SlideShare une entreprise Scribd logo
1  sur  11
Shortcuts & Roadblocks Encountered on the
path to protecting your data in the cloud
Simplify, Unify, Optimize
Life Science Compliance for Regulated Systems
Amazon Web Services
IaaS for Life Sciences
• “One Slide” intro to Amazon Web Services
• AWS Security, Certifications, and Compliance
• Responsibility Models
• Roadblock #1 – Qualify The Cloud!
• Shortcut #1 – Qualify The Cloud!
• Roadblock #2 – Lock down The Cloud!
• Shortcut #2 – Lock down The Cloud!
• Data Integrity Concerns
• Conclusion
Agenda
AWS Explained in a Slide …
Non-Technical Explanation
Amazon
EC2
AWS Storage
Gateway
Amazon
S3
Amazon
Glacier
Amazon
RDS
Amazon
Redshift
Amazon
DynamoDB
AWS Direct
Connect
Amazon
VPC
AWS IAM
AWS IoT
Amazon
Kinesis
Technobabble Nonsense
Technical Explanation
Certifications / Attestations Laws, Regulations, and Privacy Alignments / Frameworks
DoD SRG CS Mark [Japan] CJIS
FedRAMP DNB [Netherlands] CLIA
FIPS EAR CMS EDGE
IRAP EU Model Clauses CMSR
ISO 9001 FERPA CSA
ISO 27001 GLBA FDA
ISO 27017 HIPAA FedRAMP TIC
ISO 27018 HITECH FISC
MLPS Level 3 IRS 1075 FISMA
MTCS ITAR G-Cloud
PCI DSS Level 1 My Number Act [Japan] GxP (FDA CFR 21 Part 11)
SEC Rule 17-a-4(f) U.K. DPA - 1988 IT Grundschutz
SOC 1 VPAT / Section 508 MITA 3.0
SOC 2 EU Data Protection Directive MPAA
SOC 3 Privacy Act [Australia] NERC
Privacy Act [New Zealand] NIST
PDPA - 2010 [Malaysia] PHR
PDPA – 2012 [Singapore] UK Cyber Essentials
Adapted from https://aws.amazon.com/compliance/
Your Data
Platform, Applications, I&AM
Operating Systems, Network & Firewall Configuration
Server-side Encryption (File
System and/or Data)
Client-side Data Encryption &
Data Integrity Authentication
Network Traffic Protection
(Encryption/Integrity/Identity)
Adapted from https://aws.amazon.com/compliance/shared-responsibility-model/
Compute Storage NetworkingDatabase
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
AWS
Responsible for
security “of” the
Cloud
Customer
Responsible for
security “in” the
Cloud
• Scenario: Shared Responsibility Model not understood
• Efforts to qualify low-level infrastructure ensue
• Policies incongruent to service model are pushed
• Cycles wasted in trying to absorb AWS’s declared responsibilities
Roadblock #1 – Qualify the Cloud!
• Scenario: Shared Responsibility Model is integrated into IT
• Policies are updated to allow distributed management
• Controls in place to govern Cloud Assets
• Definitions updated to allow for new CIs
• Maintain & Manage State of Control
Shortcut #1 – Qualify the Cloud!
Manage as independent assets
Business as usual
• Enact strict “no trust/deny all” security policy on Cloud assets
• Cloud assets are isolated from traditional/on prem assets
• Islands of data pile up
• UID poses an issue/threat
Roadblock #2 – Lock down The Cloud!
• For Private/Internal Assets
• Protect/Preserve via VPC
• Use Security Zones or Subnets within VPC
• Lockdown & Audit assets per normal methods (business as usual)
Shortcut #2 – Lock down The Cloud!
virtual private cloud
VPC subnet
PROD LIMS
VPC subnet
DEV LIMS
corporate network
users
VPN
connection
AWS Direct
Connect
• Be nimble, like Jack
… but remember
• POCs can unexpectedly gain momentum
• Fragmentation likely to occur
• Integrate IAM early, review & audit often
• Consider corporate directory integration mandatory
• Strategies for Data at Rest
Data Integrity Concerns
AWS IAM
AWS
CloudTrail
AWS Directory
Service
• If your house is not in good order today:
• It will be even worse in the cloud!
• Assess compliance gaps, perceived or real, before moving to Cloud
• Implement bridges to gaps; be Cloud-Aware when doing so
• Treat AWS as an extension to your Corporate Datacenter
• It will be infinitely easier to manage
• Management of Cloud Assets should be the same as on-prem
• Except when it isn’t! Plan specifically for Cloud management
Conclusion

