SlideShare ist ein Scribd-Unternehmen logo
1 von 244
Downloaden Sie, um offline zu lesen
©2017 Lacework, Inc. Confidential and Proprietary.
.start
©2017 Lacework, Inc. Confidential and Proprietary.
Bakers Dozen to Securing AWS
©2017 Lacework, Inc. Confidential and Proprietary.
Dan Hubbard, Lacework
©2017 Lacework, Inc. Confidential and Proprietary.
@dhubbard858
©2017 Lacework, Inc. Confidential and Proprietary.
So, you are running in AWS?
©2017 Lacework, Inc. Confidential and Proprietary.
AWS has amazing advantages….
©2017 Lacework, Inc. Confidential and Proprietary.
Speed
©2017 Lacework, Inc. Confidential and Proprietary.
Velocity
©2017 Lacework, Inc. Confidential and Proprietary.
Auto-scale
©2017 Lacework, Inc. Confidential and Proprietary.
They run the infrastructure.
©2017 Lacework, Inc. Confidential and Proprietary.
And let you focus on your apps.
©2017 Lacework, Inc. Confidential and Proprietary.
That is what matters.
©2017 Lacework, Inc. Confidential and Proprietary.
But how do you secure all of this?
©2017 Lacework, Inc. Confidential and Proprietary.
Think different.
©2017 Lacework, Inc. Confidential and Proprietary.
It’s less about the castle and moat.
©2017 Lacework, Inc. Confidential and Proprietary.
And more about automation.
©2017 Lacework, Inc. Confidential and Proprietary.
scale.
©2017 Lacework, Inc. Confidential and Proprietary.
visibility.
©2017 Lacework, Inc. Confidential and Proprietary.
context.
©2017 Lacework, Inc. Confidential and Proprietary.
And most importantly….
©2017 Lacework, Inc. Confidential and Proprietary.
Shrinking your attack surface.
©2017 Lacework, Inc. Confidential and Proprietary.
Minimizing mistakes.
©2017 Lacework, Inc. Confidential and Proprietary.
And fitting security INTO your
architecture.
©2017 Lacework, Inc. Confidential and Proprietary.
NOT in FRONT of it.
©2017 Lacework, Inc. Confidential and Proprietary.
Where do we start?
©2017 Lacework, Inc. Confidential and Proprietary.
Drive towards least-privilege
systems.
©2017 Lacework, Inc. Confidential and Proprietary.
I know, you may not be there TODAY.
©2017 Lacework, Inc. Confidential and Proprietary.
You may be migrating
©2017 Lacework, Inc. Confidential and Proprietary.
Least Privilege is easier said than
done.
©2017 Lacework, Inc. Confidential and Proprietary.
But it’s a destination you want to
drive to.
©2017 Lacework, Inc. Confidential and Proprietary.
And if you have the luxury of starting
over.
©2017 Lacework, Inc. Confidential and Proprietary.
then start with least privilege.
©2017 Lacework, Inc. Confidential and Proprietary.
Start with templatized workload
configuration.
©2017 Lacework, Inc. Confidential and Proprietary.
Terraform (multi-platform)
©2017 Lacework, Inc. Confidential and Proprietary.
Cloudformation = AWS specific
©2017 Lacework, Inc. Confidential and Proprietary.
Next select your orchestration
system.
©2017 Lacework, Inc. Confidential and Proprietary.
Kubernetes
©2017 Lacework, Inc. Confidential and Proprietary.
Docker Swarm
©2017 Lacework, Inc. Confidential and Proprietary.
Mesos.
©2017 Lacework, Inc. Confidential and Proprietary.
Choose your favorite container tech.
©2017 Lacework, Inc. Confidential and Proprietary.
Likely Docker or equiv..
©2017 Lacework, Inc. Confidential and Proprietary.
And finally your favorite OS.
©2017 Lacework, Inc. Confidential and Proprietary.
CoreOS
©2017 Lacework, Inc. Confidential and Proprietary.
Redhat
©2017 Lacework, Inc. Confidential and Proprietary.
Ubuntu
©2017 Lacework, Inc. Confidential and Proprietary.
OK, now let’s think about the
security...
©2017 Lacework, Inc. Confidential and Proprietary.
Start with AWS Accounts.
©2017 Lacework, Inc. Confidential and Proprietary.
Then your services
©2017 Lacework, Inc. Confidential and Proprietary.
API’s
©2017 Lacework, Inc. Confidential and Proprietary.
