SlideShare ist ein Scribd-Unternehmen logo
1 von 28
© 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Michael Stringer – AWS Solutions Architect
Cloud Security fundamentals and
PROTECTED workloads on AWS
3rd July 2019
“Innovation and cloud help
form the basis on which we will
make the Australian
government more secure.
Innovation is good. Cloud is
good – because it helps us
move off from legacy
systems. Our biggest risk is
indeed legacy systems.”
Voice of our customers
Agenda
AWS Security
PROTECTED on AWS
Shared Responsibility Model
Consumer Guide
Reference Architecture
Why is security traditionally so hard?
Lack of
visibility
Low degree
of automation
ORMove fast Stay secure
Before…
ORANDMove fast Stay secure
Now…
The most sensitive workloads run on AWS
“With AWS, DNAnexus enables enterprises worldwide to perform
genomic analysis and clinical studies in a secure and compliant
environment at a scale not previously possible.”
— Richard Daly, CEO DNAnexus
“The fact that we can rely on the AWS security posture to
boost our own security is really important for our business.
AWS does a much better job at security than we could ever
do running a cage in a data center.”
— Richard Crowley, Director of Operations, Slack
“We determined that security in AWS is superior to our on-premises
data center across several dimensions, including patching,
encryption, auditing and logging, entitlements, and compliance.”
—John Brady, CISO, FINRA (Financial Industry Regulatory Authority)
“CIOs and CISOs need to stop obsessing over
unsubstantiated cloud security worries, and instead
apply their imagination and energy to developing new
approaches to cloud control, allowing them to securely,
compliantly, and reliably leverage the benefits of this
increasingly ubiquitous computing model.”
Source: Clouds Are Secure: Are You Using Them Securely?
Automate
with deeply
integrated
security services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior visibility
and control
Move to AWS
Strengthen your security posture
Inherit global security and compliance control
Quick acronym glossary
ACSC Australian Cyber Security Centre
https://www.acsc.gov.au/
ASD Australian Signals Directorate
https://asd.gov.au/
ISM Australian Government Information Security Manual
IRAP Information Security Registered Assessors Program
AWS services assessed at PROTECTED
42 services across a broad range of categories
Standard services, standard pricing
Leverage familiar and established AWS Sydney region
Access to 3 availability zones
Consumer guide and reference architecture immediately
available
PROTECTED Classification
www.protectivesecurity.gov.au
Sensitive
information
Security classified information
UNOFFICIAL OFFICIAL
OFFICIAL:
Sensitive
PROTECTED SECRET TOP SECRET
Compromise
of information
confidentiality
would be
expected to
cause →
No business
impact
1 Low business
impact
2 Low to
medium
business
impact
3 High
business
impact
4 Extreme
business
impact
5 Catastrophic
business
impact
Not applicable.
This
information
does not form
part of official
duty.
Not applicable.
This is the
majority of
routine
information
created or
processed by
the public
sector.
Limited
damage to an
individual,
organisation or
government
generally if
compromised.
Damage to the
national
interest,
organisations
or individuals.
Serious
damage to the
national
interest,
organisations
or individuals.
Exceptionally
grave damage
to the national
interest,
organisations
or individuals.
AWS Availability Zones
AWS Region
Availability Zone
Physical Sites
Availability Zone
Physical Sites
Availability Zone
Physical Sites
ap-southeast-2a ap-southeast-2b
ap-southeast-2c
Sydney Region
ap-southeast-2
The process AWS took with the ACSC
Documentation
Review
(Phase 1)
Assess the
System
(Phase 2)
ACSC
Deep Dive
(Certification)
&
No shortcuts to PROTECTED
PROTECTED services in scope
Analytics
Amazon EMR
Amazon Kinesis Data
Firehose
Amazon Kinesis Data
Streams
Amazon WorkSpaces
Desktop
Amazon WorkDocs
Amazon API
Gateway
Mobile
Storage
S3
Amazon S3 Glacier
Amazon EBS
Amazon
DynamoDB
Databases
Amazon
ElastiCache
Amazon Redshift
Amazon RDS
Management
Amazon CloudWatch
AWS CloudFormation
AWS CloudTrail
AWS Config
AWS Systems
Manager
Compute
Amazon EC2
Amazon ECS
ELB
AWS Lambda
Networking & Content
Delivery
Amazon CloudFront
Amazon VPC
AWS Direct Connect
Security
Application Integration
AWS Step Functions
Amazon Simple
Notification Service
Amazon Simple
Queue Service
Amazon Simple
Workflow Service
Amazon Cognito
Amazon
GuardDuty
Amazon
Inspector
AWS CloudHSM
AWS
Directory Service
IAM
AWS KMS
https://aws.amazon.com/compliance/services-in-scope/
What’s the difference?
Is there a checkbox? How do I order PROTECTED services?
… there is no difference!
Additional Unclassified DLM services
All Protected services can be
used at Unclassified DLM
Unclassified DLM services
can be leveraged in
Protected solutions.
Trusted Advisor
Amazon Route 53
AWS Organisations
AWS Shield
AWS shared responsibility model
Security IN
the Cloud
Managed by
customers
Security OF
the Cloud
Managed by
AWS
Security IN
the Cloud
Managed by
customers
Security OF
the Cloud
Managed by
AWS
AWS Shared Responsibility Model
Security IN
the Cloud
Managed by
customers
Security OF
the Cloud
Managed by
AWS
AWS Shared Responsibility Model
5 Pages
13 Pages
67 Pages
57 Pages
Consumer Guide
ACSC developed guidance specifies the required mitigations and additional
security controls for using AWS in PROTECTED systems.
Available now on AWS Artifact.
May need to adapt for your design and business requirements. Talk to ACSC
and AWS.
Services that are certified UNCLASSIFIED DLM are not excluded from use in
PROTECTED systems, but must not contain or process PROTECTED
information themselves.
Consumer Guide
• Data in transit
• Data at rest protection
• Data Sovereignty
• Incident response
• Logging, Monitoring, Audit
• Segmentation and Segregation
• Service Hardening
• Other guidance
Reference Architecture
AWS Identity & Access
Management (IAM)
- Min priv. + MFA
AWS Organizations
- SCP’s
AWS Directory Service
- Federated ID
AWS CloudTrail
- All accounts and regions
AWS Config
Amazon
CloudWatch, CloudWatch
Logs, CloudWatch Events
Amazon GuardDuty
- All account and regions
VPC Flow Logs
ACSC Logging solution
Amazon EC2
Systems Manager
- Patching, automation,
session, parameters
AWS Shield
AWS Web Application
Firewall (WAF)
Amazon Inspector
Amazon Virtual Private
Cloud (VPC)
AWS CloudFormation
AWS Key Management
Service (KMS)
- Recommended on all
supported services
Server Side Encryption
Encryption in transit
- VPN and Application
AWS Config Rules
- e.g. KMS enforcement;
continuous compliance
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
Reference Architecture – CAF alignment
Resources
AWS and Essential 8 https://aws.amazon.com/blogs/publicsector/aws-and-the-
australian-signals-directorate-essential-eight/
AWS and ASD Cloud Security for Tenants
https://d1.awsstatic.com/whitepapers/compliance/Understanding_the_ASDs_Cl
oud_Computing_Security_for_Tenants_in_the_Context_of_AWS.pdf
Services in Scope https://aws.amazon.com/compliance/services-in-scope/
AWS Compliance IRAP page: https://aws.amazon.com/compliance/irap/
AWS Security and Compliance pages:
https://aws.amazon.com/security/
https://aws.amazon.com/compliance/
Summary
ACSC awarded PROTECTED certification to AWS.
Now listed on CCSL at PROTECTED and UNCLASSIFIED
DLM levels.
Broad range of 42 services now in scope at PROTECTED.
All available at standard public pricing.
Leverage established AWS Sydney region with 3
Availability zones.
Reference Architecture and ACSC Consumer guidance
immediately available.