Contenu connexe

Tendances

AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9Amazon Web Services
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddleAlert Logic
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Amazon Web Services
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesLacework
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Alert Logic
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsEvident.io
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Evident.io
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAmazon Web Services
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash CourseBryan Len
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no tryJames Strong
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSTeri Radichel
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security ModelAlert Logic
 
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayVelocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayEvident.io
 
Benefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or SecurityBenefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or SecurityMichael Mullins
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minuteskieranjacobsen
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeAlert Logic
 

Tendances (20)

AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9AWS Summit Auckland Sponsor Presentation - Dome9
AWS Summit Auckland Sponsor Presentation - Dome9
 
Lacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security ThreatsLacework | Top 10 Cloud Security Threats
Lacework | Top 10 Cloud Security Threats
 
Lacework AWS Security Week Presentation
Lacework AWS Security Week PresentationLacework AWS Security Week Presentation
Lacework AWS Security Week Presentation
 
Pariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen MiddlePariveda Solutions - Thawing the Frozen Middle
Pariveda Solutions - Thawing the Frozen Middle
 
Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud Best Practices for IoT Security in the Cloud
Best Practices for IoT Security in the Cloud
 
Practical Guide to Securing Kubernetes
Practical Guide to Securing KubernetesPractical Guide to Securing Kubernetes
Practical Guide to Securing Kubernetes
 
Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017Security Spotlight: The Coca Cola Company - CSS ATX 2017
Security Spotlight: The Coca Cola Company - CSS ATX 2017
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
Security Threats, the Cloud and Your Responsibilities - Evident.io @AWS Pop-u...
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
AWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - IntelAWS Summit Auckland Sponsor Presentation - Intel
AWS Summit Auckland Sponsor Presentation - Intel
 
Cloud Security Training Crash Course
Cloud Security Training Crash CourseCloud Security Training Crash Course
Cloud Security Training Crash Course
 
Kubernetes - do or do not, there is no try
Kubernetes  - do or do not, there is no tryKubernetes  - do or do not, there is no try
Kubernetes - do or do not, there is no try
 
Automated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWSAutomated Intrusion Detection and Response on AWS
Automated Intrusion Detection and Response on AWS
 
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model#ALSummit: Amazon Web Services: Understanding the Shared Security Model
#ALSummit: Amazon Web Services: Understanding the Shared Security Model
 
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-wayVelocity 2015-tim-prendergast-continuous-security-the-devops-way
Velocity 2015-tim-prendergast-continuous-security-the-devops-way
 
Benefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or SecurityBenefits of Cloud without risking your Data or Security
Benefits of Cloud without risking your Data or Security
 
DevSecOps in 10 minutes
DevSecOps in 10 minutesDevSecOps in 10 minutes
DevSecOps in 10 minutes
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 

En vedette

Dear Alexa line sheet feb red.compressed
Dear Alexa line sheet feb red.compressedDear Alexa line sheet feb red.compressed
Dear Alexa line sheet feb red.compressedBritt Shoemaker
 
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud EnvironmentMachine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud Environmentjins0618
 
CV-ESP-Europass-20161226-Arar-SV
CV-ESP-Europass-20161226-Arar-SVCV-ESP-Europass-20161226-Arar-SV
CV-ESP-Europass-20161226-Arar-SVMhd Fateh Arar
 
OFERTA LABORAL - Asistente de Contabilidad
OFERTA LABORAL - Asistente de ContabilidadOFERTA LABORAL - Asistente de Contabilidad
OFERTA LABORAL - Asistente de ContabilidadJuan Daniel Dávila
 
Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance
 
Model Driven SDLC using Docker #gopaddle #dockermeetup
Model Driven SDLC using Docker #gopaddle #dockermeetupModel Driven SDLC using Docker #gopaddle #dockermeetup
Model Driven SDLC using Docker #gopaddle #dockermeetupVinothini Raju
 
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012Amazon Web Services
 
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告Jerry Wen
 
Cell Division
Cell DivisionCell Division
Cell Divisionclarot16
 

En vedette (13)

Dear Alexa line sheet feb red.compressed
Dear Alexa line sheet feb red.compressedDear Alexa line sheet feb red.compressed
Dear Alexa line sheet feb red.compressed
 
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud EnvironmentMachine Status Prediction for Dynamic and Heterogenous Cloud Environment
Machine Status Prediction for Dynamic and Heterogenous Cloud Environment
 
Aula 6
Aula 6Aula 6
Aula 6
 
CV-ESP-Europass-20161226-Arar-SV
CV-ESP-Europass-20161226-Arar-SVCV-ESP-Europass-20161226-Arar-SV
CV-ESP-Europass-20161226-Arar-SV
 
