SlideShare ist ein Scribd-Unternehmen logo
1 von 19
VELOGICA’S JOURNEY
TO SOC2/TYPE2 VIA AWS
Clarke Rodgers, CISO, SCOR Velogica
About
• SCOR Velogica
 Business unit within SCOR Global Life Americas
 Location: Charlotte, NC
 Home to the Velogica automated life insurance underwriting
Service. (B2B)
 Over 2.5 million underwriting recommendations have been
issued by the Velogica Service since its inception.
• Our Customers
 Direct Life Insurers
 Focused on Velogica platform’s business agility and security of
their customer’s data.
Challenge
Business Problem
 Security questionnaires & related due diligence taking up too much
time and resources during sales cycle. How do we prove to our
future and existing clients that we have best in class security?
Solution
Business Solution
 Obtain an internationally recognized and accepted third party
assurance report attesting to the security controls in place at
SCOR Velogica.
 Provide report to clients (and prospective clients) in lieu of
spreadsheet exchanges, meetings, etc..
 Do it quickly.
What is SOC2/Type2?
• Set of standards (Trust Principles) developed by the
AICPA covering:
- Security (base report)
- Confidentiality (additive)
- Availability (additive)
- Processing Integrity (additive)
- Privacy (additive)
• Controls are reviewed and tested annually (at
minimum) by a third party auditing firm.
• Becoming the de-facto standard of third party
assurance reports for security controls.
learn more at www.aicpa.org
SOC2 by way of AWS
For SCOR Velogica, the best path to achieving SOC2/T2 attestation
was to move to AWS by:
 Focusing on OUR expertise: the controls, development & operations that
are key to our business (e.g. the Velogica web service)
 Relying on best of breed trusted third parties (e.g. AWS, 2nd Watch & Alert
Logic) to do what THEY do best:
 AWS – cloud computing infrastructure, management platform &
services.
 2nd Watch – (MCSP) professional services [design& migration]
and managed cloud operations.
 Alert Logic – (MSSP) security monitoring, log correlation and
24/7 security operations.
Key Decisions – SCOR Velogica AWS Migration
1. Develop cloud expertise
internally?
2. Migrate to AWS platforms &
services or perform a “lift and
shift” of our existing platform?
3. How do we
communicate/educate our clients
on the move?
Pro tip: Don’t assume everyone knows that Amazon is in
the datacenter business. 
Shared Responsibility Model
A note about Trust
The more you know about a provider, and their ability to be
transparent about their services instills trust in their offerings
and ability to execute.
We:
1. Reviewed (under NDA) available assurance reports for
each key provider.
2. Made site visits, interviewed key personnel and asked
detailed questions that mattered the most to our business.
3. Met with current customers to get their insights on the
providers.
It is YOUR responsibility to thoroughly vet your providers.
For your further investigation
AWS
 Has more certified platforms and services (for your workloads) than
any other cloud provider… and the list keeps growing.
 Internal operations are validated and published (under NDA) for
customer review (see aws.amazon.com/compliance for more info)
2nd Watch
 Maintains SOC2/Type2 attestation.
 Audited by AWS under partner program agreement.
Alert Logic
 Maintains SOC1/Type2 and SOC2/Type2 attestations.
 Audited by AWS under partner program agreement.
Our Enhanced Security Posture in AWS
If it logs, we
log it.
If it can be
encrypted,
we encrypt
it.
SCOR Velogica’s Cloud Security Program
Each member of
the team excels
at their
individual
strengths,
making the
entire team
stronger.
SCOR
Velogica
AWS
Alert
Logic
2nd
Watch
Foundational cloud platform with resilient
architecture. Security baked into every product and
service. API driven. Strong security partner ecosystem.
Security operations expertise. Threat & vulnerability
management, log monitoring & correlation. Security
intelligence & threat research, etc…
Secure cloud design and best practices. Patching,
Antivirus, Web Proxy, Active Directory, Hardened builds,
IAM, Infrastructure & application monitoring, etc…
Overall Responsibility of Program. Secure application
development, Access Review, Security Awareness,
Incident Response coordination, Reporting, Client
interaction, etc...
