SlideShare une entreprise Scribd logo
1  sur  44
Security Best Practices on
          AWS
     Simon Elisha – Principal Solution Architect
                  @simon_elisha
All lines are muted.

You can ask questions at any time in the
             Question box.
 We will answer some at the end of the
       session and all via email.
Agenda

    The Shared Responsibility Model
    Taking Advantaged of the Shared Model


    Using the AWS Security Features
    Underlying AWS Infrastructure Security
    Your Responsibilities
In the cloud security is a shared responsibility


How do we secure our                                      How can you secure your
Infrastructure?                                            application and what is
                           Infrastructure   Application       your responsibility?
                              Security       Security




                                  Services Security



                          What security options and
                           features are available to
                                     you?
Leverage shared security model

 Understand your customer & form correct security stance
Leverage shared security model

 Understand your customer & form security stance

                                        Penetration test requests


                  Your certifications                               Your processes
                                             External
                                             audience
Leverage shared security model

  Understand your customer & form security stance

                                          Penetration test requests


                    Your certifications                               Your processes
                                               External
                                               audience
            IAM


                     Internal
Administration
                    audience

     Architecture
Leverage shared security model

  Understand your customer & form security stance

                                          Penetration test requests


                    Your certifications                               Your processes
                                               External
                                               audience
            IAM                                                                        AWS Certifications



                     Internal                                         Regulated
Administration                                                                                 AWS White
                    audience                                          audience                   Papers


     Architecture                                                                      AWS QSA Process
Leverage shared security model

 Understand your customer & form security stance


 Engage with security assessors early in adoption cycle

 Don’t fear assessment – AWS meets high standards (PCI, ISO27001, SOC1…)
 As with any infrastructure provider, security assessments take time
 Derive value from architecture reviews early in deployment cycle
Leverage shared security model

   Understand your customer & form security stance


   Engage with security assessors early in adoption cycle

   Use comprehensive materials and certifications provided by AWS


http://aws.amazon.com/security/

    Risk and compliance paper
    AWS security processes paper
    NEW! CSA consensus assessments
    initiative questionnaire
Leverage shared security model

 Understand your customer & form security stance


 Engage with security assessors early in adoption cycle

 Use comprehensive materials and certifications provided by AWS

 Build upon features of AWS and implement a ‘security by design’ environment
Shared responsibility

                                                      Customer Data


                       Platform, Applications, Identity & Access Management
     You

                          Operating System, Network & Firewall Configuration

              Client-side Data Encryption & Data         Server-side Encryption         Network Traffic Protection
                    Integrity Authentication           (File System and/or Data)      (Encryption/Integrity/Identity)



              Foundation Services
     Amazon




                 Compute                           Storage                 Database            Networking

                                                         Availability Zones
              AWS Global                                                                    Edge Locations
              Infrastructure                                    Regions
Shared responsibility

                                                      Customer Data


                       Platform, Applications, Identity & Access Management
     You

                          Operating System, Network & Firewall Configuration

              Client-side Data Encryption & Data         Server-side Encryption         Network Traffic Protection
                    Integrity Authentication           (File System and/or Data)      (Encryption/Integrity/Identity)



              Foundation Services
     Amazon




                 Compute                           Storage                 Database            Networking

                                                         Availability Zones
              AWS Global                                                                    Edge Locations
              Infrastructure                                    Regions
Build upon AWS features


      Tiered Access                       Security Groups                                  VPC                       Direct Connect & VPN


              IAM                           Instance firewalls                      Network control                  Private connections to VPC
 Control users and allow AWS to       Firewall control on instances via         Create low level networking         Secured access to resources in AWS
 manage credentials in running                Security Groups               constraints for resource access, such   over software or hardware VPN and
   instances for service access                                                as public and private subnets,             dedicated network links
       (allocation, rotation)                 CLIs and APIs                     internet gateways and NATs

                                       Instantly audit your entire AWS
       APIs vs Instance             infrastructure from scriptable APIs –
                                                                                      Bastion hosts
Provide developer API credentials   generate an on-demand IT inventory      Only allow access for management
 and control access to SSH keys     enabled by programmatic nature of        of production resources from a
                                                     AWS                     bastion host. Turn off when not
   Temporary Credentials                                                                 needed

Provide developer API credentials                                                 Dedicated Instances
 and control access to SSH keys
                                                                            Only allow access for management
                                                                             of production resources from a
                                                                             bastion host. Turn off when not
                                                                                         needed
Identity & access management


