SlideShare une entreprise Scribd logo
1  sur  67
Télécharger pour lire hors ligne
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
December 1st 2015
AWS Data Security
Security Update
Data Security Agenda
1:00 pm – AWS Security Overview + What’s New
2:00 pm – Network Security & Access Control in AWS
2:55 pm – Refreshment Break (15 minutes)
3:10 pm – Protecting Your Data in AWS
4:10 pm – Securing Systems at Cloud Scale
5:00 pm – Closing Remarks + Open Q&A
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Security Overview
+
What’s New
AWS Security
An Intro
AWS Security Team
Operations
Application Security
Engineering
Security Assurance
Aligned for agility
Security ownership as part of DNA
• Promotes culture of “everyone is an owner” for security
• Makes security a stakeholder in business success
• Enables easier and smoother communication
Distributed Embedded
Operating principles
Separation of duties
Different personnel across service lines
Least privilege
Technology to automate operational principles
Visibility through automation
Shrinking the protection boundaries
Ubiquitous encryption
Shared Responsibility
Intro to AWS
11 Regions
30 Availability Zones
53 Edge Locations
Over 1 Million Active Customers
Across 190 Countries
Everyday, AWS adds enough new server capacity to support Amazon.com
when it was a $7 billion global enterprise.
A European view of Cloud
• Regions:
– Dublin (EU-West) – 3 x Availability Zones
• Launched in 2007
– Frankfurt (EU-Central) – 2 x Availability Zones
• Launched in 2014
• Edge Locations:
– Amsterdam, The Netherlands (2), Dublin, Ireland, Frankfurt,
Germany (3), London, England (3), Madrid, Spain, Marseille,
France, Milan, Italy, Paris, France (2), Stockholm, Sweden, and
Warsaw, Poland
• Direct Connect POPs:
– Dublin, London, Frankfurt
Data Locality
Customer chooses where to place data
AWS regions are geographically isolated by design
Data is not replicated to other AWS regions and doesn’t
move unless you choose to move it
AWS Global Infrastructure
AWS Global Infrastructure
Your Applications
AWS Global Infrastructure
AWS Global Infrastructure
AWS Global Infrastructure
Regions Availability Zones Edge Locations
Foundation
Services
Application
Services
Deployment &
Management
Compute Storage Networking Databases
Content Delivery Applications Distributed Computing Libraries & SDK’s
EC2 S3 EBS Glacier Storage
Gateway
VPC Direct
Connect
ELB Route53 RDS ElastiCacheDynamo RedShift
CloudFront SES SNS SQS Elastic
Transcoder
CloudSearch SWF EMR
CloudWatch
Monitoring
BeanStalk OpsWorks Cloud
Formation
DataPipe
Deployment & Automation
IAM Federation
Identity & Access
Management
Console
Billing
Web Interface Human Interaction
Mechanical
Turk
AWS Global Infrastructure
Enterprise
Applications
Workspaces Zocalo
Virtual Desktop Document Collaboration
Overview of AWS Services
How does a customer interact with AWS
services?
Common Protocols
• SSH, RDP, HTTP, SSL, SQL etc
API Calls
(Management Console, SDKs, Unified CLI)
• S3, EC2, RDS
API Calls
• Authentication is provided by IAM (Identity Access Management)
• API calls are secured within an TLS connection
• API Calls are made to AWS Service endpoints deployed globally
• A full list of endpoints available here:
– http://docs.aws.amazon.com/general/latest/gr/rande.html
• AWS Unified CLI
– aws ec2 start-instances
– aws ec2 stop-instances
– aws s3 ls
– aws s3 cp <source> <destionation>
Lets look at how customers traditionally manage IT
Core Services
Server Storage Networking
Platform & Applications Management
Customer Data
Customer view
Customer Responsibility:
- Data & Network
Protection
- High Availability
- Disaster Recovery
- Backup
- Scalability
- Audit
Operating System
Data Centre
HVAC UPS Security
Data Encryption
Data
Integrity/Backup
Network Protection
Management,Monitoring&Logging
AWS Shared Responsibility Model
Lets talk about Security within the Cloud and who is responsible for which parts?
Security OF the Cloud
vs
Security IN the Cloud
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Platform & Applications Management
Customer content
Customers
AWS Shared Responsibility Model:
for Infrastructure Services
Managed by
Managed by
Client-Side Data encryption
& Data Integrity Authentication
Network Traffic Protection
Encryption / Integrity / Identity
AWSIAM
CustomerIAM
Operating System, Network & Firewall Configuration
Server-Side Encryption
File System and/or Data
APIEndpoint
Infrastructure Service
Example – EC2
• AWS Responsibility:
• Foundational Services – Networking, Compute, Storage
• AWS Global Infrastructure
• AWS IAM
• AWS API Endpoints
•Customer Responsibility:
• Customer Data
• Customer Application/Platform
• Operating System
• Network & Firewall
• Customer IAM
