SlideShare une entreprise Scribd logo
1  sur  40
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security From A-Z: Governance &
Compliance in your VPC
Stephen McDermid
Sr. Solution Architect - Security & Compliance
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
All AWS customers benefit from a data center and network architecture
built from the ground up to satisfy the requirements of the most security-
sensitive organizations.
At AWS, cloud security is job zero
Designed for
Security
Constantly
Monitored
Highly
Available
Constantly
Accredited
Highly
Automated
https://aws.amazon.com/security/
https://aws.amazon.com/compliance
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Global Infrastructure
21 Regions – 66 Availability Zones – 180 Points of Presence
Region & Number of Availability Zones
AWS GovCloud (3) 2X EU
Ireland (3)
US West Frankfurt (3)
Oregon (3) London (3)
Northern California (3) Paris (3)
Stockholm (3)
US East
N. Virginia (6), Ohio (3) Asia Pacific
Singapore (3)
Canada Sydney (3), Tokyo (4),
Central (2) Seoul (2), Mumbai (2)
Osaka-Local (1)
South America China
São Paulo (3) Beijing (2)
Ningxia (3)
Announced Regions
Bahrain, Hong Kong SAR, Cape Town, Milan
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
PoPs in Europe / Middle East / Africa
Europe (Ireland) Region
AZs: 3 - Launched 2007
Europe (London) Region
AZs: 3 - Launched 2016
Europe (Frankfurt) Region
AZs: 3 - Launched 2014
Europe (Paris) Region
AZs: 3 - Launched 2017
AWS Edge Network Locations
Edge locations - Amsterdam, The Netherlands (2); Berlin, Germany (2); Cape
Town, South Africa; Copenhagen, Denmark; Dubai, United Arab Emirates; Dublin,
Ireland; Frankfurt, Germany (8); Fujairah, United Arab Emirates; Helsinki, Finland;
Johannesburg, South Africa; London, England (9); Madrid, Spain (2); Manchester,
England; Marseille, France; Milan, Italy; Munich, Germany (2); Oslo, Norway;
Palermo, Italy; Paris, France (4); Prague, Czech Republic; Stockholm, Sweden (3);
Vienna, Austria; Warsaw, Poland; Zurich, Switzerland
Regional Edge Caches - Frankfurt, Germany; London, England
Direct Connect Locations: https://aws.amazon.com/directconnect/features/
Europe (Stockholm) Region
AZs: 3 - Launched 2018
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Zoom In: AWS Region
Zoom In: AWS AZ
Sample Region
Datacenter Datacenter
Datacenter
Sample Availability Zone
Availability
Zone B
Availability
Zone A
Availability
Zone C
• Independent Geographic Areas, isolated from other Regions (security boundary)
• Customer chooses in which Region(s) to deploy services
• Regions are comprised of multiple Availability Zones (AZs), which enables the deployment of High-
Availability Architecture
• AZs are Independent Failure Zones; Physically separated; On separate Low Risk Flood Plains
• Discrete Uninterruptible Power Supply (UPS); Onsite backup generation facilities
• DCs in AZ less than ¼ ms apart
• Each AZ is 1 or more DC
• No data center is in two AZs
• Some AZs have as many as 6 DCs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Example AWS Region
AZ
AZ
AZ AZ AZ
Transit
Transit
• Mesh of Availability Zones (AZ) and Transit
Centers
• Redundant paths to transit centers
• Transit centers connect to:
– Private links to other AWS regions
– Private links to customers
– Internet through peering & paid transit
• Metro-area DWDM links between AZs
• 82,864 fiber strands in region
• AZs <2ms apart & usually <1ms
• 25Tbps peak inter-AZs traffic
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Global Network
• Redundant 100GbE network
• Redundant private capacity
between all Regions except China
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Direct Connect Gateway
• Customers reach every AWS
region from the local
Direct Connect location
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why have a backbone network?
Security
Traffic traverses our
infrastructure rather than the
internet
Availability
Controlling scaling and
redundancy
Traffic operates over Amazon-
controlled infrastructure
Reliable performance
Controlling specific paths
customer traffic traverses
Connecting closer to customers
Avoiding internet “hot spots” or
sub-optimal external
connectivity
All commercial Region-to-Region traffic
traverses the backbone except China
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
24
48
61
82
159
280
516
722
1017
1430
1,957
0 300 600 900 1200 1500 1800 2100
1
2
3
4
5
6
7
8
9
10
11
Pace of innovation | Launches
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Adopting AWS you can…
…concentrate on securing your own application, using automation and many built-
