SlideShare uma empresa Scribd logo
1 de 38
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Navigating GDPR
Compliance on AWS
1
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is the GDPR?
2
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What is the GDPR?
• The "GDPR" is the General Data Protection Regulation, a significant new EU Data
Protection Regulation
• Introduces robust requirements that will raise and harmonize standards for data
protection, security, and compliance across the EU
• The GDPR is enforceable May 25, 2018 and it replaces the EU Data Protection
Directive (Directive 95/46/EC)
• In scope: Organizations established in the EU and Organizations without an EU
presence who target or monitor EU individuals
3
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. 4
Content vs. Personal Data
Content
= anything that a customer
(or any end user) stores or
processes using AWS
services, including:
Software ǀ Data ǀ Text ǀ Audio ǀ
Video
Personal Data
= information from which a
living individual may be
identified or identifiable
(under EU data protection
law)
• Customer’s “content” might
include “personal data”
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Individuals have the right to a copy of all the
personal data that controllers have regarding him or
her. It also must be provided in a way that facilitates
reuse.
What Else Comes with GDPR?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
This gives individuals the right to have certain
personal data deleted so third parties can no
longer trace them.
What Else Comes with GDPR?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
This helps to facilitate the inclusion of policies,
guidelines, and work instructions related to data
protection in the earliest stages of projects including
personal data.
What Else Comes with GDPR?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Controllers must report personal data breaches to the
relevant supervisory authority within 72 hours. If there
is a high risk to the rights and freedoms of data
subjects, they must also notify the data subjects.
What Else Comes with GDPR?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What problems are customers trying to solve?
• What type of data am I collecting?
• Where do I collect it?
• Where do I store it?
• Do I have the appropriate legal collection
statements?
• How and when do I delete data?
• How do I secure the data?
• What responsibility do I have?
• Why do I collect the data?
• What is my legal basis for processing and
using the data?
• Where is a list of all my data?
• Do I communicate with the subject I am
collecting from?
• Who do I share it with?
• Who has access to my data? How do I
control it?
• What are the use cases for the data? Are
they permitted? Who provided permission?
• How do I find my data?
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How AWS can help customers
achieve GDPR compliance
10
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Data Protection – A Shared Responsibility
Data Controller: Titolare del trattamento
Data Processor: Responsabile del trattamento
Data Subject: Interessato al trattamento
Customers are Data
Controllers
AWS as Data ProcessorData Subjects
Controllers and Processors have
obligations under GDPR
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shared Responsibility Model
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability
Zones Edge
Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Customers
Customers are
responsible for
their security and
compliance IN
the Cloud
AWS is
responsible for
the security OF
the Cloud
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Shared Responsibility Model
Will one model work for all services?
Infrastructure
Services
Container
Services
Abstract
Services
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How AWS can help customers achieve GDPR compliance?
https://aws.amazon.com/blogs/security/all-aws-services-gdpr-ready/
AWS completed the entirety of our GDPR service readiness audit on March 26,
2018—validating that all generally available services and features adhere to the
high privacy bar and data protection standards required of data processors by the
GDPR.
What does this mean to you?
Customers can deploy AWS services as a key part of their GDPR compliance plans.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
GDPR is also a “shared responsibility”
Legal Compliance
(both controllers and processors)
System Security and Data Protection by Design
(both controllers and processors; AWS has tooling to help)
Records of Processing Activities
(both controllers and processors; AWS has tooling to help)
Encryption
(both controllers and processors; AWS has tooling to help)
Security of Personal Data
(controller responsibility)
Managing Data Subject Consent
(controller responsibility)
Managing Personal Data Deletion
(both controllers and processors; AWS has tooling to help)
Managing Personal Data Portability
(controller responsibility)
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Under GDPR, Controllers and Processors are required to implement appropriate
Technical and Organization Measures (“TOMs”) …
(1) Pseudonymization and
encryption of personal data
(2) Ensure ongoing confidentiality,
integrity, availability, and resilience
of processing systems and
services
(3) Ability to restore availability and
access to personal data in a timely
manner in the event of a physical
or technical incident
(4) Process for regularly testing,
assessing, and evaluating the
effectiveness of TOMs
GDPR in Practice: Implementing TOMs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Tools and services
Compliance framework
Partner network
§§ Data protection terms§§
Implementing TOMs – What AWS Provides to You
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Identity & Access
Management (IAM)
AWS Single Sign-On
AWS Directory Service
Amazon Cognito
AWS Organizations
AWS Secrets Manager
AWS Resource Access
Manager
AWS Security Hub
Amazon GuardDuty
AWS Config
AWS CloudTrail
Amazon
CloudWatch
VPC Flow Logs
AWS Systems Manager
AWS Shield
AWS WAF – Web
application firewall
AWS Firewall Manager
Amazon Inspector
Amazon Virtual Private
Cloud (VPC)
AWS Key Management
Service (KMS)
AWS CloudHSM
AWS Certificate Manager
Amazon Macie