• High Availability, Scaling
• Instance Management,
• Data Protection (Transit, Rest, Backup)
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Optional – Opaque data: 1’s and 0’s (in transit/at rest)
Firewall
Configuration
Platform & Applications Management
Operating System, Network Configuration
Customer content
Customers
AWS Shared Responsibility Model:
for Container Services
Managed by
Managed by
Client-Side Data encryption
& Data Integrity Authentication
Network Traffic Protection
Encryption / Integrity / Identity
APIEndpointCustomerIAM
AWSIAM
Infrastructure Service
Example – RDS
• AWS Responsibility:
• Foundational Services – Networking, Compute, Storage
• AWS Global Infrastructure
• AWS IAM
• AWS API Endpoints
• Operating System
• Platform / Application
•Customer Responsibility:
• Customer Data
• Firewall (VPC)
• Customer IAM (DB Users, Table Permissions)
• High Availability
• Data Protection (Transit, Rest, Backup)
• Scaling
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Platform & Applications Management
Operating System, Network & Firewall Configuration
Customer content
Customers
AWS Shared Responsibility Model:
for Abstract Services
Managed by
Managed by
Optional – Opaque Data: 1’s and
0’s
(in flight / at rest)
Data Protection by the Platform
Protection of Data at Rest
Network Traffic Protection by the Platform
Protection of Data at in Transit
Client-Side Data Encryption
& Data Integrity Authentication
APIEndpoint
AWSIAM
Infrastructure Service
Example – S3
• AWS Responsibility:
• Foundational Services – Networking, Compute, Storage
• AWS Global Infrastructure
• AWS IAM
• AWS API Endpoints
• Operating System
• Platform / Application
• Data Protection (Rest - SSE, Transit)
• High Availability / Scaling
•Customer Responsibility:
• Customer Data
• Data Protection
Shared Responsibility
Summary of Security IN the Cloud (Customer Responsibility
Infrastructure Services
Applications
Operating System
Container Services Abstract Services
Networking/Firewall
Data
Customer IAM
AWS IAM
Networking/Firewall
Data
AWS IAM
Data
Customer IAM
AWS IAM
What about Security OF the Cloud?
Shared Responsibility
Security Shared Responsibility Model
AWS Foundation Services
Compute Storage Database Network
AWS Global
Infrastructure
Regions
AWS is responsible
for the security OF
the cloud
AWS
Availability Zones Edge Locations
on AWS
•Start on base of accredited services
•Functionally necessary – high watermark of
requirements
•Audits done by third party experts
•Accountable to everyone
•Continuous monitoring
•Compliance approach based on all workload
scenarios
•Security innovation drives broad compliance
on-Prem
• Start with bare concrete
• Functionally optional
– (you can build a secure system without it)
• Audits done by an in-house team
• Accountable to yourself
• Typically check once a year
• Workload-specific compliance checks
• Must keep pace and invest in security innovation
Auditing - Comparison
on-Prem vs on AWS
What this means
• You benefit from an environment built for the most security sensitive
organizations
• AWS manages 1,800+ security controls so you don’t have to
• You get to define the right security controls for your workload
sensitivity
• You always have full ownership and control of your data
AWS Assurance Program Updates
SOC:
New services in scope after successful assessment
KMS, Workspace, SES
PCI:
New services in scope after achieving PCI DSS 3.1 certification
KMS, Cloudtrail, Cloudfront
ISO 27017:
International code of practice focusing on Cloud providers
ISO 27018:
International code of practice that focuses on protection of PII in the cloud.
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Your own
accreditation
Meet your own security objectives
Your own
certifications
Your own
external audits Customer scope and
effort is reduced
Better results
through focused
efforts
Built on AWS
consistent baseline
controls
Customers
Why AWS?
How AWS Security features and services
can help our Customers
Amazon Inspector (Preview)
Security assessment tool analyzing end-to-end
application configuration and activity
Why Amazon Inspector?
Applications testing key to moving fast but staying safe
Security assessment highly manual, resulting in delays or
missed security checks
Valuable security subject matter experts spending too
much time on routine security assessment
Amazon Inspector features
Configuration Scanning Engine
Activity monitoring
Built-in content library
Automatable via API
Fully auditable
Getting started
Amazon Inspector rulesets
CVE
Network Security Best Practices
Authentication Best Practices
Operating System Best Practices
Application Security Best Practices
PCI DCSS 3.0 Readiness
Prioritized findings
Detailed remediation recommendations
