SlideShare uma empresa Scribd logo
1 de 80
Baixar para ler offline
Compliance with AWS:
Verifying AWS Security
Dave Walker, Specialist Solutions
Architect, Security and Compliance
Agenda
• "Everything Starts with a Threat Model"
• The End Product
• How AWS Gets There
• What AWS Means by "Compliance"
• Getting Copy of Audit Reports: The Artifact Service
• Workbooks and White Papers
• Verifying Your AWS Security
• Geographical Considerations
“Everything	starts	with	a	threat	model”
• STRIDE,	DREAD,	others
• Identify:
• Actors
• Vectors
• “Bad	stuff	that	could	happen	when	bad	people	get	creative”
• Probabilities	and	consequences	of	bad	stuff	happening
• Apply	technical	and	procedural	mitigations
• All	the	way	up	the	OSI	stack,	from	network	to	application
The	End	Product
How	We	Get	There
70+	
services
7,710	Audit	
Artifacts
3,030	Audit	
Requirements
2,670	
Controls
AWS	Security	Team
Operations
Application	Security
Engineering
Compliance
Aligned	for	agility
How	We	Get	There
• Promotes	culture	of	“everyone	is	an	owner”	for	security
• Makes	security	stakeholder	in	business	success
• Enables	easier	and	smoother	communication
Distributed Embedded
How	We	Get	There
Separation	of	duties
Different	personnel	across	service	lines
Least	privilege	
How	We	Get	There
Visibility	through	log	analytics
Shrinking	the	protection	boundaries	
Ubiquitous	encryption
How	We	Get	There
What	AWS	Means	by	"Compliance"
SecurityRisk ComplianceGovernance
AWS	Foundation	Services
Compute Storage Database Networking
AWS	Global	
Infrastructure Regions
Availability	Zones
Edge	Locations
Customer	scope	and	
effort	is reduced
Better	results	through
focused	efforts
Built	on	AWS	consistent
baseline	controls
Your	own	
external	audits
Customers
Your	own	
accreditation
Your	own	
certifications
What	AWS	Means	by	"Compliance"
The	Artifact	Service
The	Artifact	Service	
{
"Version": "2012-10-17",
"Statement": [
{ "Effect": "Allow",
"Action": [
"artifact:Get"
],
"Resource": [
"arn:aws:artifact:::report-package/Certifications and Attestations/SOC/*",
"arn:aws:artifact:::report-package/Certifications and Attestations/PCI/*",
"arn:aws:artifact:::report-package/Certifications and Attestations/ISO/*"
]
}
]
}
The	Artifact	Service	
• C5 (Germany)
• FedRAMP Partner package
• Global Financial Services Regulatory Principles
• IRAP Package (Australia)
• ISO 27001 Certification, Statement of Applicability
• ISO 27017 Certification, Statement of Applicability
• ISO 27018 Certification, Statement of Applicability
• ISO 9001 Certification
• MAS TRM Guidelines Workbook (Singapore)
• PCI DSS Attestation of Compliance and Responsibility Summary - Current and Previous
• PSN Connection Compliance Certificate (UK)
• PSN Service Provision Compliance Certificate (UK)
• Quality Management System Overview
• SOC 1 Reports (Current and Previous)
• SOC 2 Reports (Current and Previous)
• SOC 2 Report for Confidentiality
• SOC 3
• SOC Continued Operations Letter
Workbooks	and	White	Papers
• Overview of Security Processes:
https://d1.awsstatic.com/whitepapers/Security/AWS%20Security%20Whitepaper.pdf
• UK G-Cloud / NCSC Security Principles, gov.uk:
https://d0.awsstatic.com/whitepapers/compliance/AWS_CESG_UK_Cloud_Security_Princi
ples.pdf
• IT-Grundschutz: Workbook at
https://d0.awsstatic.com/whitepapers/compliance/AWS_IT_Grundschutz_TUV_Certification
_Workbook.pdf
• FFIEC Compliance Workbook:
https://d0.awsstatic.com/whitepapers/compliance/AWS_Coalfire_FFIEC_Audit_Compliance
_Workbook.pdf
• EU Data Protection Guidance:
https://d0.awsstatic.com/whitepapers/compliance/AWS_EU_Data_Protection_Whitepaper.p
df
Compliance	Resources
https://aws.amazon.com/compliance/resources/
Verifying	Your AWS	Security
Encryption	&	
Key	Mgmt
Server	&	
Endpoint	
Protection
Application	
Security
Vulnerability		
&	Pen	Testing
Advanced	
Threat	
Analytics
Identity	and	
Access	Mgmt
Network	
Security
• PCI-DSS
• standards for merchants which process credit card payments and
have strict security requirements to protect cardholder data. A point-
in-time certification.
• SOC 1-3
• designed by the “big 4” auditors as an evolution of SSAE16, SAS70
etc, and to address perceived shortcomings in ISO27001. A
continuous-assessment certification, covering process and
implementation.
• ISO 27001
• outlines the requirements for Information Security Management
Systems. A point-in-time certification, but one which requires
mature processes.
Verifying	Your AWS	Security
• Controls overlap between standards
• see eg https://www.unifiedcompliance.com
• AWS master control list and mappings
• 2670(ish) internal controls
• Mappings to external standards
• Engage auditors, and…
Verifying	Your AWS	Security
• “The	magic’s	in	the	Scoping”
• If	a	Service	isn’t	in	scope,	that	doesn’t	necessarily	mean	it	can’t	be	used	in	a	