OFERTA LABORAL - Asistente de Contabilidad
OFERTA LABORAL - Asistente de ContabilidadOFERTA LABORAL - Asistente de Contabilidad
OFERTA LABORAL - Asistente de Contabilidad
 
Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016Pistoia Alliance USA Conference 2016
Pistoia Alliance USA Conference 2016
 
reference from Bang
reference from Bangreference from Bang
reference from Bang
 
Model Driven SDLC using Docker #gopaddle #dockermeetup
Model Driven SDLC using Docker #gopaddle #dockermeetupModel Driven SDLC using Docker #gopaddle #dockermeetup
Model Driven SDLC using Docker #gopaddle #dockermeetup
 
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012
DAT303 Amazon Relational Database Service Best Practices - AWS re: Invent 2012
 
1. alps c c++
1. alps c c++1. alps c c++
1. alps c c++
 
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告
BDTC2015 启明星辰-潘柱廷-中国大数据技术与产业发展报告
 
Cell Division
Cell DivisionCell Division
Cell Division
 
StrategicBenefits
StrategicBenefitsStrategicBenefits
StrategicBenefits
 

Similaire à PDA Presentation - MBodo

Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도Amazon Web Services Korea
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial ServicesAmazon Web Services
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAmazon Web Services
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...Amazon Web Services Korea
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Amazon Web Services
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAmazon Web Services
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...Amazon Web Services
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAmazon Web Services
 
Real world cloud formation feb 2014 final
Real world cloud formation feb 2014 finalReal world cloud formation feb 2014 final
Real world cloud formation feb 2014 finalHoward Glynn
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...Amazon Web Services
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...Amazon Web Services
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentAlgoSec
 

Similaire à PDA Presentation - MBodo (20)

Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
 
RightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the CloudRightScale Webinar: Security and Compliance in the Cloud
RightScale Webinar: Security and Compliance in the Cloud
 
Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012Security and Privacy in the AWS Cloud - AWS India Summit 2012
Security and Privacy in the AWS Cloud - AWS India Summit 2012
 
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend MicroAWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
AWS April Webianr Series - How Willbros Builds Securely in AWS with Trend Micro
 
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
CJIS Evidence Management in the Cloud using AWS GovCloud (US) | AWS Public Se...
 
Cloud computing benefits
Cloud computing benefitsCloud computing benefits
Cloud computing benefits
 
AWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS SecurityAWS Summit Sydney 2014 | Understanding AWS Security
AWS Summit Sydney 2014 | Understanding AWS Security
 
Real world cloud formation feb 2014 final
Real world cloud formation feb 2014 finalReal world cloud formation feb 2014 final
Real world cloud formation feb 2014 final
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...
AWS re:Invent 2016: Reinventing Disaster Recovery Leveraging AWS Cloud Infras...
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud EnvironmentA Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
A Pragmatic Approach to Network Security Across Your Hybrid Cloud Environment
 

