SlideShare uma empresa Scribd logo
1 de 27
Security & Compliance Overview
    Jeff Barr, | Senior Web Services Evangelist



                Amazon Confidential
Overview

• Introduction
• Key Security Concepts
• Certifications
Introduction
AWS Computing Platform
AWS Security Center
              (http://aws.amazon.com/security/)
• Answers to many security & privacy questions
  • Security whitepaper
  • Risk and Compliance whitepaper
• Security bulletins
• Customer penetration testing
• Security best practices
• More information on:
  • AWS Identity & Access Management (AWS IAM)
  • AWS Multi-Factor Authentication (AWS MFA)
Key Security
 Concepts
Shared Responsibility Model

          AWS                         Customer
•   Facilities                •   Operating System
•   Physical Security         •   Application
•   Physical Infrastructure   •   Security Groups
•   Network Infrastructure    •   OS Firewalls
•   Virtualization            •   Network Configuration
    Infrastructure            •   Account Management
AWS Identity and Access Management (IAM)

•   Users and Groups within Accounts
•   Unique security credentials
     • Access keys
     • Login/Password
     • optional MFA device
•   Policies control access to AWS APIs
•   API calls must be signed by either:
     • X.509 certificate
     • secret key
•   Deep integration into some Services
     • S3: policies on objects and buckets
     • Simple DB: domains
•   AWS Management Console now supports User log on
•   Not for Operating Systems or Applications
     • use LDAP, Active Directory/ADFS, etc...
AWS Multi-Factor Authentication

 • Helps prevent anyone with unauthorized knowledge of your
   e-mail address and password from impersonating you
 • Additional protection for account information
 • Works with
     – Master Account
     – IAM Users
 • Integrated into
     – AWS Management Console
     – Key pages on the AWS Portal
     – S3 (Secure Delete)



A recommended opt-in security feature!
AWS is Built for “Continuous Availability”

• Scalable, fault tolerant services
• All Datacenters (AZs) are always on
  – No “Disaster Recovery Datacenter”
  – Managed to the same standards
• Robust Internet connectivity
  – Each AZ has redundant, Tier 1 ISP Service Providers
  – Resilient network infrastructure
Fault Separation and Geographic Diversity
                               US East Region (N. VA)                               EU Region (IRE)


                              Availability              Availability
                                Zone A                    Zone B
                                                                               Availability   Availability
                                                                                 Zone A         Zone B
Amazon CloudWatch

                                             Availability
                                               Zone C
                    US West Region                                APAC Region                         APAC Region
                        (N. CA)                                   (Singapore)                           (Tokyo)




               Availability     Availability                Availability   Availability        Availability   Availability
                 Zone A           Zone B                      Zone A         Zone B              Zone A         Zone B




         Note: Conceptual drawing only. The number of Availability Zones may vary
Data Backups & Replication

•   AWS favors replication over traditional backup
    – Equivalent to more traditional backup solutions
    – Higher data availability and throughput
•   Makes data available in multiple edge locations
    – CloudFront, Route 53
•   Data replicated to multiple Availability Zones within a single Region
    – S3, S3 RRS, SimpleDB, SQS, RDS Multi-AZ, EBS Snapshots
•   Data replicated to multiple physical locations within a single Availability
    Zone
    – EBS, RDS
•   Data NOT automatically replicated
    – EC2 ephemeral drives (a.k.a. instance store)
Storage Device Decommissioning

• All storage devices go through process
• Uses techniques from
  – DoD 5220.22-M (“National Industrial Security
    Program Operating Manual “)
  – NIST 800-88 (“Guidelines for Media Sanitization”)
• If device can’t be verified, then either
  – degaussed
  – physically destroyed
Amazon S3 Security
• Access controls at bucket
  and object level:
   – Read, Write, Full
• Owner has full control
• Customer Encryption
    • SSL Supported
•   Durability 99.999999999%
•   Availability 99.99%
•   Versioning (MFA Delete)
•   Detailed Access Logging
EC2 Security

