SlideShare une entreprise Scribd logo
1  sur  29
© 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Karim Hopper, Solution Architecture APAC
27 May 2015
Governance, Risk and Compliance
Considerations for the Cloud
Hong Kong
Demonstrating Compliance
AWS Assurance Programs
Consistent, regular and exhaustive 3rd party evaluations
Customers control how they manage their own risks
AWS Managed and Audited Controls
SOC 1
AWS
SOC 2 PCI-DSS NIST 800-53 ISO 270001
Virtual Private
Cloud
Key
Management
Logging
AWS Provided, Customer Configured and Managed Controls
Other AWS features and services
Classification
Security Policy
Customer Provided and Managed Controls
Encryption
Governance
ITDaM
ITSM
Monitoring
Operations
Malware
Risk
Management
Customers
Customer Risk Appetite and Desired Control Environment
Business Risks Sourcing Risks
Technology
Risks
Security Risks Compliance
Compliance Programs
Reports and letters of attestation are available for a number of certifications
SOC 1 (Type 2) Controls safeguarding customer data; auditor validated over a 6 month period.
Evaluates control design, and evidence of controls working (Formerly SAS 70)
SOC 2 (Type 2) Provides additional transparency into AWS security and availability, including BCP
ISO 27001 Widely adopted global security standard for ISMS. Evaluates management of
information security risks that affect confidentiality, integrity and availability of
company and customer information
PCI DSS Level 3.0 Customers can run PCI compliant technology infrastructure for storing,
processing and transmitting credit card information to the cloud
Security Shared Responsibility Model
AWS is responsible
for the security OF
the cloud
AWS Foundation Services
AWS Global
Infrastructure
Regions
AWS
Availability Zones Edge Locations
Hypervisor Compute Storage Network
Customer applications and content
Security Shared Responsibility Model
AWS Foundation Services
Hypervisor Compute Storage Network
AWS Global
Infrastructure
Regions
AWS is responsible
for the security OF
the cloud
Platform, Applications, Identity and Access Management
Operating System, Network and Firewall Configuration
Client-side data
encryption
Server-side data
encryption
Network Traffic
Protection
The customer is
responsible for
configuring security
IN the cloud
CustomersAWS
Availability Zones Edge Locations
Data Locality
Customer chooses where to place data
AWS regions are geographically isolated by design
Data is not replicated to other AWS regions and doesn’t
move unless you choose to move it
AWS Employee Access
Staff vetting and enforcement of the principle of least privilege
• No logical access to customer instances
• Control-plane access limited and monitored
Bastion hosts, least privileged model, zoned data center access
• Access based on strict business needs
• Separate privileged account management systems
For more on compliance…
http://aws.amazon.com/compliance
•Whitepapers
•Work books
•Reference Architectures
•Security and privacy resources
Security is our #1 priority
“Based on our experience, I believe that we can be even more
secure in the AWS cloud than in our own data centers.”
Tom Soderstrom, CTO, NASA JPL
Nearly 60% of organizations agreed that CSPs [cloud service
providers] provide better security than their own IT organizations.
Source: IDC 2013 U.S. Cloud Security Survey
doc #242836, September 2013
AWS Security in Context
VISIBILITY
AUDITABILITY
CONTROL
AGILITY
Customer get more…
Through our…
Visibility
Visibility
Customers can see their entire infrastructure at a click of a mouse
Using AWS CloudTrail customers can continuously record activities happening on the AWS platform
Use cases enabled by AWS CloudTrail
Security Analysis
Use log files as an input into log management and analysis solutions to perform security analysis and to
detect user behavior patterns
Track Changes to AWS Resources
Track creation, modification, and deletion of AWS resources such as Amazon EC2 instances, Amazon
VPC security groups and Amazon EBS volumes
Troubleshoot Operational Issues
Identify the most recent actions made to resources in your AWS account
Compliance Aid
Easier to demonstrate compliance with internal policies and regulatory standards
Visibility
AWS Trusted Advisor
Recommends security best practices (identifies potential security issues)
Auditability
Auditability
The AWS Config Service lets customers audit the historical configuration of resources and
send notifications when those resources change
Use Cases
Security Analysis Am I safe?
Audit Compliance Where is the evidence?
Change Management What will this change affect?
Troubleshooting What has changed?
Auditability
AWS Config Service
Review the historical configuration of resources and send notifications when those resources change
Control
Control
AWS offers several flexible encryption options
KMI
Encryption Method
Key Storage
Key Management
KMI
Encryption Method
Key Storage
Key Management
KMI
Encryption Method
Key Storage
Key Management
Customer
Managed
AWS
Managed
AWS manages the method,
storage and KMI
AWS Key Management Service
AWS provides key storage
Customer manages encryption
method & management layer of
KMI
AWS CloudHSM
Customer controls everything
E.g. KMI / keys stored on-
premise and client side
encryption used
A B C
Control
AWS Key Management Service
• A managed service that makes it easy for you to create, control, and use your
encryption keys
• Integrated with AWS SDKs and AWS services including storage, compute and
database / data warehouse
• CloudTrail support
AWS CloudHSM
• Dedicated Safenet Luna-based solution (FIPS 2 compliant)
Control
Data Destruction
• Storage media destroyed before being permitted outside our datacenters
• Media destruction consistent with US Dept. of Defense Directive 5220.22
Control – Customers choose what they need
AWS
CloudHSM
Defense in depth
Application log file capture
Isolated, private networking environments
Fine grained access controls
Segregation of duties
Multi-factor authentication, identity federation
Single tenant / dedicated servers
Direct connections
HSM-based key storage
Multiple tiers of firewalls
AWS IAM
Amazon VPC
AWS Direct
Connect
AWS delivers more control and granularity
Agility
New Security
Features year to date
RDS Encryption using KMS
Oracle TDE with
CloudHSM
S3 Endpoints in VPC
IAM Managed Policies
Glacier Vault Access
Policies
…
Chief Info.
Security
Officer
(CISO)
Operations
Engineering
Application Security
Compliance
CEO
Amazon.com
AWS Security Organization
Amazon’s Culture
•Everyone’s an owner
•Decentralize – security engineers are
embedded in service teams
•Executive accountability
•Metrics driven – measuring constantly
•Five Why’s to establish the cause of error
•Test Constantly
•Understand normal and then identify
anomalies
Thank you
aws.amazon.com/compliance
aws.amazon.com/security
http://www.linkedin.com/in/karimhopper

