SlideShare une entreprise Scribd logo
1  sur  35
Télécharger pour lire hors ligne
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Safeguarding the integrity of your
code for fast, secure deployments
Benjamin Andrew
Global Lead, Security & Network Infrastructure
AWS Marketplace
S V C 3 0 1
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Quick
Get the software you need in minutes
with just a few clicks or use the 1-Click
deployment option.
Software in AWS Marketplace is ready
to run on Amazon Web Services (AWS).
Pay as you go
Pay only for what you use through
various payment options and receive
discounts on longer or custom terms.
All charges from AWS Marketplace are
consolidated into one bill from AWS.
Verified
All software in AWS Marketplace is
continuously scanned to ensure
reliability.
AWS Marketplace
Acurated digital software catalog that helps
you find,buy,test, and deploysoftware
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
A growing digital software catalog
• AWS Marketplace offers 39 software categories
• More than 4,800 software listings
• More than 1,400 ISVs (independent software vendors)
• More than 230,000 active customers
• More than 1 million current subscriptions
• AWS customers use over 650 million hours a month of Amazon
Elastic Compute Cloud (Amazon EC2) for AWS Marketplace
products
• AWS Marketplace is available in 18 AWS Regions
• Flexible consumption and contract models
• Easy and secure deployment, almost instantly
• One consolidated bill
• Always evolving
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Operating
systems SIEMStorage BIDatabase DevOpsNetworking
Eight popular categories most often provisioned
Security
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security in the cloud
Identify
Security fundamentally anchors
on having sufficient knowledge
of your world
Protect
The best defense is an offense
Detect
However, one must “assume
breach” and have a strong defense
Knowing and being able to act
swiftly is key in the cloud
Respond/recover
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.6
Why DevSecOps?
Business imperatives
Competing forces
Development
Build it faster
Operations
Keep it stable
Security
Make it secure
D e v O p s
Build Test Distribute
Monitor
Developers Users
D e v S e c O p s
Build Test Distribute
Monitor
Developers Users
Security
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Speed! Collaboration! Automation!
Waterfall
Agile
DevOps
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
Precommit Commit Acceptance Deploy
 Continuous compliance →
Threat modeling
Initial SAST inside IDE
Code review
“Break the build“
Compile/build checks
SCA
Container security
Additional SAST
Unit test
Secure infra build
Functional testing
SCA DAST
Unit testing
Security attacks
Deep SAST
Fuzzing, pen tests
Provision runtime
environment
Config management
RASP
Security
Compliance
CI/CD
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
Precommit
Threat modeling
Initial SAST inside IDE
Code review
Security
Compliance
CI/CD
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Static analysis security testing (SAST) in IDE
What it is: Automatically analyzes code for
security early without slowing down
development
Why it’s important: Introduces code
analysis as “far left” as possible
Why it’s critical to security: Catches
vulnerabilities at the first point they can
enter the application pipeline to reduce
significant impacts
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Veracode Greenlight
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
Commit
“Break the build“
Compile/build checks
SCA
Container security
Additional SAST
Unit test
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Software composition analysis (SCA)
What it is: Vulnerability scanning tool for
open source
Why it’s important: Most static analysis
tools aren’t relevant for open source
Why it’s critical to security: Reduces the
threat of vulnerabilities from dependencies
on open-source components
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: WhiteSource
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
WhiteSource SaaS in AWS Marketplace
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Container vulnerability analysis (CVA)
What it is: Vulnerability scanning tools that
specifically target containers
Why it’s important: Security needs to be
tailored to containerized applications
Why it’s critical to security: A vulnerability in
one container can spread to others without
isolation between containers
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Aqua
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Aqua SaaS in AWS Marketplace
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Veracode
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
Acceptance
Secure infra build
Functional testing
SCA DAST
Unit testing
Security attacks
Deep SAST
Fuzzing, pen tests
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Dynamic analysis security testing (DAST)
What it is: Tests web applications for exposed
HTTP and HTML interfaces while they are
running
Why it’s important: Dynamic, for running
applications, vulnerability scanning in testing,
staging, and production
Why it’s critical to security: Looks for a broad
range of vulnerabilities, such as input/output
validation issues leading to cross-site scripting
(XSS) or SQL injection
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Qualys Web Application Scanner
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Qualys Web Application Scanning SaaS in AWS
Marketplace
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
Provision runtime
environment
Config management
RASP
Security
Compliance
CI/CD
Precommit Commit Acceptance Deploy
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Runtime application self-protection (RASP)
What it is: Controls execution and prevents
real-time attacks in application runtime
environment.
Why it’s important: Targets application code
security at runtime (powerful addition to a
WAF).
Why it’s critical to security: Protects against
OWASP top runtime threats. Can capture zero-
day vulnerabilities.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Prevoty
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Prevoty AMI in AWS Marketplace
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Security and compliance of the code in the pipeline
 Continuous compliance →
Security
Compliance
CI/CD Precommit Commit Acceptance Deploy
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Continuous compliance
What it is: Automate the compliance of your
*infrastructure* code
Why it’s important: Ensure regulatory
compliance
Why it’s critical to security: Secure application
code can run on compliant/
safe infrastructure
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Vendor highlight: Dome9
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Dome9 in AWS Marketplace
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Making DevOps Sec-friendly
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Customize the way you provision software
Find
Machine learning
Containers
Networking
Security
Storage
DevOps
Database
Operating systems
BI and big data
From a breadth
of categories:
Buy
Free trial
Pay as you go
Hourly
Monthly
Annual and multi-year
Bring your own license (BYOL)
Seller private offers
Through flexible
pricing options:
Deploy
Amazon Elastic Container Services (Amazon
ECS)
Amazon Elastic Container Services for
Kubernetes (Amazon EKS)
Amazon Machine Image (AMI)
Application program interface (API)
Amazon SageMaker
AWS Fargate
AWS CloudFormation template
SaaS
With multiple
deployment options:
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
“The ability to deploy software instantaneously anywhere in the world means we’re able to scale
immediately, and stretch or shrink the environment to accommodate our needs.”
“Integrated billing on AWS Marketplace is very slick, very straightforward. One place, one
dashboard where all my costs appear.”
Why customers buy in AWS Marketplace
Flexible
consumption and
contract models
Easy and secure
deployment, almost
instantly
Single, consolidated
bill
Speed, simplicity, and scalability
“One benefit of the pay-as-you-go model is the ability to deploy anywhere without having to do a
capital approval process to pay for infrastructure that may or may not be used.”
—Rob Gillan, CTO, SimplePay
—Briley James Yetter, Director of Technology, Goodwill Industries
—Richard Williams, Sr. Engineer, MakerBot
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Thank you!
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Benjamin Andrew
Global Lead Security, Networking & DevSecOps
AWS Marketplace
benand@amazon.com
www.linkedin.com/in/benandrew