•   Host operating system
    – Individual SSH keyed logins via bastion host for AWS admins
    – All accesses logged and audited
•   Guest (a.k.a. Instance) operating system
    – Customer controlled (customer owns root/admin)
    – AWS admins cannot log in
    – Customer-generated keypairs
•   Stateful firewall
    – Mandatory inbound firewall, default deny mode
    – Customer controls configuration via Security Groups
•   Signed API calls
    – Require X.509 certificate or customer’s secret AWS key
Amazon EC2 Instance Isolation

     Customer 1        Customer 2            …       Customer n



                                Hypervisor

                               Virtual Interfaces
      Customer 1
    Security Groups
                        Customer 2
                      Security Groups        …        Customer n
                                                    Security Groups

                                  Firewall

         Physical Interfaces
Network Traffic Flow Security
                                 Inbound Traffic

• Security Groups
- Inbound traffic must be
  explicitly specified by
  protocol, port, and security
  group




                                     Amazon Security Groups
- VPC adds outbound filters




                                                              OS Firewall
• VPC also adds Network
  Access Control Lists (ACLs):
  inbound and outbound                                                      Encrypted
                                                                            File System
  stateless filters
• OS Firewall (e.g., iptables)                                              Encrypted
                                                                            Swap File
  may be implemented
- completely user controlled
  security layer
- granular access control of
  discrete hosts
- logging network events
Multi-tier Security Approach Example
                                                Web Tier




                                                                   Application Tier



                                                                                  Database Tier


Ports 80 and 443 only
 open to the Internet


     Engineering staff have ssh
      access to the App Tier,
       which acts as Bastion

                        Sync with on-premises                                             Amazon EC2
                              database                                                    Security Group
                                                                                          Firewall
                                                 All other Internet ports
                                                    blocked by default
Amazon Virtual Private Cloud (VPC)

•   Create a logically isolated environment in Amazon’s highly scalable
    infrastructure
•   Specify your private IP address range into one or more public or private subnets
•   Control inbound and outbound access to and from individual subnets using
    stateless Network Access Control Lists
•   Protect your Instances with stateful filters for inbound and outbound traffic using
    Security Groups
•   Attach an Elastic IP address to any instance in your VPC so it can be reached
    directly from the Internet
•   Bridge your VPC and your onsite IT infrastructure with an industry standard
    encrypted VPN connection
•   Use a wizard to easily create your VPC in 4 different topologies
Certifications
AWS Certifications

• Based on the Shared Responsibility model
• AWS Environment
  – SAS70 Type II Audit
  – ISO 27001 Certification
  – Payment Card Industry Data Security Standard (PCI DSS) Level 1
    Service Provider
  – FedRAMP (FISMA)
• Customers have deployed various compliant applications:
  –   Sarbanes-Oxley (SOX)
  –   HIPAA (healthcare)
  –   FISMA (US Federal Government)
  –   DIACAP MAC III Sensitive IATO
SAS70 Type II

•   Covers Access, Change Management and Operations of EC2 and S3
    –   Control Objective 1: Security Organization
    –   Control Objective 2: Amazon Employee Lifecycle
    –   Control Objective 3: Logical Security
    –   Control Objective 4: Secure Data Handling
    –   Control Objective 5: Physical Security
    –   Control Objective 6: Environmental Safeguards
    –   Control Objective 7: Change Management
    –   Control Objective 8: Data Integrity, Availability and Redundancy
    –   Control Objective 9: Incident Handling

•   Includes all Regions
•   Audited by an independent accounting firm and updated every 6 months
•   SAS70 report available under NDA
•   Will convert to Statement on Standards for Attestation Engagements (SSAE)
    16 format (equivalent to the International Standard on Assurance
    Engagements [ISAE] 3402)
ISO 27001 Certification

• ISO 27001/27002 certification achieved 11/2010
• Follows ISO 27002 best practice guidance
• Covers the AWS Information Security Management
  System (ISMS)
• Covers EC2, S3, and VPC
• Includes all Regions
• ISO certifying agent: EY CertifyPoint
PCI DSS Level 1 Service Provider

• PCI DSS 2.0 compliant
• Covers core infrastructure & services
   – EC2, EBS, S3, VPC
• Use normally, no special configuration
• Leverage the work of our QSA
• AWS will work with merchants and designated Qualified
  Incident Response Assessors (QIRA)
   – can support forensic investigations
• Certified in all regions
Questions?