                                 Account



               Administrators   Developers   Applications



                    Jim           Brad       Reporting


                    Bob           Mark        Console


                                  Susan        Tomcat


                                  Kevin
Identity & access management


              Groups                         Account



                Administrators              Developers   Applications



                        Jim                   Brad       Reporting


                       Bob                    Mark        Console


                                              Susan        Tomcat


                                              Kevin
              Multi-factor authentication
Identity & access management


              Groups                         Account                   Roles


                Administrators              Developers    Applications



                        Jim                   Brad         Reporting


                       Bob                    Mark          Console


                                              Susan          Tomcat


                                              Kevin
              Multi-factor authentication                AWS system entitlements
IAM policies

                                              {
                                                  "Statement": [
                                                    {
                                                      "Effect": "Allow",
                                                      "Action": [
                                                        "elasticbeanstalk:*",
Policy driven                                           "ec2:*",
                                                        "elasticloadbalancing:*",
Declarative definition of rights for groups             "autoscaling:*",
                                                        "cloudwatch:*",
Policies control access to AWS APIs                     "s3:*",
                                                        "sns:*"
                                                      ],
                                                      "Resource": "*"
                                                    }
                                                  ]
                                              }
IAM Roles




Aids Automation
Assign role to EC2 instances
Control access without passing
credentials at boot time
Integrated into SDKs
Key Management


 Decide upon a key                  Consider SSH key
   management                          rotation &
      strategy                        automation
Control access to EC2 instances   Limit exposure to private key
 via SSH and embedded public      compromise by rotating keys
               key:                       and replacing
 e.g. EC2 Key Pair per group of   authorized_keys listings
   instances, EC2 Key Pair per        on running instances
            account               Consider bootstrap automation
                                  to grant developer access with
Can use your existing SSH or AD     developer unique keypairs
           strategy
Temporary Security Credentials


Containing
  Identity for authentication
  Access Policy to control permissions
  Configurable Expiration (1 – 36 hours)

Supports
  AWS Identities (including IAM Users)
  Federated Identities (users customer’s system to authenticate)

Scales to millions of users
  No need to create an IAM identity for every user

Use Cases
  Identity Federation to AWS APIs
  Mobile and browser-based applications
  Consumer applications with unlimited users
Security credentials – the hotel metaphor




      AWS Account’s            IAM User     Temporary Security
       Access Key ID                           Credentials
Security Groups
Control ingress of data by port, IP & Security Group
VPC also supports egress data control
User configurable via API, CLI, GUI                         Web Tier
Create “defence in depth”
                                                                               Application Tier


                                                                                              Database Tier

             Ports 80 and 443 only
              open to the Internet

                  Engineering staff have ssh
                   access to the App Tier,
                    which acts as Bastion
                                    Sync with on-premises                                             Amazon EC2
                                          database                                                    Security Grou
                                                                                                      Firewall
                                                             All other Internet ports
                                                                blocked by default
CLI & API

 Instantly audit the
 state of your entire
 environment using
       the API
Regular calls via command line
or API to determine which web-
 based infrastructure services
  are being used at any time
Store and compare over time –
   track anomalies or non-
       governed usage
Virtual Private Cloud (VPC)



Logically Isolated Environment
Private IP address ranges & subnets
Ingress and Egress Network Access Control
                                                           Internet
Elastic IP addresses, NAT & and Internet Gateway
Hardware encrypted VPN connections and/or Direct Connect
Wizard-based setup
EC2 Dedicated Instances



Available within VPC
Instances launched on hardware dedicated to a single customer
Can mix-and-match use of dedicated and non-dedicated instances
Bastion Hosts

Server (or servers) used for system management
Access tightly controlled
Management only enabled from these hosts
Stop host when not in use
Access only allowed from specified IP addresses
                  TCP 22 “Bastion”   TCP 22 “Bastion”   TCP 22 “Bastion”
                     Web                App                DB
                     Server             Server             Server           Bastion
                                                                            Host
                      Web Security       App Security        DB Security
                        Group              Group               Group          Bastion
                  TCP 80,443 “ELB”   TCP 8080 “Web”      TCP 3306 “App”    Security Group


                                                                               SSH          Admin
Certifications


      Certifications                Physical Security               HW, SW, Network
  SOC 1 Type 2 (formerly SAS-      Datacenters in nondescript           Systematic change
             70)                           facilities                     management

           ISO 27001                  Physical access strictly     Phased updates deployment
                                            controlled
           PCI DSS for                                              Safe storage decommission
  EC2, S3, EBS, VPC, RDS, ELB, I      Must pass two-factor
               AM                  authentication at least twice    Automated monitoring and
                                         for floor access                  self-audit
  FISMA Moderate Compliant
         Controls                   Physical access logged and     Advanced network protection
                                              audited
    HIPAA & ITAR Compliant
         Architecture
Security standards