Contenu connexe

Tendances

Using automation to drive continuous-compliance best practices - SVC309 - Chi...
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Using automation to drive continuous-compliance best practices - SVC309 - Chi...
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Amazon Web Services
 
Increasing the value of video with machine learning & AWS Media Services - SV...
Increasing the value of video with machine learning & AWS Media Services - SV...Increasing the value of video with machine learning & AWS Media Services - SV...
Increasing the value of video with machine learning & AWS Media Services - SV...Amazon Web Services
 
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS Summit
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitDo you need a ledger database or a blockchain? - SVC310 - Chicago AWS Summit
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitAmazon Web Services
 
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Amazon Web Services
 
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Amazon Web Services
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Amazon Web Services
 
Developing serverless applications with .NET using AWS SDK and tools - MAD308...
Developing serverless applications with .NET using AWS SDK and tools - MAD308...Developing serverless applications with .NET using AWS SDK and tools - MAD308...
Developing serverless applications with .NET using AWS SDK and tools - MAD308...Amazon Web Services
 
Monitoring with container insights & anomaly detection - SVC308 - New York AW...
Monitoring with container insights & anomaly detection - SVC308 - New York AW...Monitoring with container insights & anomaly detection - SVC308 - New York AW...
Monitoring with container insights & anomaly detection - SVC308 - New York AW...Amazon Web Services
 
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS Summit
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitExploring the fundamentals of AWS networking - SVC210 - Chicago AWS Summit
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitAmazon Web Services
 
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...Amazon Web Services
 
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Amazon Web Services
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitAmazon Web Services
 