Weitere ähnliche Inhalte

Was ist angesagt?

Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questionsShivamSharma909
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSMigrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSGerry Miller
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeAlert Logic
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)ijceronline
 
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert LogicIntroduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert LogicAlert Logic
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudAmazon Web Services
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAmazon Web Services
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...Amazon Web Services
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAmazon Web Services
 
K8s monitoring with prometheus
K8s monitoring with prometheusK8s monitoring with prometheus
K8s monitoring with prometheusKasun Rajapakse
 
AWS Webcast - AWS Compliance Forum Introduction Oct 2013
AWS Webcast - AWS Compliance Forum Introduction Oct 2013AWS Webcast - AWS Compliance Forum Introduction Oct 2013
AWS Webcast - AWS Compliance Forum Introduction Oct 2013Amazon Web Services
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markryAmazon Web Services LATAM
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSKarim Hopper
 
Aws certified-security
Aws certified-securityAws certified-security
Aws certified-securitykartikaryan4
 

Was ist angesagt? (20)

Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWSMigrating Your HIPAA Compliant Healthcare Analytics to AWS
Migrating Your HIPAA Compliant Healthcare Analytics to AWS
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
 
International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)International Journal of Computational Engineering Research(IJCER)
International Journal of Computational Engineering Research(IJCER)
 