                 Thank You!

aws.amazon.com/security

Jeff Barr
• Email: jbarr@amazon.com
• AWS Blog: http://aws.typepad.com
© 2010-2011 Amazon.com, Inc., or its affiliates. This document is provided for informational
purposes only. It represents AWS’s current product offerings as of the date of issue of this
document, which are subject to change without notice. Customers are responsible for making
their own independent assessment of the information in this document and any use of AWS’s
products or services, each of which is provided “as is” without warranty of any kind, whether
express or implied. This document does not create any warranties, representations,
contractual commitments, conditions or assurances from AWS, its affiliates, suppliers or
licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS
agreements, and this document is not part of, nor does it modify, any agreement between
AWS and its customers.

This presentation is dated May 2011. Please visit aws.amazon.com to ensure that you have
the latest version.

Mais conteúdo relacionado

Mais procurados

Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionAmazon Web Services
 
Microservices on AWS: Divide & Conquer for Agility and Scalability
Microservices on AWS: Divide & Conquer for Agility and ScalabilityMicroservices on AWS: Divide & Conquer for Agility and Scalability
Microservices on AWS: Divide & Conquer for Agility and ScalabilityAmazon Web Services
 
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...Amazon Web Services Korea
 
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당:: AWS Summit Online Korea 2020
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당::  AWS Summit Online Korea 2020AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당::  AWS Summit Online Korea 2020
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당:: AWS Summit Online Korea 2020Amazon Web Services Korea
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSSamsung Electronics
 
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit SydneyVMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit SydneyAmazon Web Services
 
Moving your commercial databases to Amazon RDS
Moving your commercial databases to Amazon RDSMoving your commercial databases to Amazon RDS
Moving your commercial databases to Amazon RDSAmazon Web Services
 
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...Amazon Web Services Korea
 
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀Track 5 Session 5_STG03 AWS 檔案儲存服務概觀
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀Amazon Web Services
 
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018Amazon Web Services Korea
 
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...Amazon Web Services Korea
 
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)Amazon Web Services Korea
 
AWSome Day Glasgow | Technical Track
AWSome Day Glasgow | Technical TrackAWSome Day Glasgow | Technical Track
AWSome Day Glasgow | Technical TrackAmazon Web Services
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web ServicesAndrew Wong
 
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...Amazon Web Services Korea
 
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집Amazon Web Services Korea
 
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...Amazon Web Services LATAM
 
AWS in Media: Cloud and Serverless Architectures
AWS in Media: Cloud and Serverless ArchitecturesAWS in Media: Cloud and Serverless Architectures
AWS in Media: Cloud and Serverless ArchitecturesAmazon Web Services
 
Best Practices for Hosting Web Applications on AWS
Best Practices for Hosting Web Applications on AWSBest Practices for Hosting Web Applications on AWS
Best Practices for Hosting Web Applications on AWSAmazon Web Services
 

Mais procurados (20)

Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
 
Microservices on AWS: Divide & Conquer for Agility and Scalability
Microservices on AWS: Divide & Conquer for Agility and ScalabilityMicroservices on AWS: Divide & Conquer for Agility and Scalability
Microservices on AWS: Divide & Conquer for Agility and Scalability
 
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
 
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당:: AWS Summit Online Korea 2020
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당::  AWS Summit Online Korea 2020AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당::  AWS Summit Online Korea 2020
AWS를 통한 데이터 분석 및 처리의 새로운 혁신 기법 - 김윤건, AWS사업개발 담당:: AWS Summit Online Korea 2020
 