Delivering applications securely with AWS - SVC303 - Chicago AWS Summit
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitDelivering applications securely with AWS - SVC303 - Chicago AWS Summit
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitAmazon Web Services
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Amazon Web Services
 
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...Amazon Web Services
 
Industry 4.0 in the cloud - SVC214 - Chicago AWS Summit
Industry 4.0 in the cloud - SVC214 - Chicago AWS SummitIndustry 4.0 in the cloud - SVC214 - Chicago AWS Summit
Industry 4.0 in the cloud - SVC214 - Chicago AWS SummitAmazon Web Services
 
Planning advanced AWS networking architectures - SVC304 - Chicago AWS Summit
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitPlanning advanced AWS networking architectures - SVC304 - Chicago AWS Summit
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitAmazon Web Services
 
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...Amazon Web Services
 
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...Amazon Web Services
 

Tendances (20)

Using automation to drive continuous-compliance best practices - SVC309 - Chi...
Using automation to drive continuous-compliance best practices - SVC309 - Chi...Using automation to drive continuous-compliance best practices - SVC309 - Chi...
Using automation to drive continuous-compliance best practices - SVC309 - Chi...
 
Increasing the value of video with machine learning & AWS Media Services - SV...
Increasing the value of video with machine learning & AWS Media Services - SV...Increasing the value of video with machine learning & AWS Media Services - SV...
Increasing the value of video with machine learning & AWS Media Services - SV...
 
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS Summit
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS SummitDo you need a ledger database or a blockchain? - SVC310 - Chicago AWS Summit
Do you need a ledger database or a blockchain? - SVC310 - Chicago AWS Summit
 
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
Connecting low-power devices to the cloud with Amazon FreeRTOS BLE - SVC206 -...
 
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
Gain visibility & real-time actionable security alerts with VPC Flow Logs & A...
 
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
Gain visibility and real-time security alerts with VPC Flow Logs & AWS - DEM0...
 
Developing serverless applications with .NET using AWS SDK and tools - MAD308...
Developing serverless applications with .NET using AWS SDK and tools - MAD308...Developing serverless applications with .NET using AWS SDK and tools - MAD308...
Developing serverless applications with .NET using AWS SDK and tools - MAD308...
 
Monitoring with container insights & anomaly detection - SVC308 - New York AW...
Monitoring with container insights & anomaly detection - SVC308 - New York AW...Monitoring with container insights & anomaly detection - SVC308 - New York AW...
Monitoring with container insights & anomaly detection - SVC308 - New York AW...
 
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS Summit
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS SummitExploring the fundamentals of AWS networking - SVC210 - Chicago AWS Summit
Exploring the fundamentals of AWS networking - SVC210 - Chicago AWS Summit
 
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...
Train once, deploy anywhere on the cloud and at the edge with Neo - AIM301 - ...
 
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...
Finding all the threats: AWS threat detection and remediation - SEC303 - Chic...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
Safeguard the Integrity of Your Code for Fast and Secure Deployments - SVC206...
 
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS SummitCarry security with you to the cloud - DEM14-SR - New York AWS Summit
Carry security with you to the cloud - DEM14-SR - New York AWS Summit
 
Delivering applications securely with AWS - SVC303 - Chicago AWS Summit
Delivering applications securely with AWS - SVC303 - Chicago AWS SummitDelivering applications securely with AWS - SVC303 - Chicago AWS Summit
Delivering applications securely with AWS - SVC303 - Chicago AWS Summit
 
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
Deploy and manage Kubernetes on AWS from your on-premises environment - DEM04...
 
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...
Accelerating your Cloud Migration with VMware Cloud on AWS - SVC210 - Atlanta...
 
Industry 4.0 in the cloud - SVC214 - Chicago AWS Summit
Industry 4.0 in the cloud - SVC214 - Chicago AWS SummitIndustry 4.0 in the cloud - SVC214 - Chicago AWS Summit
Industry 4.0 in the cloud - SVC214 - Chicago AWS Summit
 
Planning advanced AWS networking architectures - SVC304 - Chicago AWS Summit
Planning advanced AWS networking architectures - SVC304 - Chicago AWS SummitPlanning advanced AWS networking architectures - SVC304 - Chicago AWS Summit
Planning advanced AWS networking architectures - SVC304 - Chicago AWS Summit
 
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...
CI/CD best practices for building modern applications - MAD302 - Atlanta AWS ...
 
