SlideShare a Scribd company logo
1 of 52
Download to read offline
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure machine learning
Guarding your data and gaining insights
Jason Barto
Solutions Architect
AWS Financial Services
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Put machine learning in the
hands of every developer
Our mission at AWS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Key services
Amazon
CloudWatch
AWS
CloudTrail
AWS IAM
AWS KMS
Amazon VPC
Amazon ECR
Amazon S3
Amazon EC2
Amazon
SageMaker
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Amazon SageMaker:
Build, Train, and Deploy ML Models at Scale
1
2
3
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle - Research
“Can we do this?”
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle - Deployment
“How do we scale this?”
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Data lakes on AWS
Snowball
Snowmobile Kinesis
Data Firehose
Kinesis
Data Streams
Amazon S3
Redshift
EMR
Athena Kinesis
Elasticsearch Service
Kinesis
Video Streams
AI Services
QuickSight
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Amazon S3 – Object storage
Secure, highly scalable, durable object storage with millisecond latency for data access
Store any type of data–web sites, mobile apps, corporate applications, and IoT sensors
Security and
Compliance
Three different forms of
encryption; encrypts data
in transit when
replicating across regions;
log and monitor with
CloudTrail, use ML to
discover and protect
sensitive data with Macie
Flexible Management
Classify, report, and
visualize data usage
trends; objects can be
tagged to see storage
consumption, cost, and
security; build lifecycle
policies to automate
tiering, and retention
Durability, Availability
& Scalability
Built for eleven nine’s of
durability; data
distributed across 3
physical facilities in an
AWS region;
automatically replicated
to any other AWS region
Query in Place
Run analytics & ML on
data lake without data
movement; S3 Select can
retrieve subset of data,
improving analytics
performance by 400%
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure Jupyter notebooks
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure Jupyter notebooks
VPC
Availability zone
Subnet
Notebook
Instance
Availability zone
Subnet
Subnet
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure Jupyter notebooks
VPC
Availability zone
Subnet
Notebook
Instance
S3 Endpoint
Availability zone
Subnet
Subnet
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure Jupyter notebooks
VPC
Availability zone
Subnet
Notebook
Instance
DatabaseS3 Endpoint
Availability zone
Subnet
Subnet
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure Jupyter notebooks
VPC
Availability zone
Subnet
Internet
Notebook
Instance
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker notebook internals
• Customer managed encryption keys
• Lifecycle configurations
• Terminal access
Subnet
Notebook
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Jupyter terminal
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker notebook lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
Availability zone
Subnet
Subnet
Training
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instance
Training
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instance
Training
Instance
Training
Instance
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instances
Training
Instances
Training
Instances
Encrypted in transit
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker containers
Container
Training
Instances
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker training, network isolation
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Training
Instances
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
Encrypted using CMK
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
TLS via private endpoint
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
Stored using CMK
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
TLS
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
Logged using CMK
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
Stored using CMK
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
TLS via private endpoint
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Lifecycle of training data
VPC
S3 Endpoint Training
Instance
Training start
Training in progress
Training complete
Encrypted using CMK
TLS
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
The machine learning lifecycle
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
SageMaker hosted endpoints
VPC
Availability zone
Subnet
Internet
Database
Web Proxy
S3 Endpoint
Availability zone
Subnet
Subnet
Inference
Instances
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Endpoint access control
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Endpoint logging and monitoring
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Identity and access
management
Network controls
VPC Endpoints
Endpoint policies
Activity logs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Identity and access
management
Network controls
Endpoint policies
Encryption at rest
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Isolated environments
Isolated networks
IT security policies
Audit logs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Identity and access
management
Encryption at rest
VPC Endpoints
Endpoint policies
Audit logs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Shared responsibility
model
SOC compliant
ISO compliant
PCI DSS compliant
GDPR compliant
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure ML requirements
• Protect data against exfiltration
• Prevent unauthorized access
• Protect your business IT systems
• Protect your intellectual property
• Meet regulatory requirements
• Enable agile innovation
Isolated environments
Data lake
On-demand resources
Provided algorithms
Multi-framework
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T
Secure machine learning environments
S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.