Practical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBSPractical Approach to Data Maintenance in for PLM in Oracle EBS
Practical Approach to Data Maintenance in for PLM in Oracle EBS
 
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit SydneyVMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
 
Moving your commercial databases to Amazon RDS
Moving your commercial databases to Amazon RDSMoving your commercial databases to Amazon RDS
Moving your commercial databases to Amazon RDS
 
AWS Black Belt Tips
AWS Black Belt TipsAWS Black Belt Tips
AWS Black Belt Tips
 
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
 
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀Track 5 Session 5_STG03 AWS 檔案儲存服務概觀
Track 5 Session 5_STG03 AWS 檔案儲存服務概觀
 
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
 
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...
아름답고 유연한 데이터 파이프라인 구축을 위한 Amazon Managed Workflow for Apache Airflow - 유다니엘 A...
 
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)AWS Summit Seoul 2015 -  국내 사례로 본 클라우드 운영 최적화  (이주완-메가존)
AWS Summit Seoul 2015 - 국내 사례로 본 클라우드 운영 최적화 (이주완-메가존)
 
AWSome Day Glasgow | Technical Track
AWSome Day Glasgow | Technical TrackAWSome Day Glasgow | Technical Track
AWSome Day Glasgow | Technical Track
 
Amazon Web Services
Amazon Web ServicesAmazon Web Services
Amazon Web Services
 
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
 
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
Amazon Container 환경의 보안 – 최인영, AWS 솔루션즈 아키텍트:: AWS 온라인 이벤트 – 클라우드 보안 특집
 
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...
AWS Data Immersion Webinar Week - Entenda como ampliar suas possibilidades de...
 
AWS in Media: Cloud and Serverless Architectures
AWS in Media: Cloud and Serverless ArchitecturesAWS in Media: Cloud and Serverless Architectures
AWS in Media: Cloud and Serverless Architectures
 
Best Practices for Hosting Web Applications on AWS
Best Practices for Hosting Web Applications on AWSBest Practices for Hosting Web Applications on AWS
Best Practices for Hosting Web Applications on AWS
 

Destaque

AWS Summit 2011: Customer Presentation - NASA JPL
AWS Summit 2011: Customer Presentation - NASA JPLAWS Summit 2011: Customer Presentation - NASA JPL
AWS Summit 2011: Customer Presentation - NASA JPLAmazon Web Services
 
AWS Customer Presentation -Playfish
AWS Customer Presentation -Playfish AWS Customer Presentation -Playfish
AWS Customer Presentation -Playfish Amazon Web Services
 
AWS Customer Presentation - NASA JPL
AWS Customer Presentation - NASA JPLAWS Customer Presentation - NASA JPL
AWS Customer Presentation - NASA JPLAmazon Web Services
 
Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Tony Pearson
 
Introducing AWS Elastic Beanstalk
Introducing AWS Elastic BeanstalkIntroducing AWS Elastic Beanstalk
Introducing AWS Elastic BeanstalkAmazon Web Services
 
AWS fault tolerant architecture
AWS fault tolerant architectureAWS fault tolerant architecture
AWS fault tolerant architectureskadyan1
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeAmazon Web Services
 

Destaque (9)

AWS Summit 2011: Customer Presentation - NASA JPL
AWS Summit 2011: Customer Presentation - NASA JPLAWS Summit 2011: Customer Presentation - NASA JPL
AWS Summit 2011: Customer Presentation - NASA JPL
 
AWS Customer Presentation- Esri
AWS Customer Presentation- EsriAWS Customer Presentation- Esri
AWS Customer Presentation- Esri
 
AWS Customer Presentation -Playfish
AWS Customer Presentation -Playfish AWS Customer Presentation -Playfish
AWS Customer Presentation -Playfish
 
AWS Customer Presentation - NASA JPL
AWS Customer Presentation - NASA JPLAWS Customer Presentation - NASA JPL
AWS Customer Presentation - NASA JPL
 