AWS WAF
AWS WAF features
Web filtering
Amazon CloudFront integration
Centralized rule management
Real-time visibility
API automation
AWS WAF benefits
Increased protection
against web attacks
Ease of deployment and
maintenance
Security embedded in
development process
AWS WAF
AWS WAF in action
AWS Management
ConsoleAdmins
Developers AWS API
Web app in
CloudFront
Define rules
Deploy
protection
AWS WAF
AWS WAF Partner integrations
• Alert Logic, Trend Micro, and Imperva integrating with AWS WAF
• Offer additional detection and threat intelligence
• Dynamically modify rulesets of AWS WAF for increased protection
AWS Config Rules
Fully managed service which provides:
• An Inventory of your AWS resources
• Lets you audit the resource configuration
history
• Notifies you of resource configuration
changes
• Logs are placed in customer defined S3
bucket
AWS Config
AWS Config Rules features
Flexible rules evaluated continuously and
retroactively
Dashboard and reports for common goals
Customizable remediation
API automation
AWS Config Rules – example rules
Is Cloudtrail Enabled?
Are in-use volumes encrypted?
Are resources appropriately tagged?
Is incoming SSH disabled?
Are instanced running in the correct VPC?
Are Elastic IPs attached to the correct EC2 instances?
AWS Config Rules
Broad ecosystem of solutions
AWS Config Rules benefits
Continuous monitoring for
unexpected changes
Shared compliance
across your organization
Simplified management of
configuration changes
AWS Config Rules
Security by Design (Preview)
Evolution of security & compliance at AWS
AWS
certifications
Customer
enabler docs
Customer
case studies
Security by
Design
(SbD)
AWS
CloudTrailAWS
CloudHSM
AWS IAM
AWS KMS
AWS
Config
Security by Design - SbD
Security by Design (SbD) is a modern, security
assurance approach that formalizes AWS
account design, automates security controls, and
streamlines auditing.
It is a systematic approach to ensure security;
instead of relying on after-the-fact auditing, SbD
provides control insights throughout the IT
management process.
AWS
CloudTrail
AWS
CloudHSM
AWS IAM
AWS KMS
AWS
Config
Putting it all together (SbD)
Build your AWS
applications
using Security by
Design
Continuous
Compliance
through Config
Rules
Continuous
Compliance
through
Inspector
Customer
Workload
Security Training
New security training
Training
Security Fundamentals on AWS
– Free online course for Security
Auditors, Analysts and Management
– 5 modules over 3 hours
 Progress is saved
Details at aws.amazon.com/training
New security training
Training
Security Operations on AWS
– 3 day class for:
 Security Engineers/Architects
 Security Analysts and Auditors
– 11 modules with X Labs
Details at aws.amazon.com/training
Security Partners
• Infrastructure Security – gateway, firewall, router, WAF, network, UTM
• Identity & Access Control - allowed/authorized access
• Logging & Monitoring - SIEM/ Governance, Risk, & Compliance (GRC)
• Configuration & Vulnerability Analysis – scanning/pen testing and
IPS/IDS
• Data Protection - DRM/DLP/Encryption
• Threat Analytics - continuous monitoring
AWS Marketplace
Offers customers a choice of security configurations IN the Cloud
AWS Marketplace Network/Security Partner Eco-system
Infrastructure
Security
Logging &
Monitoring
Identity &
Access Control
Configuration &
Vulnerability
Analysis
Data
Protection
SaaS
SaaS
SaaS
Helpful Resources
Getting help - Trusted Advisor
Performs a series of security
configuration checks of your AWS
environment:
----------------
• Open ports
• Unrestricted access
• IAM use
• CloudTrail Logging
• S3 Bucket Permissions
• Multi-factor authentication
• Password Policy
• DB Access Risk
• DNS Records
• Load Balancer configuration
Getting Help - AWS Auditing Checklists
Getting help - AWS Compliance:
Workbooks
• IT Grundschutz (TUV Trust IT)
• CESG UK Security Principles
• PCI Workbook – Anitian
• Audit Checklists
Whitepapers
• EU Data Protection
• Risk & Compliance
• Overview of Security Processes
• FERPA
FAQs
• PCI, HIPAA, EU Data Protection, ISO 27001, 9001 etc…
Training
• eLearning – Security Fundamentals – 3hour free online course
• Instructor Lead Training – 3day course for Security Professionals
• Qwiklabs - Security & Auditing Self Paced Lab
Blogs
• http://blogs.aws.amazon.com/security/
Getting help - Resources
Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/
Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and-compliance/
Compliance Center Website: https://aws.amazon.com/compliance
Security Center: https://aws.amazon.com/security
Security Blog: https://blogs.aws.amazon.com/security/
AWS Audit Training: awsaudittraining@amazon.com
AWS Security Training: https://aws.amazon.com/blogs/aws/new-aws-security-courses/