Oversight of the entire program is the customer’s (your) responsibility. If your
vendors aren’t measuring up, find different ones, coach the ones you have or
do it yourself.
So what does “All-in AWS” mean exactly?
Three pieces of
our critical
infrastructure
NOT in AWS:
• Desk Phones.
• Internet
Connection.
• Printers.
 Secure MFA access to AWS Workspaces from
anywhere on any supported device.
 Customer facing Velogica Web Service - in AWS.
 All application development – in AWS.
 All customer billing & operations – in AWS.
 All core infrastructure (e.g. Active Directory, network
file shares, etc..) – in AWS.
 Business Continuity - in AWS.
 Disaster Recovery – in AWS.
All new technology products and services purchases are either AWS friendly or
other third party SaaS offerings (e.g. Office 365). If not, we don’t buy it!
Non SOC2 related benefits of our move to AWS
 Failure is cheap.
 Granular control over our costs.
 Real time detailed inventory of everything we have.
 Built in metrics of what is being used and what isn't.
We are at the cusp of the cloud computing revolution. It is really
just starting and we’ve positioned ourselves to take full advantage
of all the innovations yet to come. Exciting times!
Next steps for SCOR Velogica
 Maintain SOC2/Type 2
 Exploit the AWS platform to our business advantage:
 Continue the automation of our entire software development
lifecycle.
 Build an automated, event driven security program to
address human errors/misconfiguration.
 Duplicate the application environment when needed to
support international expansion of the Velogica platform
 Continue maturing our DevOps/DevSecOps culture
within the development & infrastructure/ops teams.
 Training & Certification path for everyone who wants it.
Final Thoughts: What business are you in?
At SCOR Velogica, we provide the leading automated
life insurance underwriting platform in the industry. We
are experts in automated life insurance underwriting.
We are not:
 In the datacenter management business.
 In the enterprise infrastructure/cloud management
business.
 In the security monitoring/threat analytics and log
review business.
There are others who will operate in the above spaces
with an expertise that will be hard to match, because
that is their focus.
Resources
• AWS Compliance - https://aws.amazon.com/compliance/
• AWS Security - https://aws.amazon.com/security/
• AWS Contact for SOC1, SOC2 & PCI Compliance packages -https://aws.amazon.com/compliance/contact/
• PCI FAQs, including which AWS services are in scope -https://aws.amazon.com/compliance/pci-dss-level-1-faqs/
• Introduction to AWS Security - https://d0.awsstatic.com/whitepapers/Security/Intro_to_AWS_Security.pdf
• Cloud Security Whitepaper – https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf
• Cloud Security Best Practices - https://d0.awsstatic.com/whitepapers/aws-security-best-practices.pdf
• AWS Well Architected Framework - https://d0.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf
• AWS Cloud Adoption Framework Documents:
o https://d0.awsstatic.com/whitepapers/Maturity_Perspective_v1.0.pdf
o https://d0.awsstatic.com/whitepapers/Process_Perspective_v1.0.pdf
o https://d0.awsstatic.com/whitepapers/Operations_Perspective_v1.0.pdf
o https://d0.awsstatic.com/whitepapers/AWS_CAF_People_Perspective.pdf
o https://d0.awsstatic.com/whitepapers/Platform_Perspective.pdf
o https://d0.awsstatic.com/whitepapers/Business_Perspective_v1.0.pdf
o https://d0.awsstatic.com/whitepapers/aws_cloud_adoption_framework.pdf
• AWS Blogs to Read Every Day - https://aws.amazon.com/blogs/aws/ ; https://blogs.aws.amazon.com/security/
• AWS Case Studies - https://aws.amazon.com/solutions/case-studies/enterprise-it/?hp=tile
• AWS Global Infrastructure -https://aws.amazon.com/about-aws/global-infrastructure/?hp=tile
• Example of what can be done in AWS that can’t be matched on premise (from Security perspective) - https://securosis.com/blog/event-driven-security-on-aws-a-
practical-example
• Must attend events: https://aws.amazon.com/summits/ ;https://reinvent.awsevents.com/
• Training Resources (other than official AWS courses): https://cloudacademy.com/
• Books – Consumption Economics by J.T. Wood & The Phoenix Project by Gene Kim and Kevin Behr
Connect
https://www.linkedin.com/in/clarkerodgers
crodgers@scorvelogica.com
https://www.twitter.com/clarkerodgers
Thank you.