More Related Content

What's hot

Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...
Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...
Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...Amazon Web Services
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Amazon Web Services
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Amazon Web Services
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...Amazon Web Services
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...Amazon Web Services
 
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdf
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdfAdd intelligence to applications - AIM205 - Santa Clara AWS Summit.pdf
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdfAmazon Web Services
 
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...Amazon Web Services
 
Building enterprise solutions with blockchain technology - SVC217 - New York ...
Building enterprise solutions with blockchain technology - SVC217 - New York ...Building enterprise solutions with blockchain technology - SVC217 - New York ...
Building enterprise solutions with blockchain technology - SVC217 - New York ...Amazon Web Services
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Amazon Web Services
 
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSSecurity Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSAmazon Web Services LATAM
 
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...Amazon Web Services
 
Driving performance & security across your industrial facility with AWS - SVC...
Driving performance & security across your industrial facility with AWS - SVC...Driving performance & security across your industrial facility with AWS - SVC...
Driving performance & security across your industrial facility with AWS - SVC...Amazon Web Services
 
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Amazon Web Services
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Amazon Web Services
 
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Amazon Web Services
 
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...Amazon Web Services
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledAmazon Web Services
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Amazon Web Services
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCAmazon Web Services
 

What's hot (20)

Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...
Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...
Atlassian's Solution for Multi-Region Encryption and Decryption - AWS Summit ...
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
 
Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...Designing security & governance via AWS Control Tower & Organizations - SEC30...
Designing security & governance via AWS Control Tower & Organizations - SEC30...
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdf
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdfAdd intelligence to applications - AIM205 - Santa Clara AWS Summit.pdf
Add intelligence to applications - AIM205 - Santa Clara AWS Summit.pdf
 
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...
Simplified data protection with Veeam, N2WS, and AWS - DEM10 - Santa Clara AW...
 
Building enterprise solutions with blockchain technology - SVC217 - New York ...
Building enterprise solutions with blockchain technology - SVC217 - New York ...Building enterprise solutions with blockchain technology - SVC217 - New York ...
Building enterprise solutions with blockchain technology - SVC217 - New York ...
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWSSecurity Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
Security Framework Shakedown- Mapeie sua jornada com as melhores práticas da AWS
 
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...
Intelligent cloud data management with Veeam & AWS - SEC202-S - Mexico City A...
 
Driving performance & security across your industrial facility with AWS - SVC...
Driving performance & security across your industrial facility with AWS - SVC...Driving performance & security across your industrial facility with AWS - SVC...
Driving performance & security across your industrial facility with AWS - SVC...
 
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
Automate Security Event Management Using Trust-Based Decision Models - AWS Su...
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
 
AWS Security Deep Dive
AWS Security Deep DiveAWS Security Deep Dive
AWS Security Deep Dive
 
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
Cloud DevSecOps masterclass: Lessons learned from a multi-year implementation...
 
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...
Video anomaly detection using Amazon SageMaker, AWS DeepLens, & AWS IoT Green...
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
 
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
Lean and clean SecOps using AWS native services cloud - SDD301 - AWS re:Infor...
 