Predicting Costs on AWS
Predicting Costs on AWSPredicting Costs on AWS
Predicting Costs on AWS
 
Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8Ima Cloud Computing Mar2010 V8
Ima Cloud Computing Mar2010 V8
 
Introducing AWS Elastic Beanstalk
Introducing AWS Elastic BeanstalkIntroducing AWS Elastic Beanstalk
Introducing AWS Elastic Beanstalk
 
AWS fault tolerant architecture
AWS fault tolerant architectureAWS fault tolerant architecture
AWS fault tolerant architecture
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 

Semelhante a AWS Summit 2011: Overview of Security and Compliance in the cloud

AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance OverviewRightScale
 
Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2ReadMaloney
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAmazon Web Services
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security ProcessesAmazon Web Services Japan
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaAmazon Web Services
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deckinfolive
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAmazon Web Services
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSAmazon Web Services
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - OverviewSai Kesavamatham
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAmazon Web Services
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWSAmazon Web Services
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudAmazon Web Services
 
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리Amazon Web Services Korea
 
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...Amazon Web Services
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayAWS Germany
 

Semelhante a AWS Summit 2011: Overview of Security and Compliance in the cloud (20)

AWS - Security and Compliance Overview
AWS - Security and Compliance OverviewAWS - Security and Compliance Overview
AWS - Security and Compliance Overview
 
Aws security overview q3 2010 v2
Aws security overview q3 2010 v2Aws security overview q3 2010 v2
Aws security overview q3 2010 v2
 
Aws Security Overview
Aws Security OverviewAws Security Overview
Aws Security Overview
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
 
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
[AWS Summit 2012] ソリューションセッション#4 AWS: Overview of Security Processes
 
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 AustraliaSecurity and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
Security and Privacy in the Cloud - Stephen Schmidt - AWS Summit 2012 Australia
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
16h30 aws gru security deck
16h30   aws gru security deck16h30   aws gru security deck
16h30 aws gru security deck
 
AWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best PracticesAWS Summit 2011: Application Security Best Practices
AWS Summit 2011: Application Security Best Practices
 
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWSSecurity and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
Security and Privacy in the AWS Cloud, Steve Schmidt, CIS Officer, AWS
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYCAWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
AWS Security Overview - AWS CISO Steve Schmidt - AWS Summit 2012 - NYC
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Smartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS CloudSmartronix - Building Secure Applications on the AWS Cloud
Smartronix - Building Secure Applications on the AWS Cloud
 
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
엔터프라이즈를 위한 하이브리드 클라우드 및 보안 관리
 
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
AWS Public Sector Symposium 2014 Canberra | Security as an Enabler: Improving...
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsMaria Levchenko
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024The Digital Insurer
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilV3cube
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slidespraypatel2
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Paola De la Torre
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slidevu2urc
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdfhans926745
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024The Digital Insurer
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...apidays
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxKatpro Technologies
 

Último (20)

Handwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed textsHandwritten Text Recognition for manuscripts and early printed texts
Handwritten Text Recognition for manuscripts and early printed texts
 
Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024Finology Group – Insurtech Innovation Award 2024
Finology Group – Insurtech Innovation Award 2024
 
Developing An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of BrazilDeveloping An App To Navigate The Roads of Brazil
Developing An App To Navigate The Roads of Brazil
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Slack Application Development 101 Slides
Slack Application Development 101 SlidesSlack Application Development 101 Slides
Slack Application Development 101 Slides
 
Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101Salesforce Community Group Quito, Salesforce 101
Salesforce Community Group Quito, Salesforce 101
 
Histor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slideHistor y of HAM Radio presentation slide
Histor y of HAM Radio presentation slide
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf[2024]Digital Global Overview Report 2024 Meltwater.pdf
[2024]Digital Global Overview Report 2024 Meltwater.pdf
 
Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024Partners Life - Insurer Innovation Award 2024
Partners Life - Insurer Innovation Award 2024
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
Apidays Singapore 2024 - Building Digital Trust in a Digital Economy by Veron...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptxFactors to Consider When Choosing Accounts Payable Services Providers.pptx
Factors to Consider When Choosing Accounts Payable Services Providers.pptx
 

AWS Summit 2011: Overview of Security and Compliance in the cloud

  • 1. Security & Compliance Overview Jeff Barr, | Senior Web Services Evangelist Amazon Confidential
  • 2. Overview • Introduction • Key Security Concepts • Certifications
  • 5. AWS Security Center (http://aws.amazon.com/security/) • Answers to many security & privacy questions • Security whitepaper • Risk and Compliance whitepaper • Security bulletins • Customer penetration testing • Security best practices • More information on: • AWS Identity & Access Management (AWS IAM) • AWS Multi-Factor Authentication (AWS MFA)
  • 7. Shared Responsibility Model AWS Customer • Facilities • Operating System • Physical Security • Application • Physical Infrastructure • Security Groups • Network Infrastructure • OS Firewalls • Virtualization • Network Configuration Infrastructure • Account Management
  • 8. AWS Identity and Access Management (IAM) • Users and Groups within Accounts • Unique security credentials • Access keys • Login/Password • optional MFA device • Policies control access to AWS APIs • API calls must be signed by either: • X.509 certificate • secret key • Deep integration into some Services • S3: policies on objects and buckets • Simple DB: domains • AWS Management Console now supports User log on • Not for Operating Systems or Applications • use LDAP, Active Directory/ADFS, etc...
  • 9. AWS Multi-Factor Authentication • Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you • Additional protection for account information • Works with – Master Account – IAM Users • Integrated into – AWS Management Console – Key pages on the AWS Portal – S3 (Secure Delete) A recommended opt-in security feature!
  • 10. AWS is Built for “Continuous Availability” • Scalable, fault tolerant services • All Datacenters (AZs) are always on – No “Disaster Recovery Datacenter” – Managed to the same standards • Robust Internet connectivity – Each AZ has redundant, Tier 1 ISP Service Providers – Resilient network infrastructure
  • 11. Fault Separation and Geographic Diversity US East Region (N. VA) EU Region (IRE) Availability Availability Zone A Zone B Availability Availability Zone A Zone B Amazon CloudWatch Availability Zone C US West Region APAC Region APAC Region (N. CA) (Singapore) (Tokyo) Availability Availability Availability Availability Availability Availability Zone A Zone B Zone A Zone B Zone A Zone B Note: Conceptual drawing only. The number of Availability Zones may vary
  • 12. Data Backups & Replication • AWS favors replication over traditional backup – Equivalent to more traditional backup solutions – Higher data availability and throughput • Makes data available in multiple edge locations – CloudFront, Route 53 • Data replicated to multiple Availability Zones within a single Region – S3, S3 RRS, SimpleDB, SQS, RDS Multi-AZ, EBS Snapshots • Data replicated to multiple physical locations within a single Availability Zone – EBS, RDS • Data NOT automatically replicated – EC2 ephemeral drives (a.k.a. instance store)
  • 13. Storage Device Decommissioning • All storage devices go through process • Uses techniques from – DoD 5220.22-M (“National Industrial Security Program Operating Manual “) – NIST 800-88 (“Guidelines for Media Sanitization”) • If device can’t be verified, then either – degaussed – physically destroyed
  • 14. Amazon S3 Security • Access controls at bucket and object level: – Read, Write, Full • Owner has full control • Customer Encryption • SSL Supported • Durability 99.999999999% • Availability 99.99% • Versioning (MFA Delete) • Detailed Access Logging
  • 15. EC2 Security • Host operating system – Individual SSH keyed logins via bastion host for AWS admins – All accesses logged and audited • Guest (a.k.a. Instance) operating system – Customer controlled (customer owns root/admin) – AWS admins cannot log in – Customer-generated keypairs • Stateful firewall – Mandatory inbound firewall, default deny mode – Customer controls configuration via Security Groups • Signed API calls – Require X.509 certificate or customer’s secret AWS key