Weitere ähnliche Inhalte

Was ist angesagt?

The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and ResponseAlert Logic
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alAlert Logic
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsAlert Logic
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alAlert Logic
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSAlert Logic
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudAlert Logic
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Alert Logic
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and predictionVishwas Manral
 
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_alCss sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_alAlert Logic
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudAlert Logic
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Alert Logic
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectCloudPassage
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsCloudPassage
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the CloudSecurity Innovation
 
CSS 17: NYC - Stories from the SOC
CSS 17: NYC - Stories from the SOCCSS 17: NYC - Stories from the SOC
CSS 17: NYC - Stories from the SOCAlert Logic
 

Was ist angesagt? (20)

The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
Managed Threat Detection and Response
Managed Threat Detection and ResponseManaged Threat Detection and Response
Managed Threat Detection and Response
 
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_alCss sf azure_8-9-17-protecting_web_apps_stephen coty_al
Css sf azure_8-9-17-protecting_web_apps_stephen coty_al
 
CSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web ApplicationsCSS 17: NYC - Protecting your Web Applications
CSS 17: NYC - Protecting your Web Applications
 
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_alCss sf azure_8-9-17-intro to security in the cloud_mark brooks_al
Css sf azure_8-9-17-intro to security in the cloud_mark brooks_al
 
CSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWSCSS 17: NYC - Building Secure Solutions in AWS
CSS 17: NYC - Building Secure Solutions in AWS
 
CSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the CloudCSS 17: NYC - Realities of Security in the Cloud
CSS 17: NYC - Realities of Security in the Cloud
 
Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials Extending Amazon GuardDuty with Cloud Insight Essentials
Extending Amazon GuardDuty with Cloud Insight Essentials
 
CSA SV Threat detection and prediction
CSA SV Threat detection and predictionCSA SV Threat detection and prediction
CSA SV Threat detection and prediction
 
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_alCss sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
Css sf azure_8-9-17-stories_from_the_soc_paul fletcher_al
 
Shared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure CloudShared Security Responsibility for the Azure Cloud
Shared Security Responsibility for the Azure Cloud
 
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
Css sf azure_8-9-17 - 5_ways to_optimize_your_azure_infrastructure_thayer gla...
 
Rethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure EffectRethinking Security: The Cloud Infrastructure Effect
Rethinking Security: The Cloud Infrastructure Effect
 
Secure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOpsSecure Cloud Development Resources with DevOps
Secure Cloud Development Resources with DevOps
 
Securing Applications in the Cloud
Securing Applications in the CloudSecuring Applications in the Cloud
Securing Applications in the Cloud
 
CSS 17: NYC - Stories from the SOC
CSS 17: NYC - Stories from the SOCCSS 17: NYC - Stories from the SOC
CSS 17: NYC - Stories from the SOC
 

Ähnlich wie #ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS

Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsDr. Sunil Kr. Pandey
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxCloudHesive
 
7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdfAnil
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorAmazon Web Services
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud CrossoverArmor
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud securityRaj Sarode
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureQualys
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The CloudPECB
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --SymantecAbhishek Sood
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloudScalar Decisions
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloudpatmisasi
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAmazon Web Services
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...Amazon Web Services
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide Array Networks
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 

Ähnlich wie #ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS (20)

Cloud Security, Standards and Applications
Cloud Security, Standards and ApplicationsCloud Security, Standards and Applications
Cloud Security, Standards and Applications
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
End User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptxEnd User Computing at CloudHesive.pptx
End User Computing at CloudHesive.pptx
 
Cloud services and it security
Cloud services and it securityCloud services and it security
Cloud services and it security
 
7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf7 Essential Steps to Cloud Adoption.pdf
7 Essential Steps to Cloud Adoption.pdf
 
Losing Control to the Cloud
Losing Control to the CloudLosing Control to the Cloud
Losing Control to the Cloud
 
Demystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public SectorDemystifying Cloud Security: Lessons Learned for the Public Sector
Demystifying Cloud Security: Lessons Learned for the Public Sector
 