compliant	deployment
• …but	it	won’t	be	usable	for	a	purpose	which	touches	sensitive	data
• See	Re:Invent	sessions,	especially	"Navigating	PCI	Compliance	in	the	Cloud”,	
https://www.youtube.com/watch?v=LUGe0lofYa0&index=13&list=PLhr1KZp
dzukcJvl0e65MqqwycgpkCENmg
• Remember	the	Shared	Responsibility	Model
• “we	do	our	bit	at	AWS,	but	you	must	also	do	your	bit	in	what	you	build	using	our	
services”
• Our	audit	reports	make	it	easier	for	our	customers	to	get	approval	from	
their	auditors,	against	the	same	standards
• Liability	can’t	be	outsourced…
• "Security	is	70%	people,	policy	and	procedure,	and	30%	what	you	do	to	the	
computers"	– and	so	is	Compliance
Verifying	Your AWS	Security
• Time-based	Subtleties:
• PCI,	ISO:	point-in-time	assessments
• SOC:	assessment	spread	over	time,	therefore	more	rigorous	assessment	of	
procedures	and	operations
• (AWS	Config	allows	you	to	make	a	path	between	these,	for	your	own	auditors)
• FedRAMP:	Continuous	Monitoring	and	Reporting	– important	proof
• If	a	service	for	defined	sensitive	data	isn’t	in	scope	of	an	audit	report,	
can	this	be	designed	around?
• Eg	standing	up	a	queue	system	on	EC2	as	a	substitute	for	SQS…
• Be	careful	of	what	elements	of	a	Service	are	in	scope,	too…
• Metadata	is	typically	“out”
Verifying	Your AWS	Security
SOC	1
• Availability:
• Audit	report	available	to	any	customer	with	an	NDA
• Scope:
• AWS	CloudFormation,	AWS	CloudHSM,	AWS	CloudTrail,	AWS	DirectConnect,	Amazon	
DynamoDB,	Amazon	EBS,	Amazon	EC2,	AWS	Elastic	Beanstalk,	ELB,	Amazon	EMR,	Amazon	
ElastiCache,	Amazon	Glacier,	IAM,	AWS	KMS,	Amazon	RDS,	Amazon	Redshift,	Amazon	
Route	53,	Amazon	S3,	Amazon	SES,	Amazon	SimpleDB,	Amazon	SQS,	AWS	Storage	
Gateway,	Amazon	SWF,	AWS	VM	Import	/	Export,	Amazon	VPC,	Amazon	Workspaces
• Sensitive	data:
• N/A
• Particularly	good	for:
• Datacentre	management,	talks	about	KMS	for	key	management	and	encryption	
at	rest,	discusses	Engineering	bastions
• Downsides:
• None
SOC	2
• Availability:
• Audit	report	available	to	any	customer	with	an	NDA
• Scope:
• AWS	CloudFormation,	AWS	CloudHSM,	AWS	CloudTrail,	AWS	DirectConnect,	Amazon	DynamoDB,	
Amazon	EBS,	Amazon	EC2,	AWS	Elastic	Beanstalk,	ELB,	Amazon	EMR,	Amazon	ElastiCache,	Amazon	
Glacier,	IAM,	AWS	KMS,	Amazon	RDS,	Amazon	Redshift,	Amazon	Route	53,	Amazon	S3,	Amazon	SES,	
Amazon	SimpleDB,	Amazon	SQS,	AWS	Storage	Gateway,	Amazon	SWF,	AWS	VM	Import	/	Export,	
Amazon	VPC,	Amazon	Workspaces
• Sensitive	data:
• N/A
• Particularly	good	for:
• Risk	assessment	considerations,	management	visibility	and	process,	
organisational	structure
• Downsides:
• None
PCI-DSS
• Availability:
• Audit	report	available	to	any	customer	with	an	NDA
• Scope:
• Amazon	EC2,	Application	Auto	Scaling,	ELB,	Amazon	VPC,	Amazon	Route	53,	AWS	Direct	Connect,	
Amazon	S3,	Amazon	Glacier,	Amazon	EBS,	Amazon	RDS,	Amazon	DynamoDB,	Amazon	SimpleDB,	
Amazon	Redshift,	Amazon	EMR,	Amazon	SWF,	IAM,	AWS	CloudTrail,	AWS	CloudHSM,	Amazon	SQS,	
Amazon	CloudFront,	AWS	CloudFormation,	AWS	Elastic	Beanstalk,	AWS	KMS,	Amazon	ECS,	AWS	WAF
• Sensitive	data:
• CVV,	PAN
• Particularly	good	for:
• Forensics	cooperation,	breach	disclosure,	explaining	Shared	Responsibility	in	
depth;	also	Hypervisor-based	instance	separation	assurance
• Downsides:
• None	(since	the	August	2015	update,	when	KMS	was	added)
ISO	27001
• Availability:
• Certificate	is	public	at	
http://d0.awsstatic.com/certifications/iso_27001_global_certification.pdf,	Statement	of	
Applicability	via	Artifact,	full	audit	report	available	under	NDA	with	a	workshop
• Scope:
• AWS	CloudFormation,	Amazon	CloudFront,	AWS	CloudHSM,	AWS	CloudTrail,	AWS	Direct	Connect,	AWS	Directory	
Service,	Amazon	DynamoDB,	Amazon	EBS,	Amazon	EC2,	Amazon	ECS,	Amazon	EFS,	AWS	Elastic	Beanstalk,	ELB,	Amazon	
EMR,	Amazon	ElastiCache,	Amazon	Glacier,	IAM,	AWS	KMS,	Amazon	RDS,	Amazon	Redshift,	Amazon	Route	53,	Amazon	
S3,	Amazon	SES,	Amazon	SimpleDB,	Amazon	SQS,	AWS	Storage	Gateway,	Amazon	SWF,	AWS	VM	Import	/	Export,	
Amazon	VPC,	AWS	WAF,	Amazon	WorkDocs,	Amazon	WorkMail,	Amazon	WorkSpaces
• Sensitive	data:
• N/A
• Particularly	good	for:
• A	broad-ranging	“backstop”	and	important	“tick	box	item”	– ISMS	considerations
• Downsides:
• None	(we	now	have	a	detailed	audit	report	available,	but	it	needs	a	workshop)
ISO	27017
• Availability:
• Certificate	available	at	
https://d0.awsstatic.com/certifications/iso_27017_certification.pdf
• Scope:
• AWS	CloudFormation,	Amazon	CloudFront,	AWS	CloudHSM,	AWS	CloudTrail,	AWS	Direct	Connect,	AWS	Directory	
Service,	Amazon	DynamoDB,	Amazon	EBS,	Amazon	EC2,	Amazon	ECS,	Amazon	EFS,	AWS	Elastic	Beanstalk,	ELB,	Amazon	
EMR,	Amazon	ElastiCache,	Amazon	Glacier,	IAM,	AWS	KMS,	Amazon	RDS,	Amazon	Redshift,	Amazon	Route	53,	Amazon	
S3,	Amazon	SES,	Amazon	SimpleDB,	Amazon	SQS,	AWS	Storage	Gateway,	Amazon	SWF,	AWS	VM	Import	/	Export,	
