SlideShare ist ein Scribd-Unternehmen logo
1 von 52
Downloaden Sie, um offline zu lesen
Navigating PCI DSS Compliance in the Cloud
Jesse Angell
November 14, 2013

© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
Friday, November 15, 13
Who am I?
• Jesse Angell
– CTO of PaymentSpring
– Background in both IT operations and software development
– When I’m not building software you’ll find me working on my
experimental airplane

@jesseangell
jesse.angell@paymentspring.com

Friday, November 15, 13
– Level 1 PCI compliant gateway
– We make it easier for our clients to accept credit card transactions while
greatly reducing their PCI compliance without sacrificing their
customer’s user experience.
– As a payment gateway storing credit card numbers, we bet our
business on our security.
– Built, certified, and launched a level 1 compliant gateway in a year with
a small team.

Friday, November 15, 13
What is this about?
This is the real story of how PaymentSpring built a
level 1 PCI compliant gateway entirely on AWS.
• Why we chose AWS
• How we architected our systems
• How AWS makes PCI compliance easier

Friday, November 15, 13
What is PCI and why do I care?

Friday, November 15, 13
What is the PCI DSS?
• The PCI DSS (data security standard) is a publicly
available document setting forth the requirements
you must meet to handle credit card data.
• The current version of the DSS, is not very cloud
oriented.

Friday, November 15, 13
Levels of PCI
• Level 1: over 6 million transactions per year
• Level 2: 1 to 6 million transactions per year
• Level 3: 20,000 to 1 million transactions per year
• Level 4: Less than 20,000 transactions per year
Compliance becomes more difficult and costly with each level

Friday, November 15, 13
Does it apply to me?
If you are asking yourself this question. It’s
likely going to apply to you

If you are a merchant or a service provider to a merchant that
processes, stores, or transmits credit card data PCI applies to you.
If your customers do the above through your systems you must be
compliant.
If you are asking yourself this question, PCI likely applies to you.

Friday, November 15, 13
Understanding PCI on AWS
• All AWS services can be PCI compliant. The more
you utilize their services (such as Amazon RDS,
Amazon DynamoDB) the less infrastructure you will
have to worry about.
• With Amazon EC2, you are responsible for
everything from the hypervisor and up. This
includes patching the operating system.

Friday, November 15, 13
Compliance is not automatic
• You must understand all PCI requirements and
know how you are complying with it. Some
requirements are fully handled by Amazon, others
partially, and some fully your responsibility.
• Many requirements, such as the physical ones, are
completely handled by Amazon.

Friday, November 15, 13
Finding the right QSA
• Level 1 compliance requires an annual RoC (report
on compliance) that must be created by a QSA
(qualified security assessor)
• Talk to the QSA about AWS before engaging with
them. You don’t want to pay to educate them.
• If you cannot get them to understand how security
groups work, run, and find another!

Friday, November 15, 13
Where do I begin?
1.Download the PCI DSS
2.Write policy and create processes to address each
requirement
3.Audit that you are operating per your policy.

Friday, November 15, 13
Where do I begin?
0. Can I get out of this?
1.Download the PCI DSS
2.Write policy and create processes to address each
requirement
3.Audit that you are operating per your policy.

Friday, November 15, 13
We need a host

Friday, November 15, 13
Requirements
• High-availability
• As low cost as possible during initial build
• PCI compliant environment
• Real security and real scalability
• Like any startup we need to spend our money
carefully

Friday, November 15, 13
Our options

vs

Friday, November 15, 13

vs
Traditional hosting
Pro

Con

•Our area of

•No local PCI

expertise
•Absolute
control

Friday, November 15, 13

compliant colo
•Physical audit
•Waste of our
talent
•Upfront cost
Traditional hosting
•Give it some

time and this is
what will happen
•Audit that

Friday, November 15, 13
Traditional hosting
•Give it some

time and this is
what will happen
•Audit that

Friday, November 15, 13
PCI Compliant “Clouds”
Pro

•Local company

Friday, November 15, 13

Con

•Expensive,

was quoted 4
times AWS
•2-3 days to
turn up a new
instance
PCI Compliant “Clouds”