                  ISO 27001                                 PCI DSS Level 1
                 Achieved 11/2010
                                                    Use normally, no special configuration
      Follows ISO 27002 best practice guidance   Certified services include: EC2, S3, EBS, VPC,
                                                       RDS, ELB, IAM, underlying physical
        Covers the AWS Information Security           infrastructure & AWS Management
            Management System (ISMS)                              Environment
                Includes all Regions                    Leverage the work of our QSA

        ISO certifying agent: EY CertifyPoint    AWS will work with merchants and designated
                                                 Qualified Incident Response Assessors (QIRA)
                                                            Certified in all Regions
Location of data – Your choice




   Deployment & Administration

            App Services

  Compute     Storage      Database        Regions
                                      An independent collection of AWS resources in a defined
            Networking                geography
                                      A solid foundation for meeting location-dependent privacy
     AWS Global Infrastructure
                                      and compliance requirements
Global infrastructure




   Deployment & Administration

           App Services

 Compute     Storage      Database        Availability Zones
                                     Designed as independent failure zones
           Networking                Physically separated within a typical metropolitan region

    AWS Global Infrastructure
Global infrastructure




    Deployment & Administration

            App Services

  Compute     Storage      Database        Edge Locations
                                      To deliver content to end users with lower latency
            Networking                A global network of edge locations
                                      Supports global DNS infrastructure (Route53) and Cloud
     AWS Global Infrastructure
                                      Front CDN
Shared responsibility

                                                      Customer Data


                       Platform, Applications, Identity & Access Management
     You

                          Operating System, Network & Firewall Configuration

              Client-side Data Encryption & Data         Server-side Encryption         Network Traffic Protection
                    Integrity Authentication           (File System and/or Data)      (Encryption/Integrity/Identity)



              Foundation Services
     Amazon




                 Compute                           Storage                 Database            Networking

                                                         Availability Zones
              AWS Global                                                                    Edge Locations
              Infrastructure                                    Regions
Ensure good security practice

  Encrypt sensitive data both “in-flight” and “at-rest”

Use SSL for all AWS API calls & your own application communication
Use SSL Termination with Elastic Load Balancer (ELB) & back-end server authentication
S3 Server Side Encryption – free & easy. Can also implement client-side encryption
Operating system level encryption tools available (e.g. TrueCrypt, BitLocker, etc)
Ensure good security practice

   Encrypt sensitive data both “in-flight” and “at-rest”


   Operate host-based IDS/IPS and regular auditing and monitoring

Maintain OS-level firewalls for additional monitoring and control
Install logging tools and log to a separate, central location (e.g. S3)
Partner solutions available (including Trend Micro, Symantec, Check Point, etc.)
Extend your current management and logging tools to the AWS environment
Ensure good security practice

  Encrypt sensitive data both “in-flight” and “at-rest”


   Operate host-based IDS/IPS and regular auditing and monitoring

  Keep operating systems and application libraries patched and up-to-date

Use automated package update services (e.g. YUM, WSUS, YAST, etc)
Apply updates to installed applications, languages, SDKs etc
Easy to do “rolling updates” by creating new AMIs and instantiating a new fleet
Relational Database Service (RDS) provides automated patch application
Ensure good security practice

  Encrypt sensitive data both “in-flight” and “at-rest”


  Operate host-based IDS/IPS and regular auditing and monitoring

  Keep operating systems and applications libraries patched and up-to-date

 Design application to protect against Layer 7 attacks (SQL Injection, etc)

Design security into your application from the start
Ensure all entered data is validated and correctly formatted
Perform API authorization and authentication for API-based applications
Use partner solutions (e.g. Layer7tech, SafeNet, AiCache, Incapsula, etc)
Ensure good security practice

  Encrypt sensitive data both “in-flight” and “at-rest”


  Operate host-based IDS/IPS and regular auditing and monitoring

  Keep operating systems and applications libraries patched and up-to-date

 Design application to protect against Layer 7 attacks (SQL Injection, etc)

  Actively manage your AWS environment to leverage all of the capabilities available
Perform regular security reviews
Rotate keys and credentials
Use AWS Trusted Advisor Security Checks to detect open ports
Test and Retest


Penetration Testing
Check to see how secure your application is from
external attack
Must obtain authorization first
Partners also provide this service on & from AWS




http://aws.amazon.com/security
Where to find more information?