The Cloud Crossover
The Cloud CrossoverThe Cloud Crossover
The Cloud Crossover
 
Chap 6 cloud security
Chap 6 cloud securityChap 6 cloud security
Chap 6 cloud security
 
Securing Your Public Cloud Infrastructure
Securing Your Public Cloud InfrastructureSecuring Your Public Cloud Infrastructure
Securing Your Public Cloud Infrastructure
 
Cyber Security in The Cloud
Cyber Security in The CloudCyber Security in The Cloud
Cyber Security in The Cloud
 
Cloud Application Security --Symantec
 Cloud Application Security --Symantec Cloud Application Security --Symantec
Cloud Application Security --Symantec
 
Keys to success and security in the cloud
Keys to success and security in the cloudKeys to success and security in the cloud
Keys to success and security in the cloud
 
Keys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-CloudKeys-to-Success-and-Security-in-the-Cloud
Keys-to-Success-and-Security-in-the-Cloud
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Key Capibilities.pptx
Key Capibilities.pptxKey Capibilities.pptx
Key Capibilities.pptx
 
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
How Splunk and AWS Enabled End-to-End Visibility for PagerDuty and Bolstered ...
 
SSL VPN Evaluation Guide
SSL VPN Evaluation GuideSSL VPN Evaluation Guide
SSL VPN Evaluation Guide
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Incident response in cloud environments
Incident response in cloud environmentsIncident response in cloud environments
Incident response in cloud environments
 

Mehr von Alert Logic

Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack SurfaceAlert Logic
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the CloudAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: PresidioAlert Logic
 
Security Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterSecurity Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterAlert Logic
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOpsAlert Logic
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: PresidioAlert Logic
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionAlert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 TriviaAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the CloudAlert Logic
 
The Intersection of Security and DevOps
The Intersection of Security and DevOpsThe Intersection of Security and DevOps
The Intersection of Security and DevOpsAlert Logic
 
Security Spotlight: The Coca Cola Company
Security Spotlight: The Coca Cola CompanySecurity Spotlight: The Coca Cola Company
Security Spotlight: The Coca Cola CompanyAlert Logic
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionAlert Logic
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the CloudAlert Logic
 

Mehr von Alert Logic (20)

Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Reducing Your Attack Surface
Reducing Your Attack SurfaceReducing Your Attack Surface
Reducing Your Attack Surface
 
Reality Check: Security in the Cloud
Reality Check: Security in the CloudReality Check: Security in the Cloud
Reality Check: Security in the Cloud
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: Presidio
 
Security Spotlight: Rent-A-Center
Security Spotlight: Rent-A-CenterSecurity Spotlight: Rent-A-Center
Security Spotlight: Rent-A-Center
 
The Intersection of Security & DevOps
The Intersection of Security & DevOpsThe Intersection of Security & DevOps
The Intersection of Security & DevOps
 
Security Spotlight: Presidio
Security Spotlight: PresidioSecurity Spotlight: Presidio
Security Spotlight: Presidio
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload ProtectionReducing Your Attack Surface & Your Role in Cloud Workload Protection
Reducing Your Attack Surface & Your Role in Cloud Workload Protection
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
CSS 2018 Trivia
CSS 2018 TriviaCSS 2018 Trivia
CSS 2018 Trivia
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Realities of Security in the Cloud
Realities of Security in the CloudRealities of Security in the Cloud
Realities of Security in the Cloud
 
The Intersection of Security and DevOps
The Intersection of Security and DevOpsThe Intersection of Security and DevOps
The Intersection of Security and DevOps
 
Security Spotlight: The Coca Cola Company
Security Spotlight: The Coca Cola CompanySecurity Spotlight: The Coca Cola Company
Security Spotlight: The Coca Cola Company
 
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload ProtectionReducing Your Attack Surface and Yuor Role in Cloud Workload Protection
Reducing Your Attack Surface and Yuor Role in Cloud Workload Protection
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security Implications of the Cloud
Security Implications of the CloudSecurity Implications of the Cloud
Security Implications of the Cloud
 

KĂźrzlich hochgeladen

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 

KĂźrzlich hochgeladen (20)

GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 

#ALSummit: SCOR Velogica's Journey to SOC2/TYPE2 Via AWS

  • 1. VELOGICA’S JOURNEY TO SOC2/TYPE2 VIA AWS Clarke Rodgers, CISO, SCOR Velogica
  • 2. About • SCOR Velogica  Business unit within SCOR Global Life Americas  Location: Charlotte, NC  Home to the Velogica automated life insurance underwriting Service. (B2B)  Over 2.5 million underwriting recommendations have been issued by the Velogica Service since its inception. • Our Customers  Direct Life Insurers  Focused on Velogica platform’s business agility and security of their customer’s data.
  • 3. Challenge Business Problem  Security questionnaires & related due diligence taking up too much time and resources during sales cycle. How do we prove to our future and existing clients that we have best in class security?
  • 4. Solution Business Solution  Obtain an internationally recognized and accepted third party assurance report attesting to the security controls in place at SCOR Velogica.  Provide report to clients (and prospective clients) in lieu of spreadsheet exchanges, meetings, etc..  Do it quickly.
  • 5. What is SOC2/Type2? • Set of standards (Trust Principles) developed by the AICPA covering: - Security (base report) - Confidentiality (additive) - Availability (additive) - Processing Integrity (additive) - Privacy (additive) • Controls are reviewed and tested annually (at minimum) by a third party auditing firm. • Becoming the de-facto standard of third party assurance reports for security controls. learn more at www.aicpa.org
  • 6. SOC2 by way of AWS For SCOR Velogica, the best path to achieving SOC2/T2 attestation was to move to AWS by:  Focusing on OUR expertise: the controls, development & operations that are key to our business (e.g. the Velogica web service)  Relying on best of breed trusted third parties (e.g. AWS, 2nd Watch & Alert Logic) to do what THEY do best:  AWS – cloud computing infrastructure, management platform & services.  2nd Watch – (MCSP) professional services [design& migration] and managed cloud operations.  Alert Logic – (MSSP) security monitoring, log correlation and 24/7 security operations.
  • 7. Key Decisions – SCOR Velogica AWS Migration 1. Develop cloud expertise internally? 2. Migrate to AWS platforms & services or perform a “lift and shift” of our existing platform? 3. How do we communicate/educate our clients on the move? Pro tip: Don’t assume everyone knows that Amazon is in the datacenter business. 
  • 9. A note about Trust The more you know about a provider, and their ability to be transparent about their services instills trust in their offerings and ability to execute. We: 1. Reviewed (under NDA) available assurance reports for each key provider. 2. Made site visits, interviewed key personnel and asked detailed questions that mattered the most to our business. 3. Met with current customers to get their insights on the providers. It is YOUR responsibility to thoroughly vet your providers.
  • 10. For your further investigation AWS  Has more certified platforms and services (for your workloads) than any other cloud provider… and the list keeps growing.  Internal operations are validated and published (under NDA) for customer review (see aws.amazon.com/compliance for more info) 2nd Watch  Maintains SOC2/Type2 attestation.  Audited by AWS under partner program agreement. Alert Logic  Maintains SOC1/Type2 and SOC2/Type2 attestations.  Audited by AWS under partner program agreement.
  • 11. Our Enhanced Security Posture in AWS If it logs, we log it. If it can be encrypted, we encrypt it.
  • 12. SCOR Velogica’s Cloud Security Program Each member of the team excels at their individual strengths, making the entire team stronger. SCOR Velogica AWS Alert Logic 2nd Watch Foundational cloud platform with resilient architecture. Security baked into every product and service. API driven. Strong security partner ecosystem. Security operations expertise. Threat & vulnerability management, log monitoring & correlation. Security intelligence & threat research, etc… Secure cloud design and best practices. Patching, Antivirus, Web Proxy, Active Directory, Hardened builds, IAM, Infrastructure & application monitoring, etc… Overall Responsibility of Program. Secure application development, Access Review, Security Awareness, Incident Response coordination, Reporting, Client interaction, etc... Oversight of the entire program is the customer’s (your) responsibility. If your vendors aren’t measuring up, find different ones, coach the ones you have or do it yourself.