Server-Side Encryption
AWS Config Rules
AWS Lambda
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS security solutions
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
“Security of processing”“Data protection by design and default”
“Records of processing activities”
AWS Storage
Gateway
Amazon
Virtual Private Cloud
(VPC)
Amazon API
Gateway
AWS
KMS
AWS
CloudHSM
Amazon S3
Server-Side
Encryption
AWS Identity
and Access
Management
AWS
CloudFormation
AWS
WAF Amazon
CloudWatch
AWS
CloudTrail
AWS
Config
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The controller “shall implement appropriate technical
and organizational measures for ensuring that, by
default, only personal data that are necessary for each
specific purpose of the processing are processed.”
AWS Identity & Access Management
API-Request Authentication
Temporary Access Tokens
Implementing TOMs with AWS Services - Examples
AWS WAFAWS Systems Manager
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Data Access Control Amazon CloudFront
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
GDPR Compliance Tools
“Each controller and, where applicable, the
controller’s representative, shall maintain a
record of processing activities under their
responsibility.”
Implementing TOMs with AWS Services – Examples
AWS
CloudTrail
AWS
Config
Amazon
GuardDuty
Amazon Macie Amazon Inspector
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Monitoring of access activities – AWS CloudTrail
AWS CloudTrail
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Monitoring of access activities – Amazon GuardDuty
Amazon
GuardDuty
Detects items such as:
- Unusual API calls
- Potentially unauthorized deployments that indicate a possible
account compromise
- Potentially compromised instances or reconnaissance by
attackers
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Integrate with Amazon CloudWatch Events for:
- Alerting
- Remediation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Security service that uses machine
learning to continuously and automatically
discover, classify, and protect sensitive
data in AWS
Recognizes and classify sensitive data such as:
- Personally identifiable information (PII)
- Intellectual property
- Sensitive AWS account information
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Organizations must “implement appropriate technical and
organizational measures to ensure a level of security appropriate to the
risk, including the pseudonymisation and encryption of personal data.”
• Encryption of data at rest (Amazon EBS, Amazon S3, Amazon Glacier, Amazon RDS,
etc.)
• Centralized Regional Key Management with AWS KMS
• IPsec VPN to your AWS environment with Virtual Private Gateway
• Dedicated HSM in the cloud with AWS CloudHSM
Implementing TOMs with AWS Services – Examples
AWS Key Management
Service
AWS CloudHSM
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Data encryption at rest
EMR
S3
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing TOMs with AWS Services
Data Encryption – Key management of server-side encryption
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Appropriate technical and organizational measures may need to
include “the ability to ensure the ongoing confidentiality, integrity,
availability, and resilience of the processing systems and services.”
• SOC 1 / SSAE 16 / ISAE 3402 (formerly SAS 70) / SOC 2 / SOC 3
• PCI DSS Level 1
• ISO 9001 / ISO 27001 / ISO 27017 / ISO 27018
• NIST FIPS 140-2
• Common Cloud Computing Controls Catalog (C5)
Implementing TOMs with AWS Services – Examples
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Foundation Services
AWS Global
Infrastructure
Your own
accreditation
Meet Your Own Security Objectives
Your own
certifications
Your own
external audits
Customer scope
and effort is
reduced
Better results
through focused
efforts
Built on AWS
consistent
baseline controls
GDPR
Code of
Conduct
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
GDPR – Code of Conduct
CISPE Code (Cloud Infrastructure Service Providers in Europe)
The CISPE Code of Conduct :
• An effective, easily accessed framework for complying with the EU’s GDPR
• Excludes the reuse of customer data
• Enables data storage and processing exclusively within the EU
• Identifies cloud infrastructure services suitable for different types of data
processing
• Helps citizens retain control of their personal and sensitive data
• AWS CISPE certified
• CISPE Code of Conduct in evaluation by Article 29 WP
https://aws.amazon.com/it/compliance/cispe/
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon Trusted Advisor
Helps you reduce cost, increase performance, and
improve security by providing real-time guidance
to help you provision your resources following AWS
best practices
Continuous Validation
Comes with baked-in controls for:
- Unrestricted security groups
- MFA not on root accounts
- Publically exposed AWS credentials
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Marketplace: Your One Stop Shop for Familiar
Tools
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Partner Network (APN) & GDPR
APN Technology Partners
offer security & identity
solutions to help with GDPR
Technology PartnerConsulting Partner
APN Consulting Partners can
help your customers get ready
for GDPR
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS GDPR Center
https://aws.amazon.com/compliance/gdpr-center/
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
GDPR Resources
https://aws.amazon.com/blogs/security/tips-for-success-
gdpr-lessons-learned/
https://aws.amazon.com/blogs/apn/how-aws-supports-
customers-and-apn-partners-on-the-journey-to-gdpr-
compliance/https://aws.amazon.com/it/blogs/security/aws-gdpr-
data-processing-addendum/
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Other Resources
• Get a consistent approach for customers and partners to evaluate architectures,
and provides guidance to help implement designs that will scale with your
application needs over time. AWS Well Architected Framework,
https://aws.amazon.com/architecture/well-architected/
• Leading insight and applications from AWS security experts on achieving
provable security, the highest level of security assurance, in the cloud. Provable
Security, https://aws.amazon.com/security/provable-security/