Contenu connexe

Tendances

Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Amazon Web Services
 

Tendances (20)

Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
AWS re:Invent 2016: Security Automation: Spend Less Time Securing Your Applic...
 
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar SeriesSetup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
Setup Preconfigured Protections on AWS WAF - November 2016 Webinar Series
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
Auto-Scaling Web Application Security in Amazon Web Services (SEC308) | AWS r...
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Aws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detailAws(in)security - the devil is in the detail
Aws(in)security - the devil is in the detail
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
Encryption and key management in AWS (SEC304) | AWS re:Invent 2013
 
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
Zero to Sixty: AWS OpsWorks (DMG202) | AWS re:Invent 2013
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
AWS re:Invent 2016: Workshop: Secure Your Web Application with AWS WAF and Am...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
(SEC311) Architecting for End-to-End Security in the Enterprise | AWS re:Inve...
 

En vedette

Building High-availability Websites on AWS
Building High-availability Websites on AWSBuilding High-availability Websites on AWS
Building High-availability Websites on AWS
Amazon Web Services
 
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
Amazon Web Services
 

En vedette (20)

Extending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS CloudExtending your Storage Infrastructure into the AWS Cloud
Extending your Storage Infrastructure into the AWS Cloud
 
Amazon Cognito
Amazon CognitoAmazon Cognito
Amazon Cognito
 
C2S: What’s Next
C2S: What’s NextC2S: What’s Next
C2S: What’s Next
 
Introduction to Amazon Web Services
Introduction to Amazon Web ServicesIntroduction to Amazon Web Services
Introduction to Amazon Web Services
 
AWS December 2015 Webinar Series - Introducing Amazon Inspector
AWS December 2015 Webinar Series - Introducing Amazon InspectorAWS December 2015 Webinar Series - Introducing Amazon Inspector
AWS December 2015 Webinar Series - Introducing Amazon Inspector
 
Mobile on AWS
Mobile on AWSMobile on AWS
Mobile on AWS
 
[AWS Days Microsoft-LA 2015]: Software Licensing Considerations for Enterpris...
[AWS Days Microsoft-LA 2015]: Software Licensing Considerations for Enterpris...[AWS Days Microsoft-LA 2015]: Software Licensing Considerations for Enterpris...
[AWS Days Microsoft-LA 2015]: Software Licensing Considerations for Enterpris...
 