Contenu connexe

Tendances

Tendances (20)

Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Security OF The Cloud
Security OF The CloudSecurity OF The Cloud
Security OF The Cloud
 
Aws certified-security
Aws certified-securityAws certified-security
Aws certified-security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
AWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and ComplianceAWS Security Best Practices, SaaS and Compliance
AWS Security Best Practices, SaaS and Compliance
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
5 minutes on security
5 minutes on security5 minutes on security
5 minutes on security
 
cloud security ppt
cloud security ppt cloud security ppt
cloud security ppt
 
Cloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWSCloud Security Guidance from CESG and AWS
Cloud Security Guidance from CESG and AWS
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
AWS Cloud Security
AWS Cloud SecurityAWS Cloud Security
AWS Cloud Security
 
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
Meeting DFARS Requirements in AWS GovCloud (US) | AWS Public Sector Summit 2017
 
Microsoft Azure Security Overview
Microsoft Azure Security OverviewMicrosoft Azure Security Overview
Microsoft Azure Security Overview
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 

Similaire à Cloud Security, Risk and Compliance on AWS

Similaire à Cloud Security, Risk and Compliance on AWS (20)

Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
AWS Public Sector Symposium 2014 Canberra | Compliance and Governance on the ...
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Cloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentalsCloud computing and Cloud security fundamentals
Cloud computing and Cloud security fundamentals
 

Dernier

Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
vu2urc
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
Joaquim Jorge
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 

Dernier (20)

Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 

Cloud Security, Risk and Compliance on AWS

  • 1. © 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Karim Hopper, Solution Architecture APAC 27 May 2015 Governance, Risk and Compliance Considerations for the Cloud Hong Kong
  • 3. AWS Assurance Programs Consistent, regular and exhaustive 3rd party evaluations
  • 4. Customers control how they manage their own risks AWS Managed and Audited Controls SOC 1 AWS SOC 2 PCI-DSS NIST 800-53 ISO 270001 Virtual Private Cloud Key Management Logging AWS Provided, Customer Configured and Managed Controls Other AWS features and services Classification Security Policy Customer Provided and Managed Controls Encryption Governance ITDaM ITSM Monitoring Operations Malware Risk Management Customers Customer Risk Appetite and Desired Control Environment Business Risks Sourcing Risks Technology Risks Security Risks Compliance
  • 5. Compliance Programs Reports and letters of attestation are available for a number of certifications SOC 1 (Type 2) Controls safeguarding customer data; auditor validated over a 6 month period. Evaluates control design, and evidence of controls working (Formerly SAS 70) SOC 2 (Type 2) Provides additional transparency into AWS security and availability, including BCP ISO 27001 Widely adopted global security standard for ISMS. Evaluates management of information security risks that affect confidentiality, integrity and availability of company and customer information PCI DSS Level 3.0 Customers can run PCI compliant technology infrastructure for storing, processing and transmitting credit card information to the cloud
  • 6. Security Shared Responsibility Model AWS is responsible for the security OF the cloud AWS Foundation Services AWS Global Infrastructure Regions AWS Availability Zones Edge Locations Hypervisor Compute Storage Network
  • 7. Customer applications and content Security Shared Responsibility Model AWS Foundation Services Hypervisor Compute Storage Network AWS Global Infrastructure Regions AWS is responsible for the security OF the cloud Platform, Applications, Identity and Access Management Operating System, Network and Firewall Configuration Client-side data encryption Server-side data encryption Network Traffic Protection The customer is responsible for configuring security IN the cloud CustomersAWS Availability Zones Edge Locations
  • 8. Data Locality Customer chooses where to place data AWS regions are geographically isolated by design Data is not replicated to other AWS regions and doesn’t move unless you choose to move it
  • 9. AWS Employee Access Staff vetting and enforcement of the principle of least privilege • No logical access to customer instances • Control-plane access limited and monitored Bastion hosts, least privileged model, zoned data center access • Access based on strict business needs • Separate privileged account management systems
  • 10. For more on compliance… http://aws.amazon.com/compliance •Whitepapers •Work books •Reference Architectures •Security and privacy resources
  • 11. Security is our #1 priority
  • 12. “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers.” Tom Soderstrom, CTO, NASA JPL Nearly 60% of organizations agreed that CSPs [cloud service providers] provide better security than their own IT organizations. Source: IDC 2013 U.S. Cloud Security Survey doc #242836, September 2013
  • 13. AWS Security in Context VISIBILITY AUDITABILITY CONTROL AGILITY Customer get more… Through our…
  • 15. Visibility Customers can see their entire infrastructure at a click of a mouse Using AWS CloudTrail customers can continuously record activities happening on the AWS platform
  • 16. Use cases enabled by AWS CloudTrail Security Analysis Use log files as an input into log management and analysis solutions to perform security analysis and to detect user behavior patterns Track Changes to AWS Resources Track creation, modification, and deletion of AWS resources such as Amazon EC2 instances, Amazon VPC security groups and Amazon EBS volumes Troubleshoot Operational Issues Identify the most recent actions made to resources in your AWS account Compliance Aid Easier to demonstrate compliance with internal policies and regulatory standards
  • 17. Visibility AWS Trusted Advisor Recommends security best practices (identifies potential security issues)
  • 19. Auditability The AWS Config Service lets customers audit the historical configuration of resources and send notifications when those resources change Use Cases Security Analysis Am I safe? Audit Compliance Where is the evidence? Change Management What will this change affect? Troubleshooting What has changed?
  • 20. Auditability AWS Config Service Review the historical configuration of resources and send notifications when those resources change
  • 22. Control AWS offers several flexible encryption options KMI Encryption Method Key Storage Key Management KMI Encryption Method Key Storage Key Management KMI Encryption Method Key Storage Key Management Customer Managed AWS Managed AWS manages the method, storage and KMI AWS Key Management Service AWS provides key storage Customer manages encryption method & management layer of KMI AWS CloudHSM Customer controls everything E.g. KMI / keys stored on- premise and client side encryption used A B C
  • 23. Control AWS Key Management Service • A managed service that makes it easy for you to create, control, and use your encryption keys • Integrated with AWS SDKs and AWS services including storage, compute and database / data warehouse • CloudTrail support AWS CloudHSM • Dedicated Safenet Luna-based solution (FIPS 2 compliant)
  • 24. Control Data Destruction • Storage media destroyed before being permitted outside our datacenters • Media destruction consistent with US Dept. of Defense Directive 5220.22
  • 25. Control – Customers choose what they need AWS CloudHSM Defense in depth Application log file capture Isolated, private networking environments Fine grained access controls Segregation of duties Multi-factor authentication, identity federation Single tenant / dedicated servers Direct connections HSM-based key storage Multiple tiers of firewalls AWS IAM Amazon VPC AWS Direct Connect AWS delivers more control and granularity
  • 27. New Security Features year to date RDS Encryption using KMS Oracle TDE with CloudHSM S3 Endpoints in VPC IAM Managed Policies Glacier Vault Access Policies …
  • 28. Chief Info. Security Officer (CISO) Operations Engineering Application Security Compliance CEO Amazon.com AWS Security Organization Amazon’s Culture •Everyone’s an owner •Decentralize – security engineers are embedded in service teams •Executive accountability •Metrics driven – measuring constantly •Five Why’s to establish the cause of error •Test Constantly •Understand normal and then identify anomalies