PDA Presentation - MBodo

  • 1. Shortcuts & Roadblocks Encountered on the path to protecting your data in the cloud Simplify, Unify, Optimize Life Science Compliance for Regulated Systems Amazon Web Services IaaS for Life Sciences
  • 2. • “One Slide” intro to Amazon Web Services • AWS Security, Certifications, and Compliance • Responsibility Models • Roadblock #1 – Qualify The Cloud! • Shortcut #1 – Qualify The Cloud! • Roadblock #2 – Lock down The Cloud! • Shortcut #2 – Lock down The Cloud! • Data Integrity Concerns • Conclusion Agenda
  • 3. AWS Explained in a Slide … Non-Technical Explanation Amazon EC2 AWS Storage Gateway Amazon S3 Amazon Glacier Amazon RDS Amazon Redshift Amazon DynamoDB AWS Direct Connect Amazon VPC AWS IAM AWS IoT Amazon Kinesis Technobabble Nonsense Technical Explanation
  • 4. Certifications / Attestations Laws, Regulations, and Privacy Alignments / Frameworks DoD SRG CS Mark [Japan] CJIS FedRAMP DNB [Netherlands] CLIA FIPS EAR CMS EDGE IRAP EU Model Clauses CMSR ISO 9001 FERPA CSA ISO 27001 GLBA FDA ISO 27017 HIPAA FedRAMP TIC ISO 27018 HITECH FISC MLPS Level 3 IRS 1075 FISMA MTCS ITAR G-Cloud PCI DSS Level 1 My Number Act [Japan] GxP (FDA CFR 21 Part 11) SEC Rule 17-a-4(f) U.K. DPA - 1988 IT Grundschutz SOC 1 VPAT / Section 508 MITA 3.0 SOC 2 EU Data Protection Directive MPAA SOC 3 Privacy Act [Australia] NERC Privacy Act [New Zealand] NIST PDPA - 2010 [Malaysia] PHR PDPA – 2012 [Singapore] UK Cyber Essentials Adapted from https://aws.amazon.com/compliance/
  • 5. Your Data Platform, Applications, I&AM Operating Systems, Network & Firewall Configuration Server-side Encryption (File System and/or Data) Client-side Data Encryption & Data Integrity Authentication Network Traffic Protection (Encryption/Integrity/Identity) Adapted from https://aws.amazon.com/compliance/shared-responsibility-model/ Compute Storage NetworkingDatabase AWS Global Infrastructure Regions Availability Zones Edge Locations AWS Responsible for security “of” the Cloud Customer Responsible for security “in” the Cloud
  • 6. • Scenario: Shared Responsibility Model not understood • Efforts to qualify low-level infrastructure ensue • Policies incongruent to service model are pushed • Cycles wasted in trying to absorb AWS’s declared responsibilities Roadblock #1 – Qualify the Cloud!
  • 7. • Scenario: Shared Responsibility Model is integrated into IT • Policies are updated to allow distributed management • Controls in place to govern Cloud Assets • Definitions updated to allow for new CIs • Maintain & Manage State of Control Shortcut #1 – Qualify the Cloud! Manage as independent assets Business as usual
  • 8. • Enact strict “no trust/deny all” security policy on Cloud assets • Cloud assets are isolated from traditional/on prem assets • Islands of data pile up • UID poses an issue/threat Roadblock #2 – Lock down The Cloud!
  • 9. • For Private/Internal Assets • Protect/Preserve via VPC • Use Security Zones or Subnets within VPC • Lockdown & Audit assets per normal methods (business as usual) Shortcut #2 – Lock down The Cloud! virtual private cloud VPC subnet PROD LIMS VPC subnet DEV LIMS corporate network users VPN connection AWS Direct Connect
  • 10. • Be nimble, like Jack … but remember • POCs can unexpectedly gain momentum • Fragmentation likely to occur • Integrate IAM early, review & audit often • Consider corporate directory integration mandatory • Strategies for Data at Rest Data Integrity Concerns AWS IAM AWS CloudTrail AWS Directory Service
  • 11. • If your house is not in good order today: • It will be even worse in the cloud! • Assess compliance gaps, perceived or real, before moving to Cloud • Implement bridges to gaps; be Cloud-Aware when doing so • Treat AWS as an extension to your Corporate Datacenter • It will be infinitely easier to manage • Management of Cloud Assets should be the same as on-prem • Except when it isn’t! Plan specifically for Cloud management Conclusion

Notes de l'éditeur

  1. When the Shared Responsibility model is not understood, an organization may tend to gravitate towards doing only what it knows today, meaning there may be policies or procedures that are incongruent or not practical to apply when it comes to a cloud vendor such as Amazon. Lower level infrastructure, such as the supporting utilities, physical security, logical security, physical infrastructure, attached storage, and so on, are now managed by the vendor, in this case, AWS. The need to manage a system level topography below what is within the Customer’s realm of responsibility is no longer a directly manageable activity. Many attempts to attempt to convince or coerce a cloud vendor such as AWS will likely result in wasted time and effort, and lead to frustration with cloud vendors as a whole. At this point, I would strongly recommend relying upon the contractual agreement and obligations your organization has entered into with your cloud provider, and ensure those obligations, at minimum, meet the requirements of your organization’s quality policy.
  2. In the case of managing assets that are internal to the organization, such as an enterprise LIMS system, one would want to control and lock down assets the same way that traditional assets are managed. The large difference, in this particular scenario, is that the assets are hosted external to the corporate network. In this case, it is the VPN connection or the AWS Direct Connect which needs to be configured to properly allow data in motion to be handled the same as it is handled between different geographical locations in corporate offices. The assumption is that the company will treat off-prem assets the same as on-prem assets. At the end of the day, in each area of the VPC, you would want to apply the same logical restrictions on your assets running in the cloud as you would running on your corporate network; that is to say, you wouldn’t want to treat them much differently. External assets would need to be evaluated on a case by case basis, taking into account data criticality, operational risk, regulatory risk, etc etc.
  3. Jack be nimble, jack be quick, jack provisioned a datacenter with just one click. Keep keen eye over what projects your AWS infrastructure are supporting Keep an eye on how many version(s) of the same solution are floating around – this will avoid the discussion of “are my data CORRECT” Understand your IAM strategy. Integrate IAM as quickly as possible. Dispel any attribution issues as early as possible. Scenario – data are being pushed via Kinesis Firehose into an S3 bucket and a RedShift table for real time analysis of a manufacturing environment – you’d want to be certain that the datapoints you’re collecting can be properly attributed to the correct origin – the correct data generating device or person.