   Risk and compliance paper
   AWS security processes paper
   NEW! CSA consensus assessments
   initiative questionnaire




http://aws.amazon.com/security
Save the Date




                aws.amazon.com/apac/arc-anz
Catch the AWS Podcast
http://aws.amazon.com/podcast
Questions? Enter them in the Question
area of the console and we will cover as
            many as we can.
Thank you
Simon Elisha – Principal Solution Architect
             @simon_elisha

Contenu connexe

Tendances

Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsViresh Suri
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best PracticesAmazon Web Services
 
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018Amazon Web Services Korea
 
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집Amazon Web Services Korea
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustFrans Sauermann
 
Securing sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultSecuring sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultTom Kerkhove
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityAmazon Web Services
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar Amazon Web Services
 
Iam presentation
Iam presentationIam presentation
Iam presentationAWS UG PK
 
DEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLIDEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLIAmazon Web Services
 
Demystifying Initial Access in Azure
Demystifying Initial Access in AzureDemystifying Initial Access in Azure
Demystifying Initial Access in AzureGabriel Mathenge
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAFAmazon Web Services
 

Tendances (20)

AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 
IAM Introduction and Best Practices
IAM Introduction and Best PracticesIAM Introduction and Best Practices
IAM Introduction and Best Practices
 
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
다양한 솔루션으로 만들어가는 AWS 네트워크 보안::이경수::AWS Summit Seoul 2018
 
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
AWS 네트워크 보안을 위한 계층별 보안 구성 모범 사례 – 조이정, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
 
COSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero TrustCOSAC 2021 presentation - AWS Zero Trust
COSAC 2021 presentation - AWS Zero Trust
 
Securing sensitive data with Azure Key Vault
Securing sensitive data with Azure Key VaultSecuring sensitive data with Azure Key Vault
Securing sensitive data with Azure Key Vault
 
Azure Security Overview
Azure Security OverviewAzure Security Overview
Azure Security Overview
 
Aws VPC
Aws VPCAws VPC
Aws VPC
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar AWS Web Application Firewall and AWS Shield - Webinar
AWS Web Application Firewall and AWS Shield - Webinar
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Amazon CloudFront 101
Amazon CloudFront 101Amazon CloudFront 101
Amazon CloudFront 101
 
DEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLIDEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLI
 
Demystifying Initial Access in Azure
Demystifying Initial Access in AzureDemystifying Initial Access in Azure
Demystifying Initial Access in Azure
 
(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF(SEC323) New: Securing Web Applications with AWS WAF
(SEC323) New: Securing Web Applications with AWS WAF
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 

En vedette

AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAmazon Web Services
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAmazon Web Services
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSAmazon Web Services
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAmazon Web Services
 
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Amazon Web Services
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesAmazon Web Services
 
From One to Many: Evolving VPC Design
From One to Many: Evolving VPC DesignFrom One to Many: Evolving VPC Design
From One to Many: Evolving VPC DesignAmazon Web Services
 
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...Amazon Web Services
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Amazon Web Services
 
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Amazon Web Services
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Amazon Web Services
 
Geocloud blue raster web mapping cloud deployment lessons from the field 201...
Geocloud blue raster web mapping cloud deployment  lessons from the field 201...Geocloud blue raster web mapping cloud deployment  lessons from the field 201...
Geocloud blue raster web mapping cloud deployment lessons from the field 201...Amazon Web Services
 
Splunk Live - Security Best Practices for AWS
Splunk Live - Security Best Practices for AWSSplunk Live - Security Best Practices for AWS
Splunk Live - Security Best Practices for AWSAmazon Web Services
 

En vedette (20)

AWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design PatternsAWS Security Best Practices and Design Patterns
AWS Security Best Practices and Design Patterns
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
AWS Security
AWS SecurityAWS Security
AWS Security
 
Practical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWSPractical Steps to Hack-Proofing AWS
Practical Steps to Hack-Proofing AWS
 
AWS Deployment Best Practices
AWS Deployment Best PracticesAWS Deployment Best Practices
AWS Deployment Best Practices
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
Selecting the Best VPC Network Architecture (CPN208) | AWS re:Invent 2013
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar Series
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 
From One to Many: Evolving VPC Design
From One to Many: Evolving VPC DesignFrom One to Many: Evolving VPC Design
From One to Many: Evolving VPC Design
 
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
AWS March 2016 Webinar Series - Best Practices for Managing Security Operatio...
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
 
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
 
Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)Deep Dive - Amazon Virtual Private Cloud (VPC)
Deep Dive - Amazon Virtual Private Cloud (VPC)
 
Geocloud blue raster web mapping cloud deployment lessons from the field 201...
Geocloud blue raster web mapping cloud deployment  lessons from the field 201...Geocloud blue raster web mapping cloud deployment  lessons from the field 201...
Geocloud blue raster web mapping cloud deployment lessons from the field 201...
 