in security tools designed to meet the most stringent regulations and requirements
+ =
• Facilities
• Physical security
• Compute infrastructure
• Storage infrastructure
• Network infrastructure
• Virtualization layer (EC2)
• Hardened service endpoints
• Rich IAM capabilities
• Extensive set of security services
• Extensive assurance program
• Network configuration
• Security groups
• OS / Network firewalls
• Operating systems security
• Application security
• Proper service configuration
• AuthN and account management
• Authorization policies
• Data Security
• Operational Security Automation
More secure and
compliant
systems
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
More secure in the cloud
AWS customers tell us that the workloads they have
running in AWS are more secure than the workloads they
are running on premise.
"I have come to realize that as a relatively small organization, we can be far more secure in the cloud
and achieve a higher level of assurance at a much lower cost, in terms of effort and dollars invested.
We determined that security in AWS is superior to our on-premises data center across several
dimensions, including patching, encryption, auditing and logging, entitlements, and compliance.” -
John Brady, CISO FINRA
What key AWS features are these customers using to
achieve this?
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Common Security Enablers
Visibility &
Knowledge
Automation /
Repeatable
Processes
Cross-team /
cross-process
synchronisation
Fast
Implementation /
Reaction Time
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Advantages to the API
• Authoritative - The interface to, and between, AWS services
• Auditable – always know what, and who, is doing what
• Secure – verified integrity, authenticated, no covert channels
• Fast - can be read and manipulated in sub-second time
• Precise – defines the state of all infrastructure and services
• Evolving – continuously improving
• Uniform - provides consistency across disparate components
• Automatable - Enables some really cool capabilities
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Automate
with deeply
integrated
security services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior visibility
and control
Move to AWS
Strengthen your security posture
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The status (knowledge), and control (automation), of the ENTIRE
infrastructure one click of a mouse, or API call, away
Security policies for the whole system (in code not paper) constantly
and automatically evaluated (visibility, synchronization, time)
Consistent tooling and processes, and built-in solutions, for the whole
environment using a common interface
Detection and/or reaction time reduced to seconds
Ubiquitous encryption, in transit, at rest, AWS-managed, customer-
managed, and with customer imported keys
Some of the AWS security enablers…
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Immutable systems and/or Self-healing infrastructures (that
automatically protects from attacks)
Focus on security applications and business assets (instead of
managing the infrastructure necessary to manage security)
Improved security whilst reducing complexity in a standardised manner
Comply with new regulations easily and with low cost
Laser-focused, incremental, changes or improvements without impacting
other controls/workloads
Providing things such as…
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
And also…
Dedicated, programmable hardware (FPGAs) and GPUs for HPC
and/or security applications
Edge computing, for either:
• Connected devices controlled by the customers
• Local (customer premises) workloads in remote or offline location
• AWS Edge locations
ML, AI, IoT, Serverless computing
https://aws.amazon.com/stateandlocal/justice-and-public-safety/
https://aws.amazon.com/smart-cities/
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The security paradigm shifted
On AWSOn-premises
Big Perimeter
End-to-End Ownership
Build it all yourself
Server-centric approach
De-centralised Administration
Focus on physical assets
Multiple (manual) processes
Micro-Perimeters
Own just enough
Focus on your core values
Service-Centric approach
Central control plane (API)
Focus on protection data
Everything is automated
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
SecurityAssurance - Comparison
Start with bare concrete
Periodic checks
Workload-specific compliance
Must keep pace and invest in
security innovation
Heterogeneous governance
processes and tools
Typically reactive
Start on accredited services
Continuous monitoring
Ubiquitous compliance
Integrated Security innovation
drives broad compliance