Friday, November 15, 13
PCI Compliant “Clouds”
ElasticSearch
Cassandra
MogileFS

Memcached
Queue
service
Nagios
Relational
Load
Database
Balancer

Friday, November 15, 13

No hosted
services
AWS
Pro

•End-to-End PCI
•Lowest cost PCI
compliant cloud
•Hosted services
save us tons of
time and shrinks
our PCI
environment
Friday, November 15, 13

Con
•No experience
on our team
•We were
worried about
instance
failures
•Small fish in
big ocean
AWS

My fears were unfounded

•Our team learned quickly and

we were still able to build faster
than we could have in colo
•Instance reliability has been
better than our IBM and
Supermicro servers
•We receive better service from
our AWS account manager than
our local colo
Friday, November 15, 13
We designed for PCI

Friday, November 15, 13
Our strategy
• Thoroughly reviewed the entire PCI DSS before we
wrote a single line of code.
• Throughout your development cycle cross-check
PCI requirements. Avoid expensive mistakes.
Involve a QSA at every major decision.
• Reach beyond PCI requirements for security. It is a
baseline not your ultimate goal.

Friday, November 15, 13
Service Oriented Architecture

*simplified
Friday, November 15, 13
Other SoA Perks
• SoA is the answer for mitigating PCI. We isolated
the paths where card holder data flows into small
services that are easily audited.
• Each service should have their own security group
• The less coupled things are the more granular your
security can become.
• Our services are designed not to trust each other.

Friday, November 15, 13
Our service philosophy
• Services are their own fully isolated application with
an API.
• API calls between services are fully authenticated.
Do not build god keys, admin keys, or backdoors
between services.
• Any one of our services can be safely exposed to
the internet and be useful by itself.

Friday, November 15, 13
Our service philosophy
• 1 service per EC2 instance
• Services have their own database instances
(Amazon RDS).
• Security groups are powerful. Use them. The more
services you have, the more specific you can make
your security groups. Be paranoid.

Friday, November 15, 13
Some more rules...
• We never make changes to production instances
• If a change needs to be made we build new
instances and terminate the old ones.
• Our production instances can ONLY access the
network resources they need to do their job. They do
not have internet access. We do not log into them.
• We accomplish the above by moving instances
between “stages” as they are built.
Friday, November 15, 13
Stage 0: Distribution AMI
1.Launch the upstream distribution AMI.
2.Apply system updates
3.Apply Puppet manifests for that role.
4.Create AMI
5. Terminate instance
(The birth of a production instance)

Friday, November 15, 13
Stage 1: PaymentSpring Base AMI
1.Launch our latest stage 1 AMI for the particular
service.
2.Deploy code to instance and run tests
3. Create AMI
4.Terminate instance
(Add the application code)

Friday, November 15, 13
Stage 2: Production-ready AMI
1. Launch latest stage-2 AMI for service we’re
deploying.
2.Add to Elastic Load Balancing

(Locked down and ready for production)

Friday, November 15, 13
Security changes with each stage
Stage 0: Distribution AMI

•Has network access to repositories for
installing updates
•Has not yet been hardened

Friday, November 15, 13
Security changes with each stage
Stage 1: PaymentSpring Base AMI

•Has network access to download our code
but no longer can talk to the package
repositories
•File integrity monitoring is now enabled on
everything except the code

Friday, November 15, 13
Security changes with each stage
Stage 2: PaymentSpring Production

•Has network access to database servers

and load balancers
•File integrity monitoring is now enabled on
the code as well
•Extremely strict file integrity and intrusion
detection monitoring.
Friday, November 15, 13
You must be consistent to be secure
• All it takes is one misconfigured machine to lose card
data.
• Eliminate the human otherwise you will never be
consistent
• Reconfigure and replace instances with new ones
from scratch instead of modifying them.
• Use configuration management (we’re a puppet shop)