Mais conteúdo relacionado

Mais procurados

Aws security best practices
Aws security best practicesAws security best practices
Aws security best practicesSundeep Roxx
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAmazon Web Services
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Amazon Web Services
 
Incident Response - Eyes Everywhere
Incident Response - Eyes EverywhereIncident Response - Eyes Everywhere
Incident Response - Eyes EverywhereAmazon Web Services
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledAmazon Web Services
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes EverywhereAmazon Web Services
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Amazon Web Services
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...Amazon Web Services
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Amazon Web Services
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesAhmad Khan
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 Amazon Web Services
 
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSAmazon Web Services
 
T4 – Understanding aws security
T4 – Understanding aws securityT4 – Understanding aws security
T4 – Understanding aws securityAmazon Web Services
 
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...Driven by security: Legendary Entertainment’s high-velocity cloud transformat...
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...Amazon Web Services
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPTAmazon Web Services
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Amazon Web Services
 

Mais procurados (20)

Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security BaselineAWS Security Week: Infrastructure Security- Your Minimum Security Baseline
AWS Security Week: Infrastructure Security- Your Minimum Security Baseline
 
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
Foundations - Understanding the Critical Building Blocks of AWS Identity & Go...
 
Incident Response - Eyes Everywhere
Incident Response - Eyes EverywhereIncident Response - Eyes Everywhere
Incident Response - Eyes Everywhere
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Incident Response: Eyes Everywhere
Incident Response: Eyes EverywhereIncident Response: Eyes Everywhere
Incident Response: Eyes Everywhere
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019 Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
Scaling threat detection and response in AWS - SDD312-R - AWS re:Inforce 2019
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
T4 – Understanding aws security
T4 – Understanding aws securityT4 – Understanding aws security
T4 – Understanding aws security
 
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...Driven by security: Legendary Entertainment’s high-velocity cloud transformat...
Driven by security: Legendary Entertainment’s high-velocity cloud transformat...
 
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 Build HIPAA Eligible Solutions with AWS and APN Partners PPT Build HIPAA Eligible Solutions with AWS and APN Partners PPT
Build HIPAA Eligible Solutions with AWS and APN Partners PPT
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
 

Semelhante a AWS per la semplificazione del percorso di conformità al GDPR

Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSAmazon Web Services
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSAmazon Web Services
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Net4All
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaAmazon Web Services
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUAmazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSAmazon Web Services
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksAmazon Web Services
 
Gdpr compliance on_aws
Gdpr compliance on_awsGdpr compliance on_aws
Gdpr compliance on_awssaifam
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Amazon Web Services
 
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Amazon Web Services
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWSAmazon Web Services
 
Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...Amazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSAmazon Web Services
 

Semelhante a AWS per la semplificazione del percorso di conformità al GDPR (20)

GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in China
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Gdpr compliance on_aws
Gdpr compliance on_awsGdpr compliance on_aws
Gdpr compliance on_aws
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
 
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS per la semplificazione del percorso di conformità al GDPR

