SlideShare uma empresa Scribd logo
1 de 22
Baixar para ler offline
Security Assurance and Governance in AWS
Chad Woolf, Director, AWS Risk and Compliance
November 13, 2013

© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
Better Security in the Cloud
“…We’ll also see organizations adopt cloud services
for the improved security protections and
compliance controls that they otherwise could not
provide as efficiently or effectively themselves.”
-

Security’s Cloud Revolution Is Upon Us,
Forrester Research, Inc., August 2, 2013
Better Security in AWS
Optimized
Network/OS/App Controls
Service-specific Controls
Managed by
Customer

Security in the Cloud

Cross-service Controls
Cloud Service Provider
Controls

Security of the Cloud

Managed by
AWS
Request reports at:
aws.amazon.com/compliance/#contact
Governance, Security, Compliance
Enablers

Governance in AWS

AWS Security Best
Practices
AWS Auditing Security
Checklist
AWS Risk and Compliance

AWS
Compliance
Forum

AWS Trusted
Advisor
Security at Scale: Governance in AWS
1.
2.
3.
4.
5.

Financial Control
IT Asset Identification
Asset Configuration and
Management
Logical Access Control
Physical Access Control

Get this whitepaper at:
aws.amazon.com/compliance/

6.
7.

Data Encryption
Network Configuration and
Management
8. Security Logging and
Monitoring
9. Security Incident Response
10. Disaster Recovery
Examples
Governance
Domain

On-prem
Challenge

AWS Enabler

Control Provided

8. Security
Logging and
Monitoring

Centralized
logging of user
actions taken
against a set of IT
resources

AWS CloudTrail
Provides logging of API or
console actions (e.g., logs when
someone changes a bucket
policy, stops and instance, etc.)

Advanced monitoring
capabilities of actions
taken and changes
made

10. Disaster
Recovery

Producing point in
time, usable
incremental
backups

EBS Snapshots
Point-in-time full volume copies of
Amazon EBS data into persistent
storage of Amazon S3

Anytime incremental
point-in-time backup of
server data
Examples
Governance
Domain

On-prem
Challenge

AWS Enabler

Control Provided

8. Security
Logging and
Monitoring

Centralized
logging of user
actions taken
against a set of IT
resources

AWS CloudTrail
Provides logging of API or
console actions (e.g., logs when
someone changes a bucket
policy, stops and instance, etc.)

Advanced monitoring
capabilities of actions
taken and changes
made

10. Disaster
Recovery

Producing point in
time, usable
incremental
backups

EBS Snapshots
Point-in-time full volume copies of
Amazon EBS data into persistent
storage of Amazon S3

Anytime incremental
point-in-time backup of
server data
Security at Scale: Governance in AWS
1.
2.
3.
4.
5.

Financial Control
IT Asset Identification
Asset Configuration and
Management
Logical Access Control
Physical Access Control

Get this whitepaper at:
aws.amazon.com/compliance/

6.
7.

Data Encryption
Network Configuration and
Management
8. Security Logging and
Monitoring
9. Security Incident Response
10. Disaster Recovery
Scaling Security
AWS Compliance Forum

Join the AWS Compliance Forum by emailing
us at: awscompliance@amazon.com
Governance Tool: AWS Trusted Advisor
• Online service from AWS Support
– Analyzes account for various kinds of
issues and possible concerns
– Soon available as an API for integration
with your tools or 3rd party solutions

• Four categories:
–
–
–
–

Cost savings
Security
Fault tolerance
Performance
Innovative Governance Tool: AWS
Trusted Advisor
Since 1/1/2013:
• 10,000 + customers
• 700,000 recommendations reviewed
• $140M in annualized savings

Learn more about Trusted Advisor at:
https://aws.amazon.com/premiumsupport/trustedadvisor/
Compliance Case Studies
Case: Pegasystems
Company: Provides software for business process management,
CRM, and case management
Challenge: Pega tech is used cross-functionally across the
healthcare industry; all data is considered PHI
Results: Pega and their customers are HIPAA compliant on AWS
Case: NASDAQ FinQloud
Company: provides products and services to manage the entire life
cycle of a trade
Challenge: Securely storing and managing vast amounts of data with
strict compliance requirements
Results: NASDAQ and FinQloud customers meets stringent SEC
17a-4 requirements for financial record retention
Case: Cognia
Company: Global communications platform for call centers to capture
communications data
Challenge: must comply with PCI DSS so their customers can
process payment card data on the platform
Results: PCI certified on AWS
AWS: centralized security
controls - visible, testable,
automated
Resource Links
AWS Compliance site - provides AWS Compliance Forum links, descriptions of
audit reports available, contact links, and relevant whitepapers