Integrated governance
processes and tools
Focus on prevention
On AWSOn-premises
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
“CIOs and CISOs need to stop obsessing over
unsubstantiated cloud security worries, and instead
apply their imagination and energy to developing new
approaches to cloud control, allowing them to securely,
compliantly, and reliably leverage the benefits of this
increasingly ubiquitous computing model.”
Source: Clouds Are Secure: Are You Using Them Securely?
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The shared responsibility model
RESPONSIBLE FOR
SECURITY
“IN” THE CLOUD
RESPONSIBLE FOR
SECURITY
“OF” THE CLOUD
SOFTWARE
HARDWARE / AWS GLOBAL INFRASTRUCTURE
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security OF the
Cloud
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Global Certifications
GLACIER VAULT LOCK
& SEC RULE 17A-4(F)
SOC 1
SOC 2
SOC 3
PSN
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Self-service Compliance Reports – AWS Artifact
e-NDA
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How do we do it?
100+
services
Controls,
Artefacts, Audits
Thousands of Controls, Artefacts, Audit requirements
Set on the highest bar,
standardisation and automation
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Security &
Privacy
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Overview
Customer chooses where to place data
AWS regions are geographically isolated by design
Data is not replicated to other AWS regions and
doesn’t move unless customer chooses to move it
Customers manage access to their customer content
and AWS services and resources
Customers choose how their content is secured
https://aws.amazon.com/compliance/data-privacy-faq/
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
In-Country vs. EU vs. Global
Unless there is a specific need to comply with a local law or regulation, customers
can run workloads anywhere in Europe - because of AWS compliance with the
GDPR Regulation (EU) 2016/679 as a processor.
And with our EU-approved Data Processing Addendum and ‘Model Clauses’, AWS
customers can continue to run their global operations outside EU (including in US)
in full compliance with EU law - as confirmed by the Article 29 Working Party
The AWS Data Processing Addendum is available to all AWS customers that are
processing personal data whether they are established in Europe or a global
company operating in the European Economic Area
As discussed, customer – as the sole owner of their content - are still responsible
for classifying their data and deciding how it is protected
Data Residency whitepaper: https://d1.awsstatic.com/whitepapers/compliance/Data_Residency_Whitepaper.pdf
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security IN the
Cloud
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Identity & Access
Management (IAM)
AWS Organizations
AWS Cognito
AWS Directory Service
AWS Single Sign-On
AWS Secret Manager
AWS CloudTrail
AWS Config
Amazon
CloudWatch
Amazon GuardDuty
VPC Flow Logs
AWS Security Hub
Amazon EC2
Systems Manager
AWS Shield
AWS Web Application
Firewall (WAF)
Amazon Inspector
Amazon Virtual Private
Cloud (VPC)
AWS Key Management
Service
AWS CloudHSM
Server/Client Side
Encryption
Amazon Macie
AWS Certificate
Manager
AWS Config Rules
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS security solutions
AWS CAF Security Perspective:
https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Access a deep set of cloud security tools
Encryption & Data Protection
Networking & Infrastructure Monitoring & Governance
Identity & Access Management
Security
Groups
Endpoints
g
VPN
Gateway
Customer
gateway
Internet
gateway
Network access
control list
Route
table
Alarm Rule AutomationInventory Parameter
Store
Patch
manager
Run
command
State
manager
Change
set
Checklist
security
Flow logs
Checklist
AWS
Organizations
AWS
STS
Temporary
security
credential
Permissions Long-term
security
credential
MFA
token
Role Federation Data
encryption
key
SAML, OAuth
OpenID
Connect
Template
Server-Side
Encryption
Client-Side
Encryption
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Governance
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Largest ecosystem
of security partners and solutions
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Consulting competency partners
with demonstrated expertise
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Automate
with deeply
integrated
security services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior visibility
and control
Move to AWS
Strengthen your security posture
Thank you!
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

