SlideShare une entreprise Scribd logo
1  sur  24
AWS: Overview of
Security Processes
Stephen Schmidt
Chief Information Security Officer
AWS Security Model Overview
       Certifications & Accreditations                                                   Shared Responsibility Model

  !    Sarbanes-Oxley (SOX) compliance                                              !    Customer/SI Partner/ISV controls
  !    ISO 27001 Certification                                                            guest OS-level security, including
  !    PCI DSS Level I Certification                                                      patching and maintenance
  !    HIPAA compliant architecture                                                 !    Application level security, including
                                                                                          password and role based access
  !    SAS 70(SOC 1) Type II Audit
                                                                                    !    Host-based firewalls, including
  !    FISMA Low & Moderate ATOs
                                                                                          Intrusion Detection/Prevention
  !    DIACAP MAC III-Sensitive                                                           Systems
         §    Pursuing DIACAP MAC II–Sensitive                                     !    Separation of Access
Physical Security                                 VM Security                                 Network Security
!   Multi-level, multi-factor controlled          !   Multi-factor access to Amazon           !   Instance firewalls can be configured
     access environment                                Account                                     in security groups;
!   Controlled, need-based access for             !   Instance Isolation                      !   The traffic may be restricted by
     AWS employees (least privilege)                     •  Customer-controlled firewall at        protocol, by service port, as well as
Management Plane Administrative Access                      the hypervisor level                   by source IP address (individual IP
!   Multi-factor, controlled, need-based                 •  Neighboring instances                  or Classless Inter-Domain Routing
     access to administrative host                          prevented access                       (CIDR) block).
!   All access logged, monitored,                        •  Virtualized disk management       !   Virtual Private Cloud (VPC) provides
     reviewed                                               layer ensure only account              IPSec VPN access from existing
!   AWS Administrators DO NOT have                          owners can access storage              enterprise data center to a set of
     logical access inside a customer’s                     disks (EBS)                            logically isolated AWS resources
     VMs, including applications and data         !   Support for SSL end point encryption
                                                       for API calls
Shared Responsibility Model
             AWS                             Customer
•    Facili'es	
                      •  Opera'ng	
  System	
  
•    Physical	
  Security	
           •  Applica'on	
  
•    Physical	
  Infrastructure	
     •  Security	
  Groups	
  
•    Network	
  Infrastructure	
      •  Network	
  ACLs	
  
•    Virtualiza'on	
                  •  Network	
  Configura'on	
  
     Infrastructure	
  	
             •  Account	
  Management	
  
AWS Security Resources


!       http://aws.amazon.com/security/
!       Security Whitepaper
!       Risk and Compliance Whitepaper
!       Latest Versions May 2011, January
        2012 respectively
!       Regularly Updated
!       Feedback is welcome
AWS Certifications
!   Sarbanes-Oxley (SOX)
!   ISO 27001 Certification
!   Payment Card Industry Data Security
    Standard (PCI DSS) Level 1 Compliant
!   SAS70(SOC 1) Type II Audit
!   FISMA A&As
    •  Multiple NIST Low Approvals to Operate (ATO)
    •  NIST Moderate, GSA issued ATO
    •  FedRAMP
!   DIACAP MAC III Sensitive ATO
!   Customers have deployed various compliant applications such as HIPAA
    (healthcare)
SOC 1 Type II
!    Amazon Web Services now publishes a Service Organization Controls 1 (SOC 1), Type 2
     report every six months and maintains a favorable unbiased and unqualified opinion
     from its independent auditors. AWS identifies those controls relating to the operational
     performance and security to safeguard customer data. The SOC 1 report audit attests
     that AWS’ control objectives are appropriately designed and that the individual controls
     defined to safeguard customer data are operating effectively. Our commitment to the SOC 1
     report is on-going and we plan to continue our process of periodic audits.

!    The audit for this report is conducted in accordance with the Statement on Standards for
     Attestation Engagements No. 16 (SSAE 16) and the International Standards for Assurance
     Engagements No. 3402 (ISAE 3402) professional standards. This dual-standard report can
     meet a broad range of auditing requirements for U.S. and international auditing bodies. This
     audit is the replacement of the Statement on Auditing Standards No. 70 (SAS 70) Type II
     report.