  • 13. So what does “All-in AWS” mean exactly? Three pieces of our critical infrastructure NOT in AWS: • Desk Phones. • Internet Connection. • Printers.  Secure MFA access to AWS Workspaces from anywhere on any supported device.  Customer facing Velogica Web Service - in AWS.  All application development – in AWS.  All customer billing & operations – in AWS.  All core infrastructure (e.g. Active Directory, network file shares, etc..) – in AWS.  Business Continuity - in AWS.  Disaster Recovery – in AWS. All new technology products and services purchases are either AWS friendly or other third party SaaS offerings (e.g. Office 365). If not, we don’t buy it!
  • 14. Non SOC2 related benefits of our move to AWS  Failure is cheap.  Granular control over our costs.  Real time detailed inventory of everything we have.  Built in metrics of what is being used and what isn't. We are at the cusp of the cloud computing revolution. It is really just starting and we’ve positioned ourselves to take full advantage of all the innovations yet to come. Exciting times!
  • 15. Next steps for SCOR Velogica  Maintain SOC2/Type 2  Exploit the AWS platform to our business advantage:  Continue the automation of our entire software development lifecycle.  Build an automated, event driven security program to address human errors/misconfiguration.  Duplicate the application environment when needed to support international expansion of the Velogica platform  Continue maturing our DevOps/DevSecOps culture within the development & infrastructure/ops teams.  Training & Certification path for everyone who wants it.
  • 16. Final Thoughts: What business are you in? At SCOR Velogica, we provide the leading automated life insurance underwriting platform in the industry. We are experts in automated life insurance underwriting. We are not:  In the datacenter management business.  In the enterprise infrastructure/cloud management business.  In the security monitoring/threat analytics and log review business. There are others who will operate in the above spaces with an expertise that will be hard to match, because that is their focus.
  • 17. Resources • AWS Compliance - https://aws.amazon.com/compliance/ • AWS Security - https://aws.amazon.com/security/ • AWS Contact for SOC1, SOC2 & PCI Compliance packages -https://aws.amazon.com/compliance/contact/ • PCI FAQs, including which AWS services are in scope -https://aws.amazon.com/compliance/pci-dss-level-1-faqs/ • Introduction to AWS Security - https://d0.awsstatic.com/whitepapers/Security/Intro_to_AWS_Security.pdf • Cloud Security Whitepaper – https://d0.awsstatic.com/whitepapers/Security/AWS_Security_Whitepaper.pdf • Cloud Security Best Practices - https://d0.awsstatic.com/whitepapers/aws-security-best-practices.pdf • AWS Well Architected Framework - https://d0.awsstatic.com/whitepapers/architecture/AWS_Well-Architected_Framework.pdf • AWS Cloud Adoption Framework Documents: o https://d0.awsstatic.com/whitepapers/Maturity_Perspective_v1.0.pdf o https://d0.awsstatic.com/whitepapers/Process_Perspective_v1.0.pdf o https://d0.awsstatic.com/whitepapers/Operations_Perspective_v1.0.pdf o https://d0.awsstatic.com/whitepapers/AWS_CAF_People_Perspective.pdf o https://d0.awsstatic.com/whitepapers/Platform_Perspective.pdf o https://d0.awsstatic.com/whitepapers/Business_Perspective_v1.0.pdf o https://d0.awsstatic.com/whitepapers/aws_cloud_adoption_framework.pdf • AWS Blogs to Read Every Day - https://aws.amazon.com/blogs/aws/ ; https://blogs.aws.amazon.com/security/ • AWS Case Studies - https://aws.amazon.com/solutions/case-studies/enterprise-it/?hp=tile • AWS Global Infrastructure -https://aws.amazon.com/about-aws/global-infrastructure/?hp=tile • Example of what can be done in AWS that can’t be matched on premise (from Security perspective) - https://securosis.com/blog/event-driven-security-on-aws-a- practical-example • Must attend events: https://aws.amazon.com/summits/ ;https://reinvent.awsevents.com/ • Training Resources (other than official AWS courses): https://cloudacademy.com/ • Books – Consumption Economics by J.T. Wood & The Phoenix Project by Gene Kim and Kevin Behr