  • 16. Amazon EC2 Instance Isolation Customer 1 Customer 2 … Customer n Hypervisor Virtual Interfaces Customer 1 Security Groups Customer 2 Security Groups … Customer n Security Groups Firewall Physical Interfaces
  • 17. Network Traffic Flow Security Inbound Traffic • Security Groups - Inbound traffic must be explicitly specified by protocol, port, and security group Amazon Security Groups - VPC adds outbound filters OS Firewall • VPC also adds Network Access Control Lists (ACLs): inbound and outbound Encrypted File System stateless filters • OS Firewall (e.g., iptables) Encrypted Swap File may be implemented - completely user controlled security layer - granular access control of discrete hosts - logging network events
  • 18. Multi-tier Security Approach Example Web Tier Application Tier Database Tier Ports 80 and 443 only open to the Internet Engineering staff have ssh access to the App Tier, which acts as Bastion Sync with on-premises Amazon EC2 database Security Group Firewall All other Internet ports blocked by default
  • 19. Amazon Virtual Private Cloud (VPC) • Create a logically isolated environment in Amazon’s highly scalable infrastructure • Specify your private IP address range into one or more public or private subnets • Control inbound and outbound access to and from individual subnets using stateless Network Access Control Lists • Protect your Instances with stateful filters for inbound and outbound traffic using Security Groups • Attach an Elastic IP address to any instance in your VPC so it can be reached directly from the Internet • Bridge your VPC and your onsite IT infrastructure with an industry standard encrypted VPN connection • Use a wizard to easily create your VPC in 4 different topologies
  • 20.
  • 22. AWS Certifications • Based on the Shared Responsibility model • AWS Environment – SAS70 Type II Audit – ISO 27001 Certification – Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider – FedRAMP (FISMA) • Customers have deployed various compliant applications: – Sarbanes-Oxley (SOX) – HIPAA (healthcare) – FISMA (US Federal Government) – DIACAP MAC III Sensitive IATO
  • 23. SAS70 Type II • Covers Access, Change Management and Operations of EC2 and S3 – Control Objective 1: Security Organization – Control Objective 2: Amazon Employee Lifecycle – Control Objective 3: Logical Security – Control Objective 4: Secure Data Handling – Control Objective 5: Physical Security – Control Objective 6: Environmental Safeguards – Control Objective 7: Change Management – Control Objective 8: Data Integrity, Availability and Redundancy – Control Objective 9: Incident Handling • Includes all Regions • Audited by an independent accounting firm and updated every 6 months • SAS70 report available under NDA • Will convert to Statement on Standards for Attestation Engagements (SSAE) 16 format (equivalent to the International Standard on Assurance Engagements [ISAE] 3402)
  • 24. ISO 27001 Certification • ISO 27001/27002 certification achieved 11/2010 • Follows ISO 27002 best practice guidance • Covers the AWS Information Security Management System (ISMS) • Covers EC2, S3, and VPC • Includes all Regions • ISO certifying agent: EY CertifyPoint
  • 25. PCI DSS Level 1 Service Provider • PCI DSS 2.0 compliant • Covers core infrastructure & services – EC2, EBS, S3, VPC • Use normally, no special configuration • Leverage the work of our QSA • AWS will work with merchants and designated Qualified Incident Response Assessors (QIRA) – can support forensic investigations • Certified in all regions
  • 26. Questions? Thank You! aws.amazon.com/security Jeff Barr • Email: jbarr@amazon.com • AWS Blog: http://aws.typepad.com
  • 27. © 2010-2011 Amazon.com, Inc., or its affiliates. This document is provided for informational purposes only. It represents AWS’s current product offerings as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS’s products or services, each of which is provided “as is” without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions or assurances from AWS, its affiliates, suppliers or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. This presentation is dated May 2011. Please visit aws.amazon.com to ensure that you have the latest version.