Contenu connexe

Tendances

人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用Amazon Web Services
 
Migrate and Modernize Your Database
Migrate and Modernize Your DatabaseMigrate and Modernize Your Database
Migrate and Modernize Your DatabaseAmazon Web Services
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloudAmazon Web Services
 
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS FoundationsEducation : Digital transformation & AWS Foundations
Education : Digital transformation & AWS FoundationsAmazon Web Services
 
AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用Amazon Web Services
 
AWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - PlenaryAWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - PlenaryAmazon Web Services
 
AWS AI and Machine Learning Journey
AWS AI and Machine Learning JourneyAWS AI and Machine Learning Journey
AWS AI and Machine Learning JourneyAmazon Web Services
 
‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and PlatformsAmazon Web Services
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用Amazon Web Services
 
Becoming A High Frequency Enterprise
Becoming A High Frequency EnterpriseBecoming A High Frequency Enterprise
Becoming A High Frequency EnterpriseAmazon Web Services
 
Big Data e Inteligencia Artificial en AWS
Big Data e Inteligencia Artificial en AWSBig Data e Inteligencia Artificial en AWS
Big Data e Inteligencia Artificial en AWSAmazon Web Services
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentAmazon Web Services
 
The Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration JourneyThe Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration JourneyAmazon Web Services
 
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the CloudAWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the CloudAmazon Web Services
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfAmazon Web Services
 
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...Amazon Web Services
 
AWS G-Cloud 12 - Partner Seminar
AWS G-Cloud 12 - Partner SeminarAWS G-Cloud 12 - Partner Seminar
AWS G-Cloud 12 - Partner SeminarAmazon Web Services
 
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdf
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfPerforming real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdf
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfAmazon Web Services
 

Tendances (20)

人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
 
Migrate and Modernize Your Database
Migrate and Modernize Your DatabaseMigrate and Modernize Your Database
Migrate and Modernize Your Database
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS FoundationsEducation : Digital transformation & AWS Foundations
Education : Digital transformation & AWS Foundations
 
AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用
 
AWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - PlenaryAWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - Plenary
 
AWS AI and Machine Learning Journey
AWS AI and Machine Learning JourneyAWS AI and Machine Learning Journey
AWS AI and Machine Learning Journey
 
‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms
 
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
 
Becoming A High Frequency Enterprise
Becoming A High Frequency EnterpriseBecoming A High Frequency Enterprise
Becoming A High Frequency Enterprise
 
Big Data e Inteligencia Artificial en AWS
Big Data e Inteligencia Artificial en AWSBig Data e Inteligencia Artificial en AWS
Big Data e Inteligencia Artificial en AWS
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environment
 
The Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration JourneyThe Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration Journey
 
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the CloudAWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
 
Strengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdfStrengthen Your Organizations Security and Privacy.pdf
Strengthen Your Organizations Security and Privacy.pdf
 
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...
What's New with Amazon S3, Amazon EFS, and Other AWS Storage Services - STG20...
 
AWS G-Cloud 12 - Partner Seminar
AWS G-Cloud 12 - Partner SeminarAWS G-Cloud 12 - Partner Seminar
AWS G-Cloud 12 - Partner Seminar
 
Open Data on AWS
Open Data on AWSOpen Data on AWS
Open Data on AWS
 
Open Data on AWS
Open Data on AWSOpen Data on AWS
Open Data on AWS
 
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdf
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdfPerforming real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdf
Performing real-time ETL into data lakes - ADB202 - Santa Clara AWS Summit.pdf
 

Similaire à AWS Security from A-Z: Governance & Compliance in VPC

AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAmazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudAmazon Web Services
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAmazon Web Services
 
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAmazon Web Services
 
APN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAPN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAmazon Web Services
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSAmazon Web Services
 
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdf
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdfRetiring Technical Debt - AWS Partner Summit Mumbai 2018.pdf
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdfAmazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecurityAmazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesAmazon Web Services
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewEagleDream Technologies
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSAmazon Web Services
 
Virtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesVirtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesAmazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneAmazon Web Services
 
PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusCloudera, Inc.
 