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Navigating GDPR Compliance on AWS 1
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. What is the GDPR? 2
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. What is the GDPR? • The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection Regulation • Introduces robust requirements that will raise and harmonize standards for data protection, security, and compliance across the EU • The GDPR is enforceable May 25, 2018 and it replaces the EU Data Protection Directive (Directive 95/46/EC) • In scope: Organizations established in the EU and Organizations without an EU presence who target or monitor EU individuals 3
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. 4 Content vs. Personal Data Content = anything that a customer (or any end user) stores or processes using AWS services, including: Software ǀ Data ǀ Text ǀ Audio ǀ Video Personal Data = information from which a living individual may be identified or identifiable (under EU data protection law) • Customer’s “content” might include “personal data”
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Individuals have the right to a copy of all the personal data that controllers have regarding him or her. It also must be provided in a way that facilitates reuse. What Else Comes with GDPR?
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. This gives individuals the right to have certain personal data deleted so third parties can no longer trace them. What Else Comes with GDPR?
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. This helps to facilitate the inclusion of policies, guidelines, and work instructions related to data protection in the earliest stages of projects including personal data. What Else Comes with GDPR?
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Controllers must report personal data breaches to the relevant supervisory authority within 72 hours. If there is a high risk to the rights and freedoms of data subjects, they must also notify the data subjects. What Else Comes with GDPR?
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. What problems are customers trying to solve? • What type of data am I collecting? • Where do I collect it? • Where do I store it? • Do I have the appropriate legal collection statements? • How and when do I delete data? • How do I secure the data? • What responsibility do I have? • Why do I collect the data? • What is my legal basis for processing and using the data? • Where is a list of all my data? • Do I communicate with the subject I am collecting from? • Who do I share it with? • Who has access to my data? How do I control it? • What are the use cases for the data? Are they permitted? Who provided permission? • How do I find my data?
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. How AWS can help customers achieve GDPR compliance 10
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Data Protection – A Shared Responsibility Data Controller: Titolare del trattamento Data Processor: Responsabile del trattamento Data Subject: Interessato al trattamento Customers are Data Controllers AWS as Data ProcessorData Subjects Controllers and Processors have obligations under GDPR
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Shared Responsibility Model AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Shared Responsibility Model Will one model work for all services? Infrastructure Services Container Services Abstract Services
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. How AWS can help customers achieve GDPR compliance? https://aws.amazon.com/blogs/security/all-aws-services-gdpr-ready/ AWS completed the entirety of our GDPR service readiness audit on March 26, 2018—validating that all generally available services and features adhere to the high privacy bar and data protection standards required of data processors by the GDPR. What does this mean to you? Customers can deploy AWS services as a key part of their GDPR compliance plans.
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. GDPR is also a “shared responsibility” Legal Compliance (both controllers and processors) System Security and Data Protection by Design (both controllers and processors; AWS has tooling to help) Records of Processing Activities (both controllers and processors; AWS has tooling to help) Encryption (both controllers and processors; AWS has tooling to help) Security of Personal Data (controller responsibility) Managing Data Subject Consent (controller responsibility) Managing Personal Data Deletion (both controllers and processors; AWS has tooling to help) Managing Personal Data Portability (controller responsibility)
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Under GDPR, Controllers and Processors are required to implement appropriate Technical and Organization Measures (“TOMs”) … (1) Pseudonymization and encryption of personal data (2) Ensure ongoing confidentiality, integrity, availability, and resilience of processing systems and services (3) Ability to restore availability and access to personal data in a timely manner in the event of a physical or technical incident (4) Process for regularly testing, assessing, and evaluating the effectiveness of TOMs GDPR in Practice: Implementing TOMs
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Tools and services Compliance framework Partner network §§ Data protection terms§§ Implementing TOMs – What AWS Provides to You
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Identity & Access Management (IAM) AWS Single Sign-On AWS Directory Service Amazon Cognito AWS Organizations AWS Secrets Manager AWS Resource Access Manager AWS Security Hub Amazon GuardDuty AWS Config AWS CloudTrail Amazon CloudWatch VPC Flow Logs AWS Systems Manager AWS Shield AWS WAF – Web application firewall AWS Firewall Manager Amazon Inspector Amazon Virtual Private Cloud (VPC) AWS Key Management Service (KMS) AWS CloudHSM AWS Certificate Manager Amazon Macie Server-Side Encryption AWS Config Rules AWS Lambda Identity Detective control Infrastructure security Incident response Data protection AWS security solutions