Splunk Live - Security Best Practices for AWS
Splunk Live - Security Best Practices for AWSSplunk Live - Security Best Practices for AWS
Splunk Live - Security Best Practices for AWS
 

Similaire à Security Best Practices on AWS

[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAmazon Web Services
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...Amazon Web Services Korea
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsKannan Subbiah
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Amazon Web Services
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAmazon Web Services
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCloudIDSummit
 

Similaire à Security Best Practices on AWS (20)

17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 
Enterprise Applications on AWS
Enterprise Applications on AWSEnterprise Applications on AWS
Enterprise Applications on AWS
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWS
 
Private cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud securityPrivate cloud day session 5 a solution for private cloud security
Private cloud day session 5 a solution for private cloud security
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
SaaS Challenges & Security Concerns
SaaS Challenges & Security ConcernsSaaS Challenges & Security Concerns
SaaS Challenges & Security Concerns
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
Mission (Not) Impossible: NIST 800-53 High Impact Controls on AWS | AWS Publi...
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
CIS14: Identity Management for the Cloud
CIS14: Identity Management for the CloudCIS14: Identity Management for the Cloud
CIS14: Identity Management for the Cloud
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 3652toLead Limited
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfLoriGlavin3
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024BookNet Canada
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersRaghuram Pandurangan
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 

Dernier (20)

Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365Ensuring Technical Readiness For Copilot in Microsoft 365
Ensuring Technical Readiness For Copilot in Microsoft 365
 
Moving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdfMoving Beyond Passwords: FIDO Paris Seminar.pdf
Moving Beyond Passwords: FIDO Paris Seminar.pdf
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
New from BookNet Canada for 2024: Loan Stars - Tech Forum 2024
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Generative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information DevelopersGenerative AI for Technical Writer or Information Developers
Generative AI for Technical Writer or Information Developers
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 