Building High-availability Websites on AWS
Building High-availability Websites on AWSBuilding High-availability Websites on AWS
Building High-availability Websites on AWS
 
AWS Cloud for HPC and Big Data
AWS Cloud for HPC and Big DataAWS Cloud for HPC and Big Data
AWS Cloud for HPC and Big Data
 
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
 
Behind the Scenes: Deploying a Low-Latency Multiplayer Game Globally
Behind the Scenes: Deploying a Low-Latency Multiplayer Game GloballyBehind the Scenes: Deploying a Low-Latency Multiplayer Game Globally
Behind the Scenes: Deploying a Low-Latency Multiplayer Game Globally
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
Introduction of AWS KMS
Introduction of AWS KMSIntroduction of AWS KMS
Introduction of AWS KMS
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
AWS re:Invent 2016: AWS Customers Saving Lives with Mobile and IoT Technology...
 
Engage Your Customers with Amazon SNS Mobile Push (MBL308) | AWS re:Invent 2013
Engage Your Customers with Amazon SNS Mobile Push (MBL308) | AWS re:Invent 2013Engage Your Customers with Amazon SNS Mobile Push (MBL308) | AWS re:Invent 2013
Engage Your Customers with Amazon SNS Mobile Push (MBL308) | AWS re:Invent 2013
 
AWS re:Invent 2016: AWS GovCloud (US) for Highly Regulated Workloads (WWPS301)
AWS re:Invent 2016: AWS GovCloud (US) for Highly Regulated Workloads (WWPS301)AWS re:Invent 2016: AWS GovCloud (US) for Highly Regulated Workloads (WWPS301)
AWS re:Invent 2016: AWS GovCloud (US) for Highly Regulated Workloads (WWPS301)
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
AWS re:Invent 2016: Add User Sign-In, User Management, and Security to your M...
 
AWS Services overview and global infrastructure
AWS Services overview and global infrastructureAWS Services overview and global infrastructure
AWS Services overview and global infrastructure
 

Similaire à Intro & Security Update

선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
Amazon Web Services Korea
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
MohammadEnnab4
 

Similaire à Intro & Security Update (20)

Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Getting Started with Windows Workloads on Amazon EC2 - Toronto
 Getting Started with Windows Workloads on Amazon EC2 - Toronto Getting Started with Windows Workloads on Amazon EC2 - Toronto
Getting Started with Windows Workloads on Amazon EC2 - Toronto
 
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWSThe AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
The AWS Shared Responsibility Model in Practice - Nirav Kothari, AWS
 
AWS solution Architect Associate study material
AWS solution Architect Associate study materialAWS solution Architect Associate study material
AWS solution Architect Associate study material
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Shared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account StructuresShared Responsibility and Setting Up Secure Account Structures
Shared Responsibility and Setting Up Secure Account Structures
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
The Tightrope for K12 IT
The Tightrope for K12 ITThe Tightrope for K12 IT
The Tightrope for K12 IT
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 

Plus de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Dernier

EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
Earley Information Science
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 

Dernier (20)

Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Advantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your BusinessAdvantages of Hiring UIUX Design Service Providers for Your Business
Advantages of Hiring UIUX Design Service Providers for Your Business
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Intro & Security Update