Friday, November 15, 13
Meeting the requirements on AWS

Friday, November 15, 13
Firewalls (security groups)
• Firewall rules must be audited
–The AWS API allows you to audit every security group in
seconds
• Firewall firmware must be updated
–Not applicable on AWS
• Networks must be properly segmented
–Segmentation can exist between instances inside the
same subnet based on roles (services)

Friday, November 15, 13
Networking (VPC)
• Switches and router firmware must be updated
–Not applicable on AWS
• Must not expose private ip addresses
–VPCs allow you to create private subnets in the ip range
of your choice and use NAT to isolate your instances from
the public internet

Friday, November 15, 13
Intrusion detection and file integrity
• Intrusion detection must be on every server
– Instance stages make your IDS effective and not annoying

• File integrity monitoring must be enabled
–Instance stages make your file integrity effective and not annoying

• Alerts must be monitored and responded to
–We don’t touch instances in production which all but eliminates false
alerts.

Friday, November 15, 13
Anti-Virus
• Must run anti-virus (Yes, even on Linux servers).
–AWS allows you to scale up or reconfigure your environment so that the
scans don’t impact service response

Friday, November 15, 13
Key management
• It’s a complicated problem to solve.
–AWS CloudHSM is an Amazon service that allows you to easily
protect and manage your keys
Pro tip: Challenge your staff to imagine ways that a hacker could
access your keys at rest, in memory, etc. If they can think of a way to
decrypt a card number on their own your system is broken. Fix it.
Remember that your application can decrypt data, a single flaw in it’s
logic could defeat all of your key management strategies.

Friday, November 15, 13
Other tips - Protect your application
• Your application is what is exposed to the internet.
It’s the easiest vector for an attacker. You must
constantly evaluate how well you’re protecting it.
• Code review, code review, code review.
• Watch out for the libraries you use in your
application. This is often missed and there can be
giant holes in them (injection issue in an ORM
library, for example).
Friday, November 15, 13
If you care about it or are audited
on it, AUTOMATE IT

Friday, November 15, 13
Automate everything
• AWS provides an API for everything. An API means
you can automate it and automating it means you
can eliminate the human error.
• In traditional data centers you pile on change after
change and never truly know how things are
configured. Your systems and your security rot.

Friday, November 15, 13
Real security, smoother audits
• With AWS you can verify your
infrastructure is for sure 100%
configured as you intend.
• In traditional data centers
there is no way to do that
• Source controlled
configuration of your platform
provides security you cannot
get elsewhere
Friday, November 15, 13
Real security, smoother audits
• With AWS you can verify your
infrastructure is for sure 100%
configured as you intend.
• In traditional data centers
there is no way to do that
• Source controlled
configuration of your platform
provides security you cannot
get elsewhere
Friday, November 15, 13
Think hard about handling card data

Friday, November 15, 13
A credit card number is a liability
• Ensure the benefit of touching the card number is
greater than the liability
• Go beyond the DSS, be paranoid, ensure data is
always encrypted -- even in memory.
• First and foremost, evaluate whether or not you can
eliminate the reasons that compliance is necessary.

Friday, November 15, 13
Please give us your feedback on this
presentation

SEC206
As a thank you, we will select prize
winners daily for completed surveys!

Thank You

@jesseangell

jesse.angell@paymentspring.com
Friday, November 15, 13

Weitere ähnliche Inhalte

Was ist angesagt?

AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)Amazon Web Services
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...Amazon Web Services
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudAmazon Web Services
 
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)Amazon Web Services
 
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...Amazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...Amazon Web Services
 
How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  Amazon Web Services
 
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...Amazon Web Services
 
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...Amazon Web Services
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsHackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsAmazon Web Services
 
Getting Started with Amazon Inspector
Getting Started with Amazon InspectorGetting Started with Amazon Inspector
Getting Started with Amazon InspectorAmazon Web Services
 
Getting started with aws io t.compressed.compressed
Getting started with aws io t.compressed.compressedGetting started with aws io t.compressed.compressed
Getting started with aws io t.compressed.compressedAmazon Web Services
 
