SlideShare uma empresa Scribd logo
1 de 139
Your Future with Cloud Computing
                       Dr. Werner Vogels
                       CTO, Amazon.com
AWS Global Infrastructure
 GovCloud            US West        US West         US East South America EU                   Asia Pacific    Asia
(US ITAR Region)(Northern California) (Oregon)   (Northern Virginia) (Sao Paulo)   (Ireland)    (Singapore)   Pacific
                                                                                                              (Tokyo)




    AWS Regions
    AWS Edge Locations
Powering the Most Popular Internet Businesses
Trusted by Enterprises
And Government Agencies
Partner Ecosystem
System Integrators   Independent Software Vendors
What Enterprises are Running on AWS
 Business
 Applications


 Web
 Applications


 Big Data & High
 Performance Computing


 Disaster Recovery
 & Archive
What Analysts are Saying about AWS
Infrastructure-as-a-Service   Leader in 2011 Gartner IaaS   Leader in 2011 Forrester
   Market Share Leader             Magic Quadrant               Hadoop Wave
The Scale of AWS: Amazon S3 Growth
   Peak Requests:
      650,000+
     per second



Total Number of Objects Stored in Amazon S3
The Scale of AWS: Amazon S3 Growth
       Peak Requests:
          650,000+                                                  762 Billion
         per second



  Total Number of Objects Stored in Amazon S3


                                                      262 Billion

                                        102 Billion
              14 Billion   40 Billion
2.9 Billion

Q4 2006       Q4 2007      Q4 2008       Q4 2009      Q4 2010        Q4 2011
The Scale of AWS: Amazon S3 Growth
                                                                                  905 Billion
       Peak Requests:
          650,000+                                                  762 Billion
         per second



  Total Number of Objects Stored in Amazon S3


                                                      262 Billion

                                        102 Billion
              14 Billion   40 Billion
2.9 Billion

Q4 2006       Q4 2007      Q4 2008       Q4 2009      Q4 2010        Q4 2011       Q1 2012
Our Price Reduction Philosophy
     Scale & Innovation…                        … Drive Costs Down

                 Invest in
                  Capital



Attract More
Customers
                                   Invest in
                                  Technology
                                               19 Price Reductions


        Reduce                Improve
        Prices               Efficiency
AWS Platform Overview
          Deployment & Administration


                 App Services


Compute             Storage             Database


                  Networking


           AWS Global Infrastructure
AWS Global Infrastructure
Secure, redundant Cloud infrastructure
for global companies and global apps
                                              Regions



       Deployment & Administration
                                          Availability Zones
              App Services

  Compute       Storage        Database

               Networking                  Edge Locations

        AWS Global Infrastructure
AWS Networking Services
Extend your enterprise infrastructure to
the AWS Cloud
                                             Amazon Virtual Private Cloud
                                           VPN to Extend Your Network Topology to AWS



       Deployment & Administration                 AWS Direct Connect
                                              Private, Dedicated Connection to AWS
              App Services

   Compute      Storage        Database
                                                    Amazon Route 53
               Networking                        Scalable Domain Name Service

        AWS Global Infrastructure
Compute Services
Scalable Linux and Windows
compute services

                                                  Amazon EC2
                                          Virtual Servers in the AWS Cloud

     Deployment & Administration
                                                  Auto Scaling
            App Services
                                         Rule-driven scaling service for EC2
 Compute      Storage        Database

                                        Amazon Elastic Load Balancing
             Networking
                                           Virtual load balancers for EC2
      AWS Global Infrastructure
Storage Services
Scalable and Durable High Performance Cloud Storage



                                                     Amazon S3
                                           Redundant, High-Scale Object Store
      Deployment & Administration

             App Services                   Amazon Elastic Block Store
                                             Persistent block storage for EC2
  Compute      Storage        Database

              Networking
                                               AWS Storage Gateway
       AWS Global Infrastructure
                                         Seamless backup of enterprise data to S3
Database Services
Scalable and Durable High
Performance Cloud Storage
                                              Amazon DynamoDB
                                         High Performance NoSQL Database Service



                                                   Amazon RDS
      Deployment & Administration
                                         Managed Oracle & MySQL Database Service
             App Services

  Compute      Storage        Database
                                              Amazon ElastiCache
                                              Managed Memecached Service
              Networking

       AWS Global Infrastructure
AWS App Services
Highly abstracted services that
                                                     Amazon CloudFront
replace software for commonly                     Global Content Delivery Service
needed application functionality
                                                    Amazon CloudSearch
                                          Managed Search Service that Automatically Scales


                                                         Amazon SWF
       Deployment & Administration                    Simple Workflow Service


              App Services
                                                         Amazon SNS
                                                     Simple Notification Service
   Compute      Storage        Database
                                                         Amazon SQS
               Networking                             Simple Queuing Service


        AWS Global Infrastructure                        Amazon SES
                                                 Simple Transactional Email Service
Ecosystem App Services
3rd party highly abstracted services that
                                            Security
replace software for commonly needed        Services
application functionality
… and already run on AWS                  Log Analysis
                                            Services


       Deployment & Administration          Developer
                                             Services
              App Services
                                           BI Services
  Compute       Storage        Database

               Networking                      Test
                                             Services
        AWS Global Infrastructure
Deployment & Administration
3rd party managed services that
replace software for commonly                           AWS                        Ecosystem
needed application functionality …           AWS Management Console
and already run on AWS                        Web-based management interface


                                             Amazon Elastic MapReduce
                                                  Big Data Analytics Service




                                                                               a
       Deployment & Administration                      AWS IAM
                                               Identity & Access Management
              App Services
                                                 Amazon CloudWatch
                                               Automated monitoring & alerts
  Compute       Storage        Database
                                                AWS CloudFormation
               Networking                   Automated AWS resource provisioning

                                                AWS Elastic Beanstalk
        AWS Global Infrastructure         Java & PHP App deployment & management
AWS Pace of Innovation…                                                                                                  82

                                                                                                                       Including:

                                                                                            61                    AWS Oregon Region
                                                                                                                 Elastic Beanstalk (Beta)
                                                                                                                   Amazon SES (Beta)
                                                                                           Including:
                                                                                                                  AWS CloudFormation
                                                                                         Amazon SNS
                                                                                                                 Amazon RDS for Oracle
                                                                                      Amazon CloudFront
                                                                                                                  AWS Direct Connect
                                                                                       Amazon Route 53
                                                                 48                    S3 Bucket Policies
                                                                                                                  AWS GovCloud (US)
                                                                                                                  Amazon ElastiCache
                                                                Including:           RDS Multi-AZ Support
                                                                                                                 VPC Virtual Networking
                                                              Amazon RDS            RDS Reserved Databases
                                                                                                                VPC Dedicated Instances
                                                              Amazon VPC               AWS Import/Export
                                                                                                                  SMS Text Notification
                                                              Amazon EMR                 AWS IAM Beta
                                       24                   EC2 Auto Scaling         AWS Singapore Region
                                                                                                                CloudFront Live Streaming
                                                                                                                   AWS Tokyo Region
                                                         EC2 Reserved Instances     Cluster Instances for EC2
                                    Including:
                                                                                                                    SAP RDS on EC2
                                                         EC2 Elastic Load Balance   Micro Instances for EC2
                                 Amazon SimpleDB
             9                  Amazon Cloudfront           AWS Import/Export          Amazon Linux AMI
                                                                                                                    SAP BO on EC2
                                                                                                                Win Srv 2008 R2 on EC2
                                                           AWS Mngmt Console          Oracle Apps on EC2
         Including:                Amazon EBS
                                                                                                                 Win Srv 2003 VM Import
                                                           Win Srv 2008 on EC2        SUSE Linux on EC2
        Amazon FPS             EC2 Availability Zones
                                                                                                                    Amazon S3 SSE
                                                            IBM Apps on EC2            VM Import for EC2
  Red Hat Enterprise on EC2   EC2 Elastic IP Addresses


        2007                        2008                        2009                         2010                        2011
…Continuing in 2012
                                                                                       15

                                                                            Amazon DynamoDB in Europe
                                                                          Storage Gateway in South America
                                                                              CloudFront Live Streaming
                                                                                                                              9
                                                                           Route 53 Latency Based Routing
                                                                           PHP and Git for Elastic Beanstalk
                                                                                                                 Live Smooth Streaming for Amazon
                                                                         CloudFront Lowers Content Expiration               CloudFront

               7                                                           RDS Increases Backup Retention        Reserved Cache Nodes for Amazon
                                                                                                                           ElastiCache
                                                  6                          IAM Password Management
                                                                                                                         AWS CloudSearch
      Amazon DynamoDB                                                     IAM User Access to Account Billing
                                                                                                                         AWS Marketplace
     AWS Storage Gateway            Amazon Simple Workflow Service         Amazon RDS Free Trial program
                                                                                                                DynamoDB Announces BatchWriteItem
  Amazon RDS on Amazon VPC            Amazon DynamoDB in Japan             Amazon EC2 Medium Instances                      Feature

   AWS IAM Identity Federation     ElastiCache in Oregon and Sao Paulo      64-bit AMI on Small & Medium           AWS Elastic Beanstalk in Japan

    Windows Free Usage Tier             Amazon S3 Lower Prices              EC2 Linux Login from Console            DynamoDB in Three Regions

 New Premium Support Features         AWS CloudFormation for VPC           Beanstalk Resource Permissions           AWS CloudFormation in VPC

New AWS Direct Connect Locations   New Osaka and Milan Edge Locations    EC2, RDS, ElastiCache Lower Prices      EC2 CC2 Instance in Amazon VPC



       January                            February                                 March                                    April
AWS Direct Connect
                                                 Private secure connection to AWS
                                     AWS Cloud

                                                 Bypass the public Internet
                        AWS Direct
                         Connect

                                                 High bandwidth and predictable
         Internet                                latency

Corporate Data Center
AWS Storage Gateway
                                      Easily backup on-premises data to AWS
              Snapshots in
  S3          Amazon S3

                                      Store snapshots in Amazon S3 for backup
                                      and disaster recovery

                                      Simple software appliance - no changes
                                      required to your on-premises architecture
AWS Storage
 Gateway




                   Your Data Center
Amazon Simple Workflow Service
                                   Run application workflows and business
                                   processes on AWS
        Amazon SWF
                                   Manage processes across Cloud, mobile
                                   and on-premises environments

Cloud       Mobile   On Premises   Use any programming language for
                                   workflow logic
Amazon DynamoDB
        Non Relational (NoSQL) Database

        Fast & predictable performance

        Seamless Scalability

        Zero administration
Oracle Multi-AZ
                                        Replicates database updates across two
                                        Availability Zones

                                        Automatically fail over to the standby for
                                        planned maintenance and unplanned
                                        disruptions

                                        Increased durability and availability


Availability Zone   Availability Zone
PHP & Git Deployment for AWS Beanstalk
 git push
                Elastic Beanstalk
                                                      Run and manage existing PHP
                                                      applications with no changes to
                                                      application code
                                           PHP

Your App                                Apache HTTP
                                           Server     Provides full control over the
                                    Amazon Linux      infrastructure and the software
                         Elastic Load
                         Balancer

              yourApp.elasticbeanstalk.com
SQL Server & .NET Beanstalk
                    Fully managed Express,Web, Standard
                    and Enterprise Editions of SQL Server
                    2008 R2
           .NET
                    SQL Server (Express Edition) covered
                  Text
                    under the free usage tier for a full year

                    Elastic Beanstalk leverages the Windows
SQL
                    Server 2008 R2 AMI and IIS 7.5
Server
                    Deploy using AWS Toolkit for Visual
                    Studio
Amazon CloudSearch
   Fully managed search service
   Up and running in less than an hour
   Automatically scales for data and traffic
   Starting at less than $100 / month
AWS Marketplace
       Find, buy and run software running on
       AWS

       More than 250 listings at launch

       Sell your software or SaaS app to our
       hundreds of thousands of customers

       aws.amazon.com/marketplace
VPC 2
News Limited
Craige Pendleton-Browne
Chief Technology Officer
Context

     •News Ltd runs a single enterprise CMS platform

     •Supporting 8 major web sites

     •12 different critical systems

     •Over 600m page impressions per month

     •Approximately 2400 new assets created daily




34
The Challenge

     •Complex technology stack – development = 46 servers
     •All configuration and deployment manual
     •56 days and 6 teams to build a new environment

     •Impact
       – slow project start up
       – Only run one major project at a time
       – Lack of innovation

                                   The Challenge
                        go from 56 days to 1 day in the cloud



35
Current Status

     •Virtual Private Cloud configured and working

     •Configuration separated out and all systems packaged

     •Semi automated build process implemented in EC2

     •2 project environments up and running in EC2

     •From 56 days to 3 days semi automated




36
Current Status

     •Developers can run up or tear down environments

     •Two new projects starting this month with poof of concepts in the cloud

     •Ability to stand up 8 distinct environments quickly

     •By the end of the month reduce time to 6 hours




37
Where to next

     •An agreed corporate cloud governance model

     •Seamlessly integrate cloud and physical environments

     •Automated procedures for managing costs

     •Move towards a devops model

     •Move production to the cloud




38
The Seven Transformations of
     Cloud Computing
A common misconception:
  cloud computing is only about….


Saving money          Doing things faster
Cloud Transforms what’s possible
Transformation 1:
Distributed Architectures Made Easy

             High
           Availability
Building Distributed Architectures
Cloud Computing Makes This Easier
 Distributed     Multi-AZ   Building Blocks      Loosely Coupled
Infrastructure   Services                      Process Coordination



    AWS
   Regions          S3
                                    EC2               SWF
                                 Instances


                 DynamoDB                             SNS
  Availability
    Zones
                                Elastic Load
                                                      SQS
                   RDS           Balancer
Architecture Templates for Common Patterns




                              MICROSOFT SHAREPOINT




aws.amazon.com/architecture
… open source Simian Army
coming soon
Vodafone
    Hutchison Australia
    Easwaren Siva
   General Manager
    Technology Strategy & Product
Vodafone
Cricket LIVE
Australia

          Behind the Scenes
      Vodafone Hutchison Australia
Vodafone Australia

Vodafone Australia operated by Vodafone Hutchison Australia (VHA)

2009 merger, Vodafone Australia and Hutchison 3G Australia

Operates Vodafone, 3 Mobile and Crazy John’s brands

VHA mobile services to over 7.0 million customers

Shareholders operate Mobile Networks across the globe




        50
Big Brother




                                                                 Key Learning:
                                                                                                                                                                                                                                                       ‘Big Brother’ 05




                                                                                                                                           No Smartphones - No Apps




                                   Environments
                                                                                                                                                                      Early days of 3G – 3 Mobile 100% 3G
                                                                                                                                                                                                            3 Mobile pioneered ‘Live’ Mobile TV with




                    ‘Live’ interactive TV can drive immense
                    traffic towards your Portals and Content

                0
                       200
                                         400
                                                           600
                                                                     800




     16:44:23
     16:45:23
     16:46:23
     16:47:23
     16:48:23
     16:49:23
     16:50:23
     16:51:23
     16:52:23
     16:53:23
     16:54:23
     16:55:23
     16:56:23
     16:57:23
     16:58:23
     16:59:23
     17:00:23
     17:01:23
     17:02:23
     17:03:23
     17:04:23
     17:05:23
     17:06:23
     17:07:23
     17:08:23
     17:09:23
     17:10:23
     17:11:23
     17:12:23
     17:13:23
     17:14:23
     17:15:23
     17:16:23
     17:17:23
     17:18:23
     17:19:23
     17:20:23
     17:21:23
     17:22:23
     17:23:23
     17:24:23
     17:25:23
     17:26:23
     17:27:23
     17:28:23
     17:29:23
     17:30:23
     17:31:23
     17:32:23
     17:33:23
     17:34:23
     17:35:23
     17:36:23
     17:37:23
     17:38:23
     17:39:23
     17:40:23
     17:41:23
     17:42:23
     17:43:23
     17:44:23
     17:45:23
     17:46:23
     17:47:23
     17:48:23
     17:49:23
     17:50:23
     17:51:23
     17:52:23
     17:53:23
     17:54:23
     17:55:23
     17:56:23
     17:57:23
     17:58:23
     17:59:23
     18:00:23
     18:01:23
     18:02:23
     18:03:23
     18:04:23
     18:05:23
     18:06:23
     18:07:23
     18:08:23
     18:09:23
     18:10:23
     18:11:23
     18:12:23
     18:13:23
     18:14:23
     18:15:23
     18:16:23
     18:17:23
     18:18:23
     18:19:23
     18:20:23
     18:21:23
     18:22:23
     18:23:23
     18:24:23
     18:25:23
     18:26:23
     18:27:23
     18:28:23
     18:29:23
     18:30:23
     18:31:23
     18:32:23
     18:33:23
     18:34:23
     18:35:23
     18:36:23
     18:37:23
     18:38:23
     18:39:23
     18:40:23
     18:41:23
     18:42:23
     18:43:23
     18:44:23
     18:45:23
     18:46:23
     18:47:23
     18:48:23
     18:49:23
     18:50:23
     18:51:23
     18:52:23
     18:53:23
     18:54:23
     18:55:23
     18:56:23
     18:57:23
     18:58:23
     18:59:23
     19:00:23
     19:01:23
     19:02:23
     19:03:23
     19:04:23
     19:05:23
     19:06:23
     19:07:23
     19:08:23
     19:09:23
     19:10:23
     19:11:23
     19:12:23
     19:13:23
     19:14:23
     19:15:23
     19:16:23
     19:17:23
     19:18:23
     19:19:23
     19:20:23
     19:21:23
     19:22:23
     19:23:23
     19:24:23
     19:25:23
     19:26:23
     19:27:23
     19:28:23
     19:29:23
     19:30:23
     19:31:23
     19:32:23
     19:33:23
     19:34:23
     19:35:23
     19:36:23
     19:37:23
     19:38:23
     19:39:23
     19:40:23
     19:41:23
     19:42:23
     19:43:23
     19:44:23
     19:45:23
     19:46:23
     19:47:23
     19:48:23
     19:49:23
     19:50:23
     19:51:23
     19:52:23
     19:53:23
     19:54:23
     19:55:23
     19:56:23
     19:57:23
     19:58:23
     19:59:23
     20:00:23
     20:01:23
     20:02:23
     20:03:23
     20:04:23
     20:05:23
     20:06:23
     20:07:23
     20:08:23
     20:09:23
     20:10:23
     20:11:23
     20:12:23
     20:13:23
     20:14:23
     20:15:23
     20:16:23
     20:17:23
     20:18:23
     20:19:23
     20:20:23
     20:21:23
     20:22:23
     20:23:23
     20:24:23
     20:25:23
     20:26:23
     20:27:23
     20:28:23
     20:29:23
     20:30:23
     20:31:23
     20:32:23
     20:33:23
     20:34:23
     20:35:23
     20:36:23
     20:37:23
     20:38:23
     20:39:23
     20:40:23
     20:41:23
     20:42:23
     20:43:23
     20:44:23
     20:45:23
     20:46:23
     20:47:23
     20:48:23
     20:49:23
     20:50:23
     20:51:23
     20:52:23
     20:53:23
     20:54:23
     20:55:23
     20:56:23
     20:57:23
     20:58:23
     20:59:23
     21:00:23
     21:01:23
     21:02:23
     21:03:23
     21:04:23
                                                                           Total Concurrent Conenctions (Sun 26th June - 16:45 -> 23:00)




     21:05:23
     21:06:23
     21:07:23
     21:08:23
     21:09:23
     21:10:23
     21:11:23
     21:12:23
     21:13:23
     21:14:23
     21:15:23
     21:16:23
     21:17:23
     21:18:23
     21:19:23
     21:20:23
     21:21:23
     21:22:23
     21:23:23
     21:24:23
     21:25:23
     21:26:23
     21:27:23
     21:28:23
     21:29:23
     21:30:23
     21:31:23
     21:32:23
     21:33:23
     21:34:23
     21:35:23
     21:36:23
     21:37:23
     21:38:23
     21:39:23
     21:40:23
     21:41:23
     21:42:23
     21:43:23
     21:44:23
     21:45:23
     21:46:23
     21:47:23
     21:48:23
     21:49:23
     21:50:23
     21:51:23
     21:52:23
     21:53:23
     21:54:23
     21:55:23
     21:56:23
     21:57:23
     21:58:23
     21:59:23
     22:00:23
     22:01:23
     22:02:23
     22:03:23
     22:04:23
     22:05:23
     22:06:23
     22:07:23
     22:08:23
     22:09:23
     22:10:23
     22:11:23
     22:12:23
     22:13:23
     22:14:23
     22:15:23
     22:16:23
     22:17:23
     22:18:23
     22:19:23
     22:20:23
     22:21:23
     22:22:23
     22:23:23
     22:24:23
     22:25:23
     22:26:23
     22:27:23
     22:28:23
     22:29:23
     22:30:23
     22:31:23
     22:32:23
     22:33:23
     22:34:23
     22:35:23
     22:36:23
51




     22:37:23
     22:38:23
     22:39:23
     22:40:23
     22:41:23
     22:42:23
     22:43:23
     22:44:23
     22:45:23
     22:46:23
     22:47:23
     22:48:23
     22:49:23
     22:50:23
     22:51:23
     22:52:23
     22:53:23
     22:54:23
     22:55:23
     22:56:23
     22:57:23
     22:58:23
     22:59:23
     23:00:23
2011/12 Vodafone Cricket Live Australia
                            iPhone and iPad App
                            Android and Tablet App
                            Scores and Highlights
                            ‘Live’ Cricket TV Streaming
                            Vodafone Viewers verdict
2011/12 Vodafone Cricket Live Australia – Some Stats
  Over 700K Apps downloaded

  Approximately 4 Million visits

  Over 500K streams

  24.7TB iPhone streaming data for December

  Peak 10K Simultaneous Streams

  Live scores peaked at 1000 rps (Jan)
2011/12 Vodafone Cricket Live Australia – Some Stats



                               Scores Data Requests




                   iPhone Streaming Traffic
Cricket App - Vodafone Viewers Verdict




                 Challenge - managing ‘peak’
                     load cost effectively     55
Vodafone Cricket Live Australia - Architecture




                                                 56
Vodafone Cricket Live Australia - Architecture




                                                 57
Vodafone Cricket Live Australia – Amazon Components
  2 Elastic Load Balancers (ELB)

  3 EC2 instances in idle configuration (2 large 1 small), auto expandable up to 9 (8 large 1 small)
  under load

  All EC2 instances are bootstrapped to load application after instantiation.

  1 S3 bucket to store application itself

  2 auto-scaling groups to protect from hardware failure and give expandability. Any failed server
  will be automatically replaced

  MySQL relational database service (RDS) instance to hold all data

  Cloudwatch CPU usage alarms linked to auto-scaling groups for auto expand and auto shrink

  Contracted ProQuest to build and optimise our AWS instances/environment
Key Learnings and Next Step
  Key Learnings
  Public Cloud Infrastructure - best cost option for Low Frequency but High
  Demand services

  Content Delivery Networks (CDN) and Cloud Computing provides an
  optimal solution

  Next Step in Progress
  Unified Content Management System on Amazon to manage ‘peak
  demands’ when new devices are released Online

  Oracle Webcentre Sites / Fatwire 7.6 Content Management System in
  Production
Transformation 2:
Embracing the security advantages of shared systems
Applications
Flexibility to Choose the Right Security
      Model for Each Application
                                                     You


            Infrastructure                 AWS Security Infrastructure
                                               SOC 1/SSAE 16/ISAE 3402,
  Every Customer Gets the Highest           ISO 27001, PCI DSS, HIPAA, ITAR,
                                               FISMA Moderate, FIPS 140-2
           Level of Security
Kit, go
                                  faster

Transformation 3:
   From Scaling by
    Architecture …
to Scaling By Command
                         Yes
                        Michael
Scaling by Architecture: NoSQL Database Cluster

  Set up       Config &     Shard &      Rinse &
more servers    Tune       Repartition   Repeat
Scaling by Command with Amazon DynamoDB


 Amazon DynamoDB

                     Data is automatically spread across
                      enough hardware to deliver single
                           digit millisecond latency.
Transformation 4:
A Supercomputer in the Hands of Every Developer
Supercomputers used to be Privileges of the Elite



Expensive

Rationed time

Only for the “highest value” jobs
Supercomputers by the Hour… for Everyone.

AWS built the    42 nd   fastest supercomputer in the world
1,064 Amazon EC2 CC2 instances with17,024 cores
240 teraflops cluster (240 trillion calculations per second)
Less than $1,000 per hour
Develops leading computational
Instead of $20M in datacenter spend…
     51,132 Cores…

     3 Hours…

     $4,828/ hour …
Transformation 5:
Experiment Often & Fail Quickly
Traditional Infrastructure Drives up the Cost of
           Failure … Innovation Suffers
                   $1
                        2




How many big ticket                      7 M
                                     $
technology ideas can your   $9
                                 M



budget tolerate?
Experiment Often & Fail Quickly with AWS

                                          $1
                                                00
                                                        $2
                                                              K
                                                                      $5
                                                                            00




                                                     
  Cost of failure falls dramatically

People are free to try out new ideas
                                          $7
                                                5
                                                         $3
                                                              3
                                                                      $3
                                                                            K




 More risk taking, more innovation
                                          $2
                                                34
                                                        $5
                                                              00
                                                                      $6
                                                                            92




                                          $1
                                                K

                                                        $9
                                                              6
                                                                      $1
                                                                            2
REA Group
    Richard Durnall
   Head of Delivery
• Picture of view from my desk




                                 77
A bit about us
• Picture of view from my desk




                                             77
helped by
Distributed Agile




                    helped by
helped by
Continuous Delivery




           helped by
helped by
Hack Days

            helped by
helped by
Home Ideas




         helped by
Transformation 6:
Big Data without Big Servers
Attacking Big Data Problems Shouldn’t Be This
                 Complicated
    Storing Massive Data       Investing In Expensive
  Volumes Into A Huge Data   Server Clusters To Process
        Warehouse                    The Data
The Cloud Makes This a Lot Simpler


                  Hadoop Clusters
   Amazon S3



Amazon DynamoDB    Amazon EMR

  Load Data in     Organize &       Visualize
   the Cloud      Analyze Data       Results
      1                 2              3
Brandscreen
Seth Yates
Founder & CTO
It’s broken
Structurally, a
commodity
market
Low latency. High throughput. Huge
              volume.
1 petabyte

10% per month
1.Experimen
                           t
                          2.Learn
                          3.Plan
All images sourced from
iStockPhoto.com
Transformation 7:
Mobile Ecosystem for a Mobile-First World
Building Mobile
Rich media experience
Location context aware
Real-time presence driven
Social graph based
User generated content
Recommendations
Integration w/ social networks
Virtual goods economy
Advertisement / premium support
Multi-device access
Cloud Mobile Ecosystem
PBS Video for iPad    PBSKids Video for iPad
   Launched Nov ‘10        Launched April ‘11
Fun With Numbers - February 2012
Total Video               Mobile Video
Unique visitors: 30M/mo   115k unique visitors per day
Visits: 57M/mo            310k daily app opens
Page views: 367M / mo     27% of hours watched, 40%
                          of streams
Video streams: 145M/mo
Hours watched: 2.3M/mo
The AWS Mission
Enable businesses and developers to use web services
     to build scalable, sophisticated applications.
Security and Privacy
in the Cloud

Stephen Schmidt
Vice President &
Chief Information Security Officer
AWS Security Model Overview
       Certifications & Accreditations                                                  Shared Responsibility Model

   Sarbanes-Oxley (SOX) compliance                                                 Customer/SI Partner/ISV controls guest
   ISO 27001 Certification                                                         OS-level security, including patching and
   PCI DSS Level I Certification                                                   maintenance
   HIPAA compliant architecture                                                    Application level security, including
                                                                                   password and role based access
   SAS 70(SOC 1) Type II Audit
                                                                                   Host-based firewalls, including Intrusion
   FISMA Low & Moderate ATOs
                                                                                   Detection/Prevention Systems
   DIACAP MAC III-Sensitive
                                                                                   Separation of Access
     Pursuing DIACAP MAC II–Sensitive


Physical Security                              VM Security                                  Network Security
 Multi-level, multi-factor controlled access    Multi-factor access to Amazon Account        Instance firewalls can be configured in
 environment                                    Instance Isolation                           security groups;
 Controlled, need-based access for AWS           • Customer-controlled firewall at the       The traffic may be restricted by protocol,
 employees (least privilege)                       hypervisor level                          by service port, as well as by source IP
Management Plane Administrative Access           • Neighboring instances prevented access    address (individual IP or Classless Inter-
 Multi-factor, controlled, need-based                                                        Domain Routing (CIDR) block).
                                                 • Virtualized disk management layer
 access to administrative host                     ensure only account owners can access     Virtual Private Cloud (VPC) provides
 All access logged, monitored, reviewed            storage disks (EBS)                       IPSec VPN access from existing enterprise
 AWS Administrators DO NOT have logical                                                      data center to a set of logically isolated
                                                Support for SSL end point encryption for
 access inside a customer’s VMs, including                                                   AWS resources
                                                API calls
 applications and data
Shared Responsibility Model
       AWS                 Customer
•Facilities          •Operating System
•Physical Security   •Application
•Physical            •Security Groups
 Infrastructure      •Network ACLs
•Network             •Network
 Infrastructure       Configuration
                     •Account Management
AWS Security Resources


 http://aws.amazon.com/security/
 Security Whitepaper
 Risk and Compliance Whitepaper
 Latest Versions May 2011, January 2012
respectively
 Regularly Updated
 Feedback is welcome
AWS Certifications
Sarbanes-Oxley (SOX)
ISO 27001 Certification
Payment Card Industry Data Security
  Standard (PCI DSS) Level 1 Compliant
SAS70(SOC 1) Type II Audit
FISMA A&As
• Multiple NIST Low Approvals to Operate (ATO)
• NIST Moderate, GSA issued ATO
• FedRAMP
DIACAP MAC III Sensitive ATO
Customers have deployed various compliant applications such as HIPAA
(healthcare)
SOC 1 Type II
Amazon Web Services now publishes a Service Organization Controls 1 (SOC 1), Type 2 report
every six months and maintains a favorable unbiased and unqualified opinion from its
independent auditors. AWS identifies those controls relating to the operational performance
and security to safeguard customer data. The SOC 1 report audit attests that AWS’ control
objectives are appropriately designed and that the individual controls defined to safeguard
customer data are operating effectively. Our commitment to the SOC 1 report is on-going and we
plan to continue our process of periodic audits.

The audit for this report is conducted in accordance with the Statement on Standards for
Attestation Engagements No. 16 (SSAE 16) and the International Standards for Assurance
Engagements No. 3402 (ISAE 3402) professional standards. This dual-standard report can meet
a broad range of auditing requirements for U.S. and international auditing bodies. This audit is
the replacement of the Statement on Auditing Standards No. 70 (SAS 70) Type II report.
SOC 1
Control Objective 1: Security Organization
Control Objective 2: Amazon Employee Lifecycle
Control Objective 3: Logical Security
Control Objective 4: Secure Data Handling
Control Objective 5: Physical Security
Control Objective 6: Environmental Safeguards
Control Objective 7: Change Management
Control Objective 8: Data Integrity, Availability and Redundancy
Control Objective 9: Incident Handling
ISO 27001
 AWS has achieved ISO 27001 certification of our
Information Security Management System (ISMS) covering
AWS infrastructure, data centers in all regions worldwide,
and services including Amazon Elastic Compute Cloud
(Amazon EC2), Amazon Simple Storage Service (Amazon
S3) and Amazon Virtual Private Cloud (Amazon VPC). We
have established a formal program to maintain the
certification.
Physical Security

 Amazon has been building large-scale data centers for
many years
 Important attributes:
 •Non-descript facilities
 •Robust perimeter controls
 •Strictly controlled physical access
 •2 or more levels of two-factor auth
 Controlled, need-based access for
  AWS employees (least privilege)
 All access is logged and reviewed
GovCloud    US West       US West    US East South America EU                 Asia         Asia
 (US ITAR   (Northern     (Oregon)   (Northern    (Sao Paulo)   (Ireland)    Pacific      Pacific
  Region)   California)               Virginia)                             (Singapore)   (Tokyo)




  AWS Regions
  AWS Edge Locations
AWS Regions and Availability Zones




   Customer Decides Where Applications and Data Reside
AWS Identity and Access Management
Enables a customer to create multiple Users
and manage the permissions for each of
these Users.
Secure by default; new Users have no access
to AWS until permissions are explicitly
granted. Us
AWS IAM enables customers to minimize the
use of their AWS Account credentials.
Instead all interactions with AWS Services
and resources should be with AWS IAM User
security credentials.er
Customers can enable MFA devices for their
AWS Account as well as for the Users they
have created under their AWS Account with
AWS IAM.
AWS MFA Benefits
 Helps prevent anyone with unauthorized knowledge
of your e-mail address and password from
impersonating you
 Requires a device in your physical possession to
gain access to secure pages on the AWS Portal or to
gain access to the AWS Management Console
 Adds an extra layer of protection to sensitive
information, such as your AWS access identifiers
 Extends protection to your AWS resources such as
Amazon EC2 instances and Amazon S3 data
Amazon EC2 Security
Host operating system
• Individual SSH keyed logins via bastion host for AWS admins
• All accesses logged and audited
Guest operating system
• Customer controlled at root level
• AWS admins cannot log in
• Customer-generated keypairs
Firewall
• Mandatory inbound instance firewall, default deny mode
• Outbound instance firewall available in VPC
• VPC subnet ACLs
Signed API calls
• Require X.509 certificate or customer’s secret AWS key
Amazon EC2 Instance Isolation

     Customer 1        Customer 2             …       Customer n


                                 Hypervisor

                                Virtual Interfaces
      Customer 1
    Security Groups
                        Customer 2
                      Security Groups         …        Customer n
                                                     Security Groups
                                   Firewall
        Physical Interfaces
Virtual Memory & Local Disk

                                                  Amazon EC2
                                                  Instances




                                    Encrypted
                                    File System   Amazon EC2
                                                  Instance
                                    Encrypted
                                    Swap File




•Proprietary Amazon disk management prevents one Instance
 from reading the disk contents of another
•Local disk storage can also be encrypted by the customer for
 an added layer of security
Network Security Considerations
DDoS (Distributed Denial of Service):
• Standard mitigation techniques in effect

MITM (Man in the Middle):
• All endpoints protected by SSL
• Fresh EC2 host keys generated at boot

IP Spoofing:
• Prohibited at host OS level

Unauthorized Port Scanning:
• Violation of AWS TOS
• Detected, stopped, and blocked
• Ineffective anyway since inbound ports
     blocked by default

Packet Sniffing:
• Promiscuous mode is ineffective
Amazon Virtual Private Cloud (VPC)
Create a logically isolated environment in Amazon’s highly scalable infrastructure
Specify your private IP address range into one or more public or private subnets
Control inbound and outbound access to and from individual subnets using stateless
Network Access Control Lists
Protect your Instances with stateful filters for inbound and outbound traffic using
Security Groups
Attach an Elastic IP address to any instance in your VPC so it can be reached
directly from the Internet
Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted
VPN connection and/or AWS Direct Connect
Use a wizard to easily create your VPC in 4 different topologies
Amazon VPC Architecture
                                                    Customer’s isolated
                                                    AWS resources
                                                              Subnets




                                           Router
                          VPN
                      Gateway
Secure VPN                                           Amazon
Connection over the
Internet                                             Web Services
                      AWS Direct Connect             Cloud
                      – Dedicated Path/
                      Bandwidth


                        Customer’s
                        Network
Amazon VPC Architecture
                                                    Customer’s isolated
                                                    AWS resources
                                                              Subnets




                                           Router
                          VPN
                      Gateway
Secure VPN                                           Amazon
Connection over the
Internet                                             Web Services
                      AWS Direct Connect             Cloud
                      – Dedicated Path/
                      Bandwidth


                        Customer’s
                        Network
Amazon VPC Architecture
                                                               Customer’s isolated
                                                               AWS resources
                                                                         Subnets




Internet                                              Router
                                     VPN
                                 Gateway
           Secure VPN                                           Amazon
           Connection over the
           Internet                                             Web Services
                                 AWS Direct Connect             Cloud
                                 – Dedicated Path/
                                 Bandwidth


                                   Customer’s
                                   Network
Amazon VPC Architecture
                                                               Customer’s isolated
                                                               AWS resources
                                                                         Subnets




Internet                                              Router
                                     VPN
                                 Gateway
           Secure VPN                                           Amazon
           Connection over the
           Internet                                             Web Services
                                 AWS Direct Connect             Cloud
                                 – Dedicated Path/
                                 Bandwidth


                                   Customer’s
                                   Network
Amazon VPC Architecture
                                                               Customer’s isolated
                                                               AWS resources
                                                                         Subnets




                        NAT
Internet                                              Router
                                     VPN
                                 Gateway
           Secure VPN                                           Amazon
           Connection over the
           Internet                                             Web Services
                                 AWS Direct Connect             Cloud
                                 – Dedicated Path/
                                 Bandwidth


                                   Customer’s
                                   Network
Amazon VPC Architecture
                                                               Customer’s isolated
                                                               AWS resources
                                                                         Subnets




                        NAT
Internet                                              Router
                                     VPN
                                 Gateway
           Secure VPN                                           Amazon
           Connection over the
           Internet                                             Web Services
                                 AWS Direct Connect             Cloud
                                 – Dedicated Path/
                                 Bandwidth


                                   Customer’s
                                   Network
Amazon VPC Network Security Controls
Amazon VPC - Dedicated Instances
 New option to ensure physical hosts are not shared with
other customers
 $10/hr flat fee per Region + small hourly charge
 Can identify specific Instances as dedicated
 Optionally configure entire VPC as dedicated
AWS Deployment Models
                   Logical Server    Granular        Logical     Physical    Government Only    ITAR          Sample Workloads
                   and Application   Information     Network     server      Physical Network   Compliant
                   Isolation         Access Policy   Isolation   Isolation   and Facility       (US Persons
                                                                             Isolation          Only)

Commercial Cloud                                                                                            Public facing apps. Web
                                                                                                              sites, Dev test etc.

Virtual Private                                                                                           Data Center extension,
Cloud (VPC)                                                                                                   TIC environment, email,
                                                                                                              FISMA low and Moderate



AWS GovCloud                                                                                            US Persons Compliant
(US)                                                                                                          and Government Specific
                                                                                                              Apps.
Thanks!
        Remember to visit
https://aws.amazon.com/security

Mais conteúdo relacionado

Mais procurados

CloudStack-Development-Story
CloudStack-Development-StoryCloudStack-Development-Story
CloudStack-Development-StoryKimihiko Kitase
 
Seminar Report On Amazon Web Service
Seminar Report On Amazon Web ServiceSeminar Report On Amazon Web Service
Seminar Report On Amazon Web Serviceshishupal choudhary
 
AWS 101 Lunch and Learn | London
AWS 101 Lunch and Learn | LondonAWS 101 Lunch and Learn | London
AWS 101 Lunch and Learn | LondonAmazon Web Services
 
AWS and Serverless with Alexa
AWS and Serverless with AlexaAWS and Serverless with Alexa
AWS and Serverless with AlexaRory Preddy
 
AWS 101, London - September 2014
AWS 101, London - September 2014AWS 101, London - September 2014
AWS 101, London - September 2014Ian Massingham
 
Netflix keynote-adrian-qcon
Netflix keynote-adrian-qconNetflix keynote-adrian-qcon
Netflix keynote-adrian-qconYiwei Ma
 
Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Markus Knauer
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the CloudsMarkus Knauer
 
Preparing your IT infrastructure for thanksgiving
Preparing your IT infrastructure for thanksgivingPreparing your IT infrastructure for thanksgiving
Preparing your IT infrastructure for thanksgiving8KMiles Software Services
 
APAC Webinar Apr 10 - Architecting your Mobile App for the Cloud
APAC Webinar Apr 10 - Architecting your Mobile App for the CloudAPAC Webinar Apr 10 - Architecting your Mobile App for the Cloud
APAC Webinar Apr 10 - Architecting your Mobile App for the Cloud8KMiles Software Services
 
AWS Boot Camp in Taipei
AWS Boot Camp in TaipeiAWS Boot Camp in Taipei
AWS Boot Camp in TaipeiErnest Chiang
 
Architectures for open and scalable clouds
Architectures for open and scalable cloudsArchitectures for open and scalable clouds
Architectures for open and scalable cloudsRandy Bias
 
Journey Through the AWS Cloud; Application Services
Journey Through the AWS Cloud; Application ServicesJourney Through the AWS Cloud; Application Services
Journey Through the AWS Cloud; Application ServicesAmazon Web Services
 
Aws 101 A walk-through the aws cloud (2013)
Aws 101  A walk-through the aws cloud (2013)Aws 101  A walk-through the aws cloud (2013)
Aws 101 A walk-through the aws cloud (2013)Martin Yan
 
2009.11.20 BPstudy#27 Amazon Web Service
2009.11.20 BPstudy#27 Amazon Web Service2009.11.20 BPstudy#27 Amazon Web Service
2009.11.20 BPstudy#27 Amazon Web ServiceHiro Fukami
 

Mais procurados (20)

CloudStack-Development-Story
CloudStack-Development-StoryCloudStack-Development-Story
CloudStack-Development-Story
 
Keynote - Werner Vogels
Keynote - Werner Vogels Keynote - Werner Vogels
Keynote - Werner Vogels
 
Keynote from Werner Vogels
Keynote from Werner VogelsKeynote from Werner Vogels
Keynote from Werner Vogels
 
Seminar Report On Amazon Web Service
Seminar Report On Amazon Web ServiceSeminar Report On Amazon Web Service
Seminar Report On Amazon Web Service
 
Introduction to AWS tools
Introduction to AWS toolsIntroduction to AWS tools
Introduction to AWS tools
 
AWS 101 Lunch and Learn | London
AWS 101 Lunch and Learn | LondonAWS 101 Lunch and Learn | London
AWS 101 Lunch and Learn | London
 
AWS and Serverless with Alexa
AWS and Serverless with AlexaAWS and Serverless with Alexa
AWS and Serverless with Alexa
 
Masterclass Webinar: Amazon S3
Masterclass Webinar: Amazon S3Masterclass Webinar: Amazon S3
Masterclass Webinar: Amazon S3
 
AWS 101, London - September 2014
AWS 101, London - September 2014AWS 101, London - September 2014
AWS 101, London - September 2014
 
Netflix keynote-adrian-qcon
Netflix keynote-adrian-qconNetflix keynote-adrian-qcon
Netflix keynote-adrian-qcon
 
Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?Cloud Computing and Eclipse technology - how does it fit together?
Cloud Computing and Eclipse technology - how does it fit together?
 
Raindance - Tooling for the Clouds
Raindance - Tooling for the CloudsRaindance - Tooling for the Clouds
Raindance - Tooling for the Clouds
 
Preparing your IT infrastructure for thanksgiving
Preparing your IT infrastructure for thanksgivingPreparing your IT infrastructure for thanksgiving
Preparing your IT infrastructure for thanksgiving
 
APAC Webinar Apr 10 - Architecting your Mobile App for the Cloud
APAC Webinar Apr 10 - Architecting your Mobile App for the CloudAPAC Webinar Apr 10 - Architecting your Mobile App for the Cloud
APAC Webinar Apr 10 - Architecting your Mobile App for the Cloud
 
Aws overview
Aws overviewAws overview
Aws overview
 
AWS Boot Camp in Taipei
AWS Boot Camp in TaipeiAWS Boot Camp in Taipei
AWS Boot Camp in Taipei
 
Architectures for open and scalable clouds
Architectures for open and scalable cloudsArchitectures for open and scalable clouds
Architectures for open and scalable clouds
 
Journey Through the AWS Cloud; Application Services
Journey Through the AWS Cloud; Application ServicesJourney Through the AWS Cloud; Application Services
Journey Through the AWS Cloud; Application Services
 
Aws 101 A walk-through the aws cloud (2013)
Aws 101  A walk-through the aws cloud (2013)Aws 101  A walk-through the aws cloud (2013)
Aws 101 A walk-through the aws cloud (2013)
 
2009.11.20 BPstudy#27 Amazon Web Service
2009.11.20 BPstudy#27 Amazon Web Service2009.11.20 BPstudy#27 Amazon Web Service
2009.11.20 BPstudy#27 Amazon Web Service
 

Destaque

AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAmazon Web Services
 
How big is the cloud in Australia?
How big is the cloud in Australia?How big is the cloud in Australia?
How big is the cloud in Australia?Oscar Trimboli
 
Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityRussell_Kennedy
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandDamian Hamilton
 
음성 인식
음성 인식음성 인식
음성 인식geumwon
 
Cloud computing for business
Cloud computing for businessCloud computing for business
Cloud computing for businessAzure Group
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcDamian Hamilton
 
Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Johannes van der wiel
 
Transforming Education in the Cloud
Transforming Education in the CloudTransforming Education in the Cloud
Transforming Education in the CloudAmazon Web Services
 
What is everything you know about change was wrong?
What is everything you know about change was wrong?What is everything you know about change was wrong?
What is everything you know about change was wrong?Oscar Trimboli
 
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneAnsible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneKen Thompson
 
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...Amazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...Amazon Web Services
 
ePortfolio Australia 2010
ePortfolio Australia 2010ePortfolio Australia 2010
ePortfolio Australia 2010Sarah Stewart
 
Azure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAzure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAaron Saikovski
 
Designing custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comDesigning custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comSteven Herod
 
Performance Testing in the Cloud
Performance Testing in the CloudPerformance Testing in the Cloud
Performance Testing in the Cloudstuartmoncrieff
 
Journey to the Cloud with Red Hat
Journey to the Cloud with Red HatJourney to the Cloud with Red Hat
Journey to the Cloud with Red HatKen Thompson
 
AWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAmazon Web Services
 

Destaque (20)

AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS CloudAWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
AWS Canberra WWPS Summit 2013 - Disaster Recovery with the AWS Cloud
 
How big is the cloud in Australia?
How big is the cloud in Australia?How big is the cloud in Australia?
How big is the cloud in Australia?
 
Cloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from realityCloud computing in Australia - Separating hype from reality
Cloud computing in Australia - Separating hype from reality
 
HP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New ZealandHP Cloud Business - Australia & New Zealand
HP Cloud Business - Australia & New Zealand
 
음성 인식
음성 인식음성 인식
음성 인식
 
Cloud computing for business
Cloud computing for businessCloud computing for business
Cloud computing for business
 
EMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdcEMC forum 2014 mobility and ngdc
EMC forum 2014 mobility and ngdc
 
Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)Keto cloud® part 6.1 keto-cloud economics (australia)
Keto cloud® part 6.1 keto-cloud economics (australia)
 
Transforming Education in the Cloud
Transforming Education in the CloudTransforming Education in the Cloud
Transforming Education in the Cloud
 
What is everything you know about change was wrong?
What is everything you know about change was wrong?What is everything you know about change was wrong?
What is everything you know about change was wrong?
 
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in MelbourneAnsible @ Red Hat | December 2015 Ansible Meetup in Melbourne
Ansible @ Red Hat | December 2015 Ansible Meetup in Melbourne
 
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
2011 AWS Tour Australia, Closing Keynote: How Amazon.com migrated to AWS, by ...
 
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
AWS Public Sector Symposium 2014 Canberra | Big Data in the Cloud: Accelerati...
 
ePortfolio Australia 2010
ePortfolio Australia 2010ePortfolio Australia 2010
ePortfolio Australia 2010
 
Azure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the TrenchesAzure Large Scale Deployments - Tales from the Trenches
Azure Large Scale Deployments - Tales from the Trenches
 
Azure ARM Templates 101
Azure ARM Templates 101Azure ARM Templates 101
Azure ARM Templates 101
 
Designing custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.comDesigning custom REST and SOAP interfaces on Force.com
Designing custom REST and SOAP interfaces on Force.com
 
Performance Testing in the Cloud
Performance Testing in the CloudPerformance Testing in the Cloud
Performance Testing in the Cloud
 
Journey to the Cloud with Red Hat
Journey to the Cloud with Red HatJourney to the Cloud with Red Hat
Journey to the Cloud with Red Hat
 
AWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney KeynoteAWS Partner Summit Sydney Keynote
AWS Partner Summit Sydney Keynote
 

Semelhante a Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia

Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazon
Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazonKeynote - Cloud e o Futuro com Werner Vogels, CTO da amazon
Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazonAmazon Web Services LATAM
 
Keynote aws summit 2012 final
Keynote aws summit 2012 finalKeynote aws summit 2012 final
Keynote aws summit 2012 finalinfolive
 
Andy Jassy Keynote Sydney Customer Appreciation Day
Andy Jassy Keynote Sydney Customer Appreciation DayAndy Jassy Keynote Sydney Customer Appreciation Day
Andy Jassy Keynote Sydney Customer Appreciation DayAmazon Web Services
 
The Lean Cloud for Startups with AWS - Introduction & AWS Overview
The Lean Cloud for Startups with AWS - Introduction & AWS OverviewThe Lean Cloud for Startups with AWS - Introduction & AWS Overview
The Lean Cloud for Startups with AWS - Introduction & AWS OverviewAmazon Web Services
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAmazon Web Services
 
A lap around AWS
A lap around AWS A lap around AWS
A lap around AWS Aidan Casey
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarAmazon Web Services
 
Overview of Amazon Web Services
Overview of Amazon Web ServicesOverview of Amazon Web Services
Overview of Amazon Web ServicesHarish Ganesan
 
AWS Briefing Dublin - Introduction to AWS
AWS Briefing Dublin - Introduction to AWSAWS Briefing Dublin - Introduction to AWS
AWS Briefing Dublin - Introduction to AWSAmazon Web Services
 
Day 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesDay 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesAmazon Web Services
 
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...Amazon Web Services
 
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarHow to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarAmazon Web Services
 
Journey Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web ApplicationsJourney Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web ApplicationsAmazon Web Services
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesIntroduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesAmazon Web Services
 
AWS User Group UK re:Invent re:Cap
AWS User Group UK re:Invent re:CapAWS User Group UK re:Invent re:Cap
AWS User Group UK re:Invent re:CapIan Massingham
 

Semelhante a Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia (20)

Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazon
Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazonKeynote - Cloud e o Futuro com Werner Vogels, CTO da amazon
Keynote - Cloud e o Futuro com Werner Vogels, CTO da amazon
 
Keynote aws summit 2012 final
Keynote aws summit 2012 finalKeynote aws summit 2012 final
Keynote aws summit 2012 final
 
Andy Jassy Keynote Sydney Customer Appreciation Day
Andy Jassy Keynote Sydney Customer Appreciation DayAndy Jassy Keynote Sydney Customer Appreciation Day
Andy Jassy Keynote Sydney Customer Appreciation Day
 
AWS Services Overview - Ryland
AWS Services Overview - RylandAWS Services Overview - Ryland
AWS Services Overview - Ryland
 
The Lean Cloud for Startups with AWS - Introduction & AWS Overview
The Lean Cloud for Startups with AWS - Introduction & AWS OverviewThe Lean Cloud for Startups with AWS - Introduction & AWS Overview
The Lean Cloud for Startups with AWS - Introduction & AWS Overview
 
Accelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWSAccelerating SharePoint for Mobile Solutions on AWS
Accelerating SharePoint for Mobile Solutions on AWS
 
A lap around AWS
A lap around AWS A lap around AWS
A lap around AWS
 
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - WebinarRunning Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
Running Microsoft SharePoint On AWS - Smartronix and AWS - Webinar
 
Overview of Amazon Web Services
Overview of Amazon Web ServicesOverview of Amazon Web Services
Overview of Amazon Web Services
 
Overview of Amazon Web Services
Overview of Amazon Web ServicesOverview of Amazon Web Services
Overview of Amazon Web Services
 
AWS Briefing Dublin - Introduction to AWS
AWS Briefing Dublin - Introduction to AWSAWS Briefing Dublin - Introduction to AWS
AWS Briefing Dublin - Introduction to AWS
 
Day 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web ServicesDay 1 - Introduction to Cloud Computing with Amazon Web Services
Day 1 - Introduction to Cloud Computing with Amazon Web Services
 
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...
Enterprise Cloud Computing with AWS - How enterprises are using the AWS Cloud...
 
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarHow to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
 
Journey Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web ApplicationsJourney Through the AWS Cloud; Building Powerful Web Applications
Journey Through the AWS Cloud; Building Powerful Web Applications
 
Introduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web ServicesIntroduction to Cloud Computing with Amazon Web Services
Introduction to Cloud Computing with Amazon Web Services
 
AWS Service Drill Downs
AWS Service Drill DownsAWS Service Drill Downs
AWS Service Drill Downs
 
AWS User Group UK re:Invent re:Cap
AWS User Group UK re:Invent re:CapAWS User Group UK re:Invent re:Cap
AWS User Group UK re:Invent re:Cap
 
AWS 101
AWS 101AWS 101
AWS 101
 
What is AWS?
What is AWS?What is AWS?
What is AWS?
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEarley Information Science
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountPuma Security, LLC
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Igalia
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsEnterprise Knowledge
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 

Último (20)

Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptxEIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
EIS-Webinar-Prompt-Knowledge-Eng-2024-04-08.pptx
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Breaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path MountBreaking the Kubernetes Kill Chain: Host Path Mount
Breaking the Kubernetes Kill Chain: Host Path Mount
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
Raspberry Pi 5: Challenges and Solutions in Bringing up an OpenGL/Vulkan Driv...
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
IAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI SolutionsIAC 2024 - IA Fast Track to Search Focused AI Solutions
IAC 2024 - IA Fast Track to Search Focused AI Solutions
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 

Your Future with Cloud Computing - Dr. Werner Vogels - AWS Summit 2012 Australia

  • 1. Your Future with Cloud Computing Dr. Werner Vogels CTO, Amazon.com
  • 2. AWS Global Infrastructure GovCloud US West US West US East South America EU Asia Pacific Asia (US ITAR Region)(Northern California) (Oregon) (Northern Virginia) (Sao Paulo) (Ireland) (Singapore) Pacific (Tokyo) AWS Regions AWS Edge Locations
  • 3. Powering the Most Popular Internet Businesses
  • 6. Partner Ecosystem System Integrators Independent Software Vendors
  • 7. What Enterprises are Running on AWS Business Applications Web Applications Big Data & High Performance Computing Disaster Recovery & Archive
  • 8. What Analysts are Saying about AWS Infrastructure-as-a-Service Leader in 2011 Gartner IaaS Leader in 2011 Forrester Market Share Leader Magic Quadrant Hadoop Wave
  • 9. The Scale of AWS: Amazon S3 Growth Peak Requests: 650,000+ per second Total Number of Objects Stored in Amazon S3
  • 10. The Scale of AWS: Amazon S3 Growth Peak Requests: 650,000+ 762 Billion per second Total Number of Objects Stored in Amazon S3 262 Billion 102 Billion 14 Billion 40 Billion 2.9 Billion Q4 2006 Q4 2007 Q4 2008 Q4 2009 Q4 2010 Q4 2011
  • 11. The Scale of AWS: Amazon S3 Growth 905 Billion Peak Requests: 650,000+ 762 Billion per second Total Number of Objects Stored in Amazon S3 262 Billion 102 Billion 14 Billion 40 Billion 2.9 Billion Q4 2006 Q4 2007 Q4 2008 Q4 2009 Q4 2010 Q4 2011 Q1 2012
  • 12. Our Price Reduction Philosophy Scale & Innovation… … Drive Costs Down Invest in Capital Attract More Customers Invest in Technology 19 Price Reductions Reduce Improve Prices Efficiency
  • 13. AWS Platform Overview Deployment & Administration App Services Compute Storage Database Networking AWS Global Infrastructure
  • 14. AWS Global Infrastructure Secure, redundant Cloud infrastructure for global companies and global apps Regions Deployment & Administration Availability Zones App Services Compute Storage Database Networking Edge Locations AWS Global Infrastructure
  • 15. AWS Networking Services Extend your enterprise infrastructure to the AWS Cloud Amazon Virtual Private Cloud VPN to Extend Your Network Topology to AWS Deployment & Administration AWS Direct Connect Private, Dedicated Connection to AWS App Services Compute Storage Database Amazon Route 53 Networking Scalable Domain Name Service AWS Global Infrastructure
  • 16. Compute Services Scalable Linux and Windows compute services Amazon EC2 Virtual Servers in the AWS Cloud Deployment & Administration Auto Scaling App Services Rule-driven scaling service for EC2 Compute Storage Database Amazon Elastic Load Balancing Networking Virtual load balancers for EC2 AWS Global Infrastructure
  • 17. Storage Services Scalable and Durable High Performance Cloud Storage Amazon S3 Redundant, High-Scale Object Store Deployment & Administration App Services Amazon Elastic Block Store Persistent block storage for EC2 Compute Storage Database Networking AWS Storage Gateway AWS Global Infrastructure Seamless backup of enterprise data to S3
  • 18. Database Services Scalable and Durable High Performance Cloud Storage Amazon DynamoDB High Performance NoSQL Database Service Amazon RDS Deployment & Administration Managed Oracle & MySQL Database Service App Services Compute Storage Database Amazon ElastiCache Managed Memecached Service Networking AWS Global Infrastructure
  • 19. AWS App Services Highly abstracted services that Amazon CloudFront replace software for commonly Global Content Delivery Service needed application functionality Amazon CloudSearch Managed Search Service that Automatically Scales Amazon SWF Deployment & Administration Simple Workflow Service App Services Amazon SNS Simple Notification Service Compute Storage Database Amazon SQS Networking Simple Queuing Service AWS Global Infrastructure Amazon SES Simple Transactional Email Service
  • 20. Ecosystem App Services 3rd party highly abstracted services that Security replace software for commonly needed Services application functionality … and already run on AWS Log Analysis Services Deployment & Administration Developer Services App Services BI Services Compute Storage Database Networking Test Services AWS Global Infrastructure
  • 21. Deployment & Administration 3rd party managed services that replace software for commonly AWS Ecosystem needed application functionality … AWS Management Console and already run on AWS Web-based management interface Amazon Elastic MapReduce Big Data Analytics Service a Deployment & Administration AWS IAM Identity & Access Management App Services Amazon CloudWatch Automated monitoring & alerts Compute Storage Database AWS CloudFormation Networking Automated AWS resource provisioning AWS Elastic Beanstalk AWS Global Infrastructure Java & PHP App deployment & management
  • 22. AWS Pace of Innovation… 82 Including: 61 AWS Oregon Region Elastic Beanstalk (Beta) Amazon SES (Beta) Including: AWS CloudFormation Amazon SNS Amazon RDS for Oracle Amazon CloudFront AWS Direct Connect Amazon Route 53 48 S3 Bucket Policies AWS GovCloud (US) Amazon ElastiCache Including: RDS Multi-AZ Support VPC Virtual Networking Amazon RDS RDS Reserved Databases VPC Dedicated Instances Amazon VPC AWS Import/Export SMS Text Notification Amazon EMR AWS IAM Beta 24 EC2 Auto Scaling AWS Singapore Region CloudFront Live Streaming AWS Tokyo Region EC2 Reserved Instances Cluster Instances for EC2 Including: SAP RDS on EC2 EC2 Elastic Load Balance Micro Instances for EC2 Amazon SimpleDB 9 Amazon Cloudfront AWS Import/Export Amazon Linux AMI SAP BO on EC2 Win Srv 2008 R2 on EC2 AWS Mngmt Console Oracle Apps on EC2 Including: Amazon EBS Win Srv 2003 VM Import Win Srv 2008 on EC2 SUSE Linux on EC2 Amazon FPS EC2 Availability Zones Amazon S3 SSE IBM Apps on EC2 VM Import for EC2 Red Hat Enterprise on EC2 EC2 Elastic IP Addresses 2007 2008 2009 2010 2011
  • 23. …Continuing in 2012 15 Amazon DynamoDB in Europe Storage Gateway in South America CloudFront Live Streaming 9 Route 53 Latency Based Routing PHP and Git for Elastic Beanstalk Live Smooth Streaming for Amazon CloudFront Lowers Content Expiration CloudFront 7 RDS Increases Backup Retention Reserved Cache Nodes for Amazon ElastiCache 6 IAM Password Management AWS CloudSearch Amazon DynamoDB IAM User Access to Account Billing AWS Marketplace AWS Storage Gateway Amazon Simple Workflow Service Amazon RDS Free Trial program DynamoDB Announces BatchWriteItem Amazon RDS on Amazon VPC Amazon DynamoDB in Japan Amazon EC2 Medium Instances Feature AWS IAM Identity Federation ElastiCache in Oregon and Sao Paulo 64-bit AMI on Small & Medium AWS Elastic Beanstalk in Japan Windows Free Usage Tier Amazon S3 Lower Prices EC2 Linux Login from Console DynamoDB in Three Regions New Premium Support Features AWS CloudFormation for VPC Beanstalk Resource Permissions AWS CloudFormation in VPC New AWS Direct Connect Locations New Osaka and Milan Edge Locations EC2, RDS, ElastiCache Lower Prices EC2 CC2 Instance in Amazon VPC January February March April
  • 24.
  • 25.
  • 26. AWS Direct Connect Private secure connection to AWS AWS Cloud Bypass the public Internet AWS Direct Connect High bandwidth and predictable Internet latency Corporate Data Center
  • 27. AWS Storage Gateway Easily backup on-premises data to AWS Snapshots in S3 Amazon S3 Store snapshots in Amazon S3 for backup and disaster recovery Simple software appliance - no changes required to your on-premises architecture AWS Storage Gateway Your Data Center
  • 28. Amazon Simple Workflow Service Run application workflows and business processes on AWS Amazon SWF Manage processes across Cloud, mobile and on-premises environments Cloud Mobile On Premises Use any programming language for workflow logic
  • 29. Amazon DynamoDB Non Relational (NoSQL) Database Fast & predictable performance Seamless Scalability Zero administration
  • 30. Oracle Multi-AZ Replicates database updates across two Availability Zones Automatically fail over to the standby for planned maintenance and unplanned disruptions Increased durability and availability Availability Zone Availability Zone
  • 31. PHP & Git Deployment for AWS Beanstalk git push Elastic Beanstalk Run and manage existing PHP applications with no changes to application code PHP Your App Apache HTTP Server Provides full control over the Amazon Linux infrastructure and the software Elastic Load Balancer yourApp.elasticbeanstalk.com
  • 32. SQL Server & .NET Beanstalk Fully managed Express,Web, Standard and Enterprise Editions of SQL Server 2008 R2 .NET SQL Server (Express Edition) covered Text under the free usage tier for a full year Elastic Beanstalk leverages the Windows SQL Server 2008 R2 AMI and IIS 7.5 Server Deploy using AWS Toolkit for Visual Studio
  • 33. Amazon CloudSearch Fully managed search service Up and running in less than an hour Automatically scales for data and traffic Starting at less than $100 / month
  • 34. AWS Marketplace Find, buy and run software running on AWS More than 250 listings at launch Sell your software or SaaS app to our hundreds of thousands of customers aws.amazon.com/marketplace
  • 35. VPC 2
  • 37. Context •News Ltd runs a single enterprise CMS platform •Supporting 8 major web sites •12 different critical systems •Over 600m page impressions per month •Approximately 2400 new assets created daily 34
  • 38. The Challenge •Complex technology stack – development = 46 servers •All configuration and deployment manual •56 days and 6 teams to build a new environment •Impact – slow project start up – Only run one major project at a time – Lack of innovation The Challenge go from 56 days to 1 day in the cloud 35
  • 39. Current Status •Virtual Private Cloud configured and working •Configuration separated out and all systems packaged •Semi automated build process implemented in EC2 •2 project environments up and running in EC2 •From 56 days to 3 days semi automated 36
  • 40. Current Status •Developers can run up or tear down environments •Two new projects starting this month with poof of concepts in the cloud •Ability to stand up 8 distinct environments quickly •By the end of the month reduce time to 6 hours 37
  • 41. Where to next •An agreed corporate cloud governance model •Seamlessly integrate cloud and physical environments •Automated procedures for managing costs •Move towards a devops model •Move production to the cloud 38
  • 42. The Seven Transformations of Cloud Computing
  • 43. A common misconception: cloud computing is only about…. Saving money Doing things faster
  • 45. Transformation 1: Distributed Architectures Made Easy High Availability
  • 47. Cloud Computing Makes This Easier Distributed Multi-AZ Building Blocks Loosely Coupled Infrastructure Services Process Coordination AWS Regions S3 EC2 SWF Instances DynamoDB SNS Availability Zones Elastic Load SQS RDS Balancer
  • 48. Architecture Templates for Common Patterns MICROSOFT SHAREPOINT aws.amazon.com/architecture
  • 49.
  • 50. … open source Simian Army coming soon
  • 51. Vodafone Hutchison Australia Easwaren Siva General Manager Technology Strategy & Product
  • 52. Vodafone Cricket LIVE Australia Behind the Scenes Vodafone Hutchison Australia
  • 53. Vodafone Australia Vodafone Australia operated by Vodafone Hutchison Australia (VHA) 2009 merger, Vodafone Australia and Hutchison 3G Australia Operates Vodafone, 3 Mobile and Crazy John’s brands VHA mobile services to over 7.0 million customers Shareholders operate Mobile Networks across the globe 50
  • 54. Big Brother Key Learning: ‘Big Brother’ 05 No Smartphones - No Apps Environments Early days of 3G – 3 Mobile 100% 3G 3 Mobile pioneered ‘Live’ Mobile TV with ‘Live’ interactive TV can drive immense traffic towards your Portals and Content 0 200 400 600 800 16:44:23 16:45:23 16:46:23 16:47:23 16:48:23 16:49:23 16:50:23 16:51:23 16:52:23 16:53:23 16:54:23 16:55:23 16:56:23 16:57:23 16:58:23 16:59:23 17:00:23 17:01:23 17:02:23 17:03:23 17:04:23 17:05:23 17:06:23 17:07:23 17:08:23 17:09:23 17:10:23 17:11:23 17:12:23 17:13:23 17:14:23 17:15:23 17:16:23 17:17:23 17:18:23 17:19:23 17:20:23 17:21:23 17:22:23 17:23:23 17:24:23 17:25:23 17:26:23 17:27:23 17:28:23 17:29:23 17:30:23 17:31:23 17:32:23 17:33:23 17:34:23 17:35:23 17:36:23 17:37:23 17:38:23 17:39:23 17:40:23 17:41:23 17:42:23 17:43:23 17:44:23 17:45:23 17:46:23 17:47:23 17:48:23 17:49:23 17:50:23 17:51:23 17:52:23 17:53:23 17:54:23 17:55:23 17:56:23 17:57:23 17:58:23 17:59:23 18:00:23 18:01:23 18:02:23 18:03:23 18:04:23 18:05:23 18:06:23 18:07:23 18:08:23 18:09:23 18:10:23 18:11:23 18:12:23 18:13:23 18:14:23 18:15:23 18:16:23 18:17:23 18:18:23 18:19:23 18:20:23 18:21:23 18:22:23 18:23:23 18:24:23 18:25:23 18:26:23 18:27:23 18:28:23 18:29:23 18:30:23 18:31:23 18:32:23 18:33:23 18:34:23 18:35:23 18:36:23 18:37:23 18:38:23 18:39:23 18:40:23 18:41:23 18:42:23 18:43:23 18:44:23 18:45:23 18:46:23 18:47:23 18:48:23 18:49:23 18:50:23 18:51:23 18:52:23 18:53:23 18:54:23 18:55:23 18:56:23 18:57:23 18:58:23 18:59:23 19:00:23 19:01:23 19:02:23 19:03:23 19:04:23 19:05:23 19:06:23 19:07:23 19:08:23 19:09:23 19:10:23 19:11:23 19:12:23 19:13:23 19:14:23 19:15:23 19:16:23 19:17:23 19:18:23 19:19:23 19:20:23 19:21:23 19:22:23 19:23:23 19:24:23 19:25:23 19:26:23 19:27:23 19:28:23 19:29:23 19:30:23 19:31:23 19:32:23 19:33:23 19:34:23 19:35:23 19:36:23 19:37:23 19:38:23 19:39:23 19:40:23 19:41:23 19:42:23 19:43:23 19:44:23 19:45:23 19:46:23 19:47:23 19:48:23 19:49:23 19:50:23 19:51:23 19:52:23 19:53:23 19:54:23 19:55:23 19:56:23 19:57:23 19:58:23 19:59:23 20:00:23 20:01:23 20:02:23 20:03:23 20:04:23 20:05:23 20:06:23 20:07:23 20:08:23 20:09:23 20:10:23 20:11:23 20:12:23 20:13:23 20:14:23 20:15:23 20:16:23 20:17:23 20:18:23 20:19:23 20:20:23 20:21:23 20:22:23 20:23:23 20:24:23 20:25:23 20:26:23 20:27:23 20:28:23 20:29:23 20:30:23 20:31:23 20:32:23 20:33:23 20:34:23 20:35:23 20:36:23 20:37:23 20:38:23 20:39:23 20:40:23 20:41:23 20:42:23 20:43:23 20:44:23 20:45:23 20:46:23 20:47:23 20:48:23 20:49:23 20:50:23 20:51:23 20:52:23 20:53:23 20:54:23 20:55:23 20:56:23 20:57:23 20:58:23 20:59:23 21:00:23 21:01:23 21:02:23 21:03:23 21:04:23 Total Concurrent Conenctions (Sun 26th June - 16:45 -> 23:00) 21:05:23 21:06:23 21:07:23 21:08:23 21:09:23 21:10:23 21:11:23 21:12:23 21:13:23 21:14:23 21:15:23 21:16:23 21:17:23 21:18:23 21:19:23 21:20:23 21:21:23 21:22:23 21:23:23 21:24:23 21:25:23 21:26:23 21:27:23 21:28:23 21:29:23 21:30:23 21:31:23 21:32:23 21:33:23 21:34:23 21:35:23 21:36:23 21:37:23 21:38:23 21:39:23 21:40:23 21:41:23 21:42:23 21:43:23 21:44:23 21:45:23 21:46:23 21:47:23 21:48:23 21:49:23 21:50:23 21:51:23 21:52:23 21:53:23 21:54:23 21:55:23 21:56:23 21:57:23 21:58:23 21:59:23 22:00:23 22:01:23 22:02:23 22:03:23 22:04:23 22:05:23 22:06:23 22:07:23 22:08:23 22:09:23 22:10:23 22:11:23 22:12:23 22:13:23 22:14:23 22:15:23 22:16:23 22:17:23 22:18:23 22:19:23 22:20:23 22:21:23 22:22:23 22:23:23 22:24:23 22:25:23 22:26:23 22:27:23 22:28:23 22:29:23 22:30:23 22:31:23 22:32:23 22:33:23 22:34:23 22:35:23 22:36:23 51 22:37:23 22:38:23 22:39:23 22:40:23 22:41:23 22:42:23 22:43:23 22:44:23 22:45:23 22:46:23 22:47:23 22:48:23 22:49:23 22:50:23 22:51:23 22:52:23 22:53:23 22:54:23 22:55:23 22:56:23 22:57:23 22:58:23 22:59:23 23:00:23
  • 55. 2011/12 Vodafone Cricket Live Australia iPhone and iPad App Android and Tablet App Scores and Highlights ‘Live’ Cricket TV Streaming Vodafone Viewers verdict
  • 56. 2011/12 Vodafone Cricket Live Australia – Some Stats Over 700K Apps downloaded Approximately 4 Million visits Over 500K streams 24.7TB iPhone streaming data for December Peak 10K Simultaneous Streams Live scores peaked at 1000 rps (Jan)
  • 57. 2011/12 Vodafone Cricket Live Australia – Some Stats Scores Data Requests iPhone Streaming Traffic
  • 58. Cricket App - Vodafone Viewers Verdict Challenge - managing ‘peak’ load cost effectively 55
  • 59. Vodafone Cricket Live Australia - Architecture 56
  • 60. Vodafone Cricket Live Australia - Architecture 57
  • 61. Vodafone Cricket Live Australia – Amazon Components 2 Elastic Load Balancers (ELB) 3 EC2 instances in idle configuration (2 large 1 small), auto expandable up to 9 (8 large 1 small) under load All EC2 instances are bootstrapped to load application after instantiation. 1 S3 bucket to store application itself 2 auto-scaling groups to protect from hardware failure and give expandability. Any failed server will be automatically replaced MySQL relational database service (RDS) instance to hold all data Cloudwatch CPU usage alarms linked to auto-scaling groups for auto expand and auto shrink Contracted ProQuest to build and optimise our AWS instances/environment
  • 62. Key Learnings and Next Step Key Learnings Public Cloud Infrastructure - best cost option for Low Frequency but High Demand services Content Delivery Networks (CDN) and Cloud Computing provides an optimal solution Next Step in Progress Unified Content Management System on Amazon to manage ‘peak demands’ when new devices are released Online Oracle Webcentre Sites / Fatwire 7.6 Content Management System in Production
  • 63. Transformation 2: Embracing the security advantages of shared systems
  • 64.
  • 65. Applications Flexibility to Choose the Right Security Model for Each Application You Infrastructure AWS Security Infrastructure SOC 1/SSAE 16/ISAE 3402, Every Customer Gets the Highest ISO 27001, PCI DSS, HIPAA, ITAR, FISMA Moderate, FIPS 140-2 Level of Security
  • 66. Kit, go faster Transformation 3: From Scaling by Architecture … to Scaling By Command Yes Michael
  • 67. Scaling by Architecture: NoSQL Database Cluster Set up Config & Shard & Rinse & more servers Tune Repartition Repeat
  • 68. Scaling by Command with Amazon DynamoDB Amazon DynamoDB Data is automatically spread across enough hardware to deliver single digit millisecond latency.
  • 69.
  • 70. Transformation 4: A Supercomputer in the Hands of Every Developer
  • 71. Supercomputers used to be Privileges of the Elite Expensive Rationed time Only for the “highest value” jobs
  • 72. Supercomputers by the Hour… for Everyone. AWS built the 42 nd fastest supercomputer in the world 1,064 Amazon EC2 CC2 instances with17,024 cores 240 teraflops cluster (240 trillion calculations per second) Less than $1,000 per hour
  • 73.
  • 75. Instead of $20M in datacenter spend… 51,132 Cores… 3 Hours… $4,828/ hour …
  • 77. Traditional Infrastructure Drives up the Cost of Failure … Innovation Suffers $1 2 How many big ticket 7 M $ technology ideas can your $9 M budget tolerate?
  • 78. Experiment Often & Fail Quickly with AWS  $1 00  $2 K  $5 00  Cost of failure falls dramatically People are free to try out new ideas  $7 5 $3 3  $3 K More risk taking, more innovation  $2 34  $5 00  $6 92  $1 K  $9 6  $1 2
  • 79. REA Group Richard Durnall Head of Delivery
  • 80. • Picture of view from my desk 77
  • 81. A bit about us • Picture of view from my desk 77
  • 83. Distributed Agile helped by
  • 85. Continuous Delivery helped by
  • 87. Hack Days helped by
  • 88.
  • 90. Home Ideas helped by
  • 91. Transformation 6: Big Data without Big Servers
  • 92. Attacking Big Data Problems Shouldn’t Be This Complicated Storing Massive Data Investing In Expensive Volumes Into A Huge Data Server Clusters To Process Warehouse The Data
  • 93. The Cloud Makes This a Lot Simpler Hadoop Clusters Amazon S3 Amazon DynamoDB Amazon EMR Load Data in Organize & Visualize the Cloud Analyze Data Results 1 2 3
  • 97. Low latency. High throughput. Huge volume.
  • 99.
  • 100.
  • 101. 1.Experimen t 2.Learn 3.Plan All images sourced from iStockPhoto.com
  • 102. Transformation 7: Mobile Ecosystem for a Mobile-First World
  • 104.
  • 105. Rich media experience Location context aware Real-time presence driven Social graph based User generated content Recommendations Integration w/ social networks Virtual goods economy Advertisement / premium support Multi-device access
  • 107.
  • 108. PBS Video for iPad PBSKids Video for iPad Launched Nov ‘10 Launched April ‘11
  • 109. Fun With Numbers - February 2012 Total Video Mobile Video Unique visitors: 30M/mo 115k unique visitors per day Visits: 57M/mo 310k daily app opens Page views: 367M / mo 27% of hours watched, 40% of streams Video streams: 145M/mo Hours watched: 2.3M/mo
  • 110. The AWS Mission Enable businesses and developers to use web services to build scalable, sophisticated applications.
  • 111. Security and Privacy in the Cloud Stephen Schmidt Vice President & Chief Information Security Officer
  • 112. AWS Security Model Overview Certifications & Accreditations Shared Responsibility Model Sarbanes-Oxley (SOX) compliance Customer/SI Partner/ISV controls guest ISO 27001 Certification OS-level security, including patching and PCI DSS Level I Certification maintenance HIPAA compliant architecture Application level security, including password and role based access SAS 70(SOC 1) Type II Audit Host-based firewalls, including Intrusion FISMA Low & Moderate ATOs Detection/Prevention Systems DIACAP MAC III-Sensitive Separation of Access  Pursuing DIACAP MAC II–Sensitive Physical Security VM Security Network Security Multi-level, multi-factor controlled access Multi-factor access to Amazon Account Instance firewalls can be configured in environment Instance Isolation security groups; Controlled, need-based access for AWS • Customer-controlled firewall at the The traffic may be restricted by protocol, employees (least privilege) hypervisor level by service port, as well as by source IP Management Plane Administrative Access • Neighboring instances prevented access address (individual IP or Classless Inter- Multi-factor, controlled, need-based Domain Routing (CIDR) block). • Virtualized disk management layer access to administrative host ensure only account owners can access Virtual Private Cloud (VPC) provides All access logged, monitored, reviewed storage disks (EBS) IPSec VPN access from existing enterprise AWS Administrators DO NOT have logical data center to a set of logically isolated Support for SSL end point encryption for access inside a customer’s VMs, including AWS resources API calls applications and data
  • 113. Shared Responsibility Model AWS Customer •Facilities •Operating System •Physical Security •Application •Physical •Security Groups Infrastructure •Network ACLs •Network •Network Infrastructure Configuration •Account Management
  • 114. AWS Security Resources http://aws.amazon.com/security/ Security Whitepaper Risk and Compliance Whitepaper Latest Versions May 2011, January 2012 respectively Regularly Updated Feedback is welcome
  • 115. AWS Certifications Sarbanes-Oxley (SOX) ISO 27001 Certification Payment Card Industry Data Security Standard (PCI DSS) Level 1 Compliant SAS70(SOC 1) Type II Audit FISMA A&As • Multiple NIST Low Approvals to Operate (ATO) • NIST Moderate, GSA issued ATO • FedRAMP DIACAP MAC III Sensitive ATO Customers have deployed various compliant applications such as HIPAA (healthcare)
  • 116. SOC 1 Type II Amazon Web Services now publishes a Service Organization Controls 1 (SOC 1), Type 2 report every six months and maintains a favorable unbiased and unqualified opinion from its independent auditors. AWS identifies those controls relating to the operational performance and security to safeguard customer data. The SOC 1 report audit attests that AWS’ control objectives are appropriately designed and that the individual controls defined to safeguard customer data are operating effectively. Our commitment to the SOC 1 report is on-going and we plan to continue our process of periodic audits. The audit for this report is conducted in accordance with the Statement on Standards for Attestation Engagements No. 16 (SSAE 16) and the International Standards for Assurance Engagements No. 3402 (ISAE 3402) professional standards. This dual-standard report can meet a broad range of auditing requirements for U.S. and international auditing bodies. This audit is the replacement of the Statement on Auditing Standards No. 70 (SAS 70) Type II report.
  • 117. SOC 1 Control Objective 1: Security Organization Control Objective 2: Amazon Employee Lifecycle Control Objective 3: Logical Security Control Objective 4: Secure Data Handling Control Objective 5: Physical Security Control Objective 6: Environmental Safeguards Control Objective 7: Change Management Control Objective 8: Data Integrity, Availability and Redundancy Control Objective 9: Incident Handling
  • 118. ISO 27001 AWS has achieved ISO 27001 certification of our Information Security Management System (ISMS) covering AWS infrastructure, data centers in all regions worldwide, and services including Amazon Elastic Compute Cloud (Amazon EC2), Amazon Simple Storage Service (Amazon S3) and Amazon Virtual Private Cloud (Amazon VPC). We have established a formal program to maintain the certification.
  • 119. Physical Security Amazon has been building large-scale data centers for many years Important attributes: •Non-descript facilities •Robust perimeter controls •Strictly controlled physical access •2 or more levels of two-factor auth Controlled, need-based access for AWS employees (least privilege) All access is logged and reviewed
  • 120. GovCloud US West US West US East South America EU Asia Asia (US ITAR (Northern (Oregon) (Northern (Sao Paulo) (Ireland) Pacific Pacific Region) California) Virginia) (Singapore) (Tokyo) AWS Regions AWS Edge Locations
  • 121. AWS Regions and Availability Zones Customer Decides Where Applications and Data Reside
  • 122. AWS Identity and Access Management Enables a customer to create multiple Users and manage the permissions for each of these Users. Secure by default; new Users have no access to AWS until permissions are explicitly granted. Us AWS IAM enables customers to minimize the use of their AWS Account credentials. Instead all interactions with AWS Services and resources should be with AWS IAM User security credentials.er Customers can enable MFA devices for their AWS Account as well as for the Users they have created under their AWS Account with AWS IAM.
  • 123.
  • 124. AWS MFA Benefits Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you Requires a device in your physical possession to gain access to secure pages on the AWS Portal or to gain access to the AWS Management Console Adds an extra layer of protection to sensitive information, such as your AWS access identifiers Extends protection to your AWS resources such as Amazon EC2 instances and Amazon S3 data
  • 125. Amazon EC2 Security Host operating system • Individual SSH keyed logins via bastion host for AWS admins • All accesses logged and audited Guest operating system • Customer controlled at root level • AWS admins cannot log in • Customer-generated keypairs Firewall • Mandatory inbound instance firewall, default deny mode • Outbound instance firewall available in VPC • VPC subnet ACLs Signed API calls • Require X.509 certificate or customer’s secret AWS key
  • 126. Amazon EC2 Instance Isolation Customer 1 Customer 2 … Customer n Hypervisor Virtual Interfaces Customer 1 Security Groups Customer 2 Security Groups … Customer n Security Groups Firewall Physical Interfaces
  • 127. Virtual Memory & Local Disk Amazon EC2 Instances Encrypted File System Amazon EC2 Instance Encrypted Swap File •Proprietary Amazon disk management prevents one Instance from reading the disk contents of another •Local disk storage can also be encrypted by the customer for an added layer of security
  • 128. Network Security Considerations DDoS (Distributed Denial of Service): • Standard mitigation techniques in effect MITM (Man in the Middle): • All endpoints protected by SSL • Fresh EC2 host keys generated at boot IP Spoofing: • Prohibited at host OS level Unauthorized Port Scanning: • Violation of AWS TOS • Detected, stopped, and blocked • Ineffective anyway since inbound ports blocked by default Packet Sniffing: • Promiscuous mode is ineffective
  • 129. Amazon Virtual Private Cloud (VPC) Create a logically isolated environment in Amazon’s highly scalable infrastructure Specify your private IP address range into one or more public or private subnets Control inbound and outbound access to and from individual subnets using stateless Network Access Control Lists Protect your Instances with stateful filters for inbound and outbound traffic using Security Groups Attach an Elastic IP address to any instance in your VPC so it can be reached directly from the Internet Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted VPN connection and/or AWS Direct Connect Use a wizard to easily create your VPC in 4 different topologies
  • 130. Amazon VPC Architecture Customer’s isolated AWS resources Subnets Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 131. Amazon VPC Architecture Customer’s isolated AWS resources Subnets Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 132. Amazon VPC Architecture Customer’s isolated AWS resources Subnets Internet Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 133. Amazon VPC Architecture Customer’s isolated AWS resources Subnets Internet Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 134. Amazon VPC Architecture Customer’s isolated AWS resources Subnets NAT Internet Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 135. Amazon VPC Architecture Customer’s isolated AWS resources Subnets NAT Internet Router VPN Gateway Secure VPN Amazon Connection over the Internet Web Services AWS Direct Connect Cloud – Dedicated Path/ Bandwidth Customer’s Network
  • 136. Amazon VPC Network Security Controls
  • 137. Amazon VPC - Dedicated Instances New option to ensure physical hosts are not shared with other customers $10/hr flat fee per Region + small hourly charge Can identify specific Instances as dedicated Optionally configure entire VPC as dedicated
  • 138. AWS Deployment Models Logical Server Granular Logical Physical Government Only ITAR Sample Workloads and Application Information Network server Physical Network Compliant Isolation Access Policy Isolation Isolation and Facility (US Persons Isolation Only) Commercial Cloud   Public facing apps. Web sites, Dev test etc. Virtual Private     Data Center extension, Cloud (VPC) TIC environment, email, FISMA low and Moderate AWS GovCloud       US Persons Compliant (US) and Government Specific Apps.
  • 139. Thanks! Remember to visit https://aws.amazon.com/security

Notas do Editor

  1. \n
  2. South America, Sao Paulo region – Dec 2011\n
  3. \n
  4. Small sliver of the enterprises running on us\n
  5. \n
  6. \n
  7. Many organization first choose the AWS cloud for financial reasons, then realize the agility they gain.\n
  8. \n
  9. \n
  10. \n
  11. \n
  12. \n
  13. \n
  14. \n
  15. \n
  16. \n
  17. \n
  18. \n
  19. \n
  20. \n
  21. \n
  22. \n
  23. \n
  24. Amazon Web Services provides highly scalable computing infrastructure that enables organizations around the world to requisition compute power, storage, and other on-demand services in the cloud.  These services are available on demand so a customer doesn’t need to think about controlling them, maintaining them or even where they are located. \n\nLet’s take a look at the services that we provide.\n
  25. \n
  26. One of the reasons we believe companies are adopting these services so quickly is because of our rapid innovation based on customer feedback.  In the past four years we’ve delivered over 200 new technology releases.\n
  27. One of the reasons we believe companies are adopting these services so quickly is because of our rapid innovation based on customer feedback.  In the past four years we’ve delivered over 200 new technology releases.\n
  28. \n
  29. \n
  30. \n
  31. \n
  32. \n
  33. \n
  34. \n
  35. \n
  36. \n
  37. \n
  38. \n
  39. \n
  40. How many people work on Fatwire on a daily basis\n
  41. \n
  42. \n
  43. \n
  44. \n
  45. 2\n
  46. \n
  47. 1/3 of all people on the internet daily use AWS - WIRED\n
  48. \n
  49. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  50. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  51. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  52. service that randomly kills EC2 instances in Netflix production environment\nForces engineers to build services that automatically recover without any manual intervention\nPlan for failure as a religion\nConstantly tests Netflix’s ability to succeed despite failure so they are prepared when unexpected events happen\n
  53. \n
  54. \n
  55. \n
  56. \n
  57. \n
  58. \n
  59. \n
  60. \n
  61. \n
  62. \n
  63. \n
  64. \n
  65. \n
  66. \n
  67. \n
  68. \n
  69. \n
  70. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  71. \n
  72. - Now we’re going to show a video introducing DynamoDB\n
  73. \n
  74. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  75. \n
  76. First let me tell you a bit about Cycle. If you'd have told me 7 years ago when I started bootstrapping Cycle, that today 2 of the 3 largest banks, 3 of the 5 largest insurance, and 4 of the 5 largest Pharma would use Cycle's software to manage supercomputing-class computations, I'd have said you were crazy. The AWS Cloud helps companies do amazing things\n
  77. \n
  78. \n
  79. \n
  80. …Treat failure as the common case instead of exception. But it was extremely hard to implement, you had to do al lot of hard work to make that reality and many software system have been built to try and make this easier. \n
  81. \n
  82. \n
  83. Today - markets, brands, financials, growth profile\n\nHistory\nstartup, listing > bankrupt\nearly growth > leadership\ninternationalisation > defocused/stagnation\n2008: leadership change\n2009: rebuilding a healthy core. Key: TW (Agile, XD), LM (platform), HW (reliable ops); core group of key staff (~25), lots of sweat and commitment from all staff, lots of contractors.\nMid 2010: people (Delivery).\n\nCurrent focus:\nbroadening the value proposition > market maker, not just market participant.\noptimising operational performance > global operating model.\n\nFinancial performance\n
  84. \n
  85. Continuous delivery\n
  86. Register. Opportunity to guide customer-focused thinking, without telling. What unmet customer need are we solving?\nHacking. Get your product or business or design personnel to participate in teams.\nShowcase and vote. Watch your team start to vote up hack entries that are most likely to have the biggest customer impacts, rather than just the coolest tech stuff.\n
  87. But if you can’t tighten the loop between coding and deploying – reducing the time between having an idea and testing it in the wild - it becomes a tough effort to change the business mindset from planning perfection to planning experiments.\n
  88. Continuous delivery\n
  89. \n
  90. \n
  91. As you might guess, we run these big data jobs in the Cloud with Amazon Web Services. We load web site log file data into Amazon S3, use Amazon Elastic MapReduce to spin up large clusters of virtual severs to process the data and then use the results to update our product catalog.\n
  92. \n
  93. 1st... the way online advertising is bought and sold is fundamentally broken. The typical process is a media buyer builds a media plan using ratings data from companies like Nielsen or Comscore. They then send request-for-proposal documents to publishers, who then prepare proposal documents. Negotiation then ensues and at the end, a contract is signed. Once the media contract begins, its difficult to change if you're not meeting your goals. So, the process is very inefficient in the preparation and execution of the advertising campaign.\n\nNow, a lot of people also had this insight, and there were many products trying to automate the media buying process. But at their core, they were automating a fundamentally broken process.\n
  94. 2nd... if you abstract the media buying system, it is a one-sided market. In fact, structurally, it is a commodity market. So the insight here is that the solution is to trade media not using the old system which was basically "forward contracts" that have little flexibility, but rather execute the trades in real time as a "spot market”.\n
  95. And to execute these trades programmatically, leveraging powerful machine learning algorithms. In this sort of system, we watch every ad impression available and make a buying decision instantaneously of whether to bid for the impression, how much to bid and which ad to show. If a strategy isn't working, you can pause it within minutes. To start a new campaign takes only a few minutes.\n\nOnly a few companies had this insight, and we were fortunate to be in the leading group.\n\nOK - so those two insights were the hard bit. The easy bit was implementing that system.... no, wait, other way around. Actually, it turns out\nthat the implementation is very challenging. Because we're watching every ad impression in the market, and making decisions in real-time, we have\nthree very hard constraints:\n\n1st... Very low latency: we have to make a high quality decision on which ad to show and how much to pay in milliseconds.\n2nd... Very high throughput: we have to make these very fast decisions over 7 million times every minute.\n3rd... Very high volume: we see billions of ad impressions every single day. And we have to report, analyse and learn from all this data.\n
  96. Hence the "Big Data" challenge:\n\nIn raw terms, we have over a petabyte of raw log data stored on Amazon Simple Storage Service (S3), and that is growing at 4 terabytes per day or 130 terabytes per month.\nWhen this is compressed down and actually stored, it compresses to around 100 TB. \n\nWhen you're seeing billions of new events every day and processing terabytes per day, traditional database systems just don't cope. So, to help us with this volume, we use Hadoop MapReduce jobs. This is all powered by Amazon Elastic Map Reduce. At any given time, we might have 30-40 Hadoop nodes running various processing jobs, from report aggregations to machine learning algorithms.\n
  97. At the time when we started using Amazon Elastic Map Reduce, we didn't have CAPEX, time and in-house skills to setup and maintain a 30-40 node Hadoop cluster required to run these sorts of processing jobs. So Amazon Elastic Map Reduce really enabled us to quickly build the Big Data capability we required without any big up-front investment that would have easily cost us several months and a couple hundred thousand dollars. This accelerated our product time-to-market by months.\n
  98. Another requirement is to do Machine Learning "at scale". Sometimes, we want to test a new algorithm. With Amazon Elastic Map Reduce, we can run a once-off job on months of data (literally 100's of terabytes) and test the new algorithm in a couple of hours. If we were using a non-cloud Hadoop cluster, this sort of agile analytics would be cost prohibitive and time consuming. We can do this sort of analysis in hours instead of weeks. With Amazon Elastic Map Reduce, we can innovate quickly and continuously enhance our customer offerings.\n
  99. Finally, some of the key learnings from our adoption of Amazon Web Services:\n1) Experiment: It is fast and cheap to experiment, so just get started and iterate. When the experiment is over, just turn off the services.\n2) Learn: Spend some time on the forums and reading the documentation to pick up some tips and pointers to optimise.\n3) Plan: Just because its "in the cloud", doesn't excuse you from having to architect a fault tolerant solution and think about redundancy and single points of failure. Amazon just makes it easier to execute the fault tolerant solutions - you still have to do the thinking and planning. In any reasonable large, complicated distributed system, things are bound to go wrong-network connections timeout, jobs fail to start, and machines occasionally die. Build things expecting failure and put in place the necessary mechanisms to gracefully deal with these minor failures.\n\nThank you for your time today and the opportunity to share a bit about Brandscreen...our challenges with Big Data...and how we're solving those challenges with Amazon Web Services.\n
  100. Highly competitive, but requires rich applications\n
  101. \n
  102. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  103. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  104. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  105. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  106. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  107. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  108. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  109. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  110. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  111. The new cost of doing business\nThis is what new application builders just need to do to just enter the market\nHeroku doesn’t give you this, nor does AWS\n
  112. \n
  113. \n
  114. Also not shown here is our iPhone app which launched in January of 2011.\nWe are currently developing a number of new mobile products which will target other mobile platforms as well as reach alternative platforms such as over-the-top devices\n
  115. PBS is #1 amongst major Networks for unique visitors\n9 months ago we were at 15% which we considered to be very good\n
  116. \n
  117. \n
  118. \n
  119. \n
  120. Amazon Web Services (AWS) delivers a scalable cloud computing platform with high availability and dependability, offering the flexibility to enable customers to build a wide range of applications. Helping to protect the confidentiality, integrity, and availability of our customers’ systems and data is of the utmost importance to AWS, as is maintaining customer trust and confidence. This document is intended to answer questions such as, “How does AWS help me protect my data?” Specifically, AWS physical and operational security processes are described for network and server infrastructure under AWS’ management, as well as service-specific security implementations. This document provides an overview of security as it pertains to the following areas relevant to AWS: \n \nShared Responsibility Environment\nControl Environment Summary\nSecure Design Principles\nBackup\nMonitoring\nInformation and Communication\nEmployee Lifecycle\nPhysical Security\nEnvironmental Safeguards\nConfiguration Management \nBusiness Continuity Management\nBackups\nFault Separation \nAmazon Account Security Features\nNetwork Security\nAWS Service Specific Security \nAmazon Elastic Compute Cloud (Amazon EC2) Security\nAmazon Virtual Private Cloud (Amazon VPC)\nAmazon Simple Storage Service (Amazon S3) Security\nAmazon SimpleDB Security\nAmazon Relational Database Service (Amazon RDS) Security\nAmazon Simple Queue Service (Amazon SQS) Security\nAmazon Simple Notification Service (SNS) Security\nAmazon CloudWatch Security\nAuto Scaling Security\nAmazon CloudFront Security\nAmazon Elastic MapReduce Security\n \n
  121. Risk and Compliance Overview\nSince AWS and its customers share control over the IT environment, both parties have responsibility for managing the IT environment. AWS’ part in this shared responsibility includes providing its services on a highly secure and controlled platform and providing a wide array of security features customers can use. The customers’ responsibility includes configuring their IT environments in a secure and controlled manner for their purposes. While customers don’t communicate their use and configurations to AWS, AWS does communicate its security and control environment relevant to customers. AWS does this by doing the following:\n \nObtaining industry certifications and independent third party attestations described in this document\nPublishing information about the AWS security and control practices in whitepapers and web site content\n \nPlease see the AWS Security Whitepaper, located at www.aws.amazon.com/security, for a more detailed description of AWS security. The AWS Security Whitepaper covers AWS’s general security controls and service-specific security.\n \nShared Responsibility Environment\nMoving IT infrastructure to AWS services creates a model of shared responsibility between the customer and AWS. This shared model can help relieve customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. The customer assumes responsibility and management of, but not limited to, the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall. Customers should carefully consider the services they choose as their responsibilities vary depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations. It is possible for customers to enhance security and/or meet their more stringent compliance requirements by leveraging technology such as host based firewalls, host based intrusion detection/prevention, encryption and key management. The nature of this shared responsibility also provides the flexibility and customer control that permits the deployment of solutions that meet industry-specific certification requirements. \n \nThis customer/AWS shared responsibility model also extends to IT controls. Just as the responsibility to operate the IT environment is shared between AWS and its customers, so is the management, operation and verification of IT controls shared. AWS can help relieve customer burden of operating controls by managing those controls associated with the physical infrastructure deployed in the AWS environment that may previously have been managed by the customer. As every customer is deployed differently in AWS, customers can take advantage of shifting management of certain IT controls to AWS which results in a (new) distributed control environment. Customers can then use the AWS control and compliance documentation available to them (described in the “AWS Certifications and Third-party Attestations” section of this document) to perform their control evaluation and verification procedures as required. \n \nThe next section provides an approach on how AWS customers can evaluate and validate their distributed control environment effectively. \n \nStrong Compliance Governance\nAs always, AWS customers are required to continue to maintain adequate governance over the entire IT control environment regardless of how IT is deployed. Leading practices include an understanding of required compliance objectives and requirements (from relevant sources), establishment of a control environment that meets those objectives and requirements, an understanding of the validation required based on the organization’s risk tolerance, and verification of the operating effectiveness of their control environment. Deployment in the AWS cloud gives enterprises different options to apply various types of controls and various verification methods.\n \nStrong customer compliance and governance might include the following basic approach: \n \nReview information available from AWS together with other information to understand as much of the entire IT environment as possible, and then document all compliance requirements.\nDesign and implement control objectives to meet the enterprise compliance requirements. \nIdentify and document controls owned by outside parties.\nVerify that all control objectives are met and all key controls are designed and operating effectively.\n \nApproaching compliance governance in this manner will help companies gain a better understanding of their control environment and will help clearly delineate the verification activities to be performed.\n\nFISMA\nAWS enables U.S. government agency customers to achieve and sustain compliance with the Federal Information Security Management Act (FISMA). AWS has been certified and accredited to operate at the FISMA-Low level. AWS has also completed the control implementation and successfully passed the independent security testing and evaluation required to operate at the FISMA-Moderate level. AWS is currently pursuing a certification and accreditation to operate at the FISMA-Moderate level from government agencies.\n
  122. SAS 70 Type II\nAmazon Web Services publishes a Statement on Auditing Standards No. 70 (SAS 70) Type II Audit report every six months and maintains a favorable opinion from its independent auditors. AWS identifies those controls relating to the operational performance and security of its services. Through the SAS 70 Type II report, an auditor evaluates the design of the stated control objectives and control activities and attests to the effectiveness of their design. The auditors also verify the operation of those controls, attesting that the controls are operating as designed. Provided a customer has signed a non-disclosure agreement with AWS, this report is available to customers who require a SAS 70 to meet their own audit and compliance needs.\n \nThe AWS SAS 70 control objectives are provided here. The report itself identifies the control activities that support each of these objectives.\n \nSecurity Organization\n \nControls provide reasonable assurance that information security policies have been implemented and communicated throughout the organization.\nAmazon User Access\n \nControls provide reasonable assurance that procedures have been established so that Amazon user accounts are added, modified and deleted in a timely manner and are reviewed on a periodic basis.\nLogical Security\n \nControls provide reasonable assurance that unauthorized internal and external access to data is appropriately restricted and access to customer data is appropriately segregated from other customers.\nSecure Data Handling\n \nControls provide reasonable assurance that data handling between the customer’s point of initiation to an AWS storage location is secured and mapped accurately.\nPhysical Security\n \nControls provide reasonable assurance that physical access to Amazon’s operations building and the data centers is restricted to authorized personnel.\nEnvironmental Safeguards\n \nControls provide reasonable assurance that procedures exist to minimize the effect of a malfunction or physical disaster to the computer and data center facilities.\nChange Management\n \nControls provide reasonable assurance that changes (including emergency / non-routine and configuration) to existing IT resources are logged, authorized, tested, approved and documented.\nData Integrity, Availability and Redundancy\nControls provide reasonable assurance that data integrity is maintained through all phases including transmission, storage and processing.\nIncident Handling\n \nControls provide reasonable assurance that system incidents are recorded, analyzed, and resolved.\n \nAWS’ commitment to SAS 70 is on-going, and AWS will continue the process of periodic audits. In addition, in 2011 AWS plans to convert the SAS 70 to the new Statement on Standards for Attestation Engagements (SSAE) 16 format (equivalent to the International Standard on Assurance Engagements [ISAE] 3402). The SSAE 16 standard replaces the existing SAS 70 standard, and implementation is currently expected to be required by all SAS 70 publishers in 2011. This new report will be similar to the SAS 70 Type II report, but with additional required disclosures and a modified format.\n
  123. Control Objective 1: Security Organization: Controls provide reasonable assurance that information security policies have been implemented and\ncommunicated throughout the organization.\nControl Objective 2: Amazon Employee Lifecycle: Controls provide reasonable assurance that procedures have been established so that Amazon employee\nuser accounts are added, modified and deleted in a timely manner and reviewed on a periodic basis.\nControl Objective 3: Logical Security: Controls provide reasonable assurance that unauthorized internal and external access to data is\nappropriately restricted and access to customer data is appropriately segregated from other customers.\nControl Objective 4: Secure Data Handling: Controls provide reasonable assurance that data handling between the customer’s point of initiation to\nan AWS storage location is secured and mapped accurately.\nControl Objective 5: Physical Security: Controls provide reasonable assurance that physical access to Amazon’s operations building and the data centers is restricted to authorized personnel.\nControl Objective 6: Environmental Safeguards: Controls provide reasonable assurance that procedures exist to minimize the effect of a malfunction or\nphysical disaster to the computer and data center facilities.\nControl Objective 7: Change Management: Controls provide reasonable assurance that changes (including emergency / non-routine and configuration) to existing IT resources are logged, authorized, tested, approved and documented.\nControl Objective 8: Data Integrity, Availability and Redundancy: Controls provide reasonable assurance that data integrity is maintained through all phases including\ntransmission, storage and processing.\nControl Objective 9: Incident Handling: Controls provide reasonable assurance that system incidents are recorded, analyzed, and resolved.\n
  124. ISO 27001\nAWS has achieved ISO 27001 certification of our Information Security Management System (ISMS) covering AWS infrastructure, data centers, and services including Amazon EC2, Amazon S3 and Amazon VPC. ISO 27001/27002 is a widely-adopted global security standard that sets out requirements and best practices for a systematic approach to managing company and customer information that’s based on periodic risk assessments appropriate to ever-changing threat scenarios. In order to achieve the certification, a company must show it has a systematic and ongoing approach to managing information security risks that affect the confidentiality, integrity, and availability of company and customer information. This certification reinforces Amazon’s commitment to providing significant information regarding our security controls and practices. AWS’s ISO 27001 certification includes all AWS data centers in all regions worldwide and AWS has established a formal program to maintain the certification. AWS provides additional information and frequently asked questions about its ISO 27001 certification on their web site.\n
  125. Physical Security\nAmazon has many years of experience in designing, constructing, and operating large-scale datacenters. This experience has been applied to the AWS platform and infrastructure. AWS datacenters are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access datacenter floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. \n \nAWS only provides datacenter access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if they continue to be an employee of Amazon or Amazon Web Services. All physical access to datacenters by AWS employees is logged and audited routinely.\n
  126. Amazon Web Services is steadily expanding its global infrastructure to help customers achieve lower latency and higher throughput. As our customers grow their businesses, AWS will continue to provide infrastructure that meets their global requirements.\n
  127. You can choose to deploy and run your applications in multiple physical locations within the AWS cloud. Amazon Web Services are available in geographic Regions. When you use AWS, you can specify the Region in which your data will be stored, instances run, queues started, and databases instantiated. For most AWS infrastructure services, including Amazon EC2, there are eight regions: US East (Northern Virginia), US West (Northern California), EU (Ireland), Asia Pacific (Singapore) and Asia Pacific (Tokyo), AWS GovCloud (US), US West (Oregon), and South America (Sao Paulo).\n\nWithin each Region are Availability Zones (AZs). Availability Zones are distinct locations that are engineered to be insulated from failures in other Availability Zones and provide inexpensive, low latency network connectivity to other Availability Zones in the same Region. By launching instances in separate Availability Zones, you can protect your applications from a failure (unlikely as it might be) that affects an entire zone. Regions consist of one or more Availability Zones, are geographically dispersed, and are in separate geographic areas or countries. The Amazon EC2 service level agreement commitment is 99.95% availability for each Amazon EC2 Region.\n
  128. AWS Identity and Access Management (AWS IAM)\nAWS Identity and Access Management (AWS IAM) enables a customer to create multiple users and manage the permissions for each of these users within their AWS Account. A user is an identity (within a customer AWS Account) with unique security credentials that can be used to access AWS Services. AWS IAM eliminates the need to share passwords or access keys, and makes it easy to enable or disable a user’s access as appropriate.\n \nAWS IAM enables customers to implement security best practices, such as least privilege, by granting unique credentials to every user within their AWS Account and only granting permission to access the AWS Services and resources required for the users to perform their job. AWS IAM is secure by default; new users have no access to AWS until permissions are explicitly granted.\n \nAWS IAM enables customers to minimize the use of their AWS Account credentials. Instead all interactions with AWS Services and resources should be with AWS IAM user security credentials. More information about AWS Identity and Access Management (AWS IAM) is available on the AWS website: http://aws.amazon.com/iam/\n
  129. \n
  130. \n
  131. Amazon Elastic Compute Cloud (Amazon EC2) Security\nSecurity within Amazon EC2 is provided on multiple levels: the operating system (OS) of the host system, the virtual instance operating system or guest OS, a firewall, and signed API calls. Each of these items builds on the capabilities of the others. The goal is to protect against data contained within Amazon EC2 from being intercepted by unauthorized systems or users and to provide Amazon EC2 instances themselves that are as secure as possible without sacrificing the flexibility in configuration that customers demand. \n \nMultiple Levels of Security\nHost Operating System: Administrators with a business need to access the management plane are required to use multi-factor authentication to gain access to purpose-built administration hosts. These administrative hosts are systems that are specifically designed, built, configured, and hardened to protect the management plane of the cloud. All such access is logged and audited. When an employee no longer has a business need to access the management plane, the privileges and access to these hosts and relevant systems are revoked.\n \nGuest Operating System: Virtual instances are completely controlled by the customer. Customers have full root access or administrative control over accounts, services, and applications. AWS does not have any access rights to customer instances and cannot log into the guest OS. AWS recommends a base set of security best practices to include disabling password-only access to their hosts, and utilizing some form of multi-factor authentication to gain access to their instances (or at a minimum certificate-based SSH Version 2 access). Additionally, customers should employ a privilege escalation mechanism with logging on a per-user basis. For example, if the guest OS is Linux, after hardening their instance, they should utilize certificate-based SSHv2 to access the virtual instance, disable remote root login, use command-line logging, and use ‘sudo’ for privilege escalation. Customers should generate their own key pairs in order to guarantee that they are unique, and not shared with other customers or with AWS. \n \nFirewall: Amazon EC2 provides a complete firewall solution; this mandatory inbound firewall is configured in a default deny-all mode and Amazon EC2 customers must explicitly open the ports needed to allow inbound traffic. The traffic may be restricted by protocol, by service port, as well as by source IP address (individual IP or Classless Inter-Domain Routing (CIDR) block).\n \n
  132. The Hypervisor\nAmazon EC2 currently utilizes a highly customized version of the Xen hypervisor, taking advantage of paravirtualization (in the case of Linux guests). Because paravirtualized guests rely on the hypervisor to provide support for operations that normally require privileged access, the guest OS has no elevated access to the CPU. The CPU provides four separate privilege modes: 0-3, called rings. Ring 0 is the most privileged and 3 the least. The host OS executes in Ring 0. However, rather than executing in Ring 0 as most operating systems do, the guest OS runs in a lesser-privileged Ring 1 and applications in the least privileged Ring 3. This explicit virtualization of the physical resources leads to a clear separation between guest and hypervisor, resulting in additional security separation between the two. \n \nInstance Isolation\nDifferent instances running on the same physical machine are isolated from each other via the Xen hypervisor. Amazon is active in the Xen community, which provides awareness of the latest developments. In addition, the AWS firewall resides within the hypervisor layer, between the physical network interface and the instance's virtual interface. All packets must pass through this layer, thus an instance’s neighbors have no more access to that instance than any other host on the Internet and can be treated as if they are on separate physical hosts. The physical RAM is separated using similar mechanisms. \n
  133. Customer instances have no access to raw disk devices, but instead are presented with virtualized disks. The AWS proprietary disk virtualization layer automatically resets every block of storage used by the customer, so that one customer’s data are never unintentionally exposed to another. AWS recommends customers further protect their data using appropriate means. One common solution is to run an encrypted file system on top of the virtualized disk device. \n
  134. Network Security\nThe AWS network provides significant protection against traditional network security issues and the customer can implement further protection. The following are a few examples:\n \nDistributed Denial Of Service (DDoS) Attacks\nAWS Application Programming Interface (API) endpoints are hosted on large, Internet-scale, world-class infrastructure that benefits from the same engineering expertise that has built Amazon into the world’s largest online retailer. Proprietary DDoS mitigation techniques are used. Additionally, AWS’s networks are multi-homed across a number of providers to achieve Internet access diversity. \n \nMan In the Middle (MITM) Attacks \nAll of the AWS APIs are available via SSL-protected endpoints which provide server authentication. Amazon EC2 AMIs automatically generate new SSH host certificates on first boot and log them to the instance’s console. Customers can then use the secure APIs to call the console and access the host certificates before logging into the instance for the first time. Customers are encouraged to use SSL for all of their interactions with AWS.\n \nIP Spoofing\nAmazon EC2 instances cannot send spoofed network traffic. The AWS-controlled, host-based firewall infrastructure will not permit an instance to send traffic with a source IP or MAC address other than its own.\n \nPort Scanning \nUnauthorized port scans by Amazon EC2 customers are a violation of the AWS Acceptable Use Policy. Violations of the AWS Acceptable Use Policy are taken seriously, and every reported violation is investigated. Customers can report suspected abuse via the contacts available on our website at: http://aws.amazon.com/contact-us/report-abuse/ When unauthorized port scanning is detected it is stopped and blocked. Port scans of Amazon EC2 instances are generally ineffective because, by default, all inbound ports on Amazon EC2 instances are closed and are only opened by the customer. The customer’s strict management of security groups can further mitigate the threat of port scans. If the customer configures the security group to allow traffic from any source to a specific port, then that specific port will be vulnerable to a port scan. In these cases, the customer must use appropriate security measures to protect listening services that may be essential to their application from being discovered by an unauthorized port scan. For example, a web server must clearly have port 80 (HTTP) open to the world, and the administrator of this server is responsible for the security of the HTTP server software, such as Apache. Customers may request permission to conduct vulnerability scans as required to meet their specific compliance requirements. These scans must be limited to the customer’s own instances and must not violate the AWS Acceptable Use Policy. Advanced approval for these types of scans can be initiated by submitting a request via the website at: https://aws-portal.amazon.com/gp/aws/html-forms-controller/contactus/AWSSecurityPenTestRequest \n \nPacket sniffing by other tenants\nIt is not possible for a virtual instance running in promiscuous mode to receive or “sniff” traffic that is intended for a different virtual instance. While customers can place their interfaces into promiscuous mode, the hypervisor will not deliver any traffic to them that is not addressed to them. Even two virtual instances that are owned by the same customer located on the same physical host cannot listen to each other’s traffic. Attacks such as ARP cache poisoning do not work within Amazon EC2 and Amazon VPC. While Amazon EC2 does provide ample protection against one customer inadvertently or maliciously attempting to view another’s data, as a standard practice customers should encrypt sensitive traffic.\n\nConfiguration Management \nEmergency, non-routine, and other configuration changes to existing AWS infrastructure are authorized, logged, tested, approved, and documented in accordance with industry norms for similar systems. Updates to AWS’ infrastructure are done to minimize any impact on the customer and their use of the services. AWS will communicate with customers, either via email, or through the AWS Service Health Dashboard (http://status.aws.amazon.com/) when service use is likely to be adversely affected. \n \nSoftware\nAWS applies a systematic approach to managing change so that changes to customer impacting services are thoroughly reviewed, tested, approved and well communicated. \n \nAWS’ change management process is designed avoid unintended service disruptions and to maintain the integrity of service to the customer. Changes deployed into production environments are: \nReviewed: Peer reviews of the technical aspects of a change\nTested: being applied will behave as expected and not adversely impact performance\nApproved: to provide appropriate oversight and understanding of business impact \n \nChanges are typically pushed into production in a phased deployment starting with lowest impact areas. Deployments are tested on a single system and closely monitored so impact can be evaluated. Service owners have a number of configurable metrics that measure the health of the service’s upstream dependencies. These metrics are closely monitored with thresholds and alarming in place. Rollback procedures are documented in the Change Management (CM) ticket. \n \nWhen possible, changes are scheduled during regular change windows. Emergency changes to production systems that require deviations from standard change management procedures are associated with an incident and are logged and approved as appropriate.\n \nPeriodically, AWS performs self-audits of changes to key services to monitor quality, maintain high standards and to facilitate continuous improvement of the change management process. Any exceptions are analyzed to determine the root cause and appropriate actions are taken to bring the change into compliance or roll back the change if necessary. Actions are then taken to address and remediate the process or people issue.\n \nInfrastructure\nAmazon’s Corporate Applications team develops and manages software to automate IT processes for UNIX/Linux hosts in the areas of third-party software delivery, internally developed software and configuration management. The Infrastructure team maintains and operates a UNIX/Linux configuration management framework to address hardware scalability, availability, auditing, and security management. By centrally managing hosts through the use of automated processes that manage change, the Company is able to achieve its goals of high availability, repeatability, scalability, robust security and disaster recovery. Systems and Network Engineers monitor the status of these automated tools on a daily basis, reviewing reports to respond to hosts that fail to obtain or update their configuration and software.\n \nInternally developed configuration management software is installed when new hardware is provisioned. These tools are run on all UNIX hosts to validate that they are configured and that software is installed in compliance with standards determined by the role assigned to the host. This configuration management software also helps to regularly update packages that are already installed on the host. Only approved personnel enabled through the permissions service may log in to the central configuration management servers. \n
  135. \n
  136. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  137. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  138. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  139. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  140. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  141. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  142. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  143. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  144. Point of Slide: to explain VPC's high-level architecture, walking them through the discrete elements of a VPC, and a specific data flow to exemplify 1) data-in-transit security and continued 1) AAA control by the enterprise.\n\nAWS (”orange cloud"): What everybody knows of AWS today.\n\nCustomer’s Network (“blue square”): The customer’s internal IT infrastructure.\n\nVPC (”blue square on top of orange cloud"): Secure container for other object types; includes Border Router for external connectivity. The isolated resources that customers have in the AWS cloud.\n\nCloud Router (“orange router surrounded by clouds”): Lives within a VPC; anchors an AZ; presents stateful filtering.\n\nCloud Subnet (“blue squares” inside VPC): connects instances to a Cloud Router.\n\nVPN Connection: Customer Gateway and VPN Gateway anchor both sides of the VPN Connection, and enables secure connectivity; implemented using industry standard mechanisms. Please note that we currently require whatever customer gateway device is used supports BGP. We actually terminate two (2) tunnels - one tunnel per VPN Gateway - on our side. Besides providing high availability, we can service one device while maintaining service. As such, we can either connect to one of the customer's BGP-supporting devices (preferably running JunOS or IOS).\n
  145. Multiple Levels of Security\nVirtual Private Cloud: Each VPC is a distinct, isolated network within the cloud. At creation time, an IP address range for each VPC is selected by the customer. Network traffic within each VPC is isolated from all other VPCs; therefore, multiple VPCs may use overlapping (even identical) IP address ranges without loss of this isolation. By default, VPCs have no external connectivity. Customers may create and attach an Internet Gateway, VPN Gateway, or both to establish external connectivity, subject to the controls below.\n \nAPI: Calls to create and delete VPCs, change routing, security group, and network ACL parameters, and perform other functions are all signed by the customer’s Amazon Secret Access Key, which could be either the AWS Accounts Secret Access Key or the Secret Access key of a user created with AWS IAM. Without access to the customer’s Secret Access Key, Amazon VPC API calls cannot be made on the customer’s behalf. In addition, API calls can be encrypted with SSL to maintain confidentiality. Amazon recommends always using SSL-protected API endpoints. AWS IAM also enables a customer to further control what APIs a newly created user has permissions to call. \n \nSubnets: Customers create one or more subnets within each VPC; each instance launched in the VPC is connected to one subnet. Traditional Layer 2 security attacks, including MAC spoofing and ARP spoofing, are blocked.\n \nRoute Tables and Routes: Each Subnet in a VPC is associated with a routing table, and all network traffic leaving a subnet is processed by the routing table to determine the destination.\n \nVPN Gateway: A VPN Gateway enables private connectivity between the VPC and another network. Network traffic within each VPN Gateway is isolated from network traffic within all other VPN Gateways. Customers may establish VPN Connections to the VPN Gateway from gateway devices at the customer premise. Each connection is secured by a pre-shared key in conjunction with the IP address of the customer gateway device.\n \nInternet Gateway: An Internet Gateway may be attached to a VPC to enable direct connectivity to Amazon S3, other AWS services, and the Internet. Each instance desiring this access must either have an Elastic IP associated with it or route traffic through a NAT instance. Additionally, network routes are configured (see above) to direct traffic to the Internet Gateway. AWS provides reference NAT AMIs that can be extended by customers to perform network logging, deep packet inspection, application-layer filtering, or other security controls.\n \nThis access can only be modified through the invocation of Amazon VPC APIs. AWS supports the ability to grant granular access to different administrative functions on the instances and the Internet Gateway, therefore enabling the customer to implement additional security through separation of duties.\n \nAmazon EC2 Instances: Amazon EC2 instances running with an Amazon VPC contain all of the benefits described above related to the Host Operating System, Guest Operating System, Hypervisor, Instance Isolation, and protection against packet sniffing.\n \nTenancy: VPC allows customers to launch Amazon EC2 instances that are physically isolated at the host hardware level; they will run on single tenant hardware. A VPC can be created with ‘dedicated’ tenancy, in which case all instances launched into the VPC will utilize this feature. Alternatively, a VPC may be created with ‘default’ tenancy, but customers may specify ‘dedicated’ tenancy for particular instances launched into the VPC.\n \nFirewall (Security Groups): Like Amazon EC2, Amazon VPC supports a complete firewall solution enabling filtering on both ingress and egress traffic from an instance. The default group enables inbound communication from other members of the same group and outbound communication to any destination. Traffic can be restricted by any IP protocol, by service port, as well as source/destination IP address (individual IP or Classless Inter-Domain Routing (CIDR) block). \n \nThe firewall isn’t controlled through the Guest OS; rather it can be modified only through the invocation of Amazon VPC APIs. AWS supports the ability to grant granular access to different administrative functions on the instances and the firewall, therefore enabling the customer to implement additional security through separation of duties. The level of security afforded by the firewall is a function of which ports are opened by the customer, and for what duration and purpose. Well-informed traffic management and security design are still required on a per-instance basis. AWS further encourages customers to apply additional per-instance filters with host-based firewalls such as IPtables or the Windows Firewall.\n \nNetwork Access Control Lists: To add a further layer of security within Amazon VPC, customers can configure Network ACLs. These are stateless traffic filters that apply to all traffic inbound or outbound from a subnet within VPC. These ACLs can contain ordered rules to allow or deny traffic based upon IP protocol, by service port, as well as source/destination IP address.\n \nLike security groups, network ACLs are managed through Amazon VPC APIs, adding an additional layer of protection and enabling additional security through separation of duties.\n
  146. \n
  147. \n
  148. Amazon Simple Data Base (SimpleDB) Security\nAmazon SimpleDB APIs provide domain-level controls that only permit authenticated access by the domain creator, therefore the customer maintains full control over who has access to their data. \n \nAmazon SimpleDB access can be granted based on an AWS Account ID. Once authenticated, an AWS Account has full access to all operations. Access to each individual domain is controlled by an independent Access Control List that maps authenticated users to the domains they own. A user created with AWS IAM only has access to the operations and domains for which they have been granted permission via policy. \n \nAmazon SimpleDB is accessible via SSL-encrypted endpoints. The encrypted endpoints are accessible from both the Internet and from within Amazon EC2. Data stored within Amazon SimpleDB is not encrypted by AWS; however the customer can encrypt data before it is uploaded to Amazon SimpleDB. These encrypted attributes would be retrievable as part of a Get operation only. They could not be used as part of a query filtering condition. Encrypting before sending data to Amazon SimpleDB helps protect against access to sensitive customer data by anyone, including AWS.\n\nAmazon SimpleDB Data Management \nWhen a domain is deleted from Amazon SimpleDB, removal of the domain mapping starts immediately, and is generally processed across the distributed system within seconds. Once the mapping is removed, there is no remote access to the deleted domain. \n \nWhen item and attribute data are deleted within a domain, removal of the mapping within the domain starts immediately, and is also generally complete within seconds. Once the mapping is removed, there is no remote access to the deleted data. That storage area is then made available only for write operations and the data are overwritten by newly stored data. \n