SlideShare ist ein Scribd-Unternehmen logo
1 von 38
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
CAF Infrastructure Security: Your minimum security baseline
Steven Laino
Security Architect
Professional Services
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
CAF Infrastructure Security
• Overview of Shared Responsibility Model
– Infrastructure Services
– Container Services
– Abstracted Services
• Overview of Cloud Adoption Framework
– Security Perspective
• Infrastructure Security
– Tools
– Techniques
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
All customers benefit from the same security
Certified by independent experts
• SOC 1 (SSAE 16 & ISAE 3402) Type II
• SOC 2 Type II and public SOC 3 report
• ISO 27001
• ISO 9001
• PCI DSS Level 1 - Service Provider
• ISO 27017 (security of the cloud)
• ISO 27018 (personal data)
Compute Storage Database Network
AWS Global
Infrastructure Regions
Availability Zones CloudFront
edge
locations
AWS Foundation Services
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure Regions
Availability	Zones
Edge	Locations
Optional	– Opaque	data:	1’s	and	0’s	(in	transit/at	rest)
Platform	&	Applications	Management
Customer	content
Customers
Infrastructure Services
Such as Amazon EC2, Amazon EBS, and Amazon VPC
Managed	by
Managed	by
Client-Side	Data	encryption	
&	Data	Integrity	
Authentication
Network	Traffic	Protection
Encryption	/	Integrity	/	Identity
AWS	IAMCustomer	IAM
Operating	System,	Network	&	Firewall	Configuration
Server-Side	Encryption
Fire	System	and/or	Data
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure Regions
Availability	Zones
Edge	Locations
Optional	– Opaque	data:	1’s	and	0’s	(in	transit/at	rest)
Firewall	
Configuration
Platform	&	Applications	Management
Operating	System,	Network	Configuration
Customer	content
Customers
Container Services
Such as Amazon RDS and Amazon EMR
Managed	by
Managed	by
Client-Side	Data	encryption	
&	Data	Integrity	Authentication
Network	Traffic	Protection
Encryption	/	Integrity	/	Identity
AWS	IAMCustomer	IAM
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure Regions
Availability	Zones
Edge	Locations
Platform	&	Applications	Management
Operating	System,	Network	&	Firewall	Configuration
Customer	content
Customers
Abstracted Services
Such as Amazon S3 and Amazon DynamoDB Managed	by
Managed	by
Optional	– Opaque	Data:	1’s	and	
0’s	
(in	flight	/	at	rest)
Data	Protection	by	the	Platform
Protection	of	Data	at	Rest
Network	Traffic	Protection	by	the	Platform
Protection	of	Data	at	in	Transit
Client-Side	Data	Encryption	
&	Data	Integrity	Authentication
AWS	IAM
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Overview of Cloud Adoption Framework
• Guidance for organizations adopting the cloud
– Helps coordinate different aspects of adoption
– Helps understand the how the organization will change
• 6 Perspectives
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
• Common Roles:
– CISO
– IT Security Managers
– IT Security Analysts
• 5 Core Epics
CAF Security Perspective
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Security in the cloud is familiar.
“Security	in	the	cloud	is	familiar.	The	
increase	in	agility	and	the	ability	to	
perform	actions	faster,	at	a	larger	
scale	and	at	a	lower	cost,	does	not	
invalidate	well-established	principles	
of	information	security.”
- Security	Perspective	of	the	AWS	
Cloud	Adoption	Framework	
Whitepaper
Security	Perspective
Directive
Preventative Detective
Responsive
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Infrastructure Security
• Preventative
• Virtual Private Cloud (VPC)
• Subnets
• Security Groups
• Network Access Control Lists (ACLs)
• Egress filtering
• CloudFront / Route53
• AWS Shield
• Detective/Responsive
• Config & Config Rules
• Cloudtrail & Cloudwatch
• VPC flow logs
• Inspector
• EC2 Systems Manager (SSM)
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
VPC	Public	Subnet	10.10.1.0/24 VPC	Public	Subnet	10.10.2.0/24
VPC	CIDR		10.10.0.0/16
VPC	Private	Subnet	10.10.3.0/24 VPC	Private	Subnet	10.10.4.0/24
VPC	Private	Subnet	10.10.5.0/24 VPC	Private	Subnet	10.10.6.0/24
AZ A AZ B
Public	ELB
Internal	ELB
RDS
Master
Autoscaling
Web	Tier
Autoscaling
Application	Tier
Internet
Gateway
RDS
Standby
Snapshots
Multi-AZ	RDS
Data	Tier
Existing
Datacenter
Virtual
Private
Gateway
Customer
Gateway
VPN	Connection
Direct	Connect
Network
Partner
Location
Administrators	&
Corporate	Users
Virtual	Private	Cloud
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Security Groups