Security Best Practices on AWS

  • 1. Security Best Practices on AWS Simon Elisha – Principal Solution Architect @simon_elisha
  • 2. All lines are muted. You can ask questions at any time in the Question box. We will answer some at the end of the session and all via email.
  • 3. Agenda The Shared Responsibility Model Taking Advantaged of the Shared Model Using the AWS Security Features Underlying AWS Infrastructure Security Your Responsibilities
  • 4. In the cloud security is a shared responsibility How do we secure our How can you secure your Infrastructure? application and what is Infrastructure Application your responsibility? Security Security Services Security What security options and features are available to you?
  • 5. Leverage shared security model Understand your customer & form correct security stance
  • 6. Leverage shared security model Understand your customer & form security stance Penetration test requests Your certifications Your processes External audience
  • 7. Leverage shared security model Understand your customer & form security stance Penetration test requests Your certifications Your processes External audience IAM Internal Administration audience Architecture
  • 8. Leverage shared security model Understand your customer & form security stance Penetration test requests Your certifications Your processes External audience IAM AWS Certifications Internal Regulated Administration AWS White audience audience Papers Architecture AWS QSA Process
  • 9. Leverage shared security model Understand your customer & form security stance Engage with security assessors early in adoption cycle Don’t fear assessment – AWS meets high standards (PCI, ISO27001, SOC1…) As with any infrastructure provider, security assessments take time Derive value from architecture reviews early in deployment cycle
  • 10. Leverage shared security model Understand your customer & form security stance Engage with security assessors early in adoption cycle Use comprehensive materials and certifications provided by AWS http://aws.amazon.com/security/ Risk and compliance paper AWS security processes paper NEW! CSA consensus assessments initiative questionnaire
  • 11. Leverage shared security model Understand your customer & form security stance Engage with security assessors early in adoption cycle Use comprehensive materials and certifications provided by AWS Build upon features of AWS and implement a ‘security by design’ environment
  • 12. Shared responsibility Customer Data Platform, Applications, Identity & Access Management You Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Server-side Encryption Network Traffic Protection Integrity Authentication (File System and/or Data) (Encryption/Integrity/Identity) Foundation Services Amazon Compute Storage Database Networking Availability Zones AWS Global Edge Locations Infrastructure Regions
  • 13. Shared responsibility Customer Data Platform, Applications, Identity & Access Management You Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Server-side Encryption Network Traffic Protection Integrity Authentication (File System and/or Data) (Encryption/Integrity/Identity) Foundation Services Amazon Compute Storage Database Networking Availability Zones AWS Global Edge Locations Infrastructure Regions
  • 14. Build upon AWS features Tiered Access Security Groups VPC Direct Connect & VPN IAM Instance firewalls Network control Private connections to VPC Control users and allow AWS to Firewall control on instances via Create low level networking Secured access to resources in AWS manage credentials in running Security Groups constraints for resource access, such over software or hardware VPN and instances for service access as public and private subnets, dedicated network links (allocation, rotation) CLIs and APIs internet gateways and NATs Instantly audit your entire AWS APIs vs Instance infrastructure from scriptable APIs – Bastion hosts Provide developer API credentials generate an on-demand IT inventory Only allow access for management and control access to SSH keys enabled by programmatic nature of of production resources from a AWS bastion host. Turn off when not Temporary Credentials needed Provide developer API credentials Dedicated Instances and control access to SSH keys Only allow access for management of production resources from a bastion host. Turn off when not needed
  • 15. Identity & access management Account Administrators Developers Applications Jim Brad Reporting Bob Mark Console Susan Tomcat Kevin
  • 16. Identity & access management Groups Account Administrators Developers Applications Jim Brad Reporting Bob Mark Console Susan Tomcat Kevin Multi-factor authentication
  • 17. Identity & access management Groups Account Roles Administrators Developers Applications Jim Brad Reporting Bob Mark Console Susan Tomcat Kevin Multi-factor authentication AWS system entitlements
  • 18. IAM policies { "Statement": [ { "Effect": "Allow", "Action": [ "elasticbeanstalk:*", Policy driven "ec2:*", "elasticloadbalancing:*", Declarative definition of rights for groups "autoscaling:*", "cloudwatch:*", Policies control access to AWS APIs "s3:*", "sns:*" ], "Resource": "*" } ] }
  • 19. IAM Roles Aids Automation Assign role to EC2 instances Control access without passing credentials at boot time Integrated into SDKs
  • 20. Key Management Decide upon a key Consider SSH key management rotation & strategy automation Control access to EC2 instances Limit exposure to private key via SSH and embedded public compromise by rotating keys key: and replacing e.g. EC2 Key Pair per group of authorized_keys listings instances, EC2 Key Pair per on running instances account Consider bootstrap automation to grant developer access with Can use your existing SSH or AD developer unique keypairs strategy
  • 21. Temporary Security Credentials Containing Identity for authentication Access Policy to control permissions Configurable Expiration (1 – 36 hours) Supports AWS Identities (including IAM Users) Federated Identities (users customer’s system to authenticate) Scales to millions of users No need to create an IAM identity for every user Use Cases Identity Federation to AWS APIs Mobile and browser-based applications Consumer applications with unlimited users
  • 22. Security credentials – the hotel metaphor AWS Account’s IAM User Temporary Security Access Key ID Credentials
  • 23. Security Groups Control ingress of data by port, IP & Security Group VPC also supports egress data control User configurable via API, CLI, GUI Web Tier Create “defence in depth” Application Tier Database Tier Ports 80 and 443 only open to the Internet Engineering staff have ssh access to the App Tier, which acts as Bastion Sync with on-premises Amazon EC2 database Security Grou Firewall All other Internet ports blocked by default