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...Amazon Web Services
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveAmazon Web Services
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Amazon Web Services
 
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...Amazon Web Services
 
DevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous DeploymentDevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous DeploymentAmazon Web Services
 
GitHub's Latest: Automation and More
GitHub's Latest: Automation and MoreGitHub's Latest: Automation and More
GitHub's Latest: Automation and MoreAmazon Web Services
 

Was ist angesagt? (20)

AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
AWS re:Invent 2016: Accenture Cloud Platform Serverless Journey (ARC202)
 
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
AWS re:Invent 2016: Effective Application Data Analytics for Modern Applicati...
 
Getting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless CloudGetting Started with AWS Lambda and the Serverless Cloud
Getting Started with AWS Lambda and the Serverless Cloud
 
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
AWS re:Invent 2016: VMware and AWS Together - VMware Cloud on AWS (ENT317)
 
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...
AWS re:Invent 2016: Running Lean Architectures: How to Optimize for Cost Effi...
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
AWS January 2016 Webinar Series - Cloud Data Migration: 6 Strategies for Gett...
 
How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment  How Serverless Computing Enables Microservices and Micropayment 
How Serverless Computing Enables Microservices and Micropayment 
 
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...
AWS re:Invent 2016: Develop, Build, Deploy, and Manage Containerized Services...
 
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...
AWS re:Invent 2016: Hybrid Architectures: Bridging the Gap to the Cloud( ARC2...
 
Hackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 ThreatsHackproof Your Cloud: Responding to 2016 Threats
Hackproof Your Cloud: Responding to 2016 Threats
 
Getting Started with Amazon Inspector
Getting Started with Amazon InspectorGetting Started with Amazon Inspector
Getting Started with Amazon Inspector
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
Getting started with aws io t.compressed.compressed
Getting started with aws io t.compressed.compressedGetting started with aws io t.compressed.compressed
Getting started with aws io t.compressed.compressed
 
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
AWS re:Invent 2016: Advanced Techniques for Managing Sensitive Data in the Cl...
 
Data Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and ArchiveData Storage for the Long Haul: Compliance and Archive
Data Storage for the Long Haul: Compliance and Archive
 
Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016Reactive Cloud Security | AWS Public Sector Summit 2016
Reactive Cloud Security | AWS Public Sector Summit 2016
 
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...
AWS re:Invent 2016: Stop Managing Email Infrastructure: Move to Amazon WorkMa...
 
DevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous DeploymentDevOps for the Enterprise: Continuous Deployment
DevOps for the Enterprise: Continuous Deployment
 
GitHub's Latest: Automation and More
GitHub's Latest: Automation and MoreGitHub's Latest: Automation and More
GitHub's Latest: Automation and More
 

Andere mochten auch

Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSAmazon Web Services
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015Evident.io
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivAmazon Web Services
 
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster Recovery
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster RecoveryAWS Summit Tel Aviv - Enterprise Track - Backup and Disaster Recovery
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster RecoveryAmazon Web Services
 
Updating Security Operations for the Cloud
Updating Security Operations for the CloudUpdating Security Operations for the Cloud
Updating Security Operations for the CloudAmazon Web Services
 
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...Amazon Web Services
 
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...Amazon Web Services
 
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Amazon Web Services
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageCloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the CloudCloudPassage
 
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...Amazon Web Services
 
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014Amazon Web Services
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overviewokrantz
 
(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon RedshiftAmazon Web Services
 
AWS Infrastructure as Code - September 2016 Webinar Series
AWS Infrastructure as Code - September 2016 Webinar SeriesAWS Infrastructure as Code - September 2016 Webinar Series
AWS Infrastructure as Code - September 2016 Webinar SeriesAmazon Web Services
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Amazon Web Services
 

Andere mochten auch (18)

Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
PCI Compliance on AWS - Evident.io @ AWS Pop-up Loft 2/26/2015
 
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel AvivBuilding PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
Building PCI Compliance Solution on AWS - Pop-up Loft Tel Aviv
 
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster Recovery
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster RecoveryAWS Summit Tel Aviv - Enterprise Track - Backup and Disaster Recovery
AWS Summit Tel Aviv - Enterprise Track - Backup and Disaster Recovery
 
Updating Security Operations for the Cloud
Updating Security Operations for the CloudUpdating Security Operations for the Cloud
Updating Security Operations for the Cloud
 
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...
Edmunds.com: Migrating, Deploying & Managing On-Premises Web Property (DMG205...
 