security group
HTTP	GET
TCP(6)	Port(80)
NTP Buffer	Overrun
UDP(17)	Port(123)
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Network ACLs
VPC (BuildABeer-VPC-1)
security group (BuildABeer-SG-1)
HTTP	GET
TCP(6)	Port(80)
HTTP	GET
TCP(6)	Port(80)
srcIP=216.246.16.228
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Layers of Access Control
users
Applicatio
nservers
Private subnet
security
group
Public subnet
ELB IPS/IDS
Private subnet
ELB
security group
WAF
Private subnet
ELB
security group security group
ELB
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Considerations for controlling egress traffic from VPCs
• In addition to Security groups & Network ACLs…
• Routing rules
• VPC endpoints
• NAT gateways
• Host / network based third party tools
Egress Filtering
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
CloudFront
VPC (BuildABeer-VPC-1)
Amazon
Route 53
CloudFront
users
security group (BuildABeer-SG-1)
Public subnet
servers
Private subnet
ELB
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Hide ‘n Go Seek
• ~>nslookup www.buildabeer.com
• Server: 10.43.23.72
• Address: 10.43.23.72#53
• Non-authoritative answer:
• www.buildabeer.us canonical name = d3u9qbug2y23to.cloudfront.net.
• Name: d3u9qbug2y23to.cloudfront.net
• Address: 52.84.20.173
• <snip>
• Name: d3u9qbug2y23to.cloudfront.net
• Address: 52.84.20.85
• ~>nslookup ftp.buildabeer.com
• Server: 10.43.23.72
• Address: 10.43.23.72#53
• Non-authoritative answer:
• ftp.buildabeer canonical name = bab-elb-1-916251722.us-west-2.elb.amazonaws.com.
• Name: bab-elb-1-916251722.us-west-2.elb.amazonaws.com
• Address: 54.148.117.41
• <snip>
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Separation of services
Amazon
Route 53
CloudFront
security group
Public subnet
servers
Private subnet
ELB
www.foo.commail.foo.com
security group
Public subnet
Mail servers
Private subnet
ELB
security group
Public subnet
Web servers
Private subnet
ELB
mail.foo.com
www.foo.com
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Shield DDoS protections
ü Integrated into AWS infrastructure
ü Protection against most common
infrastructure attacks
ü SYN/ACK Floods, UDP Floods,
Refection attacks, etc.
ü No additional cost
DDoS	mitigation
systems
DDoS	Attack
Users
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	CloudTrail	&	CloudWatch
AWS
CloudTrail
Amazon	
CloudWatch
ü Enable	globally	for	all	AWS	Regions
ü Encryption	&	Integrity	Validation
ü Archive	&	Forward
ü Amazon	CloudWatch	Logs
ü Metrics	&	Filters
ü Alarms	&	Notifications
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS	Config &	Config Rules
AWS
Config
Amazon	Config
Rules
ü Record	configuration	changes	
continuously
ü Time-series	view	of	resource	changes
ü Archive	&	Compare
ü Enforce	best	practices
ü Automatically	roll-back	unwanted	
changes
ü Trigger	additional	workflow
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
VPC Flow Logs
• Agentless
• Enable	per	ENI,	per	subnet,	or	per	VPC
• Logged	to	AWS	CloudWatch	Logs
• Create	CloudWatch	metrics	from	log	data
• Alarm	on	those	metrics
AWS
account
Source	IP
Destination	IP
Source	port
Destination	port
Interface Protocol Packets
Bytes Start/end	time
Accept	or	
reject
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Vulnerability Management
• What to scan
– Scanning the AMI as part of the build
– Live scans
• AWS Inspector
• Use in concert with SSM for automated patching
• Create a secure image baseline
– Translate/improve current ”golden” image
• Partners – Qualys, Tenable, Rapid 7
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Amazon EC2 Systems Manager
• A set of capabilities that...
• ...enable automated configuration...
• ...and ongoing management of systems at scale...
• ...across all of your Windows and Linux workloads...
• ...running in Amazon EC2 or on-premises…
• ...at no charge; only pay for AWS resources you manage
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Amazon EC2 Systems Manager – Components
Run Command State Manager Inventory Maintenance
Window
Patch Manager Automation Parameter Store
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Remotely and securely manage servers or virtual machines at
scale running in your data center or in AWS
§ Automate common administrative tasks
§ Execute commands across multiple instances simultaneously
§ Support for AWS and on-premises infrastructure
§ Granular permissions to control access through AWS Identity &
Access Management
§ Logging using AWS CloudTrail