!    This report is available to customers under NDA.
SOC 1
            Type II – Control Objectives
!   Control Objective 1: Security Organization
!   Control Objective 2: Amazon Employee Lifecycle
!   Control Objective 3: Logical Security
!   Control Objective 4: Secure Data Handling
!   Control Objective 5: Physical Security
!   Control Objective 6: Environmental Safeguards
!   Control Objective 7: Change Management
!   Control Objective 8: Data Integrity, Availability and Redundancy
!   Control Objective 9: Incident Handling
ISO 27001

!   AWS has achieved ISO 27001 certification of our
    Information Security Management System (ISMS)
    covering AWS infrastructure, data centers in all regions
    worldwide, and services including Amazon Elastic
    Compute Cloud (Amazon EC2), Amazon Simple Storage
    Service (Amazon S3) and Amazon Virtual Private Cloud
    (Amazon VPC). We have established a formal program
    to maintain the certification.
Physical Security

!   Amazon has been building large-scale data centers for
    many years
!   Important attributes:
   •    Non-descript facilities
   •    Robust perimeter controls
   •    Strictly controlled physical access
   •    2 or more levels of two-factor auth
!   Controlled, need-based access for
    AWS employees (least privilege)
!   All access is logged and reviewed
GovCloud    US West        US West    US East       South          EU         Asia          Asia
 (US ITAR    (Northern     (Oregon)   (Northern    America       (Ireland)   Pacific       Pacific
  Region)    California)               Virginia)   (Sao Paulo)               (Singapore)   (Tokyo)




   AWS Regions
   AWS Edge Locations
AWS Regions and Availability Zones




   Customer Decides Where Applications and Data Reside
AWS Identity and Access Management
!   Enables	
  a	
  customer	
  to	
  create	
  mul'ple	
  Users	
  and	
  
    manage	
  the	
  permissions	
  for	
  each	
  of	
  these	
  Users.	
  	
  
!   Secure	
  by	
  default;	
  new	
  Users	
  have	
  no	
  access	
  to	
  
    AWS	
  un'l	
  permissions	
  are	
  explicitly	
  granted.	
  Us	
  
!   AWS	
  IAM	
  enables	
  customers	
  to	
  minimize	
  the	
  
    use	
  of	
  their	
  AWS	
  Account	
  creden'als.	
  	
  Instead	
  
    all	
  interac'ons	
  with	
  AWS	
  Services	
  and	
  resources	
  
    should	
  be	
  with	
  AWS	
  IAM	
  User	
  security	
  
    creden'als.er	
  
!   Customers	
  can	
  enable	
  MFA	
  devices	
  for	
  their	
  
    AWS	
  Account	
  as	
  well	
  as	
  for	
  the	
  Users	
  they	
  have	
  
    created	
  under	
  their	
  AWS	
  Account	
  with	
  AWS	
  
    IAM.	
  
AWS MFA Benefits
!   Helps prevent anyone with unauthorized
    knowledge of your e-mail address and password
    from impersonating you
!   Requires a device in your physical possession to
    gain access to secure pages on the AWS Portal or
    to gain access to the AWS Management Console
!   Adds an extra layer of protection to sensitive
    information, such as your AWS access identifiers
!   Extends protection to your AWS resources such as
    Amazon EC2 instances and Amazon S3 data
Amazon EC2 Security
!   Host operating system
    •  Individual SSH keyed logins via bastion host for AWS admins
    •  All accesses logged and audited
!   Guest operating system
    •  Customer controlled at root level
    •  AWS admins cannot log in
    •  Customer-generated keypairs
!   Firewall
    •  Mandatory inbound instance firewall, default deny mode
    •  Outbound instance firewall available in VPC
    •  VPC subnet ACLs
!   Signed API calls
    •  Require X.509 certificate or customer’s secret AWS key
Amazon EC2 Instance Isolation

    Customer 1        Customer 2
                                            …	
      Customer n


                               Hypervisor

                              Virtual Interfaces

                                            …
     Customer 1        Customer 2                     Customer n
   Security Groups   Security Groups                Security Groups
                                 Firewall
        Physical Interfaces
Virtual Memory & Local Disk

                                                                                       Amazon	
  EC2	
  
                                                                                       Instances	
  




                                                                  Encrypted	
  	
  
                                                                  File	
  System	
     Amazon	
  EC2	
  
                                                                                       Instance	
  
                                                                  Encrypted	
  
                                                                  Swap	
  File	
  



•  Proprietary	
  Amazon	
  disk	
  management	
  prevents	
  one	
  Instance	
  from	
  
   reading	
  the	
  disk	
  contents	
  of	
  another	
  
•  Local	
  disk	
  storage	
  can	
  also	
  be	
  encrypted	
  by	
  the	
  customer	
  for	
  an	
  added	
  
   layer	
  of	
  security	
  
Network Security Considerations
!   DDoS (Distributed Denial of Service):
     •    Standard mitigation techniques in effect

!   MITM (Man in the Middle):
     •    All endpoints protected by SSL
     •    Fresh EC2 host keys generated at boot

!   IP Spoofing:
     •    Prohibited at host OS level

!   Unauthorized Port Scanning:
     •  Violation of AWS TOS
     •  Detected, stopped, and blocked
     •  Ineffective anyway since inbound ports
     blocked by default

!   Packet Sniffing:
     •    Promiscuous mode is ineffective
     •    Protection at hypervisor level
Amazon Virtual Private Cloud (VPC)
!   Create a logically isolated environment in Amazon’s highly scalable
    infrastructure
!   Specify your private IP address range into one or more public or private subnets
!   Control inbound and outbound access to and from individual subnets using
    stateless Network Access Control Lists
!   Protect your Instances with stateful filters for inbound and outbound traffic using
    Security Groups
!   Attach an Elastic IP address to any instance in your VPC so it can be reached
    directly from the Internet
!   Bridge your VPC and your onsite IT infrastructure with an industry standard
    encrypted VPN connection and/or AWS Direct Connect
!   Use a wizard to easily create your VPC in 4 different topologies
Amazon VPC Architecture
                                                         Customer’s isolated
                                                         AWS resources
                                                                   Subnets




                       NAT
Internet                                        Router
                                 VPN
                             Gateway
           Secure VPN                                     Amazon
           Connection over
           the Internet
                                                          Web Services
                              AWS Direct                  Cloud
                              Connect –
                              Dedicated Path/
                              Bandwidth
                                Customer’s
                                Network
Amazon VPC Network Security Controls
Amazon VPC - Dedicated Instances
!   New option to ensure physical hosts are not shared with
    other customers
!   $10/hr flat fee per Region + small hourly charge
!   Can identify specific Instances as dedicated
!   Optionally configure entire VPC as dedicated
AWS Deployment Models
                  Logical Server    Granular        Logical     Physical    Government Only    ITAR          Sample Workloads
                  and Application   Information     Network     server      Physical Network   Compliant
                  Isolation         Access Policy   Isolation   Isolation   and Facility       (US Persons
                                                                            Isolation          Only)


Commercial        ü                ü                                                                       Public facing apps. Web
Cloud                                                                                                        sites, Dev test etc.

Virtual Private   ü                ü              ü          ü                                           Data Center extension,
Cloud (VPC)                                                                                                  TIC environment, email,
                                                                                                             FISMA low and
                                                                                                             Moderate

AWS GovCloud      ü                ü              ü          ü          ü                 ü            US Persons Compliant
(US)                                                                                                         and Government
                                                                                                             Specific Apps.
Thanks!

        Remember to visit
https://aws.amazon.com/security

Contenu connexe

Tendances

Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS Amazon Web Services
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAmazon Web Services
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...😸 Richard Spindler
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”Amazon Web Services
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesAmazon Web Services
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseAmazon Web Services
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveJason Chan
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) NewAmazon Web Services
 
AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day Amazon Web Services
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelAmazon Web Services
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance OverviewRightScale
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSAmazon Web Services
 

Tendances (20)

Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar Series
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application DefenseSEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
SEC304 Advanced Techniques for DDoS Mitigation and Web Application Defense
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day AWS Security in Plain English – AWS Security Day
AWS Security in Plain English – AWS Security Day
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security Model
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 

En vedette

AWS Presentation
AWS PresentationAWS Presentation
AWS Presentationjlechowicz
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeAmazon Web Services
 
Amazon ppt
Amazon pptAmazon ppt
Amazon pptaftabssm
 
Strategy Presentation on Amazon
Strategy Presentation on AmazonStrategy Presentation on Amazon
Strategy Presentation on AmazonGabbi Baker
 
Amazon AWS Shared Security Model
Amazon AWS Shared Security Model Amazon AWS Shared Security Model
Amazon AWS Shared Security Model James Mascarenhas
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Donald E. Hester
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...Amazon Web Services
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB updateDonald E. Hester
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local GovernmentsDonald E. Hester
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationDonald E. Hester
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud EnvironmentDonald E. Hester
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearDonald E. Hester
 
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security ServicesAlert Logic
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Donald E. Hester
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Donald E. Hester
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Amazon Web Services
 

En vedette (20)

AWS Presentation
AWS PresentationAWS Presentation
AWS Presentation
 
Amazon ppt
Amazon pptAmazon ppt
Amazon ppt
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
Amazon ppt
Amazon pptAmazon ppt
Amazon ppt
 
Strategy Presentation on Amazon
Strategy Presentation on AmazonStrategy Presentation on Amazon
Strategy Presentation on Amazon
 
Amazon AWS Shared Security Model
Amazon AWS Shared Security Model Amazon AWS Shared Security Model
Amazon AWS Shared Security Model
 
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
2016 Maze Live Changes in Grant Management and How to Prepare for the Single ...
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
Understanding the Risk Management Framework & (ISC)2 CAP Module 13: Contingen...
 
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
 
2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update2016 Maze Live 1 GASB update
2016 Maze Live 1 GASB update
 
2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments2016 Maze Live Cyber-security for Local Governments
2016 Maze Live Cyber-security for Local Governments
 
Implementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and ApplicationImplementing GASB 72: Fair Value Measurement and Application
Implementing GASB 72: Fair Value Measurement and Application
 
2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment2016 Maze Live Fraud Environment
2016 Maze Live Fraud Environment
 
GASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second YearGASB 68 and 71 Planning for the Second Year
GASB 68 and 71 Planning for the Second Year
 
#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services#ALSummit: Alert Logic & AWS - AWS Security Services
#ALSummit: Alert Logic & AWS - AWS Security Services
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
Understanding the Risk Management Framework & (ISC)2 CAP Module 10: Authorize
 
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
Understanding the Risk Management Framework & (ISC)2 CAP Module 15: Incident ...
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
 

Similaire à AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC

16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAmazon Web Services
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 
Amazon Web Services Federation Integration Governance Workshop with Layer 7
Amazon Web Services Federation Integration Governance Workshop with Layer 7Amazon Web Services Federation Integration Governance Workshop with Layer 7
Amazon Web Services Federation Integration Governance Workshop with Layer 7CA API Management
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAmazon Web Services
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도Amazon Web Services Korea
 
AWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAmazon Web Services
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Amazon Web Services
 
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 AustraliaBest Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 AustraliaAmazon Web Services
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeAlert Logic
 

Similaire à AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC (20)

Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
Amazon Web Services Federation Integration Governance Workshop with Layer 7
Amazon Web Services Federation Integration Governance Workshop with Layer 7Amazon Web Services Federation Integration Governance Workshop with Layer 7
Amazon Web Services Federation Integration Governance Workshop with Layer 7
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWS
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
Brief Security Overview
Brief Security OverviewBrief Security Overview
Brief Security Overview
 
AWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloud
 
17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria
 
AWS Security
AWS SecurityAWS Security
AWS Security
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
Understanding AWS Security
 Understanding AWS Security  Understanding AWS Security
Understanding AWS Security
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012
 
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 AustraliaBest Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
Best Practices: Microsoft on AWS - Miles Ward - AWS Summit 2012 Australia
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxLoriGlavin3
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxBkGupta21
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Dernier (20)

DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptxUse of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
Use of FIDO in the Payments and Identity Landscape: FIDO Paris Seminar.pptx
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
unit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptxunit 4 immunoblotting technique complete.pptx
unit 4 immunoblotting technique complete.pptx
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC

  • 1. AWS: Overview of Security Processes Stephen Schmidt Chief Information Security Officer
  • 2. AWS Security Model Overview Certifications & Accreditations Shared Responsibility Model !  Sarbanes-Oxley (SOX) compliance !  Customer/SI Partner/ISV controls !  ISO 27001 Certification guest OS-level security, including !  PCI DSS Level I Certification patching and maintenance !  HIPAA compliant architecture !  Application level security, including password and role based access !  SAS 70(SOC 1) Type II Audit !  Host-based firewalls, including !  FISMA Low & Moderate ATOs Intrusion Detection/Prevention !  DIACAP MAC III-Sensitive Systems §  Pursuing DIACAP MAC II–Sensitive !  Separation of Access Physical Security VM Security Network Security !  Multi-level, multi-factor controlled !  Multi-factor access to Amazon !  Instance firewalls can be configured access environment Account in security groups; !  Controlled, need-based access for !  Instance Isolation !  The traffic may be restricted by AWS employees (least privilege) •  Customer-controlled firewall at protocol, by service port, as well as Management Plane Administrative Access the hypervisor level by source IP address (individual IP !  Multi-factor, controlled, need-based •  Neighboring instances or Classless Inter-Domain Routing access to administrative host prevented access (CIDR) block). !  All access logged, monitored, •  Virtualized disk management !  Virtual Private Cloud (VPC) provides reviewed layer ensure only account IPSec VPN access from existing !  AWS Administrators DO NOT have owners can access storage enterprise data center to a set of logical access inside a customer’s disks (EBS) logically isolated AWS resources VMs, including applications and data !  Support for SSL end point encryption for API calls
  • 3. Shared Responsibility Model AWS Customer •  Facili'es   •  Opera'ng  System   •  Physical  Security   •  Applica'on   •  Physical  Infrastructure   •  Security  Groups   •  Network  Infrastructure   •  Network  ACLs   •  Virtualiza'on   •  Network  Configura'on   Infrastructure     •  Account  Management  
  • 4. AWS Security Resources ! http://aws.amazon.com/security/ !   Security Whitepaper !   Risk and Compliance Whitepaper !   Latest Versions May 2011, January 2012 respectively !  Regularly Updated !  Feedback is welcome
  • 5. AWS Certifications !   Sarbanes-Oxley (SOX) !   ISO 27001 Certification !   Payment Card Industry Data Security Standard (PCI DSS) Level 1 Compliant !   SAS70(SOC 1) Type II Audit !   FISMA A&As •  Multiple NIST Low Approvals to Operate (ATO) •  NIST Moderate, GSA issued ATO •  FedRAMP !   DIACAP MAC III Sensitive ATO !   Customers have deployed various compliant applications such as HIPAA (healthcare)
  • 6. SOC 1 Type II !  Amazon Web Services now publishes a Service Organization Controls 1 (SOC 1), Type 2 report every six months and maintains a favorable unbiased and unqualified opinion from its independent auditors. AWS identifies those controls relating to the operational performance and security to safeguard customer data. The SOC 1 report audit attests that AWS’ control objectives are appropriately designed and that the individual controls defined to safeguard customer data are operating effectively. Our commitment to the SOC 1 report is on-going and we plan to continue our process of periodic audits. !  The audit for this report is conducted in accordance with the Statement on Standards for Attestation Engagements No. 16 (SSAE 16) and the International Standards for Assurance Engagements No. 3402 (ISAE 3402) professional standards. This dual-standard report can meet a broad range of auditing requirements for U.S. and international auditing bodies. This audit is the replacement of the Statement on Auditing Standards No. 70 (SAS 70) Type II report. !  This report is available to customers under NDA.
  • 7. SOC 1 Type II – Control Objectives !   Control Objective 1: Security Organization !   Control Objective 2: Amazon Employee Lifecycle !   Control Objective 3: Logical Security !   Control Objective 4: Secure Data Handling !   Control Objective 5: Physical Security !   Control Objective 6: Environmental Safeguards !   Control Objective 7: Change Management !   Control Objective 8: Data Integrity, Availability and Redundancy !   Control Objective 9: Incident Handling
  • 8. ISO 27001 !   AWS has achieved ISO 27001 certification of our Information Security Management System (ISMS) covering AWS infrastructure, data centers in all regions worldwide, and services including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC). We have established a formal program to maintain the certification.
  • 9. Physical Security !   Amazon has been building large-scale data centers for many years !   Important attributes: •  Non-descript facilities •  Robust perimeter controls •  Strictly controlled physical access •  2 or more levels of two-factor auth !   Controlled, need-based access for AWS employees (least privilege) !   All access is logged and reviewed
  • 10. GovCloud US West US West US East South EU Asia Asia (US ITAR (Northern (Oregon) (Northern America (Ireland) Pacific Pacific Region) California) Virginia) (Sao Paulo) (Singapore) (Tokyo) AWS Regions AWS Edge Locations
  • 11. AWS Regions and Availability Zones Customer Decides Where Applications and Data Reside
  • 12. AWS Identity and Access Management !   Enables  a  customer  to  create  mul'ple  Users  and   manage  the  permissions  for  each  of  these  Users.     !   Secure  by  default;  new  Users  have  no  access  to   AWS  un'l  permissions  are  explicitly  granted.  Us   !   AWS  IAM  enables  customers  to  minimize  the   use  of  their  AWS  Account  creden'als.    Instead   all  interac'ons  with  AWS  Services  and  resources   should  be  with  AWS  IAM  User  security   creden'als.er   !   Customers  can  enable  MFA  devices  for  their   AWS  Account  as  well  as  for  the  Users  they  have   created  under  their  AWS  Account  with  AWS   IAM.  
  • 13.
  • 14. AWS MFA Benefits !   Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you !   Requires a device in your physical possession to gain access to secure pages on the AWS Portal or to gain access to the AWS Management Console !   Adds an extra layer of protection to sensitive information, such as your AWS access identifiers !   Extends protection to your AWS resources such as Amazon EC2 instances and Amazon S3 data
  • 15. Amazon EC2 Security !   Host operating system •  Individual SSH keyed logins via bastion host for AWS admins •  All accesses logged and audited !   Guest operating system •  Customer controlled at root level •  AWS admins cannot log in •  Customer-generated keypairs !   Firewall •  Mandatory inbound instance firewall, default deny mode •  Outbound instance firewall available in VPC •  VPC subnet ACLs !   Signed API calls •  Require X.509 certificate or customer’s secret AWS key
  • 16. Amazon EC2 Instance Isolation Customer 1 Customer 2 …   Customer n Hypervisor Virtual Interfaces … Customer 1 Customer 2 Customer n Security Groups Security Groups Security Groups Firewall Physical Interfaces
  • 17. Virtual Memory & Local Disk Amazon  EC2   Instances   Encrypted     File  System   Amazon  EC2   Instance   Encrypted   Swap  File   •  Proprietary  Amazon  disk  management  prevents  one  Instance  from   reading  the  disk  contents  of  another   •  Local  disk  storage  can  also  be  encrypted  by  the  customer  for  an  added   layer  of  security  
  • 18. Network Security Considerations ! DDoS (Distributed Denial of Service): •  Standard mitigation techniques in effect !   MITM (Man in the Middle): •  All endpoints protected by SSL •  Fresh EC2 host keys generated at boot !   IP Spoofing: •  Prohibited at host OS level !   Unauthorized Port Scanning: •  Violation of AWS TOS •  Detected, stopped, and blocked •  Ineffective anyway since inbound ports blocked by default !   Packet Sniffing: •  Promiscuous mode is ineffective •  Protection at hypervisor level
  • 19. Amazon Virtual Private Cloud (VPC) !   Create a logically isolated environment in Amazon’s highly scalable infrastructure !   Specify your private IP address range into one or more public or private subnets !   Control inbound and outbound access to and from individual subnets using stateless Network Access Control Lists !   Protect your Instances with stateful filters for inbound and outbound traffic using Security Groups !   Attach an Elastic IP address to any instance in your VPC so it can be reached directly from the Internet !   Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted VPN connection and/or AWS Direct Connect !   Use a wizard to easily create your VPC in 4 different topologies
  • 20. Amazon VPC Architecture Customer’s isolated AWS resources Subnets NAT Internet Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Cloud Connect – Dedicated Path/ Bandwidth Customer’s Network
  • 21. Amazon VPC Network Security Controls
  • 22. Amazon VPC - Dedicated Instances !   New option to ensure physical hosts are not shared with other customers !   $10/hr flat fee per Region + small hourly charge !   Can identify specific Instances as dedicated !   Optionally configure entire VPC as dedicated
  • 23. AWS Deployment Models Logical Server Granular Logical Physical Government Only ITAR Sample Workloads and Application Information Network server Physical Network Compliant Isolation Access Policy Isolation Isolation and Facility (US Persons Isolation Only) Commercial ü  ü  Public facing apps. Web Cloud sites, Dev test etc. Virtual Private ü  ü  ü  ü  Data Center extension, Cloud (VPC) TIC environment, email, FISMA low and Moderate AWS GovCloud ü  ü  ü  ü  ü  ü  US Persons Compliant (US) and Government Specific Apps.
  • 24. Thanks! Remember to visit https://aws.amazon.com/security