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPCInitiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
 

Similar to Secure machine learning - Guarding your data and gaining insights

Automated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAutomated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAmazon Web Services
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...Amazon Web Services
 
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...Amazon Web Services
 
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summits
 
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Amazon Web Services
 
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS Summit
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS SummitBuilding Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS Summit
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS SummitAmazon Web Services
 
Machine learning at the edge for industrial applications - SVC302 - New York ...
Machine learning at the edge for industrial applications - SVC302 - New York ...Machine learning at the edge for industrial applications - SVC302 - New York ...
Machine learning at the edge for industrial applications - SVC302 - New York ...Amazon Web Services
 
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...AWS Summits
 
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...Amazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)Julien SIMON
 
Build, train and deploy machine learning models at scale using AWS
Build, train and deploy machine learning models at scale using AWSBuild, train and deploy machine learning models at scale using AWS
Build, train and deploy machine learning models at scale using AWSAmazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...Amazon Web Services
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Amazon Web Services
 
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdf
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdfWhat's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdf
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdfAmazon Web Services
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWSNathan Case
 
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverIntroduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverAmazon Web Services
 
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management toolsControl your cloud environment with AWS management tools
Control your cloud environment with AWS management toolsAmazon Web Services
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitAmazon Web Services
 

Similar to Secure machine learning - Guarding your data and gaining insights (20)

Automated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit SydneyAutomated Forensics and Incident Response on AWS - AWS Summit Sydney
Automated Forensics and Incident Response on AWS - AWS Summit Sydney
 
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...How Millennium Management achieves provable security with AWS Zelkova - FSV30...
How Millennium Management achieves provable security with AWS Zelkova - FSV30...
 
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...
Create Intelligent Industrial Equipment with AWS IoT Services & AR/VR - SVC30...
 
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at HyperscaleAWS Summit Singapore 2019 | Operating Microservices at Hyperscale
AWS Summit Singapore 2019 | Operating Microservices at Hyperscale
 
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
Migliora la disponibilità e le prestazioni delle tue applicazioni con Amazon ...
 
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS Summit
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS SummitBuilding Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS Summit
Building Data Lakes for Analytics on AWS - ADB201 - Anaheim AWS Summit
 
Machine learning at the edge for industrial applications - SVC302 - New York ...
Machine learning at the edge for industrial applications - SVC302 - New York ...Machine learning at the edge for industrial applications - SVC302 - New York ...
Machine learning at the edge for industrial applications - SVC302 - New York ...
 
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...
AWS Summit Singapore 2019 | The Serverless Lifecycle: Development and Operati...
 
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...
Deploying AWS IoT-managed devices in an industrial setting - SVC302 - Atlanta...
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)
Build, train and deploy Machine Learning models on Amazon SageMaker (May 2019)
 
Build, train and deploy machine learning models at scale using AWS
Build, train and deploy machine learning models at scale using AWSBuild, train and deploy machine learning models at scale using AWS
Build, train and deploy machine learning models at scale using AWS
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...Securing your Amazon SageMaker model development in a highly regulated enviro...
Securing your Amazon SageMaker model development in a highly regulated enviro...
 
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
Security at Scale: Security Hub and the Well Architected Framework - AWS Summ...
 
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdf
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdfWhat's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdf
What's new in Amazon Aurora - ADB204 - Santa Clara AWS Summit.pdf
 
Threat detection and mitigation at AWS
Threat detection and mitigation at AWSThreat detection and mitigation at AWS
Threat detection and mitigation at AWS
 
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - VancouverIntroduction to the AWS Cloud - AWSome Day 2019 - Vancouver
Introduction to the AWS Cloud - AWSome Day 2019 - Vancouver
 
Control your cloud environment with AWS management tools
Control your cloud environment with AWS management toolsControl your cloud environment with AWS management tools
Control your cloud environment with AWS management tools
 
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS SummitThreat detection and mitigation at AWS - SEC201 - New York AWS Summit
Threat detection and mitigation at AWS - SEC201 - New York AWS Summit
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Secure machine learning - Guarding your data and gaining insights