Similaire à AWS Security from A-Z: Governance & Compliance in VPC (20)

AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
AWS_Security_Essentials
AWS_Security_EssentialsAWS_Security_Essentials
AWS_Security_Essentials
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet ThreatsAWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
AWS Edge Security - Cloud-Native Defense Against Diverse Internet Threats
 
APN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAPN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SA
 
How Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWSHow Inovalon Uses Sophos to Control Security Costs on AWS
How Inovalon Uses Sophos to Control Security Costs on AWS
 
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdf
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdfRetiring Technical Debt - AWS Partner Summit Mumbai 2018.pdf
Retiring Technical Debt - AWS Partner Summit Mumbai 2018.pdf
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
ENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated IndustriesENT305 Compliance and Cloud Security for Regulated Industries
ENT305 Compliance and Cloud Security for Regulated Industries
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Virtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web ServicesVirtual AWSome Day October 2018 - Amazon Web Services
Virtual AWSome Day October 2018 - Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
PaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with AltusPaaS or Fail: Rule the Cloud with Altus
PaaS or Fail: Rule the Cloud with Altus
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Security from A-Z: Governance & Compliance in VPC

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security From A-Z: Governance & Compliance in your VPC Stephen McDermid Sr. Solution Architect - Security & Compliance
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. All AWS customers benefit from a data center and network architecture built from the ground up to satisfy the requirements of the most security- sensitive organizations. At AWS, cloud security is job zero Designed for Security Constantly Monitored Highly Available Constantly Accredited Highly Automated https://aws.amazon.com/security/ https://aws.amazon.com/compliance
  • 3.
  • 4. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Global Infrastructure 21 Regions – 66 Availability Zones – 180 Points of Presence Region & Number of Availability Zones AWS GovCloud (3) 2X EU Ireland (3) US West Frankfurt (3) Oregon (3) London (3) Northern California (3) Paris (3) Stockholm (3) US East N. Virginia (6), Ohio (3) Asia Pacific Singapore (3) Canada Sydney (3), Tokyo (4), Central (2) Seoul (2), Mumbai (2) Osaka-Local (1) South America China São Paulo (3) Beijing (2) Ningxia (3) Announced Regions Bahrain, Hong Kong SAR, Cape Town, Milan
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. PoPs in Europe / Middle East / Africa Europe (Ireland) Region AZs: 3 - Launched 2007 Europe (London) Region AZs: 3 - Launched 2016 Europe (Frankfurt) Region AZs: 3 - Launched 2014 Europe (Paris) Region AZs: 3 - Launched 2017 AWS Edge Network Locations Edge locations - Amsterdam, The Netherlands (2); Berlin, Germany (2); Cape Town, South Africa; Copenhagen, Denmark; Dubai, United Arab Emirates; Dublin, Ireland; Frankfurt, Germany (8); Fujairah, United Arab Emirates; Helsinki, Finland; Johannesburg, South Africa; London, England (9); Madrid, Spain (2); Manchester, England; Marseille, France; Milan, Italy; Munich, Germany (2); Oslo, Norway; Palermo, Italy; Paris, France (4); Prague, Czech Republic; Stockholm, Sweden (3); Vienna, Austria; Warsaw, Poland; Zurich, Switzerland Regional Edge Caches - Frankfurt, Germany; London, England Direct Connect Locations: https://aws.amazon.com/directconnect/features/ Europe (Stockholm) Region AZs: 3 - Launched 2018
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Zoom In: AWS Region Zoom In: AWS AZ Sample Region Datacenter Datacenter Datacenter Sample Availability Zone Availability Zone B Availability Zone A Availability Zone C • Independent Geographic Areas, isolated from other Regions (security boundary) • Customer chooses in which Region(s) to deploy services • Regions are comprised of multiple Availability Zones (AZs), which enables the deployment of High- Availability Architecture • AZs are Independent Failure Zones; Physically separated; On separate Low Risk Flood Plains • Discrete Uninterruptible Power Supply (UPS); Onsite backup generation facilities • DCs in AZ less than ¼ ms apart • Each AZ is 1 or more DC • No data center is in two AZs • Some AZs have as many as 6 DCs
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Example AWS Region AZ AZ AZ AZ AZ Transit Transit • Mesh of Availability Zones (AZ) and Transit Centers • Redundant paths to transit centers • Transit centers connect to: – Private links to other AWS regions – Private links to customers – Internet through peering & paid transit • Metro-area DWDM links between AZs • 82,864 fiber strands in region • AZs <2ms apart & usually <1ms • 25Tbps peak inter-AZs traffic
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Global Network • Redundant 100GbE network • Redundant private capacity between all Regions except China