Compliance
©2017 Lacework, Inc. Confidential and Proprietary.
Applications
©2017 Lacework, Inc. Confidential and Proprietary.
Users
©2017 Lacework, Inc. Confidential and Proprietary.
Secure your AWS account.1
©2017 Lacework, Inc. Confidential and Proprietary.
Design your accounts carefully !
©2017 Lacework, Inc. Confidential and Proprietary.
This is not easy to unwind and it’s
super important.
©2017 Lacework, Inc. Confidential and Proprietary.
Balance accounts and
responsibilities.
©2017 Lacework, Inc. Confidential and Proprietary.
Watch for sprawl.
©2017 Lacework, Inc. Confidential and Proprietary.
You do not want to have too many
accounts.
©2017 Lacework, Inc. Confidential and Proprietary.
If you have a reason for a LOT of
accounts.
©2017 Lacework, Inc. Confidential and Proprietary.
Justify it !
©2017 Lacework, Inc. Confidential and Proprietary.
Use AWS organizations.
©2017 Lacework, Inc. Confidential and Proprietary.
MFA critical for all console
authentication.
©2017 Lacework, Inc. Confidential and Proprietary.
Use instance roles for services.
©2017 Lacework, Inc. Confidential and Proprietary.
Roles manage ephemeral keys
internally
©2017 Lacework, Inc. Confidential and Proprietary.
CloudTrail2
©2017 Lacework, Inc. Confidential and Proprietary.
Make sure it’s on for ALL accounts.
©2017 Lacework, Inc. Confidential and Proprietary.
Log it in a place that you can query.
©2017 Lacework, Inc. Confidential and Proprietary.
CloudTrail is very noisy
©2017 Lacework, Inc. Confidential and Proprietary.
You need to understand the needles
in the data
©2017 Lacework, Inc. Confidential and Proprietary.
Context is critical
©2017 Lacework, Inc. Confidential and Proprietary.
Understand relevant change.
©2017 Lacework, Inc. Confidential and Proprietary.
Change in config’s
©2017 Lacework, Inc. Confidential and Proprietary.
Change in API usage
©2017 Lacework, Inc. Confidential and Proprietary.
Change in critical services.
©2017 Lacework, Inc. Confidential and Proprietary.
Change in user patterns.
©2017 Lacework, Inc. Confidential and Proprietary.
Attackers can delete / turn off
CloudTrail
©2017 Lacework, Inc. Confidential and Proprietary.
Segment S3 bucket with different
from monitored account
©2017 Lacework, Inc. Confidential and Proprietary.
Secure Services3
©2017 Lacework, Inc. Confidential and Proprietary.
EC2, S3, RDS, KMS...
©2017 Lacework, Inc. Confidential and Proprietary.
Set a policy and a framework for
your services
©2017 Lacework, Inc. Confidential and Proprietary.
Each service has unique attack
surface
©2017 Lacework, Inc. Confidential and Proprietary.
How do you think about threats in
1000’s of services.
©2017 Lacework, Inc. Confidential and Proprietary.
Lambda surface?
©2017 Lacework, Inc. Confidential and Proprietary.
ECS ?
©2017 Lacework, Inc. Confidential and Proprietary.
EKS ?
©2017 Lacework, Inc. Confidential and Proprietary.
S3 ?
©2017 Lacework, Inc. Confidential and Proprietary.
RDS ?
©2017 Lacework, Inc. Confidential and Proprietary.
Redshift ?
©2017 Lacework, Inc. Confidential and Proprietary.
Don’t boil the ocean YET.
©2017 Lacework, Inc. Confidential and Proprietary.
Understand what you use, why, and
focus on those.
©2017 Lacework, Inc. Confidential and Proprietary.
Learn what dev. is looking at next.
©2017 Lacework, Inc. Confidential and Proprietary.
Compliance4
©2017 Lacework, Inc. Confidential and Proprietary.
Your accounts and services need
continual checks
©2017 Lacework, Inc. Confidential and Proprietary.
This is not your annual compliance
audit
©2017 Lacework, Inc. Confidential and Proprietary.
Its all the time every time.
©2017 Lacework, Inc. Confidential and Proprietary.
Start with CIS for AWS benchmarks
©2017 Lacework, Inc. Confidential and Proprietary.
Expand into your relevant areas.