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure machine learning Guarding your data and gaining insights Jason Barto Solutions Architect AWS Financial Services
  • 2. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Put machine learning in the hands of every developer Our mission at AWS
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Key services Amazon CloudWatch AWS CloudTrail AWS IAM AWS KMS Amazon VPC Amazon ECR Amazon S3 Amazon EC2 Amazon SageMaker
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Amazon SageMaker: Build, Train, and Deploy ML Models at Scale 1 2 3
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle - Research “Can we do this?”
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle - Deployment “How do we scale this?”
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Data lakes on AWS Snowball Snowmobile Kinesis Data Firehose Kinesis Data Streams Amazon S3 Redshift EMR Athena Kinesis Elasticsearch Service Kinesis Video Streams AI Services QuickSight
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Amazon S3 – Object storage Secure, highly scalable, durable object storage with millisecond latency for data access Store any type of data–web sites, mobile apps, corporate applications, and IoT sensors Security and Compliance Three different forms of encryption; encrypts data in transit when replicating across regions; log and monitor with CloudTrail, use ML to discover and protect sensitive data with Macie Flexible Management Classify, report, and visualize data usage trends; objects can be tagged to see storage consumption, cost, and security; build lifecycle policies to automate tiering, and retention Durability, Availability & Scalability Built for eleven nine’s of durability; data distributed across 3 physical facilities in an AWS region; automatically replicated to any other AWS region Query in Place Run analytics & ML on data lake without data movement; S3 Select can retrieve subset of data, improving analytics performance by 400%
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure Jupyter notebooks
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure Jupyter notebooks VPC Availability zone Subnet Notebook Instance Availability zone Subnet Subnet
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure Jupyter notebooks VPC Availability zone Subnet Notebook Instance S3 Endpoint Availability zone Subnet Subnet
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure Jupyter notebooks VPC Availability zone Subnet Notebook Instance DatabaseS3 Endpoint Availability zone Subnet Subnet
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure Jupyter notebooks VPC Availability zone Subnet Internet Notebook Instance Database Web Proxy S3 Endpoint Availability zone Subnet Subnet
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker notebook internals • Customer managed encryption keys • Lifecycle configurations • Terminal access Subnet Notebook Instance
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Jupyter terminal
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker notebook lifecycle
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet Availability zone Subnet Subnet Training Instance
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet S3 Endpoint Availability zone Subnet Subnet Training Instance
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Training Instance
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Training Instance Training Instance
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Training Instance Training Instance Training Instance
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Training Instances Training Instances Training Instances Encrypted in transit
  • 28. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker containers Container Training Instances
  • 29. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker training, network isolation VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Training Instances
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete TLS
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete Encrypted using CMK TLS
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete TLS via private endpoint TLS
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete Stored using CMK TLS
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete TLS TLS
  • 35. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete Logged using CMK TLS
  • 36. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete Stored using CMK TLS
  • 37. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete TLS via private endpoint TLS
  • 38. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Lifecycle of training data VPC S3 Endpoint Training Instance Training start Training in progress Training complete Encrypted using CMK TLS
  • 39. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T The machine learning lifecycle
  • 40. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T SageMaker hosted endpoints VPC Availability zone Subnet Internet Database Web Proxy S3 Endpoint Availability zone Subnet Subnet Inference Instances
  • 41. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Endpoint access control
  • 42. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Endpoint logging and monitoring
  • 43. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 44. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation
  • 45. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Identity and access management Network controls VPC Endpoints Endpoint policies Activity logs
  • 46. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Identity and access management Network controls Endpoint policies Encryption at rest
  • 47. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Isolated environments Isolated networks IT security policies Audit logs
  • 48. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Identity and access management Encryption at rest VPC Endpoints Endpoint policies Audit logs
  • 49. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Shared responsibility model SOC compliant ISO compliant PCI DSS compliant GDPR compliant
  • 50. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure ML requirements • Protect data against exfiltration • Prevent unauthorized access • Protect your business IT systems • Protect your intellectual property • Meet regulatory requirements • Enable agile innovation Isolated environments Data lake On-demand resources Provided algorithms Multi-framework
  • 51. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.S U M M I T Secure machine learning environments
  • 52. S U M M I T © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.