Amazon	VPC,	AWS	WAF,	Amazon	WorkDocs,	Amazon	WorkMail,	Amazon	WorkSpaces
• Sensitive	data:
• PII
• Particularly	good	for:
• Cloud	Security	Recommended	Practices
• Downsides:
• No	detailed	audit	report	available
ISO	27018
• Availability:
• Certificate	available	at	
https://d0.awsstatic.com/certifications/iso_27018_certification.pdf
• Scope:
• AWS	CloudFormation,	Amazon	CloudFront,	AWS	CloudHSM,	AWS	CloudTrail,	AWS	Direct	Connect,	AWS	Directory	
Service,	Amazon	DynamoDB,	Amazon	EBS,	Amazon	EC2,	Amazon	ECS,	Amazon	EFS,	AWS	Elastic	Beanstalk,	ELB,	Amazon	
EMR,	Amazon	ElastiCache,	Amazon	Glacier,	IAM,	AWS	KMS,	Amazon	RDS,	Amazon	Redshift,	Amazon	Route	53,	Amazon	
S3,	Amazon	SES,	Amazon	SimpleDB,	Amazon	SQS,	AWS	Storage	Gateway,	Amazon	SWF,	AWS	VM	Import	/	Export,	
Amazon	VPC,	AWS	WAF,	Amazon	WorkDocs,	Amazon	WorkMail,	Amazon	WorkSpaces
• Sensitive	data:
• PII
• Particularly	good	for:
• Assurance	of	protection	of	PII	in	AWS	environments
• Downsides:
• No	detailed	audit	report	available
Industry	Best	Practices	for	
Securing	AWS	Resources
CIS	Amazon	Web	Services	Foundations
Architecture	agnostic	set	of	security	configuration	
best	practices
provides	set-by-step	implementation	and	assessment	
procedures
CIS	AWS	Foundation	Automation	is	mostly	there...
AWS	Enterprise	Accelerator:	
Compliance	Architectures
Sample	Architecture	–
Security	Controls	Matrix
Cloudformation	Templates
5	x	templates
User	Guide
http://docs.aws.amazon.com/quickstart/latest/accelerator-nist/welcome.html
“Familiar	Functions,	made	Cloud	Scale"
• IAM: “RBAC writ large”
• Fine-grained privilege
• Further access controls
• Source IP
• Time of day
• Use of MFA
• Region affected (a work in progress; works for EC2, RDS)
• Data Pipeline: “Cron writ large”
• (…and now, CloudWatch Events =
• “cron for Lambda”)
Asset	Management,	Logging	and	Analysis
• “What the API returns, is true”
• CloudTrail, Config, CloudWatch Logs
• “Checks and balances”
• S3 append-only, MFA delete
• SNS for alerting
• Easy building blocks for Continuous Protective Monitoring
AWS
Config
AWS CloudTrail CloudWatch
Config Rules	
• Set	up	rules	to	check	configuration	changes	recorded
• Use	pre-built	rules	provided	by	AWS
• Author	custom	rules	using	AWS	Lambda	
• Invoked	automatically	for	continuous	assessment	
• Use	dashboard	for	visualizing	compliance	and	identifying	offending	
changes
Key	Capabilities
• Normalized	representation	of	your	AWS	resources
• Understand	how	different	resources	are	connected	and	how	a	
configuration	change	to	one	affects	others
• Continuous	compliance	with	rules	that	you	create!
• Continuous	stream	of	configuration	changes	for	resources	you	care	
about
• Records	configurations	continuously,	but	only	when	they	change
NormalizeRecordChanging
Resources
AWS Config & Config Rules
Deliver
Stream
Snapshot (ex. 2014-11-05)
AWS Config
APIs
Store
History
Rules
NormalizeRecordChanging
Resources
AWS Config & Config Rules
Deliver
Stream
Snapshot (ex. 2014-11-05)
AWS Config
APIs
Store
History
Rules
Rule R1: TaggedEC2
Rule R3: CloudTrail enabled
Rule R2: ProductionVolumesEncrypted
Multi-region	aggregation	of	delivered	data
Region	1
Region	2
Region	3
Common	S3	bucket
Amazon	S3	policies	should	permit	accounts	to	write	Config data
SNS	Topic:	Region	1
SNS	Topic:	Region	2
SNS	Topic:	Region	3
Common	SQS	queue
Amazon	SQS/Amazon	SNS	publish/subscribe	permissions	should	be	set
AWS	CloudTrail	logs	can	be	delivered	cross-
account
CloudTrail	can	help	achieve	many	tasks
Accounts	can	send	their	trails	to	a	central	
account
Central	account	can	then	do	analytics
Central	account	can:
‣ Redistribute	the	trails
‣ Grant	access	to	the	trails
‣ Filter	and	reformat	Trails	(to	meet	privacy	
requirements)
Component Description Contains
Metadata Information about this
configuration item
Version ID, Configuration item ID,
Time when the configuration item
was captured, State ID indicating
the ordering of the configuration
items of a resource, MD5Hash, etc.
Common Attributes Resource attributes Resource ID, tags, Resource type.
Amazon Resource Name (ARN)
Availability Zone, etc.
Relationships How the resource is related to
other resources associated with the
account
EBS volume vol-1234567 is
attached to an EC2 instance i-
a1b2c3d4
Current Configuration Information returned through a call
to the Describe or List API of the
resource
e.g. for EBS Volume
State of DeleteOnTermination flag
Type of volume. For example, gp2,
io1, or standard
Related Events The AWS CloudTrail events that are
related to the current configuration
of the resource
AWS CloudTrail event ID
Configuration	Item
Sample	Configuration	Item
"configurationItemVersion": "1.0",
"configurationItemCaptureTime": "2014…",
"configurationStateID": “….",
"configurationItemStatus": "OK",