©2017 Lacework, Inc. Confidential and Proprietary.
PCI
©2017 Lacework, Inc. Confidential and Proprietary.
SOC II
©2017 Lacework, Inc. Confidential and Proprietary.
HIPAA.
©2017 Lacework, Inc. Confidential and Proprietary.
Secure the network.5
©2017 Lacework, Inc. Confidential and Proprietary.
It’s not your network.
©2017 Lacework, Inc. Confidential and Proprietary.
Yeah it’s virtual.
©2017 Lacework, Inc. Confidential and Proprietary.
Limit what can go in and out.
©2017 Lacework, Inc. Confidential and Proprietary.
Minimize in AND out.
©2017 Lacework, Inc. Confidential and Proprietary.
Understand inter network traffic
(east-west)
©2017 Lacework, Inc. Confidential and Proprietary.
But the network diminishes in
importance in cloud.
©2017 Lacework, Inc. Confidential and Proprietary.
Like console access to the router
©2017 Lacework, Inc. Confidential and Proprietary.
Firmare on edge router.
©2017 Lacework, Inc. Confidential and Proprietary.
You don’t own it. Get used to that.
©2017 Lacework, Inc. Confidential and Proprietary.
Network often static.
©2017 Lacework, Inc. Confidential and Proprietary.
But systems are dynamic.
©2017 Lacework, Inc. Confidential and Proprietary.
Containers and orchestration limit
relevance.
©2017 Lacework, Inc. Confidential and Proprietary.
But monitor config’s still important
in VPC’s.
©2017 Lacework, Inc. Confidential and Proprietary.
Secure the applications.6
©2017 Lacework, Inc. Confidential and Proprietary.
What are they talking to?
©2017 Lacework, Inc. Confidential and Proprietary.
And Why ?
©2017 Lacework, Inc. Confidential and Proprietary.
Understand application topologies
and systems.
©2017 Lacework, Inc. Confidential and Proprietary.
Gain insight into typical system
behavior
©2017 Lacework, Inc. Confidential and Proprietary.
Understand outliers.
©2017 Lacework, Inc. Confidential and Proprietary.
Log ALL application behaviors.
©2017 Lacework, Inc. Confidential and Proprietary.
Abstract containers : translate apps :
containers : machines.
©2017 Lacework, Inc. Confidential and Proprietary.
Did I mention log everything.
©2017 Lacework, Inc. Confidential and Proprietary.
Ephemeral workloads must be
monitored
©2017 Lacework, Inc. Confidential and Proprietary.
in near real-time.
©2017 Lacework, Inc. Confidential and Proprietary.
Make meaning of the logs.
©2017 Lacework, Inc. Confidential and Proprietary.
Good data turns into information
when it answers questions.
©2017 Lacework, Inc. Confidential and Proprietary.
Who ran this app?
©2017 Lacework, Inc. Confidential and Proprietary.
When did it run?
©2017 Lacework, Inc. Confidential and Proprietary.
What did it do?
©2017 Lacework, Inc. Confidential and Proprietary.
Where did it connect to?
©2017 Lacework, Inc. Confidential and Proprietary.
Good data turns into information
©2017 Lacework, Inc. Confidential and Proprietary.
when you either gain security
knowledge
©2017 Lacework, Inc. Confidential and Proprietary.
or when your can answer questions
with context.
©2017 Lacework, Inc. Confidential and Proprietary.
“Hey Dan, did you mean to install 50 new
GPU instances in the Europe Region running
Bitcoin Miners last night”?
©2017 Lacework, Inc. Confidential and Proprietary.
Secure Users.7
©2017 Lacework, Inc. Confidential and Proprietary.
Who can log into what machines.
©2017 Lacework, Inc. Confidential and Proprietary.
Why?
©2017 Lacework, Inc. Confidential and Proprietary.
Limit logins wherever you can!
©2017 Lacework, Inc. Confidential and Proprietary.
Least Privileged systems.
©2017 Lacework, Inc. Confidential and Proprietary.
If logins necessary….
©2017 Lacework, Inc. Confidential and Proprietary.
NO SHARED ACCOUNTS
©2017 Lacework, Inc. Confidential and Proprietary.
Unique accounts per user
©2017 Lacework, Inc. Confidential and Proprietary.
Use MFA.