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
AWS identity services: Enabling and securing your cloud journey - SEC203 - Ch...
 

Similaire à AWS Marketplace Guide for Securing Code Deployments

Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Amazon Web Services
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Amazon Web Services
 
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Amazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitAmazon Web Services
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...Amazon Web Services
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Amazon Web Services
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Amazon Web Services
 
AWS Secret Region – Lessons Learned Around DevSecOps
AWS Secret Region – Lessons Learned Around DevSecOpsAWS Secret Region – Lessons Learned Around DevSecOps
AWS Secret Region – Lessons Learned Around DevSecOpsAmazon Web Services
 
AWS Summit Singapore 2019 | AWS Techfest Opening Keynote
AWS Summit Singapore 2019 | AWS Techfest Opening KeynoteAWS Summit Singapore 2019 | AWS Techfest Opening Keynote
AWS Summit Singapore 2019 | AWS Techfest Opening KeynoteAWS Summits
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloudAmazon Web Services
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Amazon Web Services
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 Amazon Web Services
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
 

Similaire à AWS Marketplace Guide for Securing Code Deployments (20)

Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
 
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
Accelerate and secure your applications running on AWS - SVC208 - Santa Clara...
 
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS SummitThreat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
Threat detection and mitigation at AWS - SEC201 - Atlanta AWS Summit
 
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
The Zen of governance - Establish guardrails and empower builders - SVC201 - ...
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
Infrastructure, security, and operations as code - DEM05-S - Mexico City AWS ...
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019 Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
Integrating AppSec into Your DevSecOps on AWS - DEM14 - AWS re:Inforce 2019
 
AWS Secret Region – Lessons Learned Around DevSecOps
AWS Secret Region – Lessons Learned Around DevSecOpsAWS Secret Region – Lessons Learned Around DevSecOps
AWS Secret Region – Lessons Learned Around DevSecOps
 
AWS Summit Singapore 2019 | AWS Techfest Opening Keynote
AWS Summit Singapore 2019 | AWS Techfest Opening KeynoteAWS Summit Singapore 2019 | AWS Techfest Opening Keynote
AWS Summit Singapore 2019 | AWS Techfest Opening Keynote
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
DevOps at Amazon
DevOps at AmazonDevOps at Amazon
DevOps at Amazon
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 

Plus de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Plus de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Marketplace Guide for Securing Code Deployments

