Weitere ähnliche Inhalte Ähnlich wie Top Cloud Security Myths - Dispelled (20) Mehr von Amazon Web Services (20) Top Cloud Security Myths - Dispelled2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Top Cloud Security Myths - Dispelled!
Durga Prasad Kakaraparthi
3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SECURITY IS
JOB ZERO
4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The three stages of cloud security curiosity
General cloud
security
Specific service
security
Data
security
New to cloud
and / or
business teams
Experienced in cloud
and / or
technology teams
Advanced in cloud
and / or
risk teams
6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 01
“The public cloud is not as secure as
my on-premises infrastructure and not
as secure as my private cloud.”
7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
01: AWS security of the cloud and in the cloud
Visible AutomatedPhysical
AWS’s global infrastructure is built to meet the requirements of the
most security-sensitive organizations in the world
8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 02
“When I put my data in the cloud I lose
ownership of it, and it may move
across national borders.”
9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
02: You own and control your content
Access TraceabilityOwnership
You retain ownership and control of your content, and you choose
which region that content resides in
10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 03
“I am a highly regulated business and I
cannot use the cloud because of my
compliance requirements.”
11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
03: AWS global compliance program
Countries Enterprise
agreement
Certifications
Our security assurance program meets or exceeds industry,
country-specific, and global security requirements
12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 04
“My business requires sensitive
personal data, I cannot use the cloud.”
13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
04: Using encryption on AWS
AWS KMS High
standards
Ubiquitous
AWS encryption services are integrated into dozens of our services
and meet the strictest industry requirements
14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 05
“I have a requirement for security
testing, I cannot do that in the cloud.”
15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
05: Security testing on AWS
Seek approval Or use
pre-approved
Shared
responsibility
AWS permits security testing of your resources in line with our
acceptable usage policy, and we provide tools to help you
17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 06
“All of my operating systems are
patched automatically in the cloud.”
18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
06: Patch management on AWS
How we help Our
responsibility
Your
responsibility
You are responsible for patching operating systems that you
manage. AWS is responsible for patching services that we manage
19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 07
“I cannot use the cloud to store
sensitive data because everyone will
have access to it.”
20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
07: How to secure data in Amazon Simple Storage
Service (Amazon S3)
Notify RespondProtect
Amazon S3 and our other storage services are secure by default.
Customers control who can access their data, and AWS provides
multiple tools so you can understand how access is configured
21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 08
“I hear about secret keys being stolen,
the way you grant access is not
secure.”
22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
08: How to protect AWS credentials
Amazon
GuardDuty
Multi-factor
authentication
AWS provides a number of tools to protect your identity and access
credentials and to help you detect misuse
Temporary
access
23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 09
“I cannot control the deletion of my
data and I cannot verify it has been
deleted.”
24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
09: How AWS manages data deletion
Physical ValidatedLogical
When you delete your data we take multiple steps to wipe it and
eventually destroy it. This process is validated by independent
third parties
25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 10
“Serverless services are not secure
because they are shared between
customers.”
26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
10: How AWS protects serverless services
Identity Limited
surface
When you use AWS’s serverless services you inherit the multiple
layers of strong security controls that are built into our core services
Building
blocks
28. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 11
“A malicious insider can look at my
data via your shared administrative
access.”
29. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
11: How AWS manages administrative access
Process
controls
Technology
controls
AWS strictly controls our infrequent administrative access to
services. This process has executive oversight within AWS and is
validated by independent third parties
Automation
30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 12
“It is possible to bypass your isolation
technology and access someone else’s
data.”
31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
12: How AWS secures the hypervisor
Experience
AWS has over a decade of experience securing our virtualization
technology. We provide a deep level of isolation within the cloud
Customization
& innovation
Isolation
33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security benefits of the AWS cloud
Automate
with deeply
integrated
security
services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior
visibility and
control
34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SECURITY IS
JOB ZERO
http://amzn.to/2FZdEgH
35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
“CIOs and CISOs need to stop obsessing over
unsubstantiated cloud security worries, and instead
apply their imagination and energy to developing new
approaches to cloud control, allowing them to securely,
compliantly, and reliably leverage the benefits of this
increasingly ubiquitous computing model.”
Source: “Clouds Are Secure: Are You Using Them Securely?”