©2017 Lacework, Inc. Confidential and Proprietary.
Setup a bastion.
©2017 Lacework, Inc. Confidential and Proprietary.
3 Factors of ID..
©2017 Lacework, Inc. Confidential and Proprietary.
Setup VPN
©2017 Lacework, Inc. Confidential and Proprietary.
Limit access via IP
©2017 Lacework, Inc. Confidential and Proprietary.
Use IAM (oauth, SAML)
©2017 Lacework, Inc. Confidential and Proprietary.
3 Factors
©2017 Lacework, Inc. Confidential and Proprietary.
Account password
©2017 Lacework, Inc. Confidential and Proprietary.
Temporary password
©2017 Lacework, Inc. Confidential and Proprietary.
And keys.
©2017 Lacework, Inc. Confidential and Proprietary.
Log ALL logins.
©2017 Lacework, Inc. Confidential and Proprietary.
Failures and Successes
©2017 Lacework, Inc. Confidential and Proprietary.
Avoid service accounts logging in.
©2017 Lacework, Inc. Confidential and Proprietary.
Yes no login as say...
©2017 Lacework, Inc. Confidential and Proprietary.
ubuntu
©2017 Lacework, Inc. Confidential and Proprietary.
coreos
©2017 Lacework, Inc. Confidential and Proprietary.
admin
©2017 Lacework, Inc. Confidential and Proprietary.
Or...root !!!!
©2017 Lacework, Inc. Confidential and Proprietary.
Where possible limit users from
installing apps.
©2017 Lacework, Inc. Confidential and Proprietary.
Immunitable images.
©2017 Lacework, Inc. Confidential and Proprietary.
Use the orchestration. That is what
its for.
©2017 Lacework, Inc. Confidential and Proprietary.
Understand the app behaviors.
©2017 Lacework, Inc. Confidential and Proprietary.
Both to from and to the Internet.
©2017 Lacework, Inc. Confidential and Proprietary.
And laterally from application to
application.
©2017 Lacework, Inc. Confidential and Proprietary.
Within your “network”
©2017 Lacework, Inc. Confidential and Proprietary.
And from container to container.
©2017 Lacework, Inc. Confidential and Proprietary.
Secure the Data.8
©2017 Lacework, Inc. Confidential and Proprietary.
Encrypt it.
©2017 Lacework, Inc. Confidential and Proprietary.
ALL OF IT.
©2017 Lacework, Inc. Confidential and Proprietary.
Its likely someone will find value in
your data
©2017 Lacework, Inc. Confidential and Proprietary.
Regardless of what you think.
©2017 Lacework, Inc. Confidential and Proprietary.
Keys are critical.
©2017 Lacework, Inc. Confidential and Proprietary.
Look into vaults.
©2017 Lacework, Inc. Confidential and Proprietary.
Rotate.
©2017 Lacework, Inc. Confidential and Proprietary.
Ephemeral keys
©2017 Lacework, Inc. Confidential and Proprietary.
Layer 8 : People9
©2017 Lacework, Inc. Confidential and Proprietary.
“DevSecOps”
©2017 Lacework, Inc. Confidential and Proprietary.
It’s just a made up word.
©2017 Lacework, Inc. Confidential and Proprietary.
Establish communication channel
from/to devops and security.
©2017 Lacework, Inc. Confidential and Proprietary.
#Slack works.
©2017 Lacework, Inc. Confidential and Proprietary.
Alert on criticals : PagerDuty or ?
©2017 Lacework, Inc. Confidential and Proprietary.
Log criticals and below in #channel
©2017 Lacework, Inc. Confidential and Proprietary.
Email still works too.
©2017 Lacework, Inc. Confidential and Proprietary.
Retrospectives on alerts.
©2017 Lacework, Inc. Confidential and Proprietary.
Get good at triage.
©2017 Lacework, Inc. Confidential and Proprietary.
A great security product/system will
help bridge gaps
©2017 Lacework, Inc. Confidential and Proprietary.
from developers to security
©2017 Lacework, Inc. Confidential and Proprietary.
from security to developers.
©2017 Lacework, Inc. Confidential and Proprietary.
within or across teams.
©2017 Lacework, Inc. Confidential and Proprietary.
Best practices.10
©2017 Lacework, Inc. Confidential and Proprietary.
There is no time continuum in
security.
©2017 Lacework, Inc. Confidential and Proprietary.