Run Command: Overview
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Provides visibility into the software catalogue and configuration
for your Amazon EC2 instances and on-premises servers
§ Gather detail on a variety of attributes, such as:
– Installed applications & OS details
– AWS components and agents
– Network configuration
§ Inventory attributes are stored in AWS Config for auditing
§ Assess compliance of configurations using AWS Config Rules
Inventory: Overview
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Discover and Audit your
Software
§ Collect detailed information on the
software in your instances
§ Measure usage of licensed
software across your fleet
Inventory: Use Cases
Security & Incident Analysis
§ Historical record of inventory
changes over time
§ proactive notification if your
configurations become non-compliant
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Provides secure storage for configuration data & secrets
• Store configuration data and secure strings in hierarchies and track
versions.
• Control and audit access at granular levels.
• Reference parameters across AWS services such as Amazon EC2,
Amazon EC2 Container Service, AWS Lambda, AWS
CloudFormation
Parameter Store: Overview
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
§ Control access to sensitive
information
§ Remove sensitive data from
scripts
§ Store DB passwords securely
Parameter Store: Use Cases
Instances
Containers
Lambda	Functions
Servers
AWS	KMS
IAM
Identity	Federation
Roles
Policies
Secrets	Consumer
Parameter	Store
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Define and maintain consistent configuration of operating
systems and applications running in your data center or in AWS
§ Control configuration details such as anti-virus settings, iptables, etc.
§ Define your own schedules for deployment reviews
§ Compare actual deployments against specified configuration policy
§ State Manager reapplies policies if state drift is detected
§ Query State Manager to view status of deployments
State Manager: Overview
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Maintain a Consistent
Configuration
§ Specify and automatically
maintain the desired configuration
§ Automatically apply configuration
changes, settings or patches
State Manager: Use Cases
Reduce Configuration Drift
§ Periodically reapply policies to your
instances
§ Query the status of your
configurations at any time
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Automated tool that helps you simplify your Windows operating
system patching process
§ Select the patches you want to deploy
§ Control timing for patch roll-outs and instance reboots
§ Define auto-approval rules for patches
§ Ability to black-list or white-list specific patches
§ Schedule the automatic roll out through maintenance windows
Patch Manager: Overview
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Manage Patch Baselines
§ Define patch baselines by
products, categories & severities
§ Define approval and distribution
schedule for specific baselines
Patch Manager: Use Cases
Manage Patch Compliance
§ Scan existing fleet to determine
patch levels of the software
§ Identify patches currently installed,
missing, recently applied, etc.
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Summary
• Ingress filtering capability: use VPC design in combination with security groups and NACLs to establish
boundaries
• Egress filtering capability: use Security Groups, NACLs, NAT gateways, route tables and VPC endpoints
• Detection and response capabilities use: Config, Cloudtrail, Cloudwatch & VPC flow logs in combination with
Inspector & SSM
• DDoS mitigation capability use: Cloudfront (Shield) & Route 53 to mitigate layer 3 and 4 attacks
• Vulnerability & Patch management capability: use Inspector and SSM
• Use SSM for:
– Configuration and patch compliance
– Secure privileged access to instances
– Automated patch management
– Software inventory & licensing compliance
– Secrets vaulting
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Thank You!
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Further Reading
• https://aws.amazon.com/blogs/devops/how-to-create-an-ami-builder-with-aws-codebuild-and-
hashicorp-packer/
• https://d0.awsstatic.com/aws-answers/AWS_Securing_EC2_Instances.pdf
• https://aws.amazon.com/ec2/systems-manager/
• https://aws.amazon.com/professional-services/CAF/
©	2017,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

