Title: AWS re:Inforce 2024 - Developer’s security survival guide (COM321)
Insights:
- Incident Response Scenario: The speaker begins with a real-life scenario where they were unable to log into AWS, leading to production disruptions. This sets the stage for discussing incident response and threat mitigation.
 - Speaker Background: Brian Huff, an AWS DevTools hero and former AWS community builder, transitioned from a non-technical background to a security engineer, emphasizing the importance of security in development.
 - DevSecOps Primer: The talk covers a primer on DevSecOps, incident response, threat mitigation, and secure architecture patterns.
 - Security Best Practices: Emphasizes common security practices like changing passwords, using two-factor authentication, password managers, VPNs, and the principle of least privilege.
 - IAM Importance: Highlights the importance of Identity and Access Management (IAM) in DevSecOps, using JSON documents to control service permissions.
 - Managed Services and OWASP: While not the focus, the speaker mentions the importance of understanding OWASP vulnerabilities and how managed services abstract some security concerns.
 - Least Privilege Access: Stresses the importance of granting minimal necessary permissions to services and users to enhance security.
 - Threat Modeling: Encourages conducting threat modeling exercises to identify potential security vulnerabilities in applications.
 - Incident Response Checklist: Provides a detailed incident response resolution checklist, including using CloudTrail for tracking API activities and Security Hub for scanning vulnerabilities.
 - Proactive Security Measures: Discusses the importance of planning ahead and being proactive in threat mitigation, using tools like Security Hub, CloudWatch, and IAM policies.
 - Infrastructure as Code: Advocates for using infrastructure as code (e.g., SST, serverless framework) to create repeatable and secure deployment patterns.
 - Short-term Credentials: Recommends using short-term credentials and Secrets Manager for managing access securely.
 - CI/CD Pipelines: Highlights the importance of CI/CD pipelines with automation for secure and efficient deployments.
 - DDoS and Cross-Site Script Protection: Suggests using AWS Shield and WAF to protect applications against DDoS attacks and cross-site scripting.
 - Internal Tools Security: Emphasizes that internal tools should be secured with VPN and SSO to prevent unauthorized access.
 - Shift Security Left: Concludes with the importance of integrating security early in the development process, often referred to as "shifting security left."
 
Quotes:
- "I was literally building the rocket ship as I'm flying it."
 - "Engineers ship applications and security engineers ship access."
 - "You really need to know what the services need at the least amount possible."
 - "No one wants to talk about incidents, but they do happen."
 - "The four top questions that I think you should immediately ask when you are in an incident are who, what, where, and why."
 - "It's important to think about these types of ways to build because there's patterns that you can replicate."
 - "Pre-signed URLs are really helpful because it creates this time-limited authentication token to the resource."
 - "We like that. It makes it really easy to just give access for a certain period of time."
 - "Shift the security focus earlier in the process. Some people call it shifting security left."
 - "I hope that this is empowering and helpful for you to architect security into your development journey and really put the dev in DevSecOps."