It does not stop or start.
©2017 Lacework, Inc. Confidential and Proprietary.
It is just part of the system
©2017 Lacework, Inc. Confidential and Proprietary.
And the system needs testing.
©2017 Lacework, Inc. Confidential and Proprietary.
Pen testing.
©2017 Lacework, Inc. Confidential and Proprietary.
Vulnerability testing
©2017 Lacework, Inc. Confidential and Proprietary.
It’s not as scary as it sounds.
©2017 Lacework, Inc. Confidential and Proprietary.
War game with dev.
©2017 Lacework, Inc. Confidential and Proprietary.
Think evil.
©2017 Lacework, Inc. Confidential and Proprietary.
What if I had privileged access to ….
©2017 Lacework, Inc. Confidential and Proprietary.
Think about.
©2017 Lacework, Inc. Confidential and Proprietary.
Data exfil.
©2017 Lacework, Inc. Confidential and Proprietary.
Data destruction.
©2017 Lacework, Inc. Confidential and Proprietary.
Public disclosures.
©2017 Lacework, Inc. Confidential and Proprietary.
Inadvertent configuration mistakes.
©2017 Lacework, Inc. Confidential and Proprietary.
Compliance failures.
©2017 Lacework, Inc. Confidential and Proprietary.
Low level bugs out of your control.
©2017 Lacework, Inc. Confidential and Proprietary.
Ring0 happens.
©2017 Lacework, Inc. Confidential and Proprietary.
Be prepared
©2017 Lacework, Inc. Confidential and Proprietary.
For recovery
©2017 Lacework, Inc. Confidential and Proprietary.
It’s not *if* the market will ask about
your security.
©2017 Lacework, Inc. Confidential and Proprietary.
It’s *when*.
©2017 Lacework, Inc. Confidential and Proprietary.
Have the answers before they ask.
©2017 Lacework, Inc. Confidential and Proprietary.
But what about bugs in MY
applications?
11
©2017 Lacework, Inc. Confidential and Proprietary.
Be responsible.
©2017 Lacework, Inc. Confidential and Proprietary.
Follow responsible disclosures.
©2017 Lacework, Inc. Confidential and Proprietary.
Answer security@yourdomain
©2017 Lacework, Inc. Confidential and Proprietary.
Be friendly to bug hunters
©2017 Lacework, Inc. Confidential and Proprietary.
Bug bounty not mandatory but look
into it.
©2017 Lacework, Inc. Confidential and Proprietary.
Don’t be held hostage to hunters.
©2017 Lacework, Inc. Confidential and Proprietary.
But be responsible.
©2017 Lacework, Inc. Confidential and Proprietary.
They are saving your time, money,
and potentially losses.
©2017 Lacework, Inc. Confidential and Proprietary.
Run your own internal bug program.
©2017 Lacework, Inc. Confidential and Proprietary.
Hack a thons are great for this.
©2017 Lacework, Inc. Confidential and Proprietary.
And finally….
©2017 Lacework, Inc. Confidential and Proprietary.
Have fun.12
©2017 Lacework, Inc. Confidential and Proprietary.
Be thankful.
©2017 Lacework, Inc. Confidential and Proprietary.
You are designing the future state.
©2017 Lacework, Inc. Confidential and Proprietary.
Starting over is a privilege.
©2017 Lacework, Inc. Confidential and Proprietary.
Learn from past mistakes.
©2017 Lacework, Inc. Confidential and Proprietary.
To determine the future.
©2017 Lacework, Inc. Confidential and Proprietary.
Wait, bakers dozen!13
©2017 Lacework, Inc. Confidential and Proprietary.
What do you feel is missing?
©2017 Lacework, Inc. Confidential and Proprietary.
Add your comments here.
©2017 Lacework, Inc. Confidential and Proprietary.
Share your experiences.
©2017 Lacework, Inc. Confidential and Proprietary.
Give back to the community :)
©2017 Lacework, Inc. Confidential and Proprietary.
Lacework : Let us run your security
©2017 Lacework, Inc. Confidential and Proprietary.
Lacework : While you focus on your apps.
©2017 Lacework, Inc. Confidential and Proprietary.
Dan Hubbard, Lacework
©2017 Lacework, Inc. Confidential and Proprietary.
@dhubbard858
©2017 Lacework, Inc. Confidential and Proprietary.
.end

Weitere ähnliche Inhalte

Was ist angesagt?

AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...Lacework
 
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Amazon Web Services
 
AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017Amazon Web Services
 
Security Observability for Cloud Based Applications
Security Observability for Cloud Based ApplicationsSecurity Observability for Cloud Based Applications
Security Observability for Cloud Based ApplicationsJohn Varghese
 
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterAmazon Web Services
 
GPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSGPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSAmazon Web Services
 
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...Amazon Web Services
 
ENT227_IoT + Cloud enables Enterprise Digital Transformation
ENT227_IoT + Cloud enables Enterprise Digital TransformationENT227_IoT + Cloud enables Enterprise Digital Transformation
ENT227_IoT + Cloud enables Enterprise Digital TransformationAmazon Web Services
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...Lacework
 
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineWIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineAmazon Web Services
 
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...Amazon Web Services
 
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017Amazon Web Services
 
SID302_Force Multiply Your Security Team with Automation and Alexa
SID302_Force Multiply Your Security Team with Automation and AlexaSID302_Force Multiply Your Security Team with Automation and Alexa
SID302_Force Multiply Your Security Team with Automation and AlexaAmazon Web Services
 
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017Amazon Web Services
 
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Amazon Web Services
 
SRV318_Research at PNNL Powered by AWS
SRV318_Research at PNNL Powered by AWSSRV318_Research at PNNL Powered by AWS
SRV318_Research at PNNL Powered by AWSAmazon Web Services
 
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...Amazon Web Services
 
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...Daniel Zivkovic
 
Newt191 final project
Newt191 final projectNewt191 final project
Newt191 final projectBrianCooper73
 
WPS205_Is AWS GovCloud Right for your Regulated Workload
WPS205_Is AWS GovCloud Right for your Regulated WorkloadWPS205_Is AWS GovCloud Right for your Regulated Workload
WPS205_Is AWS GovCloud Right for your Regulated WorkloadAmazon Web Services
 

Was ist angesagt? (20)

AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
AWS Security Week | Getting to Continuous Security and Compliance Monitoring ...
 
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
Protect Your Web Applications from Common Attack Vectors Using AWS WAF - SID3...
 
AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017AWS Security State of the Union - SID326 - re:Invent 2017
AWS Security State of the Union - SID326 - re:Invent 2017
 
Security Observability for Cloud Based Applications
Security Observability for Cloud Based ApplicationsSecurity Observability for Cloud Based Applications
Security Observability for Cloud Based Applications
 
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
 
GPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWSGPSTEC311_Enhancing customer security using AIML on AWS
GPSTEC311_Enhancing customer security using AIML on AWS
 
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...
SID202_Deep Dive on How Capital One Automates the Delivery of Directory Servi...
 
ENT227_IoT + Cloud enables Enterprise Digital Transformation
ENT227_IoT + Cloud enables Enterprise Digital TransformationENT227_IoT + Cloud enables Enterprise Digital Transformation
ENT227_IoT + Cloud enables Enterprise Digital Transformation
 
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
DerbyCon 2019: Prepare to be Boarded! A Tale of Kubernetes, Plunder, and Cryp...
 
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox DeadlineWIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
WIN203_With Amazon EC2 for Windows Server and Thinkbox Deadline
 
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
ENT223_Leveraging the AWS Cloud Adoption Framework to Build Your Cloud Action...
 
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
NEW LAUNCH! Introduction to Managed Rules for AWS WAF - SID217 - re:Invent 2017
 
SID302_Force Multiply Your Security Team with Automation and Alexa
SID302_Force Multiply Your Security Team with Automation and AlexaSID302_Force Multiply Your Security Team with Automation and Alexa
SID302_Force Multiply Your Security Team with Automation and Alexa
 
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017
Best Security Practices in the Intelligence Community - SID214 - re:Invent 2017
 
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
Building the Largest Repo for Serverless Compliance-as-Code - SID205 - re:Inv...
 
SRV318_Research at PNNL Powered by AWS
SRV318_Research at PNNL Powered by AWSSRV318_Research at PNNL Powered by AWS
SRV318_Research at PNNL Powered by AWS
 
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...
How Zocdoc Achieved Security and Compliance at Scale With Infrastructure as C...
 
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
Serverless is not Cloudless - Serverless Security in AWS & AWS funds for Star...
 
Newt191 final project
Newt191 final projectNewt191 final project
Newt191 final project
 
WPS205_Is AWS GovCloud Right for your Regulated Workload
WPS205_Is AWS GovCloud Right for your Regulated WorkloadWPS205_Is AWS GovCloud Right for your Regulated Workload
WPS205_Is AWS GovCloud Right for your Regulated Workload
 

Ähnlich wie Security for AWS : Journey to Least Privilege

Containers on AWS - State of the Union - CON201 - re:Invent 2017
Containers on AWS - State of the Union - CON201 - re:Invent 2017Containers on AWS - State of the Union - CON201 - re:Invent 2017
Containers on AWS - State of the Union - CON201 - re:Invent 2017Amazon Web Services
 
ARC207_Monitoring Performance of Enterprise Applications on AWS
ARC207_Monitoring Performance of Enterprise Applications on AWSARC207_Monitoring Performance of Enterprise Applications on AWS
ARC207_Monitoring Performance of Enterprise Applications on AWSAmazon Web Services
 
Running Container on AWS - Builders Day Israel
Running Container on AWS - Builders Day IsraelRunning Container on AWS - Builders Day Israel
Running Container on AWS - Builders Day IsraelAmazon Web Services
 
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...Amazon Web Services
 
AWS Webinar CZSK Uvod do cloud computingu
AWS Webinar CZSK Uvod do cloud computinguAWS Webinar CZSK Uvod do cloud computingu
AWS Webinar CZSK Uvod do cloud computinguVladimir Simek
 
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...Amazon Web Services
 
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...Amazon Web Services
 
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017Amazon Web Services
 
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...New Relic
 
Introduction to EKS (AWS User Group Slovakia)
Introduction to EKS (AWS User Group Slovakia)Introduction to EKS (AWS User Group Slovakia)
Introduction to EKS (AWS User Group Slovakia)Vladimir Simek
 
CON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersCON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersAmazon Web Services
 
Driving Innovation with Containers - CON203 - re:Invent 2017
Driving Innovation with Containers - CON203 - re:Invent 2017Driving Innovation with Containers - CON203 - re:Invent 2017
Driving Innovation with Containers - CON203 - re:Invent 2017Amazon Web Services
 
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesIntroduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesAmazon Web Services
 
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017Amazon Web Services
 
Innovations fueled by IoT and the Cloud
Innovations fueled by IoT and the CloudInnovations fueled by IoT and the Cloud
Innovations fueled by IoT and the CloudAdrian Hornsby
 
Bridge to the Cloud: Using Apache Kafka to Migrate to AWS
Bridge to the Cloud: Using Apache Kafka to Migrate to AWSBridge to the Cloud: Using Apache Kafka to Migrate to AWS
Bridge to the Cloud: Using Apache Kafka to Migrate to AWSconfluent
 
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta pengguna
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta penggunaScale Website dan Mobile Applications Anda di AWS hingga 10 juta pengguna
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta penggunaAmazon Web Services
 
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017Amazon Web Services
 

Ähnlich wie Security for AWS : Journey to Least Privilege (20)

Containers on AWS - State of the Union - CON201 - re:Invent 2017
Containers on AWS - State of the Union - CON201 - re:Invent 2017Containers on AWS - State of the Union - CON201 - re:Invent 2017
Containers on AWS - State of the Union - CON201 - re:Invent 2017
 
ARC207_Monitoring Performance of Enterprise Applications on AWS
ARC207_Monitoring Performance of Enterprise Applications on AWSARC207_Monitoring Performance of Enterprise Applications on AWS
ARC207_Monitoring Performance of Enterprise Applications on AWS
 
Running Container on AWS - Builders Day Israel
Running Container on AWS - Builders Day IsraelRunning Container on AWS - Builders Day Israel
Running Container on AWS - Builders Day Israel
 
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...
NEW LAUNCH! AWS PrivateLink: Bringing SaaS Solutions into Your VPCs and Your ...
 
AWS Webinar CZSK Uvod do cloud computingu
AWS Webinar CZSK Uvod do cloud computinguAWS Webinar CZSK Uvod do cloud computingu
AWS Webinar CZSK Uvod do cloud computingu
 
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
ARC306_High Resiliency & Availability Of Online Entertainment Communities Usi...
 
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...
Enterprise Innovation? Yes, with AWS Cloud, AI, and IoT - WIN201 - re:Invent ...
 
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017
Interstella 8888: Advanced Microservice Operations - CON407 - re:Invent 2017
 
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...
ARC207 Monitoring Performance of Enterprise Applications on AWS: Understandin...
 
Building with Containers on AWS
Building with Containers on AWSBuilding with Containers on AWS
Building with Containers on AWS
 
Cloudy with a Chance of Databases
Cloudy with a Chance of DatabasesCloudy with a Chance of Databases
Cloudy with a Chance of Databases
 
Introduction to EKS (AWS User Group Slovakia)
Introduction to EKS (AWS User Group Slovakia)Introduction to EKS (AWS User Group Slovakia)
Introduction to EKS (AWS User Group Slovakia)
 
CON203_Driving Innovation with Containers
CON203_Driving Innovation with ContainersCON203_Driving Innovation with Containers
CON203_Driving Innovation with Containers
 
Driving Innovation with Containers - CON203 - re:Invent 2017
Driving Innovation with Containers - CON203 - re:Invent 2017Driving Innovation with Containers - CON203 - re:Invent 2017
Driving Innovation with Containers - CON203 - re:Invent 2017
 
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for KubernetesIntroduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
Introduction to AWS Fargate & Amazon Elastic Container Service for Kubernetes
 
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017
Digital Transformation: Adapt or Perish - CON207 - re:Invent 2017
 
Innovations fueled by IoT and the Cloud
Innovations fueled by IoT and the CloudInnovations fueled by IoT and the Cloud
Innovations fueled by IoT and the Cloud
 
Bridge to the Cloud: Using Apache Kafka to Migrate to AWS
Bridge to the Cloud: Using Apache Kafka to Migrate to AWSBridge to the Cloud: Using Apache Kafka to Migrate to AWS
Bridge to the Cloud: Using Apache Kafka to Migrate to AWS
 
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta pengguna
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta penggunaScale Website dan Mobile Applications Anda di AWS hingga 10 juta pengguna
Scale Website dan Mobile Applications Anda di AWS hingga 10 juta pengguna
 
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017
Airbnb Runs on Amazon Aurora - DAT331 - re:Invent 2017
 

Kürzlich hochgeladen

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobeapidays
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUK Journal
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 

Kürzlich hochgeladen (20)

Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdfUnderstanding Discord NSFW Servers A Guide for Responsible Users.pdf
Understanding Discord NSFW Servers A Guide for Responsible Users.pdf
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 

Security for AWS : Journey to Least Privilege