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. December 1st 2015 AWS Data Security Security Update
  • 2. Data Security Agenda 1:00 pm – AWS Security Overview + What’s New 2:00 pm – Network Security & Access Control in AWS 2:55 pm – Refreshment Break (15 minutes) 3:10 pm – Protecting Your Data in AWS 4:10 pm – Securing Systems at Cloud Scale 5:00 pm – Closing Remarks + Open Q&A
  • 3. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Security Overview + What’s New
  • 5. AWS Security Team Operations Application Security Engineering Security Assurance Aligned for agility
  • 6. Security ownership as part of DNA • Promotes culture of “everyone is an owner” for security • Makes security a stakeholder in business success • Enables easier and smoother communication Distributed Embedded
  • 7. Operating principles Separation of duties Different personnel across service lines Least privilege
  • 8. Technology to automate operational principles Visibility through automation Shrinking the protection boundaries Ubiquitous encryption
  • 10. Intro to AWS 11 Regions 30 Availability Zones 53 Edge Locations Over 1 Million Active Customers Across 190 Countries Everyday, AWS adds enough new server capacity to support Amazon.com when it was a $7 billion global enterprise.
  • 11. A European view of Cloud • Regions: – Dublin (EU-West) – 3 x Availability Zones • Launched in 2007 – Frankfurt (EU-Central) – 2 x Availability Zones • Launched in 2014 • Edge Locations: – Amsterdam, The Netherlands (2), Dublin, Ireland, Frankfurt, Germany (3), London, England (3), Madrid, Spain, Marseille, France, Milan, Italy, Paris, France (2), Stockholm, Sweden, and Warsaw, Poland • Direct Connect POPs: – Dublin, London, Frankfurt
  • 12. Data Locality Customer chooses where to place data AWS regions are geographically isolated by design Data is not replicated to other AWS regions and doesn’t move unless you choose to move it
  • 13. AWS Global Infrastructure AWS Global Infrastructure Your Applications AWS Global Infrastructure AWS Global Infrastructure AWS Global Infrastructure Regions Availability Zones Edge Locations Foundation Services Application Services Deployment & Management Compute Storage Networking Databases Content Delivery Applications Distributed Computing Libraries & SDK’s EC2 S3 EBS Glacier Storage Gateway VPC Direct Connect ELB Route53 RDS ElastiCacheDynamo RedShift CloudFront SES SNS SQS Elastic Transcoder CloudSearch SWF EMR CloudWatch Monitoring BeanStalk OpsWorks Cloud Formation DataPipe Deployment & Automation IAM Federation Identity & Access Management Console Billing Web Interface Human Interaction Mechanical Turk AWS Global Infrastructure Enterprise Applications Workspaces Zocalo Virtual Desktop Document Collaboration Overview of AWS Services
  • 14. How does a customer interact with AWS services? Common Protocols • SSH, RDP, HTTP, SSL, SQL etc API Calls (Management Console, SDKs, Unified CLI) • S3, EC2, RDS
  • 15. API Calls • Authentication is provided by IAM (Identity Access Management) • API calls are secured within an TLS connection • API Calls are made to AWS Service endpoints deployed globally • A full list of endpoints available here: – http://docs.aws.amazon.com/general/latest/gr/rande.html • AWS Unified CLI – aws ec2 start-instances – aws ec2 stop-instances – aws s3 ls – aws s3 cp <source> <destionation>
  • 16. Lets look at how customers traditionally manage IT
  • 17. Core Services Server Storage Networking Platform & Applications Management Customer Data Customer view Customer Responsibility: - Data & Network Protection - High Availability - Disaster Recovery - Backup - Scalability - Audit Operating System Data Centre HVAC UPS Security Data Encryption Data Integrity/Backup Network Protection Management,Monitoring&Logging
  • 18. AWS Shared Responsibility Model Lets talk about Security within the Cloud and who is responsible for which parts? Security OF the Cloud vs Security IN the Cloud
  • 19. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Platform & Applications Management Customer content Customers AWS Shared Responsibility Model: for Infrastructure Services Managed by Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity AWSIAM CustomerIAM Operating System, Network & Firewall Configuration Server-Side Encryption File System and/or Data APIEndpoint
  • 20. Infrastructure Service Example – EC2 • AWS Responsibility: • Foundational Services – Networking, Compute, Storage • AWS Global Infrastructure • AWS IAM • AWS API Endpoints •Customer Responsibility: • Customer Data • Customer Application/Platform • Operating System • Network & Firewall • Customer IAM • High Availability, Scaling • Instance Management, • Data Protection (Transit, Rest, Backup)