"resourceId": "vol-ce676ccc",
"arn": "arn:aws:us-west-………",
"accountId": "12345678910",
"availibilityZone": "us-west-2b",
"resourceType": "AWS::EC2::Volume",
"resourceCreationTime": "2014-02..",
"tags": {},
"relationships": [
{
"resourceId": "i-344c463d",
"resourceType": "AWS::EC2::Instance",
"name": "Attached to Instance"
}
],
"relatedEvents": [
"06c12a39-eb35-11de-ae07-db69edbb1e4",
],
Metadata
Common	Attributes
Relationships
Related	Events
Sample	Configuration	Item
"configuration": {
"volumeId": "vol-ce676ccc",
"size": 1,
"snapshotId": "",
"availabilityZone": "us-west-2b",
"state": "in-use",
"createTime": "2014-02-……",
"attachments": [
{
"volumeId": "vol-ce676ccc",
"instanceId": "i-344c463d",
"device": "/dev/sdf",
"state": "attached",
"attachTime": "2014-03-",
"deleteOnTermination": false
}
],
"tags": [
{
"tagName": "environment",
"tagValue": "PROD"
Configuration
Relationships
• Bi-directional	map	of	
dependencies	automatically	
assigned
• Change	to	a	resource	propagates	
to	create	Configuration	Items	for	
related	resources
EC2 Instance Elastic	IP
Config	Rule
• AWS	managed	rules
• Defined	by	AWS
• Require	minimal	(or	no)	configuration
• Rules	are	managed	by	AWS
• Customer	managed	rules
• Authored	by	you	using	AWS	Lambda
• Rules	execute	in	your	account
• You	maintain	the	rule
A	rule	that	checks	the	validity	of	configurations	recorded
Config	Rules	- Triggers
• Triggered	by	changes:	Rules	invoked	when	relevant	resources	change
Scoped	by	changes	to:
• Tag	key/value
• Resource	types
• Specific	resource	ID
• e.g.	EBS	volumes	tagged	“Production”	should	be	attached	to	EC2	instances
• Triggered	periodically:	Rules	invoked	at	specified	frequency
• e.g.	Account	should	have	no	more	than	3	“PCI	v3”	EC2	instances;	every	3	hrs
Evaluations
The	result	of	evaluating	a	Config rule	against	a	resource	
• Report	evaluation	of	{Rule,	ResourceType,	ResourceID}	directly	from	
the	rule	itself
How	do	I	know	what	happened
Config	Rules	- Example
function evaluateCompliance(configurationItem, ruleParameters) {
if((configurationItem.configuration.imageId === ruleParameters.approvedImage1) ||
(configurationItem.configuration.imageId === ruleParameters.approvedImage2))
return 'COMPLIANT';
else return 'NON_COMPLIANT';
}
exports.handler = function(event, context) {
var invokingEvent = JSON.parse(event.invokingEvent);
var ruleParameters = JSON.parse(event.ruleParameters);
...
compliance = evaluateCompliance(invokingEvent.configurationItem, ruleParameters, context);
ComplianceResourceType: invokingEvent.configurationItem.resourceType,
ComplianceResourceId: invokingEvent.configurationItem.resourceId,
ComplianceType: compliance,
..,
config.putEvaluations(putEvaluationsRequest, function (err, data)
Logs→metrics→alerts→actions
AWS Config
CloudWatch /
CloudWatch Logs
CloudWatch
alarms
AWS CloudTrail
Amazon EC2 OS logs
Amazon VPC
Flow Logs
Amazon SNS
email notification
HTTP/S
notification
SMS
notifications
Mobile push
notifications
API	calls	
from	most	
services
Monitoring	data	
from	AWS	
services
Custom	
metrics
Recommendations
• Consider separation mechanisms for in-scope vs out-of-scope
environments (which will be clear for your auditor)
• VPC
• AWS account
• Both!
• "If it moves, log it. If it doesn't move, watch it 'til it moves, then log it."
• CloudTrail, Config (especially), VPC Flow Logs, ELB Logs, RDS logs, EC2 System
Manager Inventory and EC2 System Manager State Manager are your friends
• Look at our Config Rules repo at https://github.com/awslabs/aws-config-
rules
• Look at commercial (AWS Marketplace) and open source (eg
https://github.com/capitalone/cloud-custodian ) tools for continuous
monitoring and automated response
• Don't forget your EC2 instance security!
AWS	security	tools:	What	to	use?
AWS	Security	and	Compliance
Security	of the	cloud
Services	and	tools	to	aid
security	in the	cloud
Service Type Use	cases
On-demand	evaluations
Security insights	into	your	
application	deployments	running	
inside	your	EC2	instance
Continuous	evaluations
Codified internal	best	practices,	
misconfigurations,	security	
vulnerabilities,	or	actions	on	
changes
Periodic	evaluations
Cost,	performance,	reliability,	
and	security	checks	that apply	
broadly
Inspector
Config	
Rules
Trusted	
Advisor
Configuration	Monitoring:	
Inside	EC2	Instances	
(With	new	enhancements	from	Re:Invent 2016!)
What	is	Inspector?
• Application	security	assessment
• Selectable	built-in	rules
• Security	findings
• Guidance	and	management
• Automatable	via	APIs
Getting	started
Rule	packages
• CVE	(common	vulnerabilities	and	exposures)
• CIS	OS-level	Benchmarks
• AWS	network	security	best	practices
• AWS	authentication	best	practices
• AWS	OS	security	best	practices
• AWS	application	security	best	practices
Prioritised findings