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert LogicIntroduction to Security in the Cloud - Mark Brooks, Alert Logic
Introduction to Security in the Cloud - Mark Brooks, Alert Logic
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
 
Cloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack OverviewCloud Security Alliance's GRC Stack Overview
Cloud Security Alliance's GRC Stack Overview
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
K8s monitoring with prometheus
K8s monitoring with prometheusK8s monitoring with prometheus
K8s monitoring with prometheus
 
AWS Webcast - AWS Compliance Forum Introduction Oct 2013
AWS Webcast - AWS Compliance Forum Introduction Oct 2013AWS Webcast - AWS Compliance Forum Introduction Oct 2013
AWS Webcast - AWS Compliance Forum Introduction Oct 2013
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
Aws certified-security
Aws certified-securityAws certified-security
Aws certified-security
 

Ähnlich wie Protected Workloads Security Shakedown

Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
 
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS SecurityAWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS SecurityAmazon Web Services
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignAmazon Web Services
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Cynthia Hsieh
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...Marcela Cárdenas Hidalgo
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
All About AWS Security Course
All About AWS Security CourseAll About AWS Security Course
All About AWS Security Courseinfosec train
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAmazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 

Ähnlich wie Protected Workloads Security Shakedown (20)

Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS SecurityAWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
AWS Paris Summit 2014 - Keynote Stephen Schmidt - AWS Security
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020Get ahead of cloud network security trends and practices in 2020
Get ahead of cloud network security trends and practices in 2020
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...Oas   un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
Oas un llamado a la accion para proteger a ciudadanos-Sector Privado y Gobi...
 
Oas un llamado a la accion
Oas   un llamado a la accionOas   un llamado a la accion
Oas un llamado a la accion
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
All About AWS Security Course
All About AWS Security CourseAll About AWS Security Course
All About AWS Security Course
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

Mehr von Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mehr von Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Protected Workloads Security Shakedown

