SlideShare a Scribd company logo
1 of 26
Implementing FISMA Moderate
Applications
                 Nathan Beach
                 Principle Solution Architect
                 AWS Worldwide Public Sector
Session Topics

 Resources Available Online
 Hi! We’re Here to Help You
 Things to Consider
 FISMA Primer
 Where to Begin
 We’re In This Together
 Putting the Solution Together
 Public Sector Security Ecosystem
Resources Available Online
 GSA: FedRAMP Home Page
   http://www.gsa.gov/portal/category/102371
 NIST: Computer Security Division – Resource Center
   http://csrc.nist.gov/publications/PubsSPs.html
 AWS Security and Compliance Center
   http://aws.amazon.com/security/
   New AWS: Risk Compliance Whitepaper, July 2012
 AWS Architecture Center
   http://aws.amazon.com/architecture/
 AWS U.S. Federal Government
   http://aws.amazon.com/federal/
 Find AWS Partner Solution Providers
   https://aws.amazon.com/solution-providers
Hi! We’re Here to Help You

 Getting Started
     Account Representatives
     Partner Representatives
     Solution Architects
     Security and Compliance Team


 Up and Running
   Technical Account Managers
   Premium Support Services

  But most of all….
Our Public Sector Security Ecosystem




        https://aws.amazon.com/solution-providers/
Things to Consider

 You Understand Applicable Federal Regulations and
 Data Protection Policies
   FISMA, FERPA, HIPAA, CUI, PCI,...


 Your Solution Is Suitable for Accreditation

 Your Government Sponsor is a Full-Partner in the
 Process
   Business Owner
   Information Assurance Team
Applicable CUI Information Domains


 CUI Category            CUI Category      CUI Category
 Agriculture             Copyright         Critical Infrastructure
 Export Control (ITAR)   Financial         Immigration
 Intelligence            Law Enforcement   Legal
 Nuclear                 Patent            Privacy
 Proprietary (IP)        Statistical       Tax
 Transportation
Solution Suitability for Accreditation

 Designed and Implemented with FISMA Accreditation
 as a primary goal.

 Ability to configure or customize relevant control
 areas:
     Access Controls
     Identification and Authorization
     Audit Points and Audit Integrity
     System and System Communication Protection
     Etc…
FISMA Primer – 18 Controls
AC – Access Control             PE - Physical and
AT – Awareness and Training     Environmental Protection
AU – Audit and Accountability   PL – Planning
CA – Security Assessment and    PS – Personnel Security
Authorization                   RA – Risk Assessment
CM – Configuration              SA – System and Services
Management                      Acquisition
CP – Contingency Planning       SC – System and
IA – Identification and         Communications Protection
Authentication                  SI – System and Information
IR – Incident Response          Integrity
MA – Maintenance                PM – Program Management
MP – Media Protection
FISMA Primer (cont.)

 Customer Configured
   Definition: The workload operator seeking accreditation
    is required to proactively use and configure capabilities
    implemented and maintained by AWS to be in
    compliance with the control.


 Customer Provided
   Definition: The workload operator seeking accreditation
    is required to implement, maintain, proactively use and
    configure capabilities independently of AWS to be in
    compliance with the control.
FISMA Primer (cont.)

 Hybrid Controls
   Definition: Shared implementation responsibility
    between AWS and the workload operator seeking
    accreditation.
We’re In This Together:        Shared
         Software
                               Responsibility
     Firewalls/IDS/AV
        Application
                            Customer Control &
                            Customer Responsibility
           Data

 Guest Operating System




        Hypervisor
                             AWS Control &
        Hardware
                             AWS Responsibility

  Physical Infrastructure
Examples of “Customer Responsibilities”
 Apply Your Information Management Program - that
 integrates Information Assurance
 Standardize Machine Images – create gold copy images
 for production deployment/to launch new instances
 Build and test in a sandbox environment – work out
 the bugs, figure out how to break it, architect to be resilient
 Do the same stuff you do in-house – quarterly patch
 management, IDS/IPS, logging, tripwire, etc.
 Conduct a Risk Assessment - to determine level of
 security controls you require
 Role Based Access Controls – restrict access to system
 components based upon need to know
Examples of “Customer Responsibilities” (cont.)

  Use Encryption – for data in transit, for data at rest,
  file system
  Key Management – rotate keys used to access your
  resources (AWS does not hold these…you do)
  Setup Monitoring/Alerting – collect metrics and
  enable alerting for when events occur
  Vulnerability Scans – allowed via a permission
  process (else we’ll kill/block the source of scans)
  Prepare for Failure – create backups, store data
  in more than one location, test backups, have a
  contingency system ready
Together
                                                                                                                          Putting the Solution
  Physical Security                               HW, SW, Network                                   Certifications

    Datacenters in                                  Systematic change                                SOC 1 Type 2
    nondescript facilities                          management                                       (formerly SAS-70)

    Physical access                                 Phased updates                                   ISO 27001
    strictly controlled                             deployment
                                                                                                     PCI DSS for
    Must pass two-factor                            Safe storage                                     EC2, S3, EBS, VPC,
    authentication at                               decommission                                     RDS, ELB, IAM
    least twice for floor
                                                    Automated                                        FISMA Moderate
    access
                                                    monitoring and self-                             Compliant Controls
    Physical access                                 audit
                                                                                                     HIPAA & ITAR
    logged and audited
                                                    Advanced network                                 Compliant
                                                    protection                                       Architecture


                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
Together
                                                                                                                      Putting the Solution
                Amazon VPC Architecture
                with DirectConnect

                                                                                                    Infrastructure
 Compute Services                   Network Services                                                Building Blocks
      Amazon EC2                        Amazon VPC                    Storage Services
      HPC Clusters1                Elastic Load Balancers1                  Amazon S3
      Auto Scaling1                  Amazon Route 531                      Amazon EBS
       VM Import1                      Direct Connect1

                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
Users and Groups within Accounts




                                                                                                                      Together
                                                                                                                      Putting the Solution
                                                   Unique security credentials
                                                          Access keys
                                                          Login/Password
                                                          MFA device
                                                   Policies control access to AWS APIs
                                                   Deep integration into S3
                                                          policies on objects and buckets
                                                   AWS Management Console now supports User log on
                                                   Not for Operating Systems or Applications
                                                          use LDAP, Active Directory, ADFS, etc...



                       Identity and Access Management1                                              Cross Service
                            (IAM w/ Multi-Factor Authentication)                                    Features

                                                                                                    Infrastructure
 Compute Services                   Network Services                                                Building Blocks
      Amazon EC2                        Amazon VPC                    Storage Services
      HPC Clusters1                Elastic Load Balancers1                  Amazon S3
      Auto Scaling1                  Amazon Route 531                      Amazon EBS
       VM Import1                      Direct Connect1

                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
AWS Multi-Factor Authentication

• Helps prevent anyone with unauthorized knowledge of your
  credentials from impersonating you
• Additional protection for account information and critical APIs
• Physical and virtual MFA devices supported via RFC 6238
• Works with
    Account (root) identity
    IAM Users
• Integrated into
      AWS Management Console
      Key pages on the AWS Portal
      MFA-protected API access (new feature)
      S3 secure delete

A recommended opt-in security feature!
Customer Workload                                                    Business/
                       AWS Network Layer – Configuration Touch Points                               Mission




                                                                                                                      Together
                                                                                                                      Putting the Solution
                                                                                                    Services




Libraries and SDKs1                   Web Interface2                   Command Line                 Tools to Access
  Java, .Net, Ruby, PHP             Management Console                   Interface1                 AWS Services

                       Identity and Access Management1                                              Cross Service
                            (IAM w/ Multi-Factor Authentication)                                    Features

                                                                                                    Infrastructure
 Compute Services                   Network Services                                                Building Blocks
      Amazon EC2                        Amazon VPC                    Storage Services
      HPC Clusters1                Elastic Load Balancers1                  Amazon S3
      Auto Scaling1                  Amazon Route 531                      Amazon EBS
       VM Import1                      Direct Connect1

                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
Amazon VPC Architecture
                     NAT          Private                  Customer’s isolated
                                                           AWS resources
            Public                               Private             Subnets




 Internet                                   Router
                   VPN
               Gateway

                                                            Amazon
                                                            Web Services
                                                            Cloud
                 Secure VPN
                 Connection over
                 AWS DirectConnect



                     Customer’s
                     Network
Business/




                                                                                                                      Together
                                                                                                                      Putting the Solution
                               Customer Workload
                       AWS Network Layer – Configuration Touch Points                               Mission
                                                                                                    Services



                          Customer Operating Systems
                     AWS Virtualization Layer – Configuration Touch Points

                                   Customer Storage
                        AWS Storage Layer – Configuration Touch Points


Libraries and SDKs1                   Web Interface2                   Command Line                 Tools to Access
  Java, .Net, Ruby, PHP             Management Console                   Interface1                 AWS Services

                       Identity and Access Management1                                              Cross Service
                            (IAM w/ Multi-Factor Authentication)                                    Features

                                                                                                    Infrastructure
 Compute Services                   Network Services                                                Building Blocks
      Amazon EC2                        Amazon VPC                    Storage Services
      HPC Clusters1                Elastic Load Balancers1                  Amazon S3
      Auto Scaling1                  Amazon Route 531                      Amazon EBS
       VM Import1                      Direct Connect1

                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
Business/




                                                                                                                      Together
                                                                                                                      Putting the Solution
                               Customer Workload
                       AWS Network Layer – Configuration Touch Points                               Mission
                                                                                                    Services
                                Customer Application


                          Customer Operating Systems
                     AWS Virtualization Layer – Configuration Touch Points

                                   Customer Storage
                        AWS Storage Layer – Configuration Touch Points


Libraries and SDKs1                   Web Interface2                   Command Line                 Tools to Access
  Java, .Net, Ruby, PHP             Management Console                   Interface1                 AWS Services

                       Identity and Access Management1                                              Cross Service
                            (IAM w/ Multi-Factor Authentication)                                    Features

                                                                                                    Infrastructure
 Compute Services                   Network Services                                                Building Blocks
      Amazon EC2                        Amazon VPC                    Storage Services
      HPC Clusters1                Elastic Load Balancers1                  Amazon S3
      Auto Scaling1                  Amazon Route 531                      Amazon EBS
       VM Import1                      Direct Connect1

                    Amazon Physical Infrastructure (GSS)
  (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire
  Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial
                Fiber/Network Capacity, Infrastructure Control Systems and Services)

1. In-Scope Service Feature operated under common service control process.
2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency
   machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
Virtual Firewall & IDS
                                                         Appliance

                                                                                  AWS VPC Gateway                                                               Company
                                                                                  Over DirectConnect                                                            Network
                                                                                                                Company VPN Gateway


                                Security Group A
                                 HTTP/HTTPS          DMZ - 10.254.1.0/24 , 10.254.2.0/24
                                                                                                                                                                          Policy B
                                                                                             53




                                        ”
                                                                                                       DNS




                                      ud
                                    lo
                                SC
                                                                                        Company.com                                                        AWS Management MFA




                                  ”
                             W

                                     PC
                                                                                                                                                               Console
                           “A

                                   “V
                                                          Elastic Load Balancer


                                                                                                                                               Logs          IAM Add-on




             Security Group B                                                         Security Group B
  WEB
10.30.1.X                                                                                                                                       Policy C                 IAM
                                                                                                                                                                    Security Policy
                                                        Auto Scaling Group A
                                                                                                                                                                    Security Group

             Security Group C                                                          Security Group C                                       S3 Bucket
 Business
 10.20.1.X                                                                                                                                      Policy D

                                                        Auto Scaling Group B
                                                                                                                                                                      LDAP  DC


                                                                                                                                              S3 Bucket

             Security Group D                                                       Security Group D                              Backups                            IAM Add-on
Data Svc
10.10.1.X
                                                                                                                                            Backups

                         YourDBSvr                                                                YourDBSvr
                       Availability Zone #1                                                   Availability Zone #2

                                               AWS Virtual Private Cloud
AWS Public Sector Security Ecosystem

More Related Content

What's hot

FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceControlCase
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaSftculotta27
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3EnterpriseGRC Solutions, Inc.
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)MHumaamAl
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)Kimber Spradlin
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access managementPiyush Jain
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud ComputingScientia Groups
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan Singh
 
Gallagher Systems Catalogue
Gallagher Systems CatalogueGallagher Systems Catalogue
Gallagher Systems CatalogueClaudiu Sandor
 
Docker container webinar final
Docker container webinar finalDocker container webinar final
Docker container webinar finalControlCase
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyControlCase
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreementsCade Zvavanjanja
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4EnterpriseGRC Solutions, Inc.
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - KloudlearnKloudLearn
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simpleSameer Paradia
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC CertificationControlCase
 

What's hot (20)

Gpc case study_eng_0221
Gpc case study_eng_0221Gpc case study_eng_0221
Gpc case study_eng_0221
 
GDPR
GDPRGDPR
GDPR
 
FedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP MarketplaceFedRAMP Certification & FedRAMP Marketplace
FedRAMP Certification & FedRAMP Marketplace
 
Vormetric - Gherkin Event
Vormetric - Gherkin EventVormetric - Gherkin Event
Vormetric - Gherkin Event
 
Vazata Federal IaaS
Vazata Federal IaaSVazata Federal IaaS
Vazata Federal IaaS
 
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
Virtualization and cloud impact overview auditor spin   enterprise gr-cv3Virtualization and cloud impact overview auditor spin   enterprise gr-cv3
Virtualization and cloud impact overview auditor spin enterprise gr-cv3
 
Cis controls v8_guide (1)
Cis controls v8_guide (1)Cis controls v8_guide (1)
Cis controls v8_guide (1)
 
IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)IBM Endpoint Manager for Software Use Analysis (Overview)
IBM Endpoint Manager for Software Use Analysis (Overview)
 
Identity and access management
Identity and access managementIdentity and access management
Identity and access management
 
NIST Definition of Cloud Computing
NIST Definition of Cloud ComputingNIST Definition of Cloud Computing
NIST Definition of Cloud Computing
 
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...Rohan s   w2 - top 5 tools that help in monitoring compliance for pci dss and...
Rohan s w2 - top 5 tools that help in monitoring compliance for pci dss and...
 
Gallagher Systems Catalogue
Gallagher Systems CatalogueGallagher Systems Catalogue
Gallagher Systems Catalogue
 
Docker container webinar final
Docker container webinar finalDocker container webinar final
Docker container webinar final
 
OneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to ManyOneAudit™ - Assess Once, Certify to Many
OneAudit™ - Assess Once, Certify to Many
 
Cloud computing & service level agreements
Cloud computing & service level agreementsCloud computing & service level agreements
Cloud computing & service level agreements
 
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4Virtualization And Cloud Impact Overview Auditor Spin   Enterprise Gr Cv4
Virtualization And Cloud Impact Overview Auditor Spin Enterprise Gr Cv4
 
Service Organizational Control (SOC 2) Compliance - Kloudlearn
Service Organizational Control  (SOC 2) Compliance - KloudlearnService Organizational Control  (SOC 2) Compliance - Kloudlearn
Service Organizational Control (SOC 2) Compliance - Kloudlearn
 
Cloud Security - Made simple
Cloud Security - Made simpleCloud Security - Made simple
Cloud Security - Made simple
 
Is it an internal affair
Is it an internal affairIs it an internal affair
Is it an internal affair
 
CMMC Certification
CMMC CertificationCMMC Certification
CMMC Certification
 

Viewers also liked

Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Amazon Web Services
 
FedRAMP High & AWS GovCloud (US): FISMA High Requirements
FedRAMP High & AWS GovCloud (US): FISMA High RequirementsFedRAMP High & AWS GovCloud (US): FISMA High Requirements
FedRAMP High & AWS GovCloud (US): FISMA High RequirementsAmazon Web Services
 
FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsGovCloud Network
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals2nd Watch
 
Accelerating Your Connection to the Cloud
Accelerating Your Connection to the CloudAccelerating Your Connection to the Cloud
Accelerating Your Connection to the CloudAmazon Web Services
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandAmazon Web Services
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationSylvain Maret
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceJosh Tullo
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Cyber Security Alliance
 
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...Amazon Web Services
 
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...fast_retailing
 
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarHow to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarAmazon Web Services
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Amazon Web Services
 
Pago del autobús del viaje de fin de curso
Pago del autobús del viaje de fin de cursoPago del autobús del viaje de fin de curso
Pago del autobús del viaje de fin de cursoCole Navalazarza
 
Justin Casey resume
Justin Casey resumeJustin Casey resume
Justin Casey resumeJustin Casey
 
The birth of a star
The birth of a starThe birth of a star
The birth of a starjuaniji
 

Viewers also liked (19)

Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
Federal Compliance Deep Dive: FISMA, FedRAMP, and Beyond - AWS Symposium 2014...
 
FedRAMP High & AWS GovCloud (US): FISMA High Requirements
FedRAMP High & AWS GovCloud (US): FISMA High RequirementsFedRAMP High & AWS GovCloud (US): FISMA High Requirements
FedRAMP High & AWS GovCloud (US): FISMA High Requirements
 
FedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conopsFedRAMP concept-of-operations-conops
FedRAMP concept-of-operations-conops
 
Aws Architecture Fundamentals
Aws Architecture FundamentalsAws Architecture Fundamentals
Aws Architecture Fundamentals
 
Accelerating Your Connection to the Cloud
Accelerating Your Connection to the CloudAccelerating Your Connection to the Cloud
Accelerating Your Connection to the Cloud
 
Delivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demandDelivering on the promise of the cloud for digital media, aspera on demand
Delivering on the promise of the cloud for digital media, aspera on demand
 
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and AuthenticationINA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
INA Volume 1/3 Version 1.0 RC / Digital Identity and Authentication
 
AWS Introduction - Ryland
AWS Introduction - RylandAWS Introduction - Ryland
AWS Introduction - Ryland
 
Cloud security - Auditing and Compliance
Cloud security - Auditing and ComplianceCloud security - Auditing and Compliance
Cloud security - Auditing and Compliance
 
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100Create a-strong-two-factors-authentication-device-for-less-than-chf-100
Create a-strong-two-factors-authentication-device-for-less-than-chf-100
 
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
ARC205 Building Web-scale Applications Architectures with AWS - AWS re: Inven...
 
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...
AWS Summit 2015 Tokyo Breakout: Global Large Scale Cloud Design and Cloud Nat...
 
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - WebinarHow to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
How to Extend your Datacenter into the Cloud - 2nd Watch - Webinar
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)
 
Pago del autobús del viaje de fin de curso
Pago del autobús del viaje de fin de cursoPago del autobús del viaje de fin de curso
Pago del autobús del viaje de fin de curso
 
Justin Casey resume
Justin Casey resumeJustin Casey resume
Justin Casey resume
 
The birth of a star
The birth of a starThe birth of a star
The birth of a star
 
Elast1
Elast1Elast1
Elast1
 
KF_Flyer_D_final
KF_Flyer_D_finalKF_Flyer_D_final
KF_Flyer_D_final
 

Similar to Implementing FISMA Moderate Applications on AWS

Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Amazon Web Services
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014Amazon Web Services
 
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Amazon Web Services
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Amazon Web Services
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesAmazon Web Services
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 OverviewAmit Gatenyo
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationIBM Danmark
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...New Lease
 

Similar to Implementing FISMA Moderate Applications on AWS (20)

Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 
17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria17h30 aws enterprise_app_jvaria
17h30 aws enterprise_app_jvaria
 
Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012Microsoft Best Practices - AWS India Summit 2012
Microsoft Best Practices - AWS India Summit 2012
 
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
(HLS401) Architecting for HIPAA Compliance on AWS | AWS re:Invent 2014
 
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
Mission (Not) Impossible: Applying NIST 800-53 High Impact-Controls on AWS fo...
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
System Center 2012 Overview
System Center 2012 OverviewSystem Center 2012 Overview
System Center 2012 Overview
 
Axxera
AxxeraAxxera
Axxera
 
Enterprise Applications on AWS
Enterprise Applications on AWSEnterprise Applications on AWS
Enterprise Applications on AWS
 
Sådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig informationSådan undgår du misbrug af kundedata og fortrolig information
Sådan undgår du misbrug af kundedata og fortrolig information
 
Axxera Ppt
Axxera PptAxxera Ppt
Axxera Ppt
 
Issa 042711
Issa 042711Issa 042711
Issa 042711
 
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...110531 newlease heads in the clouds feet on the ground v2.0 (partner ready)  ...
110531 newlease heads in the clouds feet on the ground v2.0 (partner ready) ...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...gurkirankumar98700
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonetsnaman860154
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsRoshan Dwivedi
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking MenDelhi Call girls
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreternaman860154
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationMichael W. Hawkins
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Drew Madelung
 

Recently uploaded (20)

08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
Kalyanpur ) Call Girls in Lucknow Finest Escorts Service 🍸 8923113531 🎰 Avail...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
How to convert PDF to text with Nanonets
How to convert PDF to text with NanonetsHow to convert PDF to text with Nanonets
How to convert PDF to text with Nanonets
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live StreamsTop 5 Benefits OF Using Muvi Live Paywall For Live Streams
Top 5 Benefits OF Using Muvi Live Paywall For Live Streams
 
08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men08448380779 Call Girls In Civil Lines Women Seeking Men
08448380779 Call Girls In Civil Lines Women Seeking Men
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Presentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreterPresentation on how to chat with PDF using ChatGPT code interpreter
Presentation on how to chat with PDF using ChatGPT code interpreter
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
GenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day PresentationGenCyber Cyber Security Day Presentation
GenCyber Cyber Security Day Presentation
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 

Implementing FISMA Moderate Applications on AWS

  • 1. Implementing FISMA Moderate Applications Nathan Beach Principle Solution Architect AWS Worldwide Public Sector
  • 2. Session Topics Resources Available Online Hi! We’re Here to Help You Things to Consider FISMA Primer Where to Begin We’re In This Together Putting the Solution Together Public Sector Security Ecosystem
  • 3. Resources Available Online GSA: FedRAMP Home Page  http://www.gsa.gov/portal/category/102371 NIST: Computer Security Division – Resource Center  http://csrc.nist.gov/publications/PubsSPs.html AWS Security and Compliance Center  http://aws.amazon.com/security/  New AWS: Risk Compliance Whitepaper, July 2012 AWS Architecture Center  http://aws.amazon.com/architecture/ AWS U.S. Federal Government  http://aws.amazon.com/federal/ Find AWS Partner Solution Providers  https://aws.amazon.com/solution-providers
  • 4. Hi! We’re Here to Help You Getting Started  Account Representatives  Partner Representatives  Solution Architects  Security and Compliance Team Up and Running  Technical Account Managers  Premium Support Services But most of all….
  • 5. Our Public Sector Security Ecosystem https://aws.amazon.com/solution-providers/
  • 6. Things to Consider You Understand Applicable Federal Regulations and Data Protection Policies  FISMA, FERPA, HIPAA, CUI, PCI,... Your Solution Is Suitable for Accreditation Your Government Sponsor is a Full-Partner in the Process  Business Owner  Information Assurance Team
  • 7. Applicable CUI Information Domains CUI Category CUI Category CUI Category Agriculture Copyright Critical Infrastructure Export Control (ITAR) Financial Immigration Intelligence Law Enforcement Legal Nuclear Patent Privacy Proprietary (IP) Statistical Tax Transportation
  • 8. Solution Suitability for Accreditation Designed and Implemented with FISMA Accreditation as a primary goal. Ability to configure or customize relevant control areas:  Access Controls  Identification and Authorization  Audit Points and Audit Integrity  System and System Communication Protection  Etc…
  • 9. FISMA Primer – 18 Controls AC – Access Control PE - Physical and AT – Awareness and Training Environmental Protection AU – Audit and Accountability PL – Planning CA – Security Assessment and PS – Personnel Security Authorization RA – Risk Assessment CM – Configuration SA – System and Services Management Acquisition CP – Contingency Planning SC – System and IA – Identification and Communications Protection Authentication SI – System and Information IR – Incident Response Integrity MA – Maintenance PM – Program Management MP – Media Protection
  • 10. FISMA Primer (cont.) Customer Configured  Definition: The workload operator seeking accreditation is required to proactively use and configure capabilities implemented and maintained by AWS to be in compliance with the control. Customer Provided  Definition: The workload operator seeking accreditation is required to implement, maintain, proactively use and configure capabilities independently of AWS to be in compliance with the control.
  • 11. FISMA Primer (cont.) Hybrid Controls  Definition: Shared implementation responsibility between AWS and the workload operator seeking accreditation.
  • 12. We’re In This Together: Shared Software Responsibility Firewalls/IDS/AV Application Customer Control & Customer Responsibility Data Guest Operating System Hypervisor AWS Control & Hardware AWS Responsibility Physical Infrastructure
  • 13. Examples of “Customer Responsibilities” Apply Your Information Management Program - that integrates Information Assurance Standardize Machine Images – create gold copy images for production deployment/to launch new instances Build and test in a sandbox environment – work out the bugs, figure out how to break it, architect to be resilient Do the same stuff you do in-house – quarterly patch management, IDS/IPS, logging, tripwire, etc. Conduct a Risk Assessment - to determine level of security controls you require Role Based Access Controls – restrict access to system components based upon need to know
  • 14. Examples of “Customer Responsibilities” (cont.) Use Encryption – for data in transit, for data at rest, file system Key Management – rotate keys used to access your resources (AWS does not hold these…you do) Setup Monitoring/Alerting – collect metrics and enable alerting for when events occur Vulnerability Scans – allowed via a permission process (else we’ll kill/block the source of scans) Prepare for Failure – create backups, store data in more than one location, test backups, have a contingency system ready
  • 15. Together Putting the Solution Physical Security HW, SW, Network Certifications Datacenters in Systematic change SOC 1 Type 2 nondescript facilities management (formerly SAS-70) Physical access Phased updates ISO 27001 strictly controlled deployment PCI DSS for Must pass two-factor Safe storage EC2, S3, EBS, VPC, authentication at decommission RDS, ELB, IAM least twice for floor Automated FISMA Moderate access monitoring and self- Compliant Controls Physical access audit HIPAA & ITAR logged and audited Advanced network Compliant protection Architecture Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 16. Together Putting the Solution Amazon VPC Architecture with DirectConnect Infrastructure Compute Services Network Services Building Blocks Amazon EC2 Amazon VPC Storage Services HPC Clusters1 Elastic Load Balancers1 Amazon S3 Auto Scaling1 Amazon Route 531 Amazon EBS VM Import1 Direct Connect1 Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 17. Users and Groups within Accounts Together Putting the Solution Unique security credentials  Access keys  Login/Password  MFA device Policies control access to AWS APIs Deep integration into S3  policies on objects and buckets AWS Management Console now supports User log on Not for Operating Systems or Applications  use LDAP, Active Directory, ADFS, etc... Identity and Access Management1 Cross Service (IAM w/ Multi-Factor Authentication) Features Infrastructure Compute Services Network Services Building Blocks Amazon EC2 Amazon VPC Storage Services HPC Clusters1 Elastic Load Balancers1 Amazon S3 Auto Scaling1 Amazon Route 531 Amazon EBS VM Import1 Direct Connect1 Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 18. AWS Multi-Factor Authentication • Helps prevent anyone with unauthorized knowledge of your credentials from impersonating you • Additional protection for account information and critical APIs • Physical and virtual MFA devices supported via RFC 6238 • Works with  Account (root) identity  IAM Users • Integrated into  AWS Management Console  Key pages on the AWS Portal  MFA-protected API access (new feature)  S3 secure delete A recommended opt-in security feature!
  • 19. Customer Workload Business/ AWS Network Layer – Configuration Touch Points Mission Together Putting the Solution Services Libraries and SDKs1 Web Interface2 Command Line Tools to Access Java, .Net, Ruby, PHP Management Console Interface1 AWS Services Identity and Access Management1 Cross Service (IAM w/ Multi-Factor Authentication) Features Infrastructure Compute Services Network Services Building Blocks Amazon EC2 Amazon VPC Storage Services HPC Clusters1 Elastic Load Balancers1 Amazon S3 Auto Scaling1 Amazon Route 531 Amazon EBS VM Import1 Direct Connect1 Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 20. Amazon VPC Architecture NAT Private Customer’s isolated AWS resources Public Private Subnets Internet Router VPN Gateway Amazon Web Services Cloud Secure VPN Connection over AWS DirectConnect Customer’s Network
  • 21. Business/ Together Putting the Solution Customer Workload AWS Network Layer – Configuration Touch Points Mission Services Customer Operating Systems AWS Virtualization Layer – Configuration Touch Points Customer Storage AWS Storage Layer – Configuration Touch Points Libraries and SDKs1 Web Interface2 Command Line Tools to Access Java, .Net, Ruby, PHP Management Console Interface1 AWS Services Identity and Access Management1 Cross Service (IAM w/ Multi-Factor Authentication) Features Infrastructure Compute Services Network Services Building Blocks Amazon EC2 Amazon VPC Storage Services HPC Clusters1 Elastic Load Balancers1 Amazon S3 Auto Scaling1 Amazon Route 531 Amazon EBS VM Import1 Direct Connect1 Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 22.
  • 23.
  • 24. Business/ Together Putting the Solution Customer Workload AWS Network Layer – Configuration Touch Points Mission Services Customer Application Customer Operating Systems AWS Virtualization Layer – Configuration Touch Points Customer Storage AWS Storage Layer – Configuration Touch Points Libraries and SDKs1 Web Interface2 Command Line Tools to Access Java, .Net, Ruby, PHP Management Console Interface1 AWS Services Identity and Access Management1 Cross Service (IAM w/ Multi-Factor Authentication) Features Infrastructure Compute Services Network Services Building Blocks Amazon EC2 Amazon VPC Storage Services HPC Clusters1 Elastic Load Balancers1 Amazon S3 Auto Scaling1 Amazon Route 531 Amazon EBS VM Import1 Direct Connect1 Amazon Physical Infrastructure (GSS) (Datacenters, Network Devices, Servers, Dark Fiber, Raw Storage Devices, Security Systems, Fire Suppression, UPS/Backup Power Systems, Environmental Control Systems, Reserved Commercial Fiber/Network Capacity, Infrastructure Control Systems and Services) 1. In-Scope Service Feature operated under common service control process. 2. Amazon GSA IaaS BPA Partner Apptis provides FIPS 140-2 validated encryption when accessing from agency machines configured in agreement with United States Government Configuration Baseline (USGCB) baselines.
  • 25. Virtual Firewall & IDS Appliance AWS VPC Gateway Company Over DirectConnect Network Company VPN Gateway Security Group A HTTP/HTTPS DMZ - 10.254.1.0/24 , 10.254.2.0/24 Policy B 53 ” DNS ud lo SC Company.com AWS Management MFA ” W PC Console “A “V Elastic Load Balancer Logs IAM Add-on Security Group B Security Group B WEB 10.30.1.X Policy C IAM Security Policy Auto Scaling Group A Security Group Security Group C Security Group C S3 Bucket Business 10.20.1.X Policy D Auto Scaling Group B LDAP DC S3 Bucket Security Group D Security Group D Backups IAM Add-on Data Svc 10.10.1.X Backups YourDBSvr YourDBSvr Availability Zone #1 Availability Zone #2 AWS Virtual Private Cloud
  • 26. AWS Public Sector Security Ecosystem

Editor's Notes

  1. FERPA: Family Educational Rights and Privacy Act of 1974 (FERPA)HIPAA: Health Information Portability and Accountability Act 1996GLB: Gramm-Leach-Bliley Act - Protect the financial information of consumers.HSA: Homeland Security Act 2002 - Created the Department of Homeland Security and many data-related requirementsCUI: Controlled but Unclassified InformationNASD Rule 3110: National Association of Securities Dealers (NASD) must control customer account information.PCI: Payment Card Industry Data Security Standard - requirements for enhancing payment account data security.