Detailed	remediation	recommendations
Amazon	EC2	Systems	Manager
• Announced	at	Re:Invent 2016
• See	sessions	WIN401	
(https://www.youtube.com/watch?v=Eal9K0aGLYI	)	and	WIN402	
(https://www.youtube.com/watch?v=L5TglwWI5Yo	)
Systems	Manager	Capabilities
Run	Command Maintenance	
Windows
Inventory
State	Manager Parameter	Store
Patch	Manager
Automation
Configuration,
Administration
Update and
Track
Shared	
Capabilities
Inventory
Inventory
What we heard:
• Accurate software inventory is critical for understanding fleet
configuration and license usage
• Legacy solutions not optimised for cloud
• Self-hosting requires additional overhead
Inventory
Introducing Inventory
• End-to-end inventory collection (EC2/on-premises/Workspaces)
• Linux / Windows
• Powerful query syntax
• Extensible inventory schema
• Integrated with AWS services
Inventory	– System	Diagram
SSMAgent
EC2	Windows	
Instance
SSMAgent
EC2	Linux	
Instance
SSMAgent
On-
Premises	
Instance
AWS	SSM	Service
State	Manager
EC2	Inventory	SSM	
document
Inventory	
Store
EC2	Console,	
SSM	CLI/APIs
AWS	Config
AWS	Config	
Console	+	CLI/APIs
Inventory	– Getting	Started
1. Configure Inventory
policy
2. Apply Inventory
policy
3. Query inventory
Inventory	– Configuration
• Create	an	Inventory	association
1. Select	instances	(by	instance	ID	or	tag)	
2. Select	scan	frequency	(hours,	minutes,	days,	NOW)
3. Select	Inventory	Types	to	gather
• Instance	information
• Applications
• AWS	Components	
• Network	configuration
• Windows	Updates	
• Custom	Inventory
Inventory	– Custom	Inventory	Type
• Custom	Inventory	Collection
• Extensible:	record	any	attribute	for	a	given	instance
• On-premise	Examples:	rack	location,	BIOS	version,	firewall	settings
• Two	ways	to	record	custom	inventory	types
1. Agent/on-instance: Write	a	cron	job	to	record	custom	inventory	files	
to	a	predefined	path
2. API: Use	PutInventory API
Inventory	Manager
• Query
• Search	by	inventory	attribute
• Partial	and	inverse	searches
• eg "Windows	2012	r2	instances	running	SQL	Server	2016	where	Windows	
Update	KB112342	is	not	installed"
• Integration	with	AWS	Config
• Record	inventory	changes	over	time	
• Use	AWS	Config Rules	to	monitor	changes,	notify
State	Manager
State	Manager	• Maintain	consistent	state	of	instances
• Reapply	to	keep	instances	from	drifting	
• Easily	view	status	of	configuration	changes
• Define	schedule	– ad	hoc,	periodic
• Track	aggregate	status	for	your	fleet
State	Manager	– Getting	started
• Document:	Author	your	intent
• Target:	Instances	or	tag	queries
• Association:	Binding	between	a	document	and	a	
target
• Schedule:	When	to	apply	your	association
• Status:	Check	the	state	of	your	association	at	an	
aggregate	or	instance	level
Creating	an	Association	
• aws ssm create-association	
• --document-name	WebServerDocument
• --document-version	$DEFAULT	
• --schedule-expression	cron(0	*/30	*	*	*	?	*)		
• --targets	“Key=tag:Name;Values=WebServer”	
• --output-location	"{	"S3Location":	{	"OutputS3Region":	“us-east-1",	
"OutputS3BucketName":	“MyBucket",	"OutputS3KeyPrefix":	“MyPrefix"	}	
}“
• Configures	all	instances	that	match	the	tag	query	and	reapplies	every	30	
minutes
Parameter	Store
Parameter	Store
• Centrally	store	and	find	config data	
• Repeatable,	automatable	management	(e.g.	SQL	connection	
strings)	
• Granular	access	control	– view,	use	and	edit	values
• Encrypt	sensitive	data	using	your	own	AWS	KMS	keys
Parameter	Store	– Getting	started
• Parameter:	Key-value	pair
• Secure	Strings:	Encrypt	sensitive	parameters	with	your	own	KMS	or	
default	account	encryption	key
• Reuse:	In	Documents	and	easily	reference	at	runtime	across	EC2	
Systems	Manager	using	{{ssm:parameter-name}}
• Access	Control:	Create	an	IAM	policy	to	control	access	to	specific	
parameter
Creating	and	using	a	parameter
• aws ssm put-parameter	
• --name	mycommand
• --type	string	
• --value	“dir C:Users”
• aws ssm send-command	
• --name	AWS-RunPowerShellScript
• --parameters	commands=[“echo	{{ssm:mycommand}}”]	
• --target	Key=tag:Name,Values=WebServer
Geographical	Considerations
Geographical	Considerations
Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/
Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and-compliance/
Compliance Centre Website: https://aws.amazon.com/compliance
Security Centre: https://aws.amazon.com/security
Security Blog: https://blogs.aws.amazon.com/security/
Well-Architected Framework: https://aws.amazon.com/blogs/aws/are-you-well-architected/
AWS Audit Training: awsaudittraining@amazon.com
Helpful	Resources
The Shared Security Model in Detail: https://youtu.be/RwUSPklR24M
IAM Recommended Practices: https://youtu.be/R-PyVnhxx-U
Encryption on AWS: https://youtu.be/DXqDStJ4epE
Securing Serverless Architectures: https://www.youtube.com/watch?v=8mpTpOXmws8
Helpful	Videos
Thank you!

