SlideShare a Scribd company logo
1 of 38
Does AWS meet our do
 What do we need to
      to ensure our
       security
applications are secure?
   requirements?
Security & Compliance Overview
                    Miles Ward | Solutions Architect


      Watch the video of this presentation
Overview

•   Key Security Concepts
•   Certifications
•   Security Features
•   Guidance
AWS Computing Platform
AWS Computing Platform
Shared Responsibility Model

          AWS                         Customer
•   Facilities                •   Operating System
•   Physical Security         •   Application
•   Physical Infrastructure   •   Security Groups
•   Network Infrastructure    •   OS Firewalls
•   Virtualization            •   Network Configuration
    Infrastructure            •   Account Management
Who says?
AWS Certifications

• Based on the Shared Responsibility model
• AWS Environment
  – SSAE 16 / SAS70 Type II Audit
  – ISO 27001 Certification
  – Payment Card Industry Data Security Standard (PCI DSS) Level 1
    Service Provider
  – FedRAMP (FISMA)
• Customers have deployed various compliant applications:
  –   Sarbanes-Oxley (SOX)
  –   HIPAA (healthcare)
  –   FISMA (US Federal Government)
  –   DIACAP MAC III Sensitive IATO
SSAE 16 – ISAE 3402
(used to be SAS70 Type II)
•   Covers Access, Change Management and Operations of EC2 and S3
    –   Control Objective 1: Security Organization
    –   Control Objective 2: Amazon Employee Lifecycle
    –   Control Objective 3: Logical Security
    –   Control Objective 4: Secure Data Handling
    –   Control Objective 5: Physical Security
    –   Control Objective 6: Environmental Safeguards
    –   Control Objective 7: Change Management
    –   Control Objective 8: Data Integrity, Availability and Redundancy
    –   Control Objective 9: Incident Handling

•   Includes all Regions
•   Audited by an independent accounting firm and updated every 6 months
•   SAS70 report available under NDA
•   Have just converted to Statement on Standards for Attestation Engagements
    (SSAE) 16 format (equivalent to the International Standard on Assurance
    Engagements [ISAE] 3402)
ISO 27001 Certification

• ISO 27001/27002 certification achieved 11/2010
• Follows ISO 27002 best practice guidance
• Covers the AWS Information Security Management
  System (ISMS)
• Covers EC2, S3, and VPC
• Includes all Regions
• ISO certifying agent: EY CertifyPoint
PCI DSS Level 1 Service Provider

• PCI DSS 2.0 compliant
• Covers core infrastructure & services
   – EC2, EBS, S3, VPC
• Use normally, no special configuration
• Leverage the work of our QSA
• AWS will work with merchants and designated Qualified
  Incident Response Assessors (QIRA)
   – can support forensic investigations
• Certified in all regions
How did AWS do that?
Physical Security of Data Centers

• Amazon has been building large-scale data centers for many years
• Important attributes:
   –   Non-descript facilities
   –   Robust perimeter controls
   –   Strictly controlled physical access
   –   2 or more levels of two-factor auth
• Controlled, need-based access
• All access is logged and reviewed
• Separation of Duties
   – employees with physical access don’t have logical privileges
AWS Configuration Management

• Most updates are done in such a manner that they will
  not impact the customer
• Changes are authorized, logged, tested, approved, and
  documented
• AWS will communicate with customers, either via
  email, or through the AWS Service Health Dashboard
  (http://status.aws.amazon.com/) when there is a chance
  they may be affected




Customers are responsible for change control in their Instances!
EC2 Security

•   Host operating system
    – Individual SSH keyed logins via bastion host for AWS admins
    – All accesses logged and audited
•   Guest (a.k.a. Instance) operating system
    – Customer controlled (customer owns root/admin)
    – AWS admins cannot log in
    – Customer-generated keypairs
•   Stateful firewall
    – Mandatory inbound firewall, default deny mode
    – Customer controls configuration via Security Groups
•   Signed API calls
    – Require X.509 certificate or customer’s secret AWS key
Amazon EC2 Instance Isolation

     Customer 1        Customer 2            …       Customer n



                                Hypervisor

                               Virtual Interfaces
      Customer 1
    Security Groups
                        Customer 2
                      Security Groups        …        Customer n
                                                    Security Groups

                                  Firewall

         Physical Interfaces
Storage Device Decommissioning

• All storage devices go through process
• Uses techniques from
  – DoD 5220.22-M (“National Industrial Security
    Program Operating Manual “)
  – NIST 800-88 (“Guidelines for Media Sanitization”)
• Ultimately
  – degaussed
  – physically destroyed
Network Traffic Flow Security
                                 Inbound Traffic

• Security Groups
- Inbound traffic must be
  explicitly specified by
  protocol, port, and security
  group




                                     Amazon Security Groups
- VPC adds outbound filters




                                                              OS Firewall
• VPC also adds Network
  Access Control Lists (ACLs):
  inbound and outbound                                                      Encrypted
                                                                            File System
  stateless filters
• OS Firewall (e.g., iptables)                                              Encrypted
                                                                            Swap File
  may be implemented
- completely user controlled
  security layer
- granular access control of
  discrete hosts
- logging network events
Network Traffic Confidentiality


                                        Amazon EC2
                                                                    Internet Traffic
                                        Instances




                                                                      Corporate
                                                                       Network
                                                         VPN



   • Sensitive traffic should be cryptographically controlled
   • Traffic to corporate networks could be wrapped within industry standard
     VPN tunnels
Network Security Considerations
•   Distributed Denial of Service (DDoS):
     – Standard mitigation techniques in effect
•   Man in the Middle (MITM):
     – All endpoints protected by SSL
     – Fresh EC2 host keys generated at boot
•   IP Spoofing:
     – Prohibited at host OS level
•   Unauthorized Port Scanning:
     – Violation of AWS TOS
     – Detected, stopped, and blocked
     – Inbound ports blocked by default
•   Packet Sniffing:
     – Promiscuous mode is ineffective
     – Protection at hypervisor level
How do I build secure?
AWS is Built for “Continuous Availability”

• Scalable, fault tolerant services
• All Datacenters (AZs) are always on
  – No “Disaster Recovery Datacenter”
  – Managed to the same standards
• Robust Internet connectivity
  – Each AZ has redundant, Tier 1 ISP Service Providers
  – Resilient network infrastructure
Fault Separation and Geographic Diversity
                                                                                EU Region (IRE)                   US West Regio
                           US East Region (N. VA)
                                                                                                                     (Oregon)

                          Availability              Availability
                            Zone A                    Zone B
Amazon CloudWatch                                                          Availability   Availability
                                                                             Zone A         Zone B            Availability   Avail
                                                                                                                Zone A         Zo
                                         Availability
                                           Zone C
               US West Region                                 APAC Region                         APAC Region
                   (N. CA)                                    (Singapore)                           (Tokyo)




           Availability     Availability                Availability   Availability        Availability   Availability
             Zone A           Zone B                      Zone A         Zone B              Zone A         Zone B




          Note: Conceptual drawing only. The number of Availability Zones may vary
AWS Identity and Access Management (IAM)

•   Users and Groups within Accounts
•   Unique security credentials
     • Access keys
     • Login/Password
     • optional MFA device
•   Policies control access to AWS APIs
•   API calls must be signed by either:
     • X.509 certificate
     • secret key
•   Deep integration into some Services
     • S3: policies on objects and buckets
     • Simple DB: domains
•   AWS Management Console supports User log on
•   Not for Operating Systems or Applications
     • use LDAP, Active Directory/ADFS, etc...
Temporary Security Credentials (sessions)
• Temporary security credentials containing
      Identity for authentication
      Access Policy to control permissions
      Configurable Expiration (1 – 36 hours)

• Supports
      AWS Identities (including IAM Users)
      Federated Identities (users customers authenticate)

• Scales to millions of users
   –   No need to create an IAM identity for every user

• Use Cases
      Identity Federation to AWS APIs
      Mobile and browser-based applications
      Consumer applications with unlimited users
Example: Mobile & Consumer Apps  AWS APIs
AWS Multi-Factor Authentication

 • Helps prevent anyone with unauthorized knowledge of your
   e-mail address and password from impersonating you
 • Additional protection for account information
 • Works with
     – Master Account
     – IAM Users
 • Integrated into
     – AWS Management Console
     – Key pages on the AWS Portal
     – S3 (Secure Delete)



A recommended opt-in security feature!
Multi-tier Security Approach Example
                                                Web Tier




                                                                   Application Tier



                                                                                  Database Tier


Ports 80 and 443 only
 open to the Internet


     Engineering staff have ssh
          access to the App
     Tier, which acts as Bastion

                        Sync with on-premises                                             Amazon EC2
                              database                                                    Security Group
                                                                                          Firewall
                                                 All other Internet ports
                                                    blocked by default
Amazon Virtual Private Cloud (VPC)

•   Create a logically isolated environment in Amazon’s highly scalable infrastructure
•   Specify your private IP address range into one or more public or private subnets
•   Control inbound and outbound access to and from individual subnets using
    stateless Network Access Control Lists
•   Protect your Instances with stateful filters for inbound and outbound traffic using
    Security Groups
•   Attach an Elastic IP address to any instance in your VPC so it can be reached
    directly from the Internet
•   Bridge your VPC and your onsite IT infrastructure with an industry standard
    encrypted VPN connection
•   Use a wizard to easily create your VPC in 4 different topologies
VPC V1
VPC V2
VPC - Dedicated Instances

• New option to ensure physical hosts are not shared with
  other customers
• $10/hr flat fee per Region + small hourly charge
• Can identify specific Instances as dedicated
• Optionally configure entire VPC as dedicated
Amazon S3 Security
• Access controls at bucket
  and object level:
   – Read, Write, Full
• Owner has full control
• Customer Encryption
    • SSL Supported
•   Durability 99.999999999%
•   Availability 99.99%
•   Versioning (MFA Delete)
•   Detailed Access Logging
Good ideas:

•   AWS is still the “real world”
•   Least-Privilege design
•   SOA design
•   Classify resources and protect accordingly
•   Security at every layer
•   Inspect what you Expect
AWS Security and Compliance Center
              (http://aws.amazon.com/security/)
• Answers to many security & privacy questions
  • Security whitepaper
  • Risk and Compliance whitepaper
• Security bulletins
• Customer penetration testing
• Security best practices
• More information on:
  • AWS Identity & Access Management (AWS IAM)
  • AWS Multi-Factor Authentication (AWS MFA)
Your input is *critically* important…
• Thoughts/questions about our compliance or
  certifications?
• Other certifications, compliance requirements or audits to
  explore?
• What risk & compliance services should AWS consider
  offering natively?
• How can we further promote AWS security posture?
Thank You!

aws.amazon.com/security

Miles Ward
• Email: miward@amazon.com
• Skype: miles932
• Twitter: @milesward

More Related Content

What's hot

Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS SecurityLalitMohanSharma8
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...😸 Richard Spindler
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAmazon Web Services
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelAmazon Web Services
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud Amazon Web Services
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScaleAmazon Web Services
 
What's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinWhat's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinAmazon Web Services
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Amazon Web Services
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAmazon Web Services
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Amazon Web Services
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityAmazon Web Services
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeAlert Logic
 
Securing enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSSecuring enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSAmazon Web Services
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeAmazon Web Services
 

What's hot (20)

Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
AWS Security - An Engineer’s Introduction to AWS Security Auditing using CIS ...
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security Model
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
Security and Compliance in the Cloud
Security and Compliance in the Cloud Security and Compliance in the Cloud
Security and Compliance in the Cloud
 
Putting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud ScalePutting it All Together: Securing Systems at Cloud Scale
Putting it All Together: Securing Systems at Cloud Scale
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
What's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinWhat's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow Dublin
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best PracticesAWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
AWS 201 - A Walk through the AWS Cloud: AWS Security Best Practices
 
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C. Security in the Cloud - AWS Symposium 2014 - Washington D.C.
Security in the Cloud - AWS Symposium 2014 - Washington D.C.
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in PracticeCSS17: DC - The AWS Shared Responsibility Model in Practice
CSS17: DC - The AWS Shared Responsibility Model in Practice
 
Securing enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSSecuring enterprise big data workloads on AWS
Securing enterprise big data workloads on AWS
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 

Viewers also liked

Scaling from new start to enterprise platform
Scaling from new start to enterprise platformScaling from new start to enterprise platform
Scaling from new start to enterprise platformRightScale
 
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014RightScale
 
Transfusion support in thalassemic patients
Transfusion support in thalassemic patientsTransfusion support in thalassemic patients
Transfusion support in thalassemic patientsbiplabendu talukdar
 
Cuadro explicativo-trabajo-de-grado-
Cuadro explicativo-trabajo-de-grado-Cuadro explicativo-trabajo-de-grado-
Cuadro explicativo-trabajo-de-grado-genesismoraa
 
Software Engineering at RightScale
Software Engineering at RightScaleSoftware Engineering at RightScale
Software Engineering at RightScaleRightScale
 
フナコシニュース2017年1月合併号
フナコシニュース2017年1月合併号フナコシニュース2017年1月合併号
フナコシニュース2017年1月合併号fu7koshi
 

Viewers also liked (8)

Scaling from new start to enterprise platform
Scaling from new start to enterprise platformScaling from new start to enterprise platform
Scaling from new start to enterprise platform
 
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014
RightScale Survey Cloud Reboot Survey/Xen Vulnerability October 2014
 
Dakar
DakarDakar
Dakar
 
Transfusion support in thalassemic patients
Transfusion support in thalassemic patientsTransfusion support in thalassemic patients
Transfusion support in thalassemic patients
 
OIG Title & Escrow
OIG Title & EscrowOIG Title & Escrow
OIG Title & Escrow
 
Cuadro explicativo-trabajo-de-grado-
Cuadro explicativo-trabajo-de-grado-Cuadro explicativo-trabajo-de-grado-
Cuadro explicativo-trabajo-de-grado-
 
Software Engineering at RightScale
Software Engineering at RightScaleSoftware Engineering at RightScale
Software Engineering at RightScale
 
フナコシニュース2017年1月合併号
フナコシニュース2017年1月合併号フナコシニュース2017年1月合併号
フナコシニュース2017年1月合併号
 

Similar to AWS - Security and Compliance Overview

AWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAmazon Web Services
 
Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2ReadMaloney
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAmazon Web Services
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAmazon Web Services
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도Amazon Web Services Korea
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS SecurityAmazon Web Services
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 

Similar to AWS - Security and Compliance Overview (20)

AWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloudAWS Summit 2011: Overview of Security and Compliance in the cloud
AWS Summit 2011: Overview of Security and Compliance in the cloud
 
Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2
 
Aws Security Overview
Aws Security OverviewAws Security Overview
Aws Security Overview
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best Practices
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Security Overview
Security Overview Security Overview
Security Overview
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
AWS Introduction - Ryland
AWS Introduction - RylandAWS Introduction - Ryland
AWS Introduction - Ryland
 
Information Security in AWS - Dave Walker
Information Security in AWS - Dave WalkerInformation Security in AWS - Dave Walker
Information Security in AWS - Dave Walker
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 

More from RightScale

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT GovernanceRightScale
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsRightScale
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleRightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowRightScale
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseRightScale
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)RightScale
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMRightScale
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaRightScale
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...RightScale
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsRightScale
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceRightScale
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreRightScale
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesRightScale
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage CostsRightScale
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMRightScale
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessRightScale
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMRightScale
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud ReportRightScale
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsRightScale
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaRightScale
 

More from RightScale (20)

10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance10 Must-Have Automated Cloud Policies for IT Governance
10 Must-Have Automated Cloud Policies for IT Governance
 
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOpsKubernetes and Terraform in the Cloud: How RightScale Does DevOps
Kubernetes and Terraform in the Cloud: How RightScale Does DevOps
 
Optimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScaleOptimize Software, SaaS, and Cloud with Flexera and RightScale
Optimize Software, SaaS, and Cloud with Flexera and RightScale
 
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About NowPrepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
Prepare Your Enterprise Cloud Strategy for 2019: 7 Things to Think About Now
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)Multi-Cloud Management with RightScale CMP (Demo)
Multi-Cloud Management with RightScale CMP (Demo)
 
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBMComparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
Comparing Cloud VM Types and Prices: AWS vs Azure vs Google vs IBM
 
How to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale OptimaHow to Allocate and Report Cloud Costs with RightScale Optima
How to Allocate and Report Cloud Costs with RightScale Optima
 
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
Should You Move Between AWS, Azure, or Google Clouds? Considerations, Pros an...
 
Using RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider ToolsUsing RightScale CMP with Cloud Provider Tools
Using RightScale CMP with Cloud Provider Tools
 
Best Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and ComplianceBest Practices for Multi-Cloud Security and Compliance
Best Practices for Multi-Cloud Security and Compliance
 
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and MoreAutomating Multi-Cloud Policies for AWS, Azure, Google, and More
Automating Multi-Cloud Policies for AWS, Azure, Google, and More
 
The 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for EnterprisesThe 5 Stages of Cloud Management for Enterprises
The 5 Stages of Cloud Management for Enterprises
 
9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs9 Ways to Reduce Cloud Storage Costs
9 Ways to Reduce Cloud Storage Costs
 
Serverless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBMServerless Comparison: AWS vs Azure vs Google vs IBM
Serverless Comparison: AWS vs Azure vs Google vs IBM
 
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP SuccessBest Practices for Cloud Managed Services Providers: The Path to CMP Success
Best Practices for Cloud Managed Services Providers: The Path to CMP Success
 
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBMCloud Storage Comparison: AWS vs Azure vs Google vs IBM
Cloud Storage Comparison: AWS vs Azure vs Google vs IBM
 
2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report2018 Cloud Trends: RightScale State of the Cloud Report
2018 Cloud Trends: RightScale State of the Cloud Report
 
Got a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP HelpsGot a Multi-Cloud Strategy? How RightScale CMP Helps
Got a Multi-Cloud Strategy? How RightScale CMP Helps
 
How to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale OptimaHow to Manage Cloud Costs with RightScale Optima
How to Manage Cloud Costs with RightScale Optima
 

Recently uploaded

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Allon Mureinik
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 

Recently uploaded (20)

How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
Neo4j - How KGs are shaping the future of Generative AI at AWS Summit London ...
 
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
08448380779 Call Girls In Diplomatic Enclave Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)Injustice - Developers Among Us (SciFiDevCon 2024)
Injustice - Developers Among Us (SciFiDevCon 2024)
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 

AWS - Security and Compliance Overview

  • 1. Does AWS meet our do What do we need to to ensure our security applications are secure? requirements?
  • 2. Security & Compliance Overview Miles Ward | Solutions Architect Watch the video of this presentation
  • 3. Overview • Key Security Concepts • Certifications • Security Features • Guidance
  • 6. Shared Responsibility Model AWS Customer • Facilities • Operating System • Physical Security • Application • Physical Infrastructure • Security Groups • Network Infrastructure • OS Firewalls • Virtualization • Network Configuration Infrastructure • Account Management
  • 8. AWS Certifications • Based on the Shared Responsibility model • AWS Environment – SSAE 16 / SAS70 Type II Audit – ISO 27001 Certification – Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider – FedRAMP (FISMA) • Customers have deployed various compliant applications: – Sarbanes-Oxley (SOX) – HIPAA (healthcare) – FISMA (US Federal Government) – DIACAP MAC III Sensitive IATO
  • 9. SSAE 16 – ISAE 3402 (used to be SAS70 Type II) • Covers Access, Change Management and Operations of EC2 and S3 – Control Objective 1: Security Organization – Control Objective 2: Amazon Employee Lifecycle – Control Objective 3: Logical Security – Control Objective 4: Secure Data Handling – Control Objective 5: Physical Security – Control Objective 6: Environmental Safeguards – Control Objective 7: Change Management – Control Objective 8: Data Integrity, Availability and Redundancy – Control Objective 9: Incident Handling • Includes all Regions • Audited by an independent accounting firm and updated every 6 months • SAS70 report available under NDA • Have just converted to Statement on Standards for Attestation Engagements (SSAE) 16 format (equivalent to the International Standard on Assurance Engagements [ISAE] 3402)
  • 10. ISO 27001 Certification • ISO 27001/27002 certification achieved 11/2010 • Follows ISO 27002 best practice guidance • Covers the AWS Information Security Management System (ISMS) • Covers EC2, S3, and VPC • Includes all Regions • ISO certifying agent: EY CertifyPoint
  • 11. PCI DSS Level 1 Service Provider • PCI DSS 2.0 compliant • Covers core infrastructure & services – EC2, EBS, S3, VPC • Use normally, no special configuration • Leverage the work of our QSA • AWS will work with merchants and designated Qualified Incident Response Assessors (QIRA) – can support forensic investigations • Certified in all regions
  • 12. How did AWS do that?
  • 13. Physical Security of Data Centers • Amazon has been building large-scale data centers for many years • Important attributes: – Non-descript facilities – Robust perimeter controls – Strictly controlled physical access – 2 or more levels of two-factor auth • Controlled, need-based access • All access is logged and reviewed • Separation of Duties – employees with physical access don’t have logical privileges
  • 14. AWS Configuration Management • Most updates are done in such a manner that they will not impact the customer • Changes are authorized, logged, tested, approved, and documented • AWS will communicate with customers, either via email, or through the AWS Service Health Dashboard (http://status.aws.amazon.com/) when there is a chance they may be affected Customers are responsible for change control in their Instances!
  • 15. EC2 Security • Host operating system – Individual SSH keyed logins via bastion host for AWS admins – All accesses logged and audited • Guest (a.k.a. Instance) operating system – Customer controlled (customer owns root/admin) – AWS admins cannot log in – Customer-generated keypairs • Stateful firewall – Mandatory inbound firewall, default deny mode – Customer controls configuration via Security Groups • Signed API calls – Require X.509 certificate or customer’s secret AWS key
  • 16. Amazon EC2 Instance Isolation Customer 1 Customer 2 … Customer n Hypervisor Virtual Interfaces Customer 1 Security Groups Customer 2 Security Groups … Customer n Security Groups Firewall Physical Interfaces
  • 17.
  • 18. Storage Device Decommissioning • All storage devices go through process • Uses techniques from – DoD 5220.22-M (“National Industrial Security Program Operating Manual “) – NIST 800-88 (“Guidelines for Media Sanitization”) • Ultimately – degaussed – physically destroyed
  • 19. Network Traffic Flow Security Inbound Traffic • Security Groups - Inbound traffic must be explicitly specified by protocol, port, and security group Amazon Security Groups - VPC adds outbound filters OS Firewall • VPC also adds Network Access Control Lists (ACLs): inbound and outbound Encrypted File System stateless filters • OS Firewall (e.g., iptables) Encrypted Swap File may be implemented - completely user controlled security layer - granular access control of discrete hosts - logging network events
  • 20. Network Traffic Confidentiality Amazon EC2 Internet Traffic Instances Corporate Network VPN • Sensitive traffic should be cryptographically controlled • Traffic to corporate networks could be wrapped within industry standard VPN tunnels
  • 21. Network Security Considerations • Distributed Denial of Service (DDoS): – Standard mitigation techniques in effect • Man in the Middle (MITM): – All endpoints protected by SSL – Fresh EC2 host keys generated at boot • IP Spoofing: – Prohibited at host OS level • Unauthorized Port Scanning: – Violation of AWS TOS – Detected, stopped, and blocked – Inbound ports blocked by default • Packet Sniffing: – Promiscuous mode is ineffective – Protection at hypervisor level
  • 22. How do I build secure?
  • 23. AWS is Built for “Continuous Availability” • Scalable, fault tolerant services • All Datacenters (AZs) are always on – No “Disaster Recovery Datacenter” – Managed to the same standards • Robust Internet connectivity – Each AZ has redundant, Tier 1 ISP Service Providers – Resilient network infrastructure
  • 24. Fault Separation and Geographic Diversity EU Region (IRE) US West Regio US East Region (N. VA) (Oregon) Availability Availability Zone A Zone B Amazon CloudWatch Availability Availability Zone A Zone B Availability Avail Zone A Zo Availability Zone C US West Region APAC Region APAC Region (N. CA) (Singapore) (Tokyo) Availability Availability Availability Availability Availability Availability Zone A Zone B Zone A Zone B Zone A Zone B Note: Conceptual drawing only. The number of Availability Zones may vary
  • 25. AWS Identity and Access Management (IAM) • Users and Groups within Accounts • Unique security credentials • Access keys • Login/Password • optional MFA device • Policies control access to AWS APIs • API calls must be signed by either: • X.509 certificate • secret key • Deep integration into some Services • S3: policies on objects and buckets • Simple DB: domains • AWS Management Console supports User log on • Not for Operating Systems or Applications • use LDAP, Active Directory/ADFS, etc...
  • 26. Temporary Security Credentials (sessions) • Temporary security credentials containing  Identity for authentication  Access Policy to control permissions  Configurable Expiration (1 – 36 hours) • Supports  AWS Identities (including IAM Users)  Federated Identities (users customers authenticate) • Scales to millions of users – No need to create an IAM identity for every user • Use Cases  Identity Federation to AWS APIs  Mobile and browser-based applications  Consumer applications with unlimited users
  • 27. Example: Mobile & Consumer Apps  AWS APIs
  • 28. AWS Multi-Factor Authentication • Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you • Additional protection for account information • Works with – Master Account – IAM Users • Integrated into – AWS Management Console – Key pages on the AWS Portal – S3 (Secure Delete) A recommended opt-in security feature!
  • 29. Multi-tier Security Approach Example Web Tier Application Tier Database Tier Ports 80 and 443 only open to the Internet Engineering staff have ssh access to the App Tier, which acts as Bastion Sync with on-premises Amazon EC2 database Security Group Firewall All other Internet ports blocked by default
  • 30. Amazon Virtual Private Cloud (VPC) • Create a logically isolated environment in Amazon’s highly scalable infrastructure • Specify your private IP address range into one or more public or private subnets • Control inbound and outbound access to and from individual subnets using stateless Network Access Control Lists • Protect your Instances with stateful filters for inbound and outbound traffic using Security Groups • Attach an Elastic IP address to any instance in your VPC so it can be reached directly from the Internet • Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted VPN connection • Use a wizard to easily create your VPC in 4 different topologies
  • 33. VPC - Dedicated Instances • New option to ensure physical hosts are not shared with other customers • $10/hr flat fee per Region + small hourly charge • Can identify specific Instances as dedicated • Optionally configure entire VPC as dedicated
  • 34. Amazon S3 Security • Access controls at bucket and object level: – Read, Write, Full • Owner has full control • Customer Encryption • SSL Supported • Durability 99.999999999% • Availability 99.99% • Versioning (MFA Delete) • Detailed Access Logging
  • 35. Good ideas: • AWS is still the “real world” • Least-Privilege design • SOA design • Classify resources and protect accordingly • Security at every layer • Inspect what you Expect
  • 36. AWS Security and Compliance Center (http://aws.amazon.com/security/) • Answers to many security & privacy questions • Security whitepaper • Risk and Compliance whitepaper • Security bulletins • Customer penetration testing • Security best practices • More information on: • AWS Identity & Access Management (AWS IAM) • AWS Multi-Factor Authentication (AWS MFA)
  • 37. Your input is *critically* important… • Thoughts/questions about our compliance or certifications? • Other certifications, compliance requirements or audits to explore? • What risk & compliance services should AWS consider offering natively? • How can we further promote AWS security posture?
  • 38. Thank You! aws.amazon.com/security Miles Ward • Email: miward@amazon.com • Skype: miles932 • Twitter: @milesward