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services “Security of processing”“Data protection by design and default” “Records of processing activities” AWS Storage Gateway Amazon Virtual Private Cloud (VPC) Amazon API Gateway AWS KMS AWS CloudHSM Amazon S3 Server-Side Encryption AWS Identity and Access Management AWS CloudFormation AWS WAF Amazon CloudWatch AWS CloudTrail AWS Config
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. The controller “shall implement appropriate technical and organizational measures for ensuring that, by default, only personal data that are necessary for each specific purpose of the processing are processed.” AWS Identity & Access Management API-Request Authentication Temporary Access Tokens Implementing TOMs with AWS Services - Examples AWS WAFAWS Systems Manager
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Data Access Control Amazon CloudFront
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. GDPR Compliance Tools “Each controller and, where applicable, the controller’s representative, shall maintain a record of processing activities under their responsibility.” Implementing TOMs with AWS Services – Examples AWS CloudTrail AWS Config Amazon GuardDuty Amazon Macie Amazon Inspector
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Monitoring of access activities – AWS CloudTrail AWS CloudTrail
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Monitoring of access activities – Amazon GuardDuty Amazon GuardDuty Detects items such as: - Unusual API calls - Potentially unauthorized deployments that indicate a possible account compromise - Potentially compromised instances or reconnaissance by attackers
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Integrate with Amazon CloudWatch Events for: - Alerting - Remediation
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Security service that uses machine learning to continuously and automatically discover, classify, and protect sensitive data in AWS Recognizes and classify sensitive data such as: - Personally identifiable information (PII) - Intellectual property - Sensitive AWS account information
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Organizations must “implement appropriate technical and organizational measures to ensure a level of security appropriate to the risk, including the pseudonymisation and encryption of personal data.” • Encryption of data at rest (Amazon EBS, Amazon S3, Amazon Glacier, Amazon RDS, etc.) • Centralized Regional Key Management with AWS KMS • IPsec VPN to your AWS environment with Virtual Private Gateway • Dedicated HSM in the cloud with AWS CloudHSM Implementing TOMs with AWS Services – Examples AWS Key Management Service AWS CloudHSM
  • 28. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Data encryption at rest EMR S3
  • 29. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing TOMs with AWS Services Data Encryption – Key management of server-side encryption
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Appropriate technical and organizational measures may need to include “the ability to ensure the ongoing confidentiality, integrity, availability, and resilience of the processing systems and services.” • SOC 1 / SSAE 16 / ISAE 3402 (formerly SAS 70) / SOC 2 / SOC 3 • PCI DSS Level 1 • ISO 9001 / ISO 27001 / ISO 27017 / ISO 27018 • NIST FIPS 140-2 • Common Cloud Computing Controls Catalog (C5) Implementing TOMs with AWS Services – Examples
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Foundation Services AWS Global Infrastructure Your own accreditation Meet Your Own Security Objectives Your own certifications Your own external audits Customer scope and effort is reduced Better results through focused efforts Built on AWS consistent baseline controls GDPR Code of Conduct
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. GDPR – Code of Conduct CISPE Code (Cloud Infrastructure Service Providers in Europe) The CISPE Code of Conduct : • An effective, easily accessed framework for complying with the EU’s GDPR • Excludes the reuse of customer data • Enables data storage and processing exclusively within the EU • Identifies cloud infrastructure services suitable for different types of data processing • Helps citizens retain control of their personal and sensitive data • AWS CISPE certified • CISPE Code of Conduct in evaluation by Article 29 WP https://aws.amazon.com/it/compliance/cispe/
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon Trusted Advisor Helps you reduce cost, increase performance, and improve security by providing real-time guidance to help you provision your resources following AWS best practices Continuous Validation Comes with baked-in controls for: - Unrestricted security groups - MFA not on root accounts - Publically exposed AWS credentials
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Marketplace: Your One Stop Shop for Familiar Tools
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Partner Network (APN) & GDPR APN Technology Partners offer security & identity solutions to help with GDPR Technology PartnerConsulting Partner APN Consulting Partners can help your customers get ready for GDPR
  • 36. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS GDPR Center https://aws.amazon.com/compliance/gdpr-center/
  • 37. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. GDPR Resources https://aws.amazon.com/blogs/security/tips-for-success- gdpr-lessons-learned/ https://aws.amazon.com/blogs/apn/how-aws-supports- customers-and-apn-partners-on-the-journey-to-gdpr- compliance/https://aws.amazon.com/it/blogs/security/aws-gdpr- data-processing-addendum/
  • 38. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Other Resources • Get a consistent approach for customers and partners to evaluate architectures, and provides guidance to help implement designs that will scale with your application needs over time. AWS Well Architected Framework, https://aws.amazon.com/architecture/well-architected/ • Leading insight and applications from AWS security experts on achieving provable security, the highest level of security assurance, in the cloud. Provable Security, https://aws.amazon.com/security/provable-security/