Mais conteúdo relacionado

Mais procurados

CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_Singapore
CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_SingaporeCI-CD with AWS Developer Tools and Fargate_AWSPSSummit_Singapore
CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_SingaporeAmazon Web Services
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWSAmazon Web Services
 
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Amazon Web Services
 
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalk
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalkContinuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalk
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalkThomas Shaw
 
Monitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsMonitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsDevOps.com
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial ServicesAmazon Web Services
 
AWS Presentation-1.ppt
AWS Presentation-1.pptAWS Presentation-1.ppt
AWS Presentation-1.pptusmanEhsan8
 
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...Amazon Web Services
 
Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips confluent
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfMIlton788007
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseRightScale
 

Mais procurados (20)

CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_Singapore
CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_SingaporeCI-CD with AWS Developer Tools and Fargate_AWSPSSummit_Singapore
CI-CD with AWS Developer Tools and Fargate_AWSPSSummit_Singapore
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
CI/CD on AWS
CI/CD on AWSCI/CD on AWS
CI/CD on AWS
 
DevOps on AWS
DevOps on AWSDevOps on AWS
DevOps on AWS
 
Amazon API Gateway
Amazon API GatewayAmazon API Gateway
Amazon API Gateway
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
Best Practices to Secure Data Lake on AWS (ANT327) - AWS re:Invent 2018
 
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalk
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalkContinuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalk
Continuous Delivery using AWS CodePipeline, AWS Lambda & AWS ElasticBeanstalk
 
Monitoring at the Speed of DevOps
Monitoring at the Speed of DevOpsMonitoring at the Speed of DevOps
Monitoring at the Speed of DevOps
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
AWS Presentation-1.ppt
AWS Presentation-1.pptAWS Presentation-1.ppt
AWS Presentation-1.ppt
 
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...
Behind the Scenes: Exploring the AWS Global Network (NET305) - AWS re:Invent ...
 
Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips Kafka Security 101 and Real-World Tips
Kafka Security 101 and Real-World Tips
 
TechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdfTechnicalTerraformLandingZones121120229238.pdf
TechnicalTerraformLandingZones121120229238.pdf
 
CI/CD for Modern Applications
CI/CD for Modern ApplicationsCI/CD for Modern Applications
CI/CD for Modern Applications
 
DevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -SecurityDevSecOps Jenkins Pipeline -Security
DevSecOps Jenkins Pipeline -Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
How to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your EnterpriseHow to Set Up a Cloud Cost Optimization Process for your Enterprise
How to Set Up a Cloud Cost Optimization Process for your Enterprise
 
Introduction to DevSecOps
Introduction to DevSecOpsIntroduction to DevSecOps
Introduction to DevSecOps
 

Destaque

Accountability vs. Responsibility in Project Management
Accountability vs. Responsibility in Project ManagementAccountability vs. Responsibility in Project Management
Accountability vs. Responsibility in Project ManagementWorkfront
 
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...DATAVERSITY
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
Delivering Quality Open Data by Chelsea Ursaner
Delivering Quality Open Data by Chelsea UrsanerDelivering Quality Open Data by Chelsea Ursaner
Delivering Quality Open Data by Chelsea UrsanerData Con LA
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical trainingAjit Yohannan
 
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...Lucidworks
 
Opensource Search Engines
Opensource Search EnginesOpensource Search Engines
Opensource Search Enginescusy GmbH
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer CrimesMar Soriano
 
Microsoft Big Data Expo
Microsoft Big Data ExpoMicrosoft Big Data Expo
Microsoft Big Data ExpoBigDataExpo
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareKai Wähner
 
Status Quo on the automation support in SOA Suite OGhTech17
Status Quo on the automation support in SOA Suite OGhTech17Status Quo on the automation support in SOA Suite OGhTech17
Status Quo on the automation support in SOA Suite OGhTech17Jon Petter Hjulstad
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data IJCERT JOURNAL
 
De Persgroep Big Data Expo
De Persgroep Big Data ExpoDe Persgroep Big Data Expo
De Persgroep Big Data ExpoBigDataExpo
 
Cloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsCloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsAsaf Nakash
 
Philips Big Data Expo
Philips Big Data ExpoPhilips Big Data Expo
Philips Big Data ExpoBigDataExpo
 
Generalized B2B Machine Learning by Andrew Waage
Generalized B2B Machine Learning by Andrew WaageGeneralized B2B Machine Learning by Andrew Waage
Generalized B2B Machine Learning by Andrew WaageData Con LA
 

Destaque (20)

Accountability vs. Responsibility in Project Management
Accountability vs. Responsibility in Project ManagementAccountability vs. Responsibility in Project Management
Accountability vs. Responsibility in Project Management
 
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
How to Crunch Petabytes with Hadoop and Big Data Using InfoSphere BigInsights...
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Delivering Quality Open Data by Chelsea Ursaner
Delivering Quality Open Data by Chelsea UrsanerDelivering Quality Open Data by Chelsea Ursaner
Delivering Quality Open Data by Chelsea Ursaner
 
100 blue mix days technical training
100 blue mix days technical training100 blue mix days technical training
100 blue mix days technical training
 
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...
Events Processing and Data Analysis with Lucidworks Fusion: Presented by Kira...
 
Gastles PXL Hogeschool 2017
Gastles PXL Hogeschool 2017Gastles PXL Hogeschool 2017
Gastles PXL Hogeschool 2017
 
Opensource Search Engines
Opensource Search EnginesOpensource Search Engines
Opensource Search Engines
 
Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016Oracle Cloud Café IoT 12-APR-2016
Oracle Cloud Café IoT 12-APR-2016
 
Chapter 3 Computer Crimes
Chapter 3 Computer  CrimesChapter 3 Computer  Crimes
Chapter 3 Computer Crimes
 
Microsoft Big Data Expo
Microsoft Big Data ExpoMicrosoft Big Data Expo
Microsoft Big Data Expo
 
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native MiddlewareTrends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
Trends at JavaOne 2016: Microservices, Docker and Cloud-Native Middleware
 
Status Quo on the automation support in SOA Suite OGhTech17
Status Quo on the automation support in SOA Suite OGhTech17Status Quo on the automation support in SOA Suite OGhTech17
Status Quo on the automation support in SOA Suite OGhTech17
 
Challenges and outlook with Big Data
Challenges and outlook with Big Data Challenges and outlook with Big Data
Challenges and outlook with Big Data
 
Bol.com
Bol.comBol.com
Bol.com
 
De Persgroep Big Data Expo
De Persgroep Big Data ExpoDe Persgroep Big Data Expo
De Persgroep Big Data Expo
 
Cloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloadsCloud Camp: Infrastructure as a service advance workloads
Cloud Camp: Infrastructure as a service advance workloads
 
Water resources
Water resourcesWater resources
Water resources
 
Philips Big Data Expo
Philips Big Data ExpoPhilips Big Data Expo
Philips Big Data Expo
 
Generalized B2B Machine Learning by Andrew Waage
Generalized B2B Machine Learning by Andrew WaageGeneralized B2B Machine Learning by Andrew Waage
Generalized B2B Machine Learning by Andrew Waage
 