  • 21. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Firewall Configuration Platform & Applications Management Operating System, Network Configuration Customer content Customers AWS Shared Responsibility Model: for Container Services Managed by Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity APIEndpointCustomerIAM AWSIAM
  • 22. Infrastructure Service Example – RDS • AWS Responsibility: • Foundational Services – Networking, Compute, Storage • AWS Global Infrastructure • AWS IAM • AWS API Endpoints • Operating System • Platform / Application •Customer Responsibility: • Customer Data • Firewall (VPC) • Customer IAM (DB Users, Table Permissions) • High Availability • Data Protection (Transit, Rest, Backup) • Scaling
  • 23. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Platform & Applications Management Operating System, Network & Firewall Configuration Customer content Customers AWS Shared Responsibility Model: for Abstract Services Managed by Managed by Optional – Opaque Data: 1’s and 0’s (in flight / at rest) Data Protection by the Platform Protection of Data at Rest Network Traffic Protection by the Platform Protection of Data at in Transit Client-Side Data Encryption & Data Integrity Authentication APIEndpoint AWSIAM
  • 24. Infrastructure Service Example – S3 • AWS Responsibility: • Foundational Services – Networking, Compute, Storage • AWS Global Infrastructure • AWS IAM • AWS API Endpoints • Operating System • Platform / Application • Data Protection (Rest - SSE, Transit) • High Availability / Scaling •Customer Responsibility: • Customer Data • Data Protection
  • 25. Shared Responsibility Summary of Security IN the Cloud (Customer Responsibility Infrastructure Services Applications Operating System Container Services Abstract Services Networking/Firewall Data Customer IAM AWS IAM Networking/Firewall Data AWS IAM Data Customer IAM AWS IAM
  • 26. What about Security OF the Cloud? Shared Responsibility
  • 27. Security Shared Responsibility Model AWS Foundation Services Compute Storage Database Network AWS Global Infrastructure Regions AWS is responsible for the security OF the cloud AWS Availability Zones Edge Locations
  • 28. on AWS •Start on base of accredited services •Functionally necessary – high watermark of requirements •Audits done by third party experts •Accountable to everyone •Continuous monitoring •Compliance approach based on all workload scenarios •Security innovation drives broad compliance on-Prem • Start with bare concrete • Functionally optional – (you can build a secure system without it) • Audits done by an in-house team • Accountable to yourself • Typically check once a year • Workload-specific compliance checks • Must keep pace and invest in security innovation Auditing - Comparison on-Prem vs on AWS
  • 29. What this means • You benefit from an environment built for the most security sensitive organizations • AWS manages 1,800+ security controls so you don’t have to • You get to define the right security controls for your workload sensitivity • You always have full ownership and control of your data
  • 30. AWS Assurance Program Updates SOC: New services in scope after successful assessment KMS, Workspace, SES PCI: New services in scope after achieving PCI DSS 3.1 certification KMS, Cloudtrail, Cloudfront ISO 27017: International code of practice focusing on Cloud providers ISO 27018: International code of practice that focuses on protection of PII in the cloud.
  • 31. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Your own accreditation Meet your own security objectives Your own certifications Your own external audits Customer scope and effort is reduced Better results through focused efforts Built on AWS consistent baseline controls Customers
  • 32. Why AWS? How AWS Security features and services can help our Customers
  • 33. Amazon Inspector (Preview) Security assessment tool analyzing end-to-end application configuration and activity
  • 34. Why Amazon Inspector? Applications testing key to moving fast but staying safe Security assessment highly manual, resulting in delays or missed security checks Valuable security subject matter experts spending too much time on routine security assessment
  • 35. Amazon Inspector features Configuration Scanning Engine Activity monitoring Built-in content library Automatable via API Fully auditable
  • 37. Amazon Inspector rulesets CVE Network Security Best Practices Authentication Best Practices Operating System Best Practices Application Security Best Practices PCI DCSS 3.0 Readiness
  • 41. AWS WAF features Web filtering Amazon CloudFront integration Centralized rule management Real-time visibility API automation