  • 24. CLI & API Instantly audit the state of your entire environment using the API Regular calls via command line or API to determine which web- based infrastructure services are being used at any time Store and compare over time – track anomalies or non- governed usage
  • 25. Virtual Private Cloud (VPC) Logically Isolated Environment Private IP address ranges & subnets Ingress and Egress Network Access Control Internet Elastic IP addresses, NAT & and Internet Gateway Hardware encrypted VPN connections and/or Direct Connect Wizard-based setup
  • 26. EC2 Dedicated Instances Available within VPC Instances launched on hardware dedicated to a single customer Can mix-and-match use of dedicated and non-dedicated instances
  • 27. Bastion Hosts Server (or servers) used for system management Access tightly controlled Management only enabled from these hosts Stop host when not in use Access only allowed from specified IP addresses TCP 22 “Bastion” TCP 22 “Bastion” TCP 22 “Bastion” Web App DB Server Server Server Bastion Host Web Security App Security DB Security Group Group Group Bastion TCP 80,443 “ELB” TCP 8080 “Web” TCP 3306 “App” Security Group SSH Admin
  • 28. Certifications Certifications Physical Security HW, SW, Network SOC 1 Type 2 (formerly SAS- Datacenters in nondescript Systematic change 70) facilities management ISO 27001 Physical access strictly Phased updates deployment controlled PCI DSS for Safe storage decommission EC2, S3, EBS, VPC, RDS, ELB, I Must pass two-factor AM authentication at least twice Automated monitoring and for floor access self-audit FISMA Moderate Compliant Controls Physical access logged and Advanced network protection audited HIPAA & ITAR Compliant Architecture
  • 29. Security standards ISO 27001 PCI DSS Level 1 Achieved 11/2010 Use normally, no special configuration Follows ISO 27002 best practice guidance Certified services include: EC2, S3, EBS, VPC, RDS, ELB, IAM, underlying physical Covers the AWS Information Security infrastructure & AWS Management Management System (ISMS) Environment Includes all Regions Leverage the work of our QSA ISO certifying agent: EY CertifyPoint AWS will work with merchants and designated Qualified Incident Response Assessors (QIRA) Certified in all Regions
  • 30. Location of data – Your choice Deployment & Administration App Services Compute Storage Database Regions An independent collection of AWS resources in a defined Networking geography A solid foundation for meeting location-dependent privacy AWS Global Infrastructure and compliance requirements
  • 31. Global infrastructure Deployment & Administration App Services Compute Storage Database Availability Zones Designed as independent failure zones Networking Physically separated within a typical metropolitan region AWS Global Infrastructure
  • 32. Global infrastructure Deployment & Administration App Services Compute Storage Database Edge Locations To deliver content to end users with lower latency Networking A global network of edge locations Supports global DNS infrastructure (Route53) and Cloud AWS Global Infrastructure Front CDN
  • 33. Shared responsibility Customer Data Platform, Applications, Identity & Access Management You Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Server-side Encryption Network Traffic Protection Integrity Authentication (File System and/or Data) (Encryption/Integrity/Identity) Foundation Services Amazon Compute Storage Database Networking Availability Zones AWS Global Edge Locations Infrastructure Regions
  • 34. Ensure good security practice Encrypt sensitive data both “in-flight” and “at-rest” Use SSL for all AWS API calls & your own application communication Use SSL Termination with Elastic Load Balancer (ELB) & back-end server authentication S3 Server Side Encryption – free & easy. Can also implement client-side encryption Operating system level encryption tools available (e.g. TrueCrypt, BitLocker, etc)
  • 35. Ensure good security practice Encrypt sensitive data both “in-flight” and “at-rest” Operate host-based IDS/IPS and regular auditing and monitoring Maintain OS-level firewalls for additional monitoring and control Install logging tools and log to a separate, central location (e.g. S3) Partner solutions available (including Trend Micro, Symantec, Check Point, etc.) Extend your current management and logging tools to the AWS environment
  • 36. Ensure good security practice Encrypt sensitive data both “in-flight” and “at-rest” Operate host-based IDS/IPS and regular auditing and monitoring Keep operating systems and application libraries patched and up-to-date Use automated package update services (e.g. YUM, WSUS, YAST, etc) Apply updates to installed applications, languages, SDKs etc Easy to do “rolling updates” by creating new AMIs and instantiating a new fleet Relational Database Service (RDS) provides automated patch application
  • 37. Ensure good security practice Encrypt sensitive data both “in-flight” and “at-rest” Operate host-based IDS/IPS and regular auditing and monitoring Keep operating systems and applications libraries patched and up-to-date Design application to protect against Layer 7 attacks (SQL Injection, etc) Design security into your application from the start Ensure all entered data is validated and correctly formatted Perform API authorization and authentication for API-based applications Use partner solutions (e.g. Layer7tech, SafeNet, AiCache, Incapsula, etc)
  • 38. Ensure good security practice Encrypt sensitive data both “in-flight” and “at-rest” Operate host-based IDS/IPS and regular auditing and monitoring Keep operating systems and applications libraries patched and up-to-date Design application to protect against Layer 7 attacks (SQL Injection, etc) Actively manage your AWS environment to leverage all of the capabilities available Perform regular security reviews Rotate keys and credentials Use AWS Trusted Advisor Security Checks to detect open ports
  • 39. Test and Retest Penetration Testing Check to see how secure your application is from external attack Must obtain authorization first Partners also provide this service on & from AWS http://aws.amazon.com/security
  • 40. Where to find more information? Risk and compliance paper AWS security processes paper NEW! CSA consensus assessments initiative questionnaire http://aws.amazon.com/security
  • 41. Save the Date aws.amazon.com/apac/arc-anz
  • 42. Catch the AWS Podcast http://aws.amazon.com/podcast
  • 43. Questions? Enter them in the Question area of the console and we will cover as many as we can.
  • 44. Thank you Simon Elisha – Principal Solution Architect @simon_elisha