Weitere ähnliche Inhalte

Was ist angesagt?

Was ist angesagt? (20)

Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
AWS Control Tower를 통한 클라우드 보안 및 거버넌스 설계 - 김학민 :: AWS 클라우드 마이그레이션 온라인
AWS Control Tower를 통한 클라우드 보안 및 거버넌스 설계 - 김학민 :: AWS 클라우드 마이그레이션 온라인AWS Control Tower를 통한 클라우드 보안 및 거버넌스 설계 - 김학민 :: AWS 클라우드 마이그레이션 온라인
AWS Control Tower를 통한 클라우드 보안 및 거버넌스 설계 - 김학민 :: AWS 클라우드 마이그레이션 온라인
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Advanced cost management strategies in AWS
Advanced cost management strategies in AWSAdvanced cost management strategies in AWS
Advanced cost management strategies in AWS
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
AWS Storage and Content Delivery Services
AWS Storage and Content Delivery ServicesAWS Storage and Content Delivery Services
AWS Storage and Content Delivery Services
 
Cloudwatch: Monitoring your AWS services with Metrics and Alarms
Cloudwatch: Monitoring your AWS services with Metrics and AlarmsCloudwatch: Monitoring your AWS services with Metrics and Alarms
Cloudwatch: Monitoring your AWS services with Metrics and Alarms
 
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
AWS IAM Tutorial | Identity And Access Management (IAM) | AWS Training Videos...
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Deep dive into AWS IAM
Deep dive into AWS IAMDeep dive into AWS IAM
Deep dive into AWS IAM
 
Introduction to AWS KMS
Introduction to AWS KMSIntroduction to AWS KMS
Introduction to AWS KMS
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Deploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control TowerDeploy and Govern at Scale with AWS Control Tower
Deploy and Govern at Scale with AWS Control Tower
 
ABCs of AWS: S3
ABCs of AWS: S3ABCs of AWS: S3
ABCs of AWS: S3
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 
Cloudwatch: Monitoring your Services with Metrics and Alarms
Cloudwatch: Monitoring your Services with Metrics and AlarmsCloudwatch: Monitoring your Services with Metrics and Alarms
Cloudwatch: Monitoring your Services with Metrics and Alarms
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Advanced Security Best Practices Masterclass
Advanced Security Best Practices MasterclassAdvanced Security Best Practices Masterclass
Advanced Security Best Practices Masterclass
 

Andere mochten auch

Andere mochten auch (20)

PASS 17 SQL Server on AWS Best Practices
PASS 17 SQL Server on AWS Best PracticesPASS 17 SQL Server on AWS Best Practices
PASS 17 SQL Server on AWS Best Practices
 
PASS 17: RDS SQL Server on Amazon Web Services Overview
PASS 17: RDS SQL Server on Amazon Web Services OverviewPASS 17: RDS SQL Server on Amazon Web Services Overview
PASS 17: RDS SQL Server on Amazon Web Services Overview
 
Managing Container Images with Amazon ECR - AWS Online Tech Talks
Managing Container Images with Amazon ECR - AWS Online Tech TalksManaging Container Images with Amazon ECR - AWS Online Tech Talks
Managing Container Images with Amazon ECR - AWS Online Tech Talks
 
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
Cloud Native, Cloud First and Hybrid: How Different Organizations are Approac...
 
Internet of Things (IoT) with Intel
Internet of Things (IoT) with IntelInternet of Things (IoT) with Intel
Internet of Things (IoT) with Intel
 
AWS 機器學習 II ─ 深度學習 Deep Learning & MXNet
AWS 機器學習 II ─ 深度學習 Deep Learning & MXNetAWS 機器學習 II ─ 深度學習 Deep Learning & MXNet
AWS 機器學習 II ─ 深度學習 Deep Learning & MXNet
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017
 
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
Big Data Experience Sharing: Building Collaborative Data Analytics Platform -...
 