PCI and the Cloud
PCI and the CloudPCI and the Cloud
PCI and the Cloud
 
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...
Scaling your Application for Growth using Automation (CPN209) | AWS re:Invent...
 
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...
Telco: Voice-Command Personal Agent Service with AWS Cloud (MBL202) | AWS re:...
 
Meeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassageMeeting PCI DSS Requirements with AWS and CloudPassage
Meeting PCI DSS Requirements with AWS and CloudPassage
 
45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud45 Minutes to PCI Compliance in the Cloud
45 Minutes to PCI Compliance in the Cloud
 
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
A Venture Capitalist’s View on the Start-up Ecosystem and the Cloud (SPOT202)...
 
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
 
1. PCI Compliance Overview
1. PCI Compliance Overview1. PCI Compliance Overview
1. PCI Compliance Overview
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift(DAT201) Introduction to Amazon Redshift
(DAT201) Introduction to Amazon Redshift
 
AWS Infrastructure as Code - September 2016 Webinar Series
AWS Infrastructure as Code - September 2016 Webinar SeriesAWS Infrastructure as Code - September 2016 Webinar Series
AWS Infrastructure as Code - September 2016 Webinar Series
 
Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM Protecting Your Data With AWS KMS and AWS CloudHSM
Protecting Your Data With AWS KMS and AWS CloudHSM
 

Ähnlich wie Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013

How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...Amazon Web Services
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...RightScale
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud SecurityAmazon Web Services
 
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?TechWell
 
AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60PolarSeven Pty Ltd
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Akash Mahajan
 
AWS Serverless patterns & best-practices in AWS
AWS Serverless  patterns & best-practices in AWSAWS Serverless  patterns & best-practices in AWS
AWS Serverless patterns & best-practices in AWSDima Pasko
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance John Varghese
 
7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaSFrederik Denkens
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
So many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSo many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSirris
 
Cloud Services helping in cloud service to be fully knowledgably .pptx
Cloud Services helping in cloud service to be fully knowledgably .pptxCloud Services helping in cloud service to be fully knowledgably .pptx
Cloud Services helping in cloud service to be fully knowledgably .pptxterewog808
 
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Amazon Web Services
 
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Amazon Web Services
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Amazon Web Services
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Amazon Web Services
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Amazon Web Services
 
The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersMarc Manthey
 

Ähnlich wie Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013 (20)

How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
How Trend Micro Build their Enterprise Security Offering on AWS (SEC307) | AW...
 
Cloud Computing 101
Cloud Computing 101Cloud Computing 101
Cloud Computing 101
 
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
PCI: Building Compliant Applications in the Public Cloud - RightScale Compute...
 
Developing a Continuous Automated Approach to Cloud Security
 Developing a Continuous Automated Approach to Cloud Security Developing a Continuous Automated Approach to Cloud Security
Developing a Continuous Automated Approach to Cloud Security
 
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
Can Your Mobile Infrastructure Survive 1 Million Concurrent Users?
 
AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60AWS User Group Sydney - Meetup #60
AWS User Group Sydney - Meetup #60
 
Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014Security in the cloud Workshop HSTC 2014
Security in the cloud Workshop HSTC 2014
 
AWS Serverless patterns & best-practices in AWS
AWS Serverless  patterns & best-practices in AWSAWS Serverless  patterns & best-practices in AWS
AWS Serverless patterns & best-practices in AWS
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Automating AWS security and compliance
Automating AWS security and compliance Automating AWS security and compliance
Automating AWS security and compliance
 
7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
So many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSo many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS provider
 
Cloud Services helping in cloud service to be fully knowledgably .pptx
Cloud Services helping in cloud service to be fully knowledgably .pptxCloud Services helping in cloud service to be fully knowledgably .pptx
Cloud Services helping in cloud service to be fully knowledgably .pptx
 
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
 
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
Running Lean and Mean: Designing Cost-efficient Architectures on AWS (ARC313)...
 
Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro Using Security to Build with Confidence in AWS - Trend Micro
Using Security to Build with Confidence in AWS - Trend Micro
 
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
Cloud ID Management of North Carolina Department of Public Instruction (SEC10...
 
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
Managing WorkSpaces at Scale | AWS Public Sector Summit 2016
 
The Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side DevelopersThe Rise of BaaS A Utopia for Client-Side Developers
The Rise of BaaS A Utopia for Client-Side Developers
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Kürzlich hochgeladen

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure servicePooja Nehwal
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Enterprise Knowledge
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 

Kürzlich hochgeladen (20)

Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure serviceWhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
WhatsApp 9892124323 ✓Call Girls In Kalyan ( Mumbai ) secure service
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...Driving Behavioral Change for Information Management through Data-Driven Gree...
Driving Behavioral Change for Information Management through Data-Driven Gree...
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 

Navigating PCI Compliance in the Cloud (SEC206) | AWS re:Invent 2013

  • 1. Navigating PCI DSS Compliance in the Cloud Jesse Angell November 14, 2013 © 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. Friday, November 15, 13
  • 2. Who am I? • Jesse Angell – CTO of PaymentSpring – Background in both IT operations and software development – When I’m not building software you’ll find me working on my experimental airplane @jesseangell jesse.angell@paymentspring.com Friday, November 15, 13
  • 3. – Level 1 PCI compliant gateway – We make it easier for our clients to accept credit card transactions while greatly reducing their PCI compliance without sacrificing their customer’s user experience. – As a payment gateway storing credit card numbers, we bet our business on our security. – Built, certified, and launched a level 1 compliant gateway in a year with a small team. Friday, November 15, 13
  • 4. What is this about? This is the real story of how PaymentSpring built a level 1 PCI compliant gateway entirely on AWS. • Why we chose AWS • How we architected our systems • How AWS makes PCI compliance easier Friday, November 15, 13
  • 5. What is PCI and why do I care? Friday, November 15, 13
  • 6. What is the PCI DSS? • The PCI DSS (data security standard) is a publicly available document setting forth the requirements you must meet to handle credit card data. • The current version of the DSS, is not very cloud oriented. Friday, November 15, 13
  • 7. Levels of PCI • Level 1: over 6 million transactions per year • Level 2: 1 to 6 million transactions per year • Level 3: 20,000 to 1 million transactions per year • Level 4: Less than 20,000 transactions per year Compliance becomes more difficult and costly with each level Friday, November 15, 13
  • 8. Does it apply to me? If you are asking yourself this question. It’s likely going to apply to you If you are a merchant or a service provider to a merchant that processes, stores, or transmits credit card data PCI applies to you. If your customers do the above through your systems you must be compliant. If you are asking yourself this question, PCI likely applies to you. Friday, November 15, 13
  • 9. Understanding PCI on AWS • All AWS services can be PCI compliant. The more you utilize their services (such as Amazon RDS, Amazon DynamoDB) the less infrastructure you will have to worry about. • With Amazon EC2, you are responsible for everything from the hypervisor and up. This includes patching the operating system. Friday, November 15, 13
  • 10. Compliance is not automatic • You must understand all PCI requirements and know how you are complying with it. Some requirements are fully handled by Amazon, others partially, and some fully your responsibility. • Many requirements, such as the physical ones, are completely handled by Amazon. Friday, November 15, 13
  • 11. Finding the right QSA • Level 1 compliance requires an annual RoC (report on compliance) that must be created by a QSA (qualified security assessor) • Talk to the QSA about AWS before engaging with them. You don’t want to pay to educate them. • If you cannot get them to understand how security groups work, run, and find another! Friday, November 15, 13