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Safeguarding the integrity of your code for fast, secure deployments Benjamin Andrew Global Lead, Security & Network Infrastructure AWS Marketplace S V C 3 0 1
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Quick Get the software you need in minutes with just a few clicks or use the 1-Click deployment option. Software in AWS Marketplace is ready to run on Amazon Web Services (AWS). Pay as you go Pay only for what you use through various payment options and receive discounts on longer or custom terms. All charges from AWS Marketplace are consolidated into one bill from AWS. Verified All software in AWS Marketplace is continuously scanned to ensure reliability. AWS Marketplace Acurated digital software catalog that helps you find,buy,test, and deploysoftware
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T A growing digital software catalog • AWS Marketplace offers 39 software categories • More than 4,800 software listings • More than 1,400 ISVs (independent software vendors) • More than 230,000 active customers • More than 1 million current subscriptions • AWS customers use over 650 million hours a month of Amazon Elastic Compute Cloud (Amazon EC2) for AWS Marketplace products • AWS Marketplace is available in 18 AWS Regions • Flexible consumption and contract models • Easy and secure deployment, almost instantly • One consolidated bill • Always evolving
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Operating systems SIEMStorage BIDatabase DevOpsNetworking Eight popular categories most often provisioned Security
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security in the cloud Identify Security fundamentally anchors on having sufficient knowledge of your world Protect The best defense is an offense Detect However, one must “assume breach” and have a strong defense Knowing and being able to act swiftly is key in the cloud Respond/recover
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.6 Why DevSecOps? Business imperatives Competing forces Development Build it faster Operations Keep it stable Security Make it secure D e v O p s Build Test Distribute Monitor Developers Users D e v S e c O p s Build Test Distribute Monitor Developers Users Security
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Speed! Collaboration! Automation! Waterfall Agile DevOps
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline Precommit Commit Acceptance Deploy  Continuous compliance → Threat modeling Initial SAST inside IDE Code review “Break the build“ Compile/build checks SCA Container security Additional SAST Unit test Secure infra build Functional testing SCA DAST Unit testing Security attacks Deep SAST Fuzzing, pen tests Provision runtime environment Config management RASP Security Compliance CI/CD
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline Precommit Threat modeling Initial SAST inside IDE Code review Security Compliance CI/CD
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Static analysis security testing (SAST) in IDE What it is: Automatically analyzes code for security early without slowing down development Why it’s important: Introduces code analysis as “far left” as possible Why it’s critical to security: Catches vulnerabilities at the first point they can enter the application pipeline to reduce significant impacts
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Veracode Greenlight
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline Commit “Break the build“ Compile/build checks SCA Container security Additional SAST Unit test Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Software composition analysis (SCA) What it is: Vulnerability scanning tool for open source Why it’s important: Most static analysis tools aren’t relevant for open source Why it’s critical to security: Reduces the threat of vulnerabilities from dependencies on open-source components
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: WhiteSource
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T WhiteSource SaaS in AWS Marketplace
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Container vulnerability analysis (CVA) What it is: Vulnerability scanning tools that specifically target containers Why it’s important: Security needs to be tailored to containerized applications Why it’s critical to security: A vulnerability in one container can spread to others without isolation between containers
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Aqua
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Aqua SaaS in AWS Marketplace
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Veracode
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline Acceptance Secure infra build Functional testing SCA DAST Unit testing Security attacks Deep SAST Fuzzing, pen tests Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Dynamic analysis security testing (DAST) What it is: Tests web applications for exposed HTTP and HTML interfaces while they are running Why it’s important: Dynamic, for running applications, vulnerability scanning in testing, staging, and production Why it’s critical to security: Looks for a broad range of vulnerabilities, such as input/output validation issues leading to cross-site scripting (XSS) or SQL injection
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Qualys Web Application Scanner
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Qualys Web Application Scanning SaaS in AWS Marketplace
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline Provision runtime environment Config management RASP Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Runtime application self-protection (RASP) What it is: Controls execution and prevents real-time attacks in application runtime environment. Why it’s important: Targets application code security at runtime (powerful addition to a WAF). Why it’s critical to security: Protects against OWASP top runtime threats. Can capture zero- day vulnerabilities.
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Prevoty
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Prevoty AMI in AWS Marketplace
  • 28. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Security and compliance of the code in the pipeline  Continuous compliance → Security Compliance CI/CD Precommit Commit Acceptance Deploy
  • 29. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Continuous compliance What it is: Automate the compliance of your *infrastructure* code Why it’s important: Ensure regulatory compliance Why it’s critical to security: Secure application code can run on compliant/ safe infrastructure
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Vendor highlight: Dome9
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Dome9 in AWS Marketplace
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Making DevOps Sec-friendly
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Customize the way you provision software Find Machine learning Containers Networking Security Storage DevOps Database Operating systems BI and big data From a breadth of categories: Buy Free trial Pay as you go Hourly Monthly Annual and multi-year Bring your own license (BYOL) Seller private offers Through flexible pricing options: Deploy Amazon Elastic Container Services (Amazon ECS) Amazon Elastic Container Services for Kubernetes (Amazon EKS) Amazon Machine Image (AMI) Application program interface (API) Amazon SageMaker AWS Fargate AWS CloudFormation template SaaS With multiple deployment options:
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T “The ability to deploy software instantaneously anywhere in the world means we’re able to scale immediately, and stretch or shrink the environment to accommodate our needs.” “Integrated billing on AWS Marketplace is very slick, very straightforward. One place, one dashboard where all my costs appear.” Why customers buy in AWS Marketplace Flexible consumption and contract models Easy and secure deployment, almost instantly Single, consolidated bill Speed, simplicity, and scalability “One benefit of the pay-as-you-go model is the ability to deploy anywhere without having to do a capital approval process to pay for infrastructure that may or may not be used.” —Rob Gillan, CTO, SimplePay —Briley James Yetter, Director of Technology, Goodwill Industries —Richard Williams, Sr. Engineer, MakerBot
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Thank you! S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Benjamin Andrew Global Lead Security, Networking & DevSecOps AWS Marketplace benand@amazon.com www.linkedin.com/in/benandrew