  • 1. © 2019, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Michael Stringer – AWS Solutions Architect Cloud Security fundamentals and PROTECTED workloads on AWS 3rd July 2019
  • 2. “Innovation and cloud help form the basis on which we will make the Australian government more secure. Innovation is good. Cloud is good – because it helps us move off from legacy systems. Our biggest risk is indeed legacy systems.” Voice of our customers
  • 3. Agenda AWS Security PROTECTED on AWS Shared Responsibility Model Consumer Guide Reference Architecture
  • 4. Why is security traditionally so hard? Lack of visibility Low degree of automation
  • 5. ORMove fast Stay secure Before…
  • 6. ORANDMove fast Stay secure Now…
  • 7. The most sensitive workloads run on AWS “With AWS, DNAnexus enables enterprises worldwide to perform genomic analysis and clinical studies in a secure and compliant environment at a scale not previously possible.” — Richard Daly, CEO DNAnexus “The fact that we can rely on the AWS security posture to boost our own security is really important for our business. AWS does a much better job at security than we could ever do running a cage in a data center.” — Richard Crowley, Director of Operations, Slack “We determined that security in AWS is superior to our on-premises data center across several dimensions, including patching, encryption, auditing and logging, entitlements, and compliance.” —John Brady, CISO, FINRA (Financial Industry Regulatory Authority)
  • 8. “CIOs and CISOs need to stop obsessing over unsubstantiated cloud security worries, and instead apply their imagination and energy to developing new approaches to cloud control, allowing them to securely, compliantly, and reliably leverage the benefits of this increasingly ubiquitous computing model.” Source: Clouds Are Secure: Are You Using Them Securely?
  • 9. Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control Move to AWS Strengthen your security posture
  • 10. Inherit global security and compliance control
  • 11. Quick acronym glossary ACSC Australian Cyber Security Centre https://www.acsc.gov.au/ ASD Australian Signals Directorate https://asd.gov.au/ ISM Australian Government Information Security Manual IRAP Information Security Registered Assessors Program
  • 12. AWS services assessed at PROTECTED 42 services across a broad range of categories Standard services, standard pricing Leverage familiar and established AWS Sydney region Access to 3 availability zones Consumer guide and reference architecture immediately available
  • 13. PROTECTED Classification www.protectivesecurity.gov.au Sensitive information Security classified information UNOFFICIAL OFFICIAL OFFICIAL: Sensitive PROTECTED SECRET TOP SECRET Compromise of information confidentiality would be expected to cause → No business impact 1 Low business impact 2 Low to medium business impact 3 High business impact 4 Extreme business impact 5 Catastrophic business impact Not applicable. This information does not form part of official duty. Not applicable. This is the majority of routine information created or processed by the public sector. Limited damage to an individual, organisation or government generally if compromised. Damage to the national interest, organisations or individuals. Serious damage to the national interest, organisations or individuals. Exceptionally grave damage to the national interest, organisations or individuals.
  • 14. AWS Availability Zones AWS Region Availability Zone Physical Sites Availability Zone Physical Sites Availability Zone Physical Sites ap-southeast-2a ap-southeast-2b ap-southeast-2c Sydney Region ap-southeast-2
  • 15. The process AWS took with the ACSC Documentation Review (Phase 1) Assess the System (Phase 2) ACSC Deep Dive (Certification) & No shortcuts to PROTECTED
  • 16. PROTECTED services in scope Analytics Amazon EMR Amazon Kinesis Data Firehose Amazon Kinesis Data Streams Amazon WorkSpaces Desktop Amazon WorkDocs Amazon API Gateway Mobile Storage S3 Amazon S3 Glacier Amazon EBS Amazon DynamoDB Databases Amazon ElastiCache Amazon Redshift Amazon RDS Management Amazon CloudWatch AWS CloudFormation AWS CloudTrail AWS Config AWS Systems Manager Compute Amazon EC2 Amazon ECS ELB AWS Lambda Networking & Content Delivery Amazon CloudFront Amazon VPC AWS Direct Connect Security Application Integration AWS Step Functions Amazon Simple Notification Service Amazon Simple Queue Service Amazon Simple Workflow Service Amazon Cognito Amazon GuardDuty Amazon Inspector AWS CloudHSM AWS Directory Service IAM AWS KMS https://aws.amazon.com/compliance/services-in-scope/
  • 17. What’s the difference? Is there a checkbox? How do I order PROTECTED services? … there is no difference!
  • 18. Additional Unclassified DLM services All Protected services can be used at Unclassified DLM Unclassified DLM services can be leveraged in Protected solutions. Trusted Advisor Amazon Route 53 AWS Organisations AWS Shield
  • 19. AWS shared responsibility model Security IN the Cloud Managed by customers Security OF the Cloud Managed by AWS
  • 20. Security IN the Cloud Managed by customers Security OF the Cloud Managed by AWS AWS Shared Responsibility Model
  • 21. Security IN the Cloud Managed by customers Security OF the Cloud Managed by AWS AWS Shared Responsibility Model 5 Pages 13 Pages 67 Pages 57 Pages
  • 22. Consumer Guide ACSC developed guidance specifies the required mitigations and additional security controls for using AWS in PROTECTED systems. Available now on AWS Artifact. May need to adapt for your design and business requirements. Talk to ACSC and AWS. Services that are certified UNCLASSIFIED DLM are not excluded from use in PROTECTED systems, but must not contain or process PROTECTED information themselves.
  • 23. Consumer Guide • Data in transit • Data at rest protection • Data Sovereignty • Incident response • Logging, Monitoring, Audit • Segmentation and Segregation • Service Hardening • Other guidance
  • 25.
  • 26. AWS Identity & Access Management (IAM) - Min priv. + MFA AWS Organizations - SCP’s AWS Directory Service - Federated ID AWS CloudTrail - All accounts and regions AWS Config Amazon CloudWatch, CloudWatch Logs, CloudWatch Events Amazon GuardDuty - All account and regions VPC Flow Logs ACSC Logging solution Amazon EC2 Systems Manager - Patching, automation, session, parameters AWS Shield AWS Web Application Firewall (WAF) Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS CloudFormation AWS Key Management Service (KMS) - Recommended on all supported services Server Side Encryption Encryption in transit - VPN and Application AWS Config Rules - e.g. KMS enforcement; continuous compliance AWS Lambda Identity Detective control Infrastructure security Incident response Data protection Reference Architecture – CAF alignment
  • 27. Resources AWS and Essential 8 https://aws.amazon.com/blogs/publicsector/aws-and-the- australian-signals-directorate-essential-eight/ AWS and ASD Cloud Security for Tenants https://d1.awsstatic.com/whitepapers/compliance/Understanding_the_ASDs_Cl oud_Computing_Security_for_Tenants_in_the_Context_of_AWS.pdf Services in Scope https://aws.amazon.com/compliance/services-in-scope/ AWS Compliance IRAP page: https://aws.amazon.com/compliance/irap/ AWS Security and Compliance pages: https://aws.amazon.com/security/ https://aws.amazon.com/compliance/
  • 28. Summary ACSC awarded PROTECTED certification to AWS. Now listed on CCSL at PROTECTED and UNCLASSIFIED DLM levels. Broad range of 42 services now in scope at PROTECTED. All available at standard public pricing. Leverage established AWS Sydney region with 3 Availability zones. Reference Architecture and ACSC Consumer guidance immediately available.