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Direct Connect Gateway • Customers reach every AWS region from the local Direct Connect location
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Why have a backbone network? Security Traffic traverses our infrastructure rather than the internet Availability Controlling scaling and redundancy Traffic operates over Amazon- controlled infrastructure Reliable performance Controlling specific paths customer traffic traverses Connecting closer to customers Avoiding internet “hot spots” or sub-optimal external connectivity All commercial Region-to-Region traffic traverses the backbone except China
  • 11.
  • 12. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 24 48 61 82 159 280 516 722 1017 1430 1,957 0 300 600 900 1200 1500 1800 2100 1 2 3 4 5 6 7 8 9 10 11 Pace of innovation | Launches
  • 13. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Adopting AWS you can… …concentrate on securing your own application, using automation and many built- in security tools designed to meet the most stringent regulations and requirements + = • Facilities • Physical security • Compute infrastructure • Storage infrastructure • Network infrastructure • Virtualization layer (EC2) • Hardened service endpoints • Rich IAM capabilities • Extensive set of security services • Extensive assurance program • Network configuration • Security groups • OS / Network firewalls • Operating systems security • Application security • Proper service configuration • AuthN and account management • Authorization policies • Data Security • Operational Security Automation More secure and compliant systems
  • 14. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. More secure in the cloud AWS customers tell us that the workloads they have running in AWS are more secure than the workloads they are running on premise. "I have come to realize that as a relatively small organization, we can be far more secure in the cloud and achieve a higher level of assurance at a much lower cost, in terms of effort and dollars invested. We determined that security in AWS is superior to our on-premises data center across several dimensions, including patching, encryption, auditing and logging, entitlements, and compliance.” - John Brady, CISO FINRA What key AWS features are these customers using to achieve this?
  • 15. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Common Security Enablers Visibility & Knowledge Automation / Repeatable Processes Cross-team / cross-process synchronisation Fast Implementation / Reaction Time
  • 16. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Advantages to the API • Authoritative - The interface to, and between, AWS services • Auditable – always know what, and who, is doing what • Secure – verified integrity, authenticated, no covert channels • Fast - can be read and manipulated in sub-second time • Precise – defines the state of all infrastructure and services • Evolving – continuously improving • Uniform - provides consistency across disparate components • Automatable - Enables some really cool capabilities
  • 17. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control Move to AWS Strengthen your security posture
  • 18. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The status (knowledge), and control (automation), of the ENTIRE infrastructure one click of a mouse, or API call, away Security policies for the whole system (in code not paper) constantly and automatically evaluated (visibility, synchronization, time) Consistent tooling and processes, and built-in solutions, for the whole environment using a common interface Detection and/or reaction time reduced to seconds Ubiquitous encryption, in transit, at rest, AWS-managed, customer- managed, and with customer imported keys Some of the AWS security enablers…
  • 19. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Immutable systems and/or Self-healing infrastructures (that automatically protects from attacks) Focus on security applications and business assets (instead of managing the infrastructure necessary to manage security) Improved security whilst reducing complexity in a standardised manner Comply with new regulations easily and with low cost Laser-focused, incremental, changes or improvements without impacting other controls/workloads Providing things such as…
  • 20. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. And also… Dedicated, programmable hardware (FPGAs) and GPUs for HPC and/or security applications Edge computing, for either: • Connected devices controlled by the customers • Local (customer premises) workloads in remote or offline location • AWS Edge locations ML, AI, IoT, Serverless computing https://aws.amazon.com/stateandlocal/justice-and-public-safety/ https://aws.amazon.com/smart-cities/
  • 21. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The security paradigm shifted On AWSOn-premises Big Perimeter End-to-End Ownership Build it all yourself Server-centric approach De-centralised Administration Focus on physical assets Multiple (manual) processes Micro-Perimeters Own just enough Focus on your core values Service-Centric approach Central control plane (API) Focus on protection data Everything is automated