  • 12. Where do I begin? 1.Download the PCI DSS 2.Write policy and create processes to address each requirement 3.Audit that you are operating per your policy. Friday, November 15, 13
  • 13. Where do I begin? 0. Can I get out of this? 1.Download the PCI DSS 2.Write policy and create processes to address each requirement 3.Audit that you are operating per your policy. Friday, November 15, 13
  • 14. We need a host Friday, November 15, 13
  • 15. Requirements • High-availability • As low cost as possible during initial build • PCI compliant environment • Real security and real scalability • Like any startup we need to spend our money carefully Friday, November 15, 13
  • 17. Traditional hosting Pro Con •Our area of •No local PCI expertise •Absolute control Friday, November 15, 13 compliant colo •Physical audit •Waste of our talent •Upfront cost
  • 18. Traditional hosting •Give it some time and this is what will happen •Audit that Friday, November 15, 13
  • 19. Traditional hosting •Give it some time and this is what will happen •Audit that Friday, November 15, 13
  • 20. PCI Compliant “Clouds” Pro •Local company Friday, November 15, 13 Con •Expensive, was quoted 4 times AWS •2-3 days to turn up a new instance
  • 23. AWS Pro •End-to-End PCI •Lowest cost PCI compliant cloud •Hosted services save us tons of time and shrinks our PCI environment Friday, November 15, 13 Con •No experience on our team •We were worried about instance failures •Small fish in big ocean
  • 24. AWS My fears were unfounded •Our team learned quickly and we were still able to build faster than we could have in colo •Instance reliability has been better than our IBM and Supermicro servers •We receive better service from our AWS account manager than our local colo Friday, November 15, 13
  • 25. We designed for PCI Friday, November 15, 13
  • 26. Our strategy • Thoroughly reviewed the entire PCI DSS before we wrote a single line of code. • Throughout your development cycle cross-check PCI requirements. Avoid expensive mistakes. Involve a QSA at every major decision. • Reach beyond PCI requirements for security. It is a baseline not your ultimate goal. Friday, November 15, 13
  • 28. Other SoA Perks • SoA is the answer for mitigating PCI. We isolated the paths where card holder data flows into small services that are easily audited. • Each service should have their own security group • The less coupled things are the more granular your security can become. • Our services are designed not to trust each other. Friday, November 15, 13
  • 29. Our service philosophy • Services are their own fully isolated application with an API. • API calls between services are fully authenticated. Do not build god keys, admin keys, or backdoors between services. • Any one of our services can be safely exposed to the internet and be useful by itself. Friday, November 15, 13
  • 30. Our service philosophy • 1 service per EC2 instance • Services have their own database instances (Amazon RDS). • Security groups are powerful. Use them. The more services you have, the more specific you can make your security groups. Be paranoid. Friday, November 15, 13
  • 31. Some more rules... • We never make changes to production instances • If a change needs to be made we build new instances and terminate the old ones. • Our production instances can ONLY access the network resources they need to do their job. They do not have internet access. We do not log into them. • We accomplish the above by moving instances between “stages” as they are built. Friday, November 15, 13
  • 32. Stage 0: Distribution AMI 1.Launch the upstream distribution AMI. 2.Apply system updates 3.Apply Puppet manifests for that role. 4.Create AMI 5. Terminate instance (The birth of a production instance) Friday, November 15, 13
  • 33. Stage 1: PaymentSpring Base AMI 1.Launch our latest stage 1 AMI for the particular service. 2.Deploy code to instance and run tests 3. Create AMI 4.Terminate instance (Add the application code) Friday, November 15, 13
  • 34. Stage 2: Production-ready AMI 1. Launch latest stage-2 AMI for service we’re deploying. 2.Add to Elastic Load Balancing (Locked down and ready for production) Friday, November 15, 13
  • 35. Security changes with each stage Stage 0: Distribution AMI •Has network access to repositories for installing updates •Has not yet been hardened Friday, November 15, 13
  • 36. Security changes with each stage Stage 1: PaymentSpring Base AMI •Has network access to download our code but no longer can talk to the package repositories •File integrity monitoring is now enabled on everything except the code Friday, November 15, 13
