts, or individual Macie jobs. Using these queries with the results of your Macie results will help you get started with tracking the security posture of your data in Amazon S3.
    Conclusion
    In this post, you learned how to enable sensitive data discovery results for Macie, query those results with Athena, and visualize the results in QuickSight.
    Because Macie sensitive data discovery results provide more granular data than the findings, you can pursue a more comprehensive incident response when sensitive data is discovered. The sample queries in this post provide answers to some generic questions that you might have. After you become familiar with the structure, you can run other interesting queries on the data.
    We hope that you can use this solution to write your own queries to gain further insights into sensitive data discovered in S3 buckets, according to the business needs and regulatory requirements of your organization. You can consider using this solution to better understand and identify data security risks that need immediate attention. For example, you can use this solution to answer questions such as the following:

    Is financial information present in an AWS account where it shouldn’t be?
    Are S3 buckets that contain PII properly hardened with access controls and encryption?

    You can also use this solution to understand gaps in your data security initiatives by tracking files that Macie couldn’t analyze due to encryption or permission issues. To further expand your knowledge of Macie capabilities and features, see the following resources:

    Automated Data Discovery for Amazon Macie
    Use Amazon Macie for automatic, continual, and cost-effective discovery of sensitive data in S3
    Best practices for setting up Amazon Macie with AWS Organizations
    How to use Amazon Macie to preview sensitive data in S3 buckets
    Use Security Hub custom actions to remediate S3 resources based on Macie discovery results
    Learn more about the new allow list feature in Macie
    Discover sensitive data by using custom data identifiers with Amazon Macie

    If you have feedback about this post, submit comments in the Comments section below. If you have questions about this post, start a new thread on Amazon Macie re:Post.
    Want more AWS Security news? Follow us on Twitter.

    Keith Rozario
    Keith is a Sr. Solution Architect at Amazon Web Services based in Singapore, where he helps customers develop solutions for their most complex business problems. He loves road cycling, reading comics from DC, and enjoying the sweet sound of music from AC/DC.

    Scott Ward
    Scott is a Principal Solutions Architect with AWS External Security Services (ESS) and has been with Amazon for over 20 years. Scott provides technical guidance to the ESS services, such as GuardDuty, Security Hub, Macie, Inspector and Detective, and helps customers make their applications secure. Scott has a deep background in supporting, enhancing, and building global financial solutions to meet the needs of large companies, including many years of supporting the global financial systems for Amazon.com.

    Koulick Ghosh
    Koulick is a Senior Product Manager in AWS Security based in Seattle, WA. He loves speaking with customers on how AWS Security services can help make them more secure. In his free-time, he enjoys playing the guitar, reading, and exploring the Pacific Northwest.

    Powered by WPeMatico

  • HIGH-INTENSITY CIRCUIT TRAINING USING BODY WEIGHT: Maximum Results With Minimal Investment

    HIGH-INTENSITY CIRCUIT TRAINING USING BODY WEIGHT: Maximum Results With Minimal Investment

    LEARNING OBJECTIVE

    To understand the health benefits and practical application of a high-intensity circuit training exercise protocol.

    Powered by WPeMatico

  • Worldwide Survey of Fitness Trends for 2023

    Worldwide Survey of Fitness Trends for 2023

    The annual ACSM’s Health & Fitness Journal® worldwide survey to determine industry trends by health and fitness professionals is now in its 17th consecutive year. The COVID-19 pandemic certainly made an impact on the 2021 survey and continued for 2022, but for 2023, some current trends are emerging whereas others are weakening because of the world’s recovery from the isolation caused by COVID-19. The #1 trend for 2023, as it was for 2022, is wearable technology. Home exercise gyms was #2 for 2022 but has dropped to #13 for 2023. Fitness programs for older adults will make a comeback in 2023, breaking the top 10 at #4. Functional fitness training, a popular form of exercise for the older adult, is the #5 trend for 2023.

    Apply It!

    From this article, the reader should understand the following concepts:

    Powered by WPeMatico

  • 2023 Fitness Trends from Around the Globe

    2023 Fitness Trends from Around the Globe

    Apply It!

    From this article, the reader should be able to:

    Powered by WPeMatico

  • STRESS RELIEF: The Role of Exercise in Stress Management

    STRESS RELIEF: The Role of Exercise in Stress Management

    LEARNING OBJECTIVE

    • Exercise can be an effective component of a stress management program, and all types of exercise can be beneficial for stress management. Exercise programs consistent with the current recommendations to improve health can be prescribed to manage stress. Fitness professionals should recognize that it might be necessary to refer a client to a psychologist or other health care provider to help develop strategies for managing stressors that produce chronic and acute episodic stress.

    Powered by WPeMatico

  • Worldwide Survey of Fitness Trends for 2022

    Worldwide Survey of Fitness Trends for 2022

    Apply It!

    From this article, the reader should understand the following concepts:

    Powered by WPeMatico

  • HATHA YOGA: Benefits and Principles for a More Meaningful Practice

    HATHA YOGA: Benefits and Principles for a More Meaningful Practice

    LEARNING OBJECTIVE

    • To understand Yoga more fully by learning about the eight limbs of Yoga. More specifically, to understand the yamas and niyamas, or ethical principles for living well, enough to be able to incorporate these principles both on and off the mat for a more meaningful practice.

    Powered by WPeMatico