Semelhante a Verifying AWS Security Compliance

AWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAmazon Web Services
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAmazon Web Services
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAmazon Web Services
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivAmazon Web Services
 
AWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAmazon Web Services
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) NewAmazon Web Services
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowAmazon Web Services
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedInfosec
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSKarim Hopper
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23Rolf Koski
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Amazon Web Services
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignAmazon Web Services
 
How We Should Think About Security
How We Should Think  About SecurityHow We Should Think  About Security
How We Should Think About SecurityAmazon Web Services
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
 

Semelhante a Verifying AWS Security Compliance (20)

AWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the CloudAWS Enterprise Summit London 2015 | Security in the Cloud
AWS Enterprise Summit London 2015 | Security in the Cloud
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
 
AWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by DesignAWS Enterprise Summit Netherlands - Infosec by Design
AWS Enterprise Summit Netherlands - Infosec by Design
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
 
AWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certifiedAWS Certified Security - Specialty: What it is and how to get certified
AWS Certified Security - Specialty: What it is and how to get certified
 
AWS Security and SecOps
AWS Security and SecOpsAWS Security and SecOps
AWS Security and SecOps
 
Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
 
How We Should Think About Security
How We Should Think  About SecurityHow We Should Think  About Security
How We Should Think About Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 

Mais de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...lizamodels9
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.Aaiza Hassan
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdfOrient Homes
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfPaul Menig
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Lviv Startup Club
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyEthan lee
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesDipal Arora
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetDenis Gagné
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxtrishalcan8
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessAggregage
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Roland Driesen
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Roomdivyansh0kumar0
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...Paul Menig
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMANIlamathiKannappan
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in managementchhavia330
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...noida100girls
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdfRenandantas16
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Delhi Call girls
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Servicediscovermytutordmt
 

Último (20)

Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
Call Girls In DLf Gurgaon ➥99902@11544 ( Best price)100% Genuine Escort In 24...
 
M.C Lodges -- Guest House in Jhang.
M.C Lodges --  Guest House in Jhang.M.C Lodges --  Guest House in Jhang.
M.C Lodges -- Guest House in Jhang.
 
Catalogue ONG NUOC PPR DE NHAT .pdf
Catalogue ONG NUOC PPR DE NHAT      .pdfCatalogue ONG NUOC PPR DE NHAT      .pdf
Catalogue ONG NUOC PPR DE NHAT .pdf
 
Grateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdfGrateful 7 speech thanking everyone that has helped.pdf
Grateful 7 speech thanking everyone that has helped.pdf
 
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
Yaroslav Rozhankivskyy: Три складові і три передумови максимальної продуктивн...
 
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case studyThe Coffee Bean & Tea Leaf(CBTL), Business strategy case study
The Coffee Bean & Tea Leaf(CBTL), Business strategy case study
 
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best ServicesMysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
Mysore Call Girls 8617370543 WhatsApp Number 24x7 Best Services
 
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature SetCreating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
Creating Low-Code Loan Applications using the Trisotech Mortgage Feature Set
 
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptxSocio-economic-Impact-of-business-consumers-suppliers-and.pptx
Socio-economic-Impact-of-business-consumers-suppliers-and.pptx
 
Sales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for SuccessSales & Marketing Alignment: How to Synergize for Success
Sales & Marketing Alignment: How to Synergize for Success
 
Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...Ensure the security of your HCL environment by applying the Zero Trust princi...
Ensure the security of your HCL environment by applying the Zero Trust princi...
 
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130  Available With RoomVIP Kolkata Call Girl Howrah 👉 8250192130  Available With Room
VIP Kolkata Call Girl Howrah 👉 8250192130 Available With Room
 
7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...7.pdf This presentation captures many uses and the significance of the number...
7.pdf This presentation captures many uses and the significance of the number...
 
A DAY IN THE LIFE OF A SALESMAN / WOMAN
A DAY IN THE LIFE OF A  SALESMAN / WOMANA DAY IN THE LIFE OF A  SALESMAN / WOMAN
A DAY IN THE LIFE OF A SALESMAN / WOMAN
 
GD Birla and his contribution in management
GD Birla and his contribution in managementGD Birla and his contribution in management
GD Birla and his contribution in management
 
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...BEST ✨ Call Girls In  Indirapuram Ghaziabad  ✔️ 9871031762 ✔️ Escorts Service...
BEST ✨ Call Girls In Indirapuram Ghaziabad ✔️ 9871031762 ✔️ Escorts Service...
 
KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)KestrelPro Flyer Japan IT Week 2024 (English)
KestrelPro Flyer Japan IT Week 2024 (English)
 
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf0183760ssssssssssssssssssssssssssss00101011 (27).pdf
0183760ssssssssssssssssssssssssssss00101011 (27).pdf
 
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
Best VIP Call Girls Noida Sector 40 Call Me: 8448380779
 
Call Girls in Gomti Nagar - 7388211116 - With room Service
Call Girls in Gomti Nagar - 7388211116  - With room ServiceCall Girls in Gomti Nagar - 7388211116  - With room Service
Call Girls in Gomti Nagar - 7388211116 - With room Service
 

Verifying AWS Security Compliance