  • 22. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. SecurityAssurance - Comparison Start with bare concrete Periodic checks Workload-specific compliance Must keep pace and invest in security innovation Heterogeneous governance processes and tools Typically reactive Start on accredited services Continuous monitoring Ubiquitous compliance Integrated Security innovation drives broad compliance Integrated governance processes and tools Focus on prevention On AWSOn-premises
  • 23. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. “CIOs and CISOs need to stop obsessing over unsubstantiated cloud security worries, and instead apply their imagination and energy to developing new approaches to cloud control, allowing them to securely, compliantly, and reliably leverage the benefits of this increasingly ubiquitous computing model.” Source: Clouds Are Secure: Are You Using Them Securely?
  • 24.
  • 25. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The shared responsibility model RESPONSIBLE FOR SECURITY “IN” THE CLOUD RESPONSIBLE FOR SECURITY “OF” THE CLOUD SOFTWARE HARDWARE / AWS GLOBAL INFRASTRUCTURE
  • 26. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security OF the Cloud
  • 27. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Global Certifications GLACIER VAULT LOCK & SEC RULE 17A-4(F) SOC 1 SOC 2 SOC 3 PSN
  • 28. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Self-service Compliance Reports – AWS Artifact e-NDA
  • 29. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How do we do it? 100+ services Controls, Artefacts, Audits Thousands of Controls, Artefacts, Audit requirements Set on the highest bar, standardisation and automation
  • 30. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Security & Privacy
  • 31. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Overview Customer chooses where to place data AWS regions are geographically isolated by design Data is not replicated to other AWS regions and doesn’t move unless customer chooses to move it Customers manage access to their customer content and AWS services and resources Customers choose how their content is secured https://aws.amazon.com/compliance/data-privacy-faq/
  • 32. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. In-Country vs. EU vs. Global Unless there is a specific need to comply with a local law or regulation, customers can run workloads anywhere in Europe - because of AWS compliance with the GDPR Regulation (EU) 2016/679 as a processor. And with our EU-approved Data Processing Addendum and ‘Model Clauses’, AWS customers can continue to run their global operations outside EU (including in US) in full compliance with EU law - as confirmed by the Article 29 Working Party The AWS Data Processing Addendum is available to all AWS customers that are processing personal data whether they are established in Europe or a global company operating in the European Economic Area As discussed, customer – as the sole owner of their content - are still responsible for classifying their data and deciding how it is protected Data Residency whitepaper: https://d1.awsstatic.com/whitepapers/compliance/Data_Residency_Whitepaper.pdf
  • 33. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security IN the Cloud
  • 34. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Identity & Access Management (IAM) AWS Organizations AWS Cognito AWS Directory Service AWS Single Sign-On AWS Secret Manager AWS CloudTrail AWS Config Amazon CloudWatch Amazon GuardDuty VPC Flow Logs AWS Security Hub Amazon EC2 Systems Manager AWS Shield AWS Web Application Firewall (WAF) Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service AWS CloudHSM Server/Client Side Encryption Amazon Macie AWS Certificate Manager AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection AWS security solutions AWS CAF Security Perspective: https://d0.awsstatic.com/whitepapers/AWS_CAF_Security_Perspective.pdf
  • 35. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Access a deep set of cloud security tools Encryption & Data Protection Networking & Infrastructure Monitoring & Governance Identity & Access Management Security Groups Endpoints g VPN Gateway Customer gateway Internet gateway Network access control list Route table Alarm Rule AutomationInventory Parameter Store Patch manager Run command State manager Change set Checklist security Flow logs Checklist AWS Organizations AWS STS Temporary security credential Permissions Long-term security credential MFA token Role Federation Data encryption key SAML, OAuth OpenID Connect Template Server-Side Encryption Client-Side Encryption
  • 36. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Governance
  • 37. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Largest ecosystem of security partners and solutions
  • 38. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Consulting competency partners with demonstrated expertise
  • 39. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control Move to AWS Strengthen your security posture
  • 40. Thank you! © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.