  • 42. AWS WAF benefits Increased protection against web attacks Ease of deployment and maintenance Security embedded in development process
  • 44. AWS WAF in action AWS Management ConsoleAdmins Developers AWS API Web app in CloudFront Define rules Deploy protection AWS WAF
  • 45. AWS WAF Partner integrations • Alert Logic, Trend Micro, and Imperva integrating with AWS WAF • Offer additional detection and threat intelligence • Dynamically modify rulesets of AWS WAF for increased protection
  • 47. Fully managed service which provides: • An Inventory of your AWS resources • Lets you audit the resource configuration history • Notifies you of resource configuration changes • Logs are placed in customer defined S3 bucket AWS Config
  • 48. AWS Config Rules features Flexible rules evaluated continuously and retroactively Dashboard and reports for common goals Customizable remediation API automation
  • 49. AWS Config Rules – example rules Is Cloudtrail Enabled? Are in-use volumes encrypted? Are resources appropriately tagged? Is incoming SSH disabled? Are instanced running in the correct VPC? Are Elastic IPs attached to the correct EC2 instances?
  • 50. AWS Config Rules Broad ecosystem of solutions
  • 51. AWS Config Rules benefits Continuous monitoring for unexpected changes Shared compliance across your organization Simplified management of configuration changes
  • 53. Security by Design (Preview)
  • 54. Evolution of security & compliance at AWS AWS certifications Customer enabler docs Customer case studies Security by Design (SbD) AWS CloudTrailAWS CloudHSM AWS IAM AWS KMS AWS Config
  • 55. Security by Design - SbD Security by Design (SbD) is a modern, security assurance approach that formalizes AWS account design, automates security controls, and streamlines auditing. It is a systematic approach to ensure security; instead of relying on after-the-fact auditing, SbD provides control insights throughout the IT management process. AWS CloudTrail AWS CloudHSM AWS IAM AWS KMS AWS Config
  • 56. Putting it all together (SbD) Build your AWS applications using Security by Design Continuous Compliance through Config Rules Continuous Compliance through Inspector Customer Workload
  • 58. New security training Training Security Fundamentals on AWS – Free online course for Security Auditors, Analysts and Management – 5 modules over 3 hours  Progress is saved Details at aws.amazon.com/training
  • 59. New security training Training Security Operations on AWS – 3 day class for:  Security Engineers/Architects  Security Analysts and Auditors – 11 modules with X Labs Details at aws.amazon.com/training
  • 61. • Infrastructure Security – gateway, firewall, router, WAF, network, UTM • Identity & Access Control - allowed/authorized access • Logging & Monitoring - SIEM/ Governance, Risk, & Compliance (GRC) • Configuration & Vulnerability Analysis – scanning/pen testing and IPS/IDS • Data Protection - DRM/DLP/Encryption • Threat Analytics - continuous monitoring AWS Marketplace Offers customers a choice of security configurations IN the Cloud
  • 62. AWS Marketplace Network/Security Partner Eco-system Infrastructure Security Logging & Monitoring Identity & Access Control Configuration & Vulnerability Analysis Data Protection SaaS SaaS SaaS
  • 64. Getting help - Trusted Advisor Performs a series of security configuration checks of your AWS environment: ---------------- • Open ports • Unrestricted access • IAM use • CloudTrail Logging • S3 Bucket Permissions • Multi-factor authentication • Password Policy • DB Access Risk • DNS Records • Load Balancer configuration
  • 65. Getting Help - AWS Auditing Checklists
  • 66. Getting help - AWS Compliance: Workbooks • IT Grundschutz (TUV Trust IT) • CESG UK Security Principles • PCI Workbook – Anitian • Audit Checklists Whitepapers • EU Data Protection • Risk & Compliance • Overview of Security Processes • FERPA FAQs • PCI, HIPAA, EU Data Protection, ISO 27001, 9001 etc… Training • eLearning – Security Fundamentals – 3hour free online course • Instructor Lead Training – 3day course for Security Professionals • Qwiklabs - Security & Auditing Self Paced Lab Blogs • http://blogs.aws.amazon.com/security/
  • 67. Getting help - Resources Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/ Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and-compliance/ Compliance Center Website: https://aws.amazon.com/compliance Security Center: https://aws.amazon.com/security Security Blog: https://blogs.aws.amazon.com/security/ AWS Audit Training: awsaudittraining@amazon.com AWS Security Training: https://aws.amazon.com/blogs/aws/new-aws-security-courses/