http://aws.amazon.com/
compliance/

AWS Security Center – provides links to a detailed whitepaper on how we
manage security at AWS and provides links to contact AWS Security

http://aws.amazon.com/
security/

AWS Security Blog – posts contain security best practices for AWS services,
how-to guides, compliance milestones, and customer and partner stories

http://blogs.aws.amazon
.com/security/

AWS Trusted Advisor - information on the tool, the nature of the checks, and
how to access it

https://aws.amazon.com
/premiumsupport/trusted
advisor/

Case studies – features of a wide range of companies doing amazing things on
AWS

http://aws.amazon.com/
solutions/casestudies/all/
Recommended Sessions
•
•
•
•
•
•
•

SEC402 - Intrusion Detection in the Cloud
SEC204 - Building Secure Applications and Navigating FedRAMP in the
AWS GovCloud (US) Region
ARC308 - Architecting for End-to-End Security in the Enterprise
SEC306 - Implementing Bullet-Proof HIPAA Solutions on AWS
SEC206 - Taking the Fear Out of PCI DSS Compliance in the Cloud
ENT206 - Using AWS Enterprise Support to the Fullest
SEC201 - Overview of AWS Identity and Access Management (IAM)
“Come talk security with AWS” Event - between 4 and 6pm on Thursday in Toscana 3605.
Please give us your feedback on this
presentation

SEC203
As a thank you, we will select prize
winners daily for completed surveys!

Mais conteúdo relacionado

Mais procurados

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
Mark Nunnikhoven
 

Mais procurados (20)

Updating Security Operations For The Cloud
Updating Security Operations For The CloudUpdating Security Operations For The Cloud
Updating Security Operations For The Cloud
 
(SEC318) AWS CloudTrail Deep Dive
(SEC318) AWS CloudTrail Deep Dive(SEC318) AWS CloudTrail Deep Dive
(SEC318) AWS CloudTrail Deep Dive
 
The 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS SecurityThe 2014 AWS Enterprise Summit - Understanding AWS Security
The 2014 AWS Enterprise Summit - Understanding AWS Security
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
Getting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute ServicesGetting Started with Amazon EC2 and Compute Services
Getting Started with Amazon EC2 and Compute Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
(SEC402) Intrusion Detection in the Cloud | AWS re:Invent 2014
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
Securing Your Data in AWS
Securing Your Data in AWSSecuring Your Data in AWS
Securing Your Data in AWS
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar Series
 
Getting started with aws security toronto rs
Getting started with aws security toronto rsGetting started with aws security toronto rs
Getting started with aws security toronto rs
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Announcements for Mobile Developers
Announcements for Mobile DevelopersAnnouncements for Mobile Developers
Announcements for Mobile Developers
 
Secure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWS
Secure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWSSecure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWS
Secure and Integrated - Using IAM with Amazon MSK | Mitchell Henderson, AWS
 
(SEC315) AWS Directory Service Deep Dive
(SEC315) AWS Directory Service Deep Dive (SEC315) AWS Directory Service Deep Dive
(SEC315) AWS Directory Service Deep Dive
 
Srv204 Getting Started with AWS IoT
Srv204 Getting Started with AWS IoTSrv204 Getting Started with AWS IoT
Srv204 Getting Started with AWS IoT
 
Federation
FederationFederation
Federation
 
Managing your identities in the cloud with AWS and Microsoft Active Directory...
Managing your identities in the cloud with AWS and Microsoft Active Directory...Managing your identities in the cloud with AWS and Microsoft Active Directory...
Managing your identities in the cloud with AWS and Microsoft Active Directory...
 
Aws security Fundamentals
Aws security Fundamentals Aws security Fundamentals
Aws security Fundamentals
 
(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWS(SEC304) Architecting for HIPAA Compliance on AWS
(SEC304) Architecting for HIPAA Compliance on AWS
 

Semelhante a Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013

Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214
Amazon Web Services
 
Aws auditing security_checklist
Aws auditing security_checklistAws auditing security_checklist
Aws auditing security_checklist
saifam
 

Semelhante a Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013 (20)

Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Security Best Practices - Hebrew Webinar
Security Best Practices - Hebrew WebinarSecurity Best Practices - Hebrew Webinar
Security Best Practices - Hebrew Webinar
 
Aws security-pillar
Aws security-pillarAws security-pillar
Aws security-pillar
 
Automating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar SeriesAutomating Compliance Defense in the Cloