SlideShare uma empresa Scribd logo
1 de 20
2013 AWS WWPS Summit
Canberra, Australia
Compliance, Governance & Security on the AWS Cloud
Mark Ryland
Chief Solutions Architect
2013 AWS WWPS Summit,
Canberra – May 23
The Capability/Transparency Trade-up
What You Get
- Flexible, powerful , fully virtual environment
- High investment and capability in security
- Certifications, reports, attestations
- Reduced compliance ops burden
- A world class security team watching your
back!
What You Give Up
- Low-level operational details of
the physical infrastructure
- Control over low-level capabilities
- Ability to physically manage /
examine networks and servers
2013 AWS WWPS Summit,
Canberra – May 23
Benefits of Scale Apply to Security and Compliance
The entire community benefits from tough
scrutiny, the world-class AWS security team,
market-leading capabilities, and constant
improvements
Everyone’s Systems and Applications
Security Infrastructure
Security Infrastructure
Requirements Requirements Requirements
Nothing better for the community than a
tough set of customers…
2013 AWS WWPS Summit,
Canberra – May 23
Accreditation & Compliance, Old and New
Old world
• Functionally optional (you can build a
secure system without it)
• Audits done by an in-house team
• Not about actual security; check the box
• Check once a year
• Workload-specific security
New world
• Functionally necessary (no, you cannot
visit our data centers!)
• Audits done by third party auditors
• Superior security drives broad compliance
• Continuous monitoring, checking
• Security based on all workload scenarios
2013 AWS WWPS Summit,
Canberra – May 23
Expert Audits: Validation Scalpels Approaching From 360º
SME
SME
SME
SME
SME
• Experts examine the system
with their particular focus
• Yet reviewed from a variety of
perspectives
• What emerges is an unusually
complete, comprehensive
view including overlapping
and non-overlapping elements
• All customers benefit from
variety, volume, velocity
SME=subject matter expert
2013 AWS WWPS Summit,
Canberra – May 23
Customers Getting Certified
Customer
Controls Verified
Reliance
Practices
Controls
+
Customer
Controls
Reports
Tested
2013 AWS WWPS Summit,
Canberra – May 23
System vs. Platform Certifications & ATOs
System/app/workload ATOs
• Traditional way of granting ATOs:
analyze entire stack from concrete
through application
• Not as efficient; harder to get re-use
• However, provides the only fast way to
achieve cloud value prop: greater agility
and more mission for the money
• Many gov’t examples: Tradeshift in the
UK; CDC BioSense 2.0 and Tradeworx
in the US; Swiss Topo; etc.
Platform certifications & ATOs
• E.g., FedRAMP in the USA; still need to
certify/authorize workload on top
• Make sense from a re-use and economies
of scale perspective
• However, waiting for platform certification
delays getting immediate value from the
cloud!
• This is the best solution for the longer
term, but don’t wait if you see compelling
value
2013 AWS WWPS Summit,
Canberra – May 23
Spectrum of Approaches to Platform Certification
Progressive Conservative
“We don’t care about platform
certification. AWS provides compelling
mission value. We’ll issue our own ATO.”
“Our agency will authorize some low-
risk workloads on AWS but will wait for
platform certification before going big.”
“Our agency won’t
speak to AWS prior to
platform certification.”
“Our agency may move to platform
certification but AWS provides
compelling value. We’ll proceed
forward with our own ATO for now.”
“Our agency requires a platform
certification. We’ll start working
with AWS but will wait to deploy
operational workloads.”
Government PM
Government ISSO
Agency Security Official
Government COTR
Government ISSO
2013 AWS WWPS Summit,
Canberra – May 23
Private Connections
Workload Migrations
Access Control Integration
Work with Existing
Management Tools
On-Premises Apps
Your Data Centers
Cloud Apps
Governance: Extension and Integration
2013 AWS WWPS Summit,
Canberra – May 23
Active Directory
VMware Images
Network Configuration
Your Data
Your On-Premises Apps
Users & Access Rules
VM Import/Export
Your Private VPC
Our Storage
Your Cloud Apps
Direct Connect
VPC
IAM
Storage Gateway
Many Capabilities to Support Hybrid Architectures
Your Data Centers
2013 AWS WWPS Summit,
Canberra – May 23
AWS Ecosystem Builds on Existing Management Tools
Single Pane of Glass
Workload MigrationInventory / patch VMs
App 1
Your Data Center
App 2
Your Data Center
VMs
AWS EC2
AWS Cloud Governance Service Enablers
Governance Area AWS Technologies
Roles and Responsibilities • Identity and Access Management: Groups, Policies, Roles
Configuration Management • Private, “hardened” AMIs
• Cloud Formation Templates
• Elastic Beanstalk
• OpsWorks
Financial Controls • Linked Accounts, Consolidated Billing
• Tagging of resources
• CloudWatch Billing Alarms
Monitoring and Reporting • Cloud Watch
• Cloud Watch Alarms
• Simple Notification Service
AWS Cloud Governance Service Enablers (cont.)
Governance Area AWS Technologies
Information Assurance:
Processing
• Corporate “Gold master” AMIs (operating system images)
• VPC network isolation for all workloads
• Dedicated EC2 Instances
• CloudHSM service
Information Assurance:
Storage
• S3 AES 256 bit server-side encryption, client-side encryption
• EBS Volume Encryption
• RDS database encryption features
• Complete destruction of all storage media on decommissioning
Information Assurance Transmission • SSL termination for all AWS endpoints
• HW/SW VPN Connections
• DirectConnect
AWS Cloud Governance Service Enablers (cont.)
Governance Area AWS Technologies
Network Security • Private addressing (Virtual Private Cloud)
• Network ACLs
• Security Groups
• Virtual Private Gateways
Access Controls • Identity and Access Management Policies across all services
• S3 Bucket Policies
• EC2 Instance Roles
Identification and Authentication • Identity and Access Management
• Federated Identity Management (AWS as relying party)
• Multi-Factor Authentication
• Group Policies and Roles
• Strong password policies
AWS Cloud Governance Service Enablers (cont.)
Governance Area AWS Technologies
Disaster Recovery and Continuity of
Operations
Data
• EBS Snapshots
• S3 Near-Line Storage
• Glacier Near-Offline Storage
• Storage Gateway
• Bulk Data Import/Export
• Managed AWS No-SQL/SQL Database Services
• Extensive 3rd Party Solutions
Workload
• Elastic load Balancers, EC2 Auto Scaling, CloudWatch
• Route 53 – Health Checks, Latency Based Routing
• Cloud Front – Content Delivery Network
• Multi-AZ, Multi-Region Workload Deployment
2013 AWS WWPS Summit,
Canberra – May 23
AWS Governance Tool: Trusted Advisor
• Online service from AWS Support
– Analyzes account for various kinds of
issues and possible concerns
– Soon available as an API for integration
with your tools or 3rd party solutions
• Four categories:
– Cost savings
– Security
– Fault tolerance
– Performance
2013 AWS WWPS Summit,
Canberra – May 23
Security is a Shared Responsibility
Facilities
Physical security
Compute infrastructure
Storage infrastructure
Network infrastructure
Virtualization layer (EC2)
Hardened service endpoints
Rich IAM capabilities
Network configuration
Security groups
OS firewalls
Operating systems
Applications
Proper service configuration
AuthN & acct management
Authorization policies
+ =
Customer
• Re-focus your security professionals on a subset of the problem
• Take advantage of high levels of uniformity and automation
Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data Encryption & Data
Integrity Authentication
Server-side Encryption
(File System and/or Data)
Network Traffic Protection
(Encryption/Integrity/Identity)
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer Data
AmazonCustomer
• Payment Card Industry (PCI)
Data Security Standard Level 1
• NIST 800-53 Controls &
multiple ATOs; FedRAMP
• DoD Compliant Controls and
multiple DIACAP ATOs
• SSAE 16 Types 1 & 2 (SAS 70)
• ISO 27001/ 2 Certification
• HIPAA and ITAR Compliant
• Customers implement their
own set of controls
• Multiple customers with
FISMA GSS/MA Low/
Moderate ATOs
• Customers and partners
working on FISMA GSS/MA
High ATOs
2013 AWS WWPS Summit,
Canberra – May 23
Dimensions of Shared Responsibility & Control
1. Operation within the Service: The functions the customer controls and
configurations they choose (e.g., in EC2, RDS)
2. Security Configurability: The tools AWS gives customers to configure their
security stance (e.g., access policies, security groups) vary considerably from
service to service
3. Security Features Which Span Services: Some security configuration
features are global (e.g., IAM), others service-specific
4. Cross-Layer Security Controls: Means by which customers integrate their
existing controls into AWS (e.g., key management, Active Directory, Drupal
user management) and vice versa (e.g., IAM Roles for Instances)
2013 AWS WWPS Summit
Canberra, Australia
Thank you!
Mark Ryland
markry@amazon.com

Mais conteúdo relacionado

Mais procurados

Next-Generation Security Operations with AWS
Next-Generation Security Operations with AWSNext-Generation Security Operations with AWS
Next-Generation Security Operations with AWSAmazon Web Services
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupCloudHesive
 
Hybrid IT Approach and Technologies with the AWS Cloud
Hybrid IT Approach and Technologies with the AWS CloudHybrid IT Approach and Technologies with the AWS Cloud
Hybrid IT Approach and Technologies with the AWS CloudAmazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSAmazon Web Services
 
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Amazon Web Services
 
AWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAmazon Web Services
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Amazon Web Services
 
Amazon AWS Shared Security Model
Amazon AWS Shared Security Model Amazon AWS Shared Security Model
Amazon AWS Shared Security Model James Mascarenhas
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance OverviewRightScale
 
Fort Lauderdale Tech Talks - The Future is the Cloud
Fort Lauderdale Tech Talks - The Future is the CloudFort Lauderdale Tech Talks - The Future is the Cloud
Fort Lauderdale Tech Talks - The Future is the CloudCloudHesive
 
Secure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneSecure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneTushar Gupta
 
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C. AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C. Amazon Web Services
 
How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...Amazon Web Services
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial ServicesAmazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS SecurityLalitMohanSharma8
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelAmazon Web Services
 

Mais procurados (20)

Next-Generation Security Operations with AWS
Next-Generation Security Operations with AWSNext-Generation Security Operations with AWS
Next-Generation Security Operations with AWS
 
Security on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition MeetupSecurity on AWS, 2021 Edition Meetup
Security on AWS, 2021 Edition Meetup
 
Hybrid IT Approach and Technologies with the AWS Cloud
Hybrid IT Approach and Technologies with the AWS CloudHybrid IT Approach and Technologies with the AWS Cloud
Hybrid IT Approach and Technologies with the AWS Cloud
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
Modern Security and Compliance Through Automation | AWS Public Sector Summit ...
 
AWS Security & Compliance
AWS Security & ComplianceAWS Security & Compliance
AWS Security & Compliance
 
AWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by Design
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
Amazon AWS Shared Security Model
Amazon AWS Shared Security Model Amazon AWS Shared Security Model
Amazon AWS Shared Security Model
 
AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Fort Lauderdale Tech Talks - The Future is the Cloud
Fort Lauderdale Tech Talks - The Future is the CloudFort Lauderdale Tech Talks - The Future is the Cloud
Fort Lauderdale Tech Talks - The Future is the Cloud
 
Secure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zoneSecure Cloud governance - AWS landing zone
Secure Cloud governance - AWS landing zone
 
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C. AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
AWS Shared Responsibility Model - AWS Symposium 2014 - Washington D.C.
 
How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...How Public Sector Entities are Advancing Their Security and Governance Capabi...
How Public Sector Entities are Advancing Their Security and Governance Capabi...
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
In Depth: AWS Shared Security Model
In Depth: AWS Shared Security ModelIn Depth: AWS Shared Security Model
In Depth: AWS Shared Security Model
 

Destaque

Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryAmazon Web Services
 
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAmazon Web Services
 
Journey Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingJourney Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingAmazon Web Services
 
AWS Summit Nordics - Use Cases For Cloud
AWS Summit Nordics - Use Cases For CloudAWS Summit Nordics - Use Cases For Cloud
AWS Summit Nordics - Use Cases For CloudAmazon Web Services
 
AWS Summit Benelux 2013 - Use Cases for Cloud
AWS Summit Benelux 2013 - Use Cases for CloudAWS Summit Benelux 2013 - Use Cases for Cloud
AWS Summit Benelux 2013 - Use Cases for CloudAmazon Web Services
 
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWS
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWSAWS Webcast - Implementing Windows and SQL Server for High Availability on AWS
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWSAmazon Web Services
 
AWS Summit Benelux 2013 - Architecting for High Availability
AWS Summit Benelux 2013 - Architecting for High AvailabilityAWS Summit Benelux 2013 - Architecting for High Availability
AWS Summit Benelux 2013 - Architecting for High AvailabilityAmazon Web Services
 
Enterprise security in the AWS cloud
Enterprise security in the AWS cloudEnterprise security in the AWS cloud
Enterprise security in the AWS cloudsanketnaik
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureNewvewm
 
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...Amazon Web Services
 
Monitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECSMonitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECSAmazon Web Services
 
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...Monitoring Performance of Enterprise Applications on AWS: Understanding the D...
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...Amazon Web Services
 
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...Amazon Web Services
 
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013Amazon Web Services
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSAmazon Web Services
 
Best Practices for Building Partner Managed Services on AWS
Best Practices for Building Partner Managed Services on AWSBest Practices for Building Partner Managed Services on AWS
Best Practices for Building Partner Managed Services on AWSAmazon Web Services
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security OperationsAmazon Web Services
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)Amazon Web Services
 
Improving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSImproving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSAmazon Web Services
 

Destaque (20)

Journey Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster RecoveryJourney Through The Cloud - Disaster Recovery
Journey Through The Cloud - Disaster Recovery
 
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner VogelsAWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
AWS Summit 2013 | India - Opening Keynote, Dr. Werner Vogels
 
Journey Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and ArchivingJourney Through the Cloud - Storage and Archiving
Journey Through the Cloud - Storage and Archiving
 
AWS Summit Nordics - Use Cases For Cloud
AWS Summit Nordics - Use Cases For CloudAWS Summit Nordics - Use Cases For Cloud
AWS Summit Nordics - Use Cases For Cloud
 
AWS Summit Benelux 2013 - Use Cases for Cloud
AWS Summit Benelux 2013 - Use Cases for CloudAWS Summit Benelux 2013 - Use Cases for Cloud
AWS Summit Benelux 2013 - Use Cases for Cloud
 
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWS
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWSAWS Webcast - Implementing Windows and SQL Server for High Availability on AWS
AWS Webcast - Implementing Windows and SQL Server for High Availability on AWS
 
AWS Summit Benelux 2013 - Architecting for High Availability
AWS Summit Benelux 2013 - Architecting for High AvailabilityAWS Summit Benelux 2013 - Architecting for High Availability
AWS Summit Benelux 2013 - Architecting for High Availability
 
Enterprise security in the AWS cloud
Enterprise security in the AWS cloudEnterprise security in the AWS cloud
Enterprise security in the AWS cloud
 
Monitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud InfrastructureMonitoring Your AWS Cloud Infrastructure
Monitoring Your AWS Cloud Infrastructure
 
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...
Discussion: Adoption, Issues & Strategies for AWS Cloud Implementation (DMG21...
 
AWS Managed Services - BlazeClan Technologies
AWS Managed Services - BlazeClan TechnologiesAWS Managed Services - BlazeClan Technologies
AWS Managed Services - BlazeClan Technologies
 
Monitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECSMonitoring in Motion: Monitoring Containers and Amazon ECS
Monitoring in Motion: Monitoring Containers and Amazon ECS
 
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...Monitoring Performance of Enterprise Applications on AWS: Understanding the D...
Monitoring Performance of Enterprise Applications on AWS: Understanding the D...
 
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...
RMG203 Cloud Infrastructure and Application Monitoring with Amazon CloudWatch...
 
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013
Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013
 
Integrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWSIntegrated Security & Operations for Scaling Securely in AWS
Integrated Security & Operations for Scaling Securely in AWS
 
Best Practices for Building Partner Managed Services on AWS
Best Practices for Building Partner Managed Services on AWSBest Practices for Building Partner Managed Services on AWS
Best Practices for Building Partner Managed Services on AWS
 
Automating your AWS Security Operations
Automating your AWS Security OperationsAutomating your AWS Security Operations
Automating your AWS Security Operations
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
 
Improving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSImproving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWS
 

Semelhante a 2013 AWS WWPS Summit, Canberra - Compliance, Governance & Security on AWS Cloud

CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeAlert Logic
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23Rolf Koski
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeAlert Logic
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtHelen Rogers
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAmazon Web Services
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice Alert Logic
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAmazon Web Services
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudAmazon Web Services
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology GovernanceAlert Logic
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignAmazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Amazon Web Services
 
(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & ComplianceAmazon Web Services
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...Amazon Web Services Korea
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markryAmazon Web Services LATAM
 

Semelhante a 2013 AWS WWPS Summit, Canberra - Compliance, Governance & Security on AWS Cloud (20)

CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
Outpost24 webinar: cloud providers ate hosting companies' lunch, what's next?...
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Why You Are Secure in the AWS Cloud
Why You Are Secure in the AWS CloudWhy You Are Secure in the AWS Cloud
Why You Are Secure in the AWS Cloud
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance(SEC312) Reliable Design & Deployment of Security & Compliance
(SEC312) Reliable Design & Deployment of Security & Compliance
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLScyllaDB
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxLoriGlavin3
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxLoriGlavin3
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Commit University
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxLoriGlavin3
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfMounikaPolabathina
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxLoriGlavin3
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .Alan Dix
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxLoriGlavin3
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningLars Bell
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESmohitsingh558521
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteDianaGray10
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 

Último (20)

Developer Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQLDeveloper Data Modeling Mistakes: From Postgres to NoSQL
Developer Data Modeling Mistakes: From Postgres to NoSQL
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptxA Deep Dive on Passkeys: FIDO Paris Seminar.pptx
A Deep Dive on Passkeys: FIDO Paris Seminar.pptx
 
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data PrivacyTrustArc Webinar - How to Build Consumer Trust Through Data Privacy
TrustArc Webinar - How to Build Consumer Trust Through Data Privacy
 
The State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptxThe State of Passkeys with FIDO Alliance.pptx
The State of Passkeys with FIDO Alliance.pptx
 
Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!Nell’iperspazio con Rocket: il Framework Web di Rust!
Nell’iperspazio con Rocket: il Framework Web di Rust!
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptxThe Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
The Role of FIDO in a Cyber Secure Netherlands: FIDO Paris Seminar.pptx
 
What is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdfWhat is DBT - The Ultimate Data Build Tool.pdf
What is DBT - The Ultimate Data Build Tool.pdf
 
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptxPasskey Providers and Enabling Portability: FIDO Paris Seminar.pptx
Passkey Providers and Enabling Portability: FIDO Paris Seminar.pptx
 
From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .From Family Reminiscence to Scholarly Archive .
From Family Reminiscence to Scholarly Archive .
 
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptxDigital Identity is Under Attack: FIDO Paris Seminar.pptx
Digital Identity is Under Attack: FIDO Paris Seminar.pptx
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
DSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine TuningDSPy a system for AI to Write Prompts and Do Fine Tuning
DSPy a system for AI to Write Prompts and Do Fine Tuning
 
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICESSALESFORCE EDUCATION CLOUD | FEXLE SERVICES
SALESFORCE EDUCATION CLOUD | FEXLE SERVICES
 
Take control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test SuiteTake control of your SAP testing with UiPath Test Suite
Take control of your SAP testing with UiPath Test Suite
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 