Build Cloud-Connected Apps in React Native for iOS & Android.pdf
Build Cloud-Connected Apps in React Native for iOS & Android.pdfBuild Cloud-Connected Apps in React Native for iOS & Android.pdf
Build Cloud-Connected Apps in React Native for iOS & Android.pdf
 
Turn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWSTurn Big Data into Big Value on Informatica and AWS
Turn Big Data into Big Value on Informatica and AWS
 
運用大數據掌握您的客戶
運用大數據掌握您的客戶運用大數據掌握您的客戶
運用大數據掌握您的客戶
 
Set it and Forget it: Auto Scaling Target Tracking Policies - AWS Online Tech...
Set it and Forget it: Auto Scaling Target Tracking Policies - AWS Online Tech...Set it and Forget it: Auto Scaling Target Tracking Policies - AWS Online Tech...
Set it and Forget it: Auto Scaling Target Tracking Policies - AWS Online Tech...
 
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWS
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWSVoice of the Customer: Zocdoc and Elevating Security While Moving to AWS
Voice of the Customer: Zocdoc and Elevating Security While Moving to AWS
 
Become a Cloud Security Ninja
Become a Cloud Security NinjaBecome a Cloud Security Ninja
Become a Cloud Security Ninja
 
Building Chatbots with Amazon Lex
Building Chatbots with Amazon LexBuilding Chatbots with Amazon Lex
Building Chatbots with Amazon Lex
 
Opportunities derived by AI
Opportunities derived by AIOpportunities derived by AI
Opportunities derived by AI
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
Analytics on AWS with Amazon Redshift, Amazon QuickSight, and Amazon Machine ...
 
Influencing the C-Suite to Champion Your Journey to the Cloud
Influencing the C-Suite to Champion Your Journey to the CloudInfluencing the C-Suite to Champion Your Journey to the Cloud
Influencing the C-Suite to Champion Your Journey to the Cloud
 
Digital Transformation - Transformation Day Public Sector London 2017
Digital Transformation - Transformation Day Public Sector London 2017Digital Transformation - Transformation Day Public Sector London 2017
Digital Transformation - Transformation Day Public Sector London 2017
 

Ähnlich wie Infrastructure Security: Your Minimum Security Baseline

Ähnlich wie Infrastructure Security: Your Minimum Security Baseline (20)

Infrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security BaselineInfrastructure Security: Your Minimum Security Baseline
Infrastructure Security: Your Minimum Security Baseline
 
Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017 Security at Scale with AWS - AWS Summit Cape Town 2017
Security at Scale with AWS - AWS Summit Cape Town 2017
 
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
Verizon: Modernizing Enterprise Infrastructure with AWS - WIN307 - re:Invent ...
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
NET309_Best Practices for Securing an Amazon Virtual Private Cloud
NET309_Best Practices for Securing an Amazon Virtual Private CloudNET309_Best Practices for Securing an Amazon Virtual Private Cloud
NET309_Best Practices for Securing an Amazon Virtual Private Cloud
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
 
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security AnalyticsNET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
NET203_Using Amazon VPC Flow Logs to Do Predictive Security Analytics
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Intro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWSIntro to Threat Detection and Remediation on AWS
Intro to Threat Detection and Remediation on AWS
 
Intro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on awsIntro to threat_detection_and_remediation on aws
Intro to threat_detection_and_remediation on aws
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
Deep Dive - Hybrid Architectures
Deep Dive - Hybrid ArchitecturesDeep Dive - Hybrid Architectures
Deep Dive - Hybrid Architectures
 
Amazon ECS Deep Dive
Amazon ECS Deep DiveAmazon ECS Deep Dive
Amazon ECS Deep Dive
 
Amazon Amazon Elastic Container Service (Amazon ECS)
Amazon Amazon Elastic Container Service (Amazon ECS)Amazon Amazon Elastic Container Service (Amazon ECS)
Amazon Amazon Elastic Container Service (Amazon ECS)
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
Building a Secured Network environment on AWS
Building a Secured Network environment on AWSBuilding a Secured Network environment on AWS
Building a Secured Network environment on AWS
 
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
PrivateLink for Partners: Connectivity, Scale, Security (GPSTEC306) - AWS re:...
 

Mehr von Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Infrastructure Security: Your Minimum Security Baseline