  • 37. Security changes with each stage Stage 2: PaymentSpring Production •Has network access to database servers and load balancers •File integrity monitoring is now enabled on the code as well •Extremely strict file integrity and intrusion detection monitoring. Friday, November 15, 13
  • 38. You must be consistent to be secure • All it takes is one misconfigured machine to lose card data. • Eliminate the human otherwise you will never be consistent • Reconfigure and replace instances with new ones from scratch instead of modifying them. • Use configuration management (we’re a puppet shop) Friday, November 15, 13
  • 39. Meeting the requirements on AWS Friday, November 15, 13
  • 40. Firewalls (security groups) • Firewall rules must be audited –The AWS API allows you to audit every security group in seconds • Firewall firmware must be updated –Not applicable on AWS • Networks must be properly segmented –Segmentation can exist between instances inside the same subnet based on roles (services) Friday, November 15, 13
  • 41. Networking (VPC) • Switches and router firmware must be updated –Not applicable on AWS • Must not expose private ip addresses –VPCs allow you to create private subnets in the ip range of your choice and use NAT to isolate your instances from the public internet Friday, November 15, 13
  • 42. Intrusion detection and file integrity • Intrusion detection must be on every server – Instance stages make your IDS effective and not annoying • File integrity monitoring must be enabled –Instance stages make your file integrity effective and not annoying • Alerts must be monitored and responded to –We don’t touch instances in production which all but eliminates false alerts. Friday, November 15, 13
  • 43. Anti-Virus • Must run anti-virus (Yes, even on Linux servers). –AWS allows you to scale up or reconfigure your environment so that the scans don’t impact service response Friday, November 15, 13
  • 44. Key management • It’s a complicated problem to solve. –AWS CloudHSM is an Amazon service that allows you to easily protect and manage your keys Pro tip: Challenge your staff to imagine ways that a hacker could access your keys at rest, in memory, etc. If they can think of a way to decrypt a card number on their own your system is broken. Fix it. Remember that your application can decrypt data, a single flaw in it’s logic could defeat all of your key management strategies. Friday, November 15, 13
  • 45. Other tips - Protect your application • Your application is what is exposed to the internet. It’s the easiest vector for an attacker. You must constantly evaluate how well you’re protecting it. • Code review, code review, code review. • Watch out for the libraries you use in your application. This is often missed and there can be giant holes in them (injection issue in an ORM library, for example). Friday, November 15, 13
  • 46. If you care about it or are audited on it, AUTOMATE IT Friday, November 15, 13
  • 47. Automate everything • AWS provides an API for everything. An API means you can automate it and automating it means you can eliminate the human error. • In traditional data centers you pile on change after change and never truly know how things are configured. Your systems and your security rot. Friday, November 15, 13
  • 48. Real security, smoother audits • With AWS you can verify your infrastructure is for sure 100% configured as you intend. • In traditional data centers there is no way to do that • Source controlled configuration of your platform provides security you cannot get elsewhere Friday, November 15, 13
  • 49. Real security, smoother audits • With AWS you can verify your infrastructure is for sure 100% configured as you intend. • In traditional data centers there is no way to do that • Source controlled configuration of your platform provides security you cannot get elsewhere Friday, November 15, 13
  • 50. Think hard about handling card data Friday, November 15, 13
  • 51. A credit card number is a liability • Ensure the benefit of touching the card number is greater than the liability • Go beyond the DSS, be paranoid, ensure data is always encrypted -- even in memory. • First and foremost, evaluate whether or not you can eliminate the reasons that compliance is necessary. Friday, November 15, 13
  • 52. Please give us your feedback on this presentation SEC206 As a thank you, we will select prize winners daily for completed surveys! Thank You @jesseangell jesse.angell@paymentspring.com Friday, November 15, 13