2013 AWS WWPS Summit, Canberra - Compliance, Governance & Security on AWS Cloud

  • 1. 2013 AWS WWPS Summit Canberra, Australia Compliance, Governance & Security on the AWS Cloud Mark Ryland Chief Solutions Architect
  • 2. 2013 AWS WWPS Summit, Canberra – May 23 The Capability/Transparency Trade-up What You Get - Flexible, powerful , fully virtual environment - High investment and capability in security - Certifications, reports, attestations - Reduced compliance ops burden - A world class security team watching your back! What You Give Up - Low-level operational details of the physical infrastructure - Control over low-level capabilities - Ability to physically manage / examine networks and servers
  • 3. 2013 AWS WWPS Summit, Canberra – May 23 Benefits of Scale Apply to Security and Compliance The entire community benefits from tough scrutiny, the world-class AWS security team, market-leading capabilities, and constant improvements Everyone’s Systems and Applications Security Infrastructure Security Infrastructure Requirements Requirements Requirements Nothing better for the community than a tough set of customers…
  • 4. 2013 AWS WWPS Summit, Canberra – May 23 Accreditation & Compliance, Old and New Old world • Functionally optional (you can build a secure system without it) • Audits done by an in-house team • Not about actual security; check the box • Check once a year • Workload-specific security New world • Functionally necessary (no, you cannot visit our data centers!) • Audits done by third party auditors • Superior security drives broad compliance • Continuous monitoring, checking • Security based on all workload scenarios
  • 5. 2013 AWS WWPS Summit, Canberra – May 23 Expert Audits: Validation Scalpels Approaching From 360º SME SME SME SME SME • Experts examine the system with their particular focus • Yet reviewed from a variety of perspectives • What emerges is an unusually complete, comprehensive view including overlapping and non-overlapping elements • All customers benefit from variety, volume, velocity SME=subject matter expert
  • 6. 2013 AWS WWPS Summit, Canberra – May 23 Customers Getting Certified Customer Controls Verified Reliance Practices Controls + Customer Controls Reports Tested
  • 7. 2013 AWS WWPS Summit, Canberra – May 23 System vs. Platform Certifications & ATOs System/app/workload ATOs • Traditional way of granting ATOs: analyze entire stack from concrete through application • Not as efficient; harder to get re-use • However, provides the only fast way to achieve cloud value prop: greater agility and more mission for the money • Many gov’t examples: Tradeshift in the UK; CDC BioSense 2.0 and Tradeworx in the US; Swiss Topo; etc. Platform certifications & ATOs • E.g., FedRAMP in the USA; still need to certify/authorize workload on top • Make sense from a re-use and economies of scale perspective • However, waiting for platform certification delays getting immediate value from the cloud! • This is the best solution for the longer term, but don’t wait if you see compelling value
  • 8. 2013 AWS WWPS Summit, Canberra – May 23 Spectrum of Approaches to Platform Certification Progressive Conservative “We don’t care about platform certification. AWS provides compelling mission value. We’ll issue our own ATO.” “Our agency will authorize some low- risk workloads on AWS but will wait for platform certification before going big.” “Our agency won’t speak to AWS prior to platform certification.” “Our agency may move to platform certification but AWS provides compelling value. We’ll proceed forward with our own ATO for now.” “Our agency requires a platform certification. We’ll start working with AWS but will wait to deploy operational workloads.” Government PM Government ISSO Agency Security Official Government COTR Government ISSO
  • 9. 2013 AWS WWPS Summit, Canberra – May 23 Private Connections Workload Migrations Access Control Integration Work with Existing Management Tools On-Premises Apps Your Data Centers Cloud Apps Governance: Extension and Integration
  • 10. 2013 AWS WWPS Summit, Canberra – May 23 Active Directory VMware Images Network Configuration Your Data Your On-Premises Apps Users & Access Rules VM Import/Export Your Private VPC Our Storage Your Cloud Apps Direct Connect VPC IAM Storage Gateway Many Capabilities to Support Hybrid Architectures Your Data Centers
  • 11. 2013 AWS WWPS Summit, Canberra – May 23 AWS Ecosystem Builds on Existing Management Tools Single Pane of Glass Workload MigrationInventory / patch VMs App 1 Your Data Center App 2 Your Data Center VMs AWS EC2
  • 12. AWS Cloud Governance Service Enablers Governance Area AWS Technologies Roles and Responsibilities • Identity and Access Management: Groups, Policies, Roles Configuration Management • Private, “hardened” AMIs • Cloud Formation Templates • Elastic Beanstalk • OpsWorks Financial Controls • Linked Accounts, Consolidated Billing • Tagging of resources • CloudWatch Billing Alarms Monitoring and Reporting • Cloud Watch • Cloud Watch Alarms • Simple Notification Service
  • 13. AWS Cloud Governance Service Enablers (cont.) Governance Area AWS Technologies Information Assurance: Processing • Corporate “Gold master” AMIs (operating system images) • VPC network isolation for all workloads • Dedicated EC2 Instances • CloudHSM service Information Assurance: Storage • S3 AES 256 bit server-side encryption, client-side encryption • EBS Volume Encryption • RDS database encryption features • Complete destruction of all storage media on decommissioning Information Assurance Transmission • SSL termination for all AWS endpoints • HW/SW VPN Connections • DirectConnect
  • 14. AWS Cloud Governance Service Enablers (cont.) Governance Area AWS Technologies Network Security • Private addressing (Virtual Private Cloud) • Network ACLs • Security Groups • Virtual Private Gateways Access Controls • Identity and Access Management Policies across all services • S3 Bucket Policies • EC2 Instance Roles Identification and Authentication • Identity and Access Management • Federated Identity Management (AWS as relying party) • Multi-Factor Authentication • Group Policies and Roles • Strong password policies
  • 15. AWS Cloud Governance Service Enablers (cont.) Governance Area AWS Technologies Disaster Recovery and Continuity of Operations Data • EBS Snapshots • S3 Near-Line Storage • Glacier Near-Offline Storage • Storage Gateway • Bulk Data Import/Export • Managed AWS No-SQL/SQL Database Services • Extensive 3rd Party Solutions Workload • Elastic load Balancers, EC2 Auto Scaling, CloudWatch • Route 53 – Health Checks, Latency Based Routing • Cloud Front – Content Delivery Network • Multi-AZ, Multi-Region Workload Deployment
  • 16. 2013 AWS WWPS Summit, Canberra – May 23 AWS Governance Tool: Trusted Advisor • Online service from AWS Support – Analyzes account for various kinds of issues and possible concerns – Soon available as an API for integration with your tools or 3rd party solutions • Four categories: – Cost savings – Security – Fault tolerance – Performance
  • 17. 2013 AWS WWPS Summit, Canberra – May 23 Security is a Shared Responsibility Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure Virtualization layer (EC2) Hardened service endpoints Rich IAM capabilities Network configuration Security groups OS firewalls Operating systems Applications Proper service configuration AuthN & acct management Authorization policies + = Customer • Re-focus your security professionals on a subset of the problem • Take advantage of high levels of uniformity and automation
  • 18. Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System and/or Data) Network Traffic Protection (Encryption/Integrity/Identity) Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer Data AmazonCustomer • Payment Card Industry (PCI) Data Security Standard Level 1 • NIST 800-53 Controls & multiple ATOs; FedRAMP • DoD Compliant Controls and multiple DIACAP ATOs • SSAE 16 Types 1 & 2 (SAS 70) • ISO 27001/ 2 Certification • HIPAA and ITAR Compliant • Customers implement their own set of controls • Multiple customers with FISMA GSS/MA Low/ Moderate ATOs • Customers and partners working on FISMA GSS/MA High ATOs
  • 19. 2013 AWS WWPS Summit, Canberra – May 23 Dimensions of Shared Responsibility & Control 1. Operation within the Service: The functions the customer controls and configurations they choose (e.g., in EC2, RDS) 2. Security Configurability: The tools AWS gives customers to configure their security stance (e.g., access policies, security groups) vary considerably from service to service 3. Security Features Which Span Services: Some security configuration features are global (e.g., IAM), others service-specific 4. Cross-Layer Security Controls: Means by which customers integrate their existing controls into AWS (e.g., key management, Active Directory, Drupal user management) and vice versa (e.g., IAM Roles for Instances)
  • 20. 2013 AWS WWPS Summit Canberra, Australia Thank you! Mark Ryland markry@amazon.com