Notes de l'éditeur

  1. [Speaker note: allow at least 30 mins]
  2. So how do we demonstrate to customers that we are doing our job as a CSP properly?
  3. AWS has an extensive assurance in place today covering a range of certifications including SOC1 SOC2, ISO27001 and PCI DSS plus others you can see here. Many of these were achieved in just the last few months and there are others that are not listed.
  4. From: Stephen Quigg Customers decide on the appropriate controls and manage and monitor the effectiveness of those controls Customers take reliance on AWS control reports Customer defines their risk appetite and desired control environment implements the controls that are appropriate to that system some of the controls the customer will provide and others will be provided by aws
  5. The SOC 1 report attests that the AWS control objectives are appropriately designed and that the controls safeguarding customer data are operating effectively. The report is carried out by independent auditors under the AT 801 standard, and is issued every 6 months. The SOC 2 report involves an evaluation of the design and operating effectiveness of controls that meet the criteria for the security principle set forth in the American Institute of Certified Public Accountant’s Trust Services Principles criteria. This report provides additional transparency into AWS security and availability based on a defined industry standard. Again, it is carried out by independent auditors, and the report is issued every 6 months. ISO 27001 is a widely-adopted global security standard that outlines the requirements for information security management systems. It provides a systematic approach to managing company and customer information that’s based on periodic risk assessments. In order to achieve the certification, a company must show it has a systematic and ongoing approach to managing information security risks that affect the confidentiality, integrity, and availability of company and customer information. AWS is certified under ISO 27001, and renews that certification annually. \ ----- Meeting Notes (5/27/15 11:58) ----- SOC2 Type 2 includes controls around BCP
  6. Constant improvement process. It’s not a static craft. It’s continually advancing.
  7. The customer is responsible for management of the guest operating system, right up to the highest layer of content. That means that an FSI controls their ARCHITECTURE that is built on AWS. control the design and architecture of their applications and solutions that run on our physical infrastructure. control the configuration of access controls and firewall settings, control the encryption of content, and how often they archive and backup their content.
  8. AWS recognises that there are legal and regulatory directives around the location of data.
  9. One of the fundamental principles we adopt in managing Security OF the cloud is the principle of least privilege. We give access to information and facilities only where necessary for a legitimate purpose. That means that I don’t know where our data centres are. The only people who even know where they are are people who build them, operate them, secure them, and audit them,.
  10. Security is job zero because its foundational to our business, what customers demand, and something that we will not have a business if we don’t do right. People think that security is different in the cloud. But actually security is very familiar at AWS. What is different though is that it’s more visible. Everyone gets the same level of security.
  11. I’m going to talk about some of the features of our platform that differentiate AWS security vs on-premise
  12. So I want to start by setting some context
  13. Can you map your network? ----- Meeting Notes (5/27/15 11:58) ----- Cloudtrail is a great system of record
  14. So I want to start by setting some context
  15. e.g. What systems will be impacted when I change this firewall setting e.g. Integration with Change Management Systems to identify out of band changes
  16. Configuration surveillance and monitoroing
  17. So I want to start by setting some context
  18. KMS is designed to meet FIPS2 logical and FIPS3 physical security
  19. So I want to start by setting some context
  20. Agility in security Ops – vulnerability management Engineering – build security tools including scanners, incident management systems, we build a lot of our own software Application Security – PenTesting blackbox (outsider attack) and whitebox (insider attack) – we repeat these anytime we do a substantive change to the service, code reviews, security engineers are embedded in our service teams, principle of least privilege, Compliance – is part of our security team (talk about this later) Our CISO reports to the CEO of Amazon. Pro-active Every week Andy Jassy goes through security issues with the senior management team to address issues and identify areas for improvement . ----- Meeting Notes (5/27/15 11:58) ----- Amazon's has created a culture that supports out focus on customer security