Notes de l'éditeur

  1. In this webinar I am going to introduce Amazon Web Services, also known as AWS, and some of the fundamental concepts behind the Amazon Cloud.
  2. Security and Operational Excellence is the Top most priority. Its Priority 0. No exceptions allowed. We understand that Security and governance are often the top issues identified when we talk to our customers. Instead of tossing this over the fence, we really advice and highly recommend our customers to invest in security review early in the process. Get your security folks talk to our security folks and understand security and compliance. Security is really not on or off. It’s a spectrum of options that you can choose from that is right for your application.
  3. Examining AWS, you’ll see that the same security isolations are employed as would be found in a traditional datacenter. These include physical datacentre security, separation of the network, isolation of the server hardware, and isolation of storage. AWS customers have control over their data: they own the data, not us; they can encrypt their data at rest and in motion, just as they would in their own datacenter.  Amazon Web Services provides the same, familiar approaches to security that companies have been using for decades. Importantly, it does this while also allowing the flexibility and low cost of cloud computing. There is nothing inherently at odds about providing on-demand infrastructure while also providing the security isolation companies have become accustomed to in their existing, privately-owned environments.AWS is a secure, durable technology platform with industry-recognized certifications and audits: PCI DSS Level 1, ISO 27001, FISMA Moderate, HIPAA, SAS 70 Type II. Our services and data centers have multiple layers of operational and physical security designed to protect the integrity and safety of your data. Visit our Security Center to learn more http://aws.amazon.com/security/.Certifications and Accreditations: AWS has successfully completed a SAS70 Type II Audit, and will continue to obtain the appropriate security certifications and accreditations to demonstrate the security of our infrastructure and services. PCI DSS: We finalized our 2011 PCI compliance audit, publishing our extensive Report on Controls (ROC) with an expanded scope. Our new November 30, 2011 PCI Attestation of Compliance, a document from our auditor stating we are compliant with all 12 PCI security standard domains, is available now for customers considering or working on moving PCI systems to AWS. The new Attestation of Compliance document includes some key changes this year: This year we’ve added RDS, ELB, and IAM as in-scope services. The addition of these services is fantastic news for PCI customers since they can now leverage RDS to store cardholder and transaction data, use ELB to manage card transaction traffic, and rely on IAM features as validated control mechanisms that satisfy PCI security standard requirements. Consistent with last year, EC2, S3, EBS, and VPC continue to be in scope.  Physical Security: Amazon has many years of experience in designing, constructing, and operating large scale data centers. AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical barriers to prevent unauthorized access.Secure Services: Each of the services within the AWS cloud is architected to be secure and contains a number of capabilities that restrict unauthorized access or usage without sacrificing the flexibility that customers demand. Data Privacy: AWS enables users to encrypt their personal or business data within the AWS cloud and publishes backup and redundancy procedures for services so that customers can gain greater understanding of how their data flows throughout AWS.“In essence, the security system of AWS’s platform has been added to our existing security systems. We now have a security posture consistent with that of a multi-billion dollar company.” - Jim Warren, CIO, Recovery Accountability and Transparency Board (RATB)
  4. Examining AWS, you’ll see that the same security isolations are employed as would be found in a traditional datacenter. These include physical datacentre security, separation of the network, isolation of the server hardware, and isolation of storage. AWS customers have control over their data: they own the data, not us; they can encrypt their data at rest and in motion, just as they would in their own datacenter.  Amazon Web Services provides the same, familiar approaches to security that companies have been using for decades. Importantly, it does this while also allowing the flexibility and low cost of cloud computing. There is nothing inherently at odds about providing on-demand infrastructure while also providing the security isolation companies have become accustomed to in their existing, privately-owned environments.AWS is a secure, durable technology platform with industry-recognized certifications and audits: PCI DSS Level 1, ISO 27001, FISMA Moderate, HIPAA, SAS 70 Type II. Our services and data centers have multiple layers of operational and physical security designed to protect the integrity and safety of your data. Visit our Security Center to learn more http://aws.amazon.com/security/.Certifications and Accreditations: AWS has successfully completed a SAS70 Type II Audit, and will continue to obtain the appropriate security certifications and accreditations to demonstrate the security of our infrastructure and services. PCI DSS: We finalized our 2011 PCI compliance audit, publishing our extensive Report on Controls (ROC) with an expanded scope. Our new November 30, 2011 PCI Attestation of Compliance, a document from our auditor stating we are compliant with all 12 PCI security standard domains, is available now for customers considering or working on moving PCI systems to AWS. The new Attestation of Compliance document includes some key changes this year: This year we’ve added RDS, ELB, and IAM as in-scope services. The addition of these services is fantastic news for PCI customers since they can now leverage RDS to store cardholder and transaction data, use ELB to manage card transaction traffic, and rely on IAM features as validated control mechanisms that satisfy PCI security standard requirements. Consistent with last year, EC2, S3, EBS, and VPC continue to be in scope.  Physical Security: Amazon has many years of experience in designing, constructing, and operating large scale data centers. AWS infrastructure is housed in Amazon-controlled data centers throughout the world. Only those within Amazon who have a legitimate business need to have such information know the actual location of these data centers, and the data centers themselves are secured with a variety of physical barriers to prevent unauthorized access.Secure Services: Each of the services within the AWS cloud is architected to be secure and contains a number of capabilities that restrict unauthorized access or usage without sacrificing the flexibility that customers demand. Data Privacy: AWS enables users to encrypt their personal or business data within the AWS cloud and publishes backup and redundancy procedures for services so that customers can gain greater understanding of how their data flows throughout AWS.“In essence, the security system of AWS’s platform has been added to our existing security systems. We now have a security posture consistent with that of a multi-billion dollar company.” - Jim Warren, CIO, Recovery Accountability and Transparency Board (RATB)
  5. In this webinar I am going to introduce Amazon Web Services, also known as AWS, and some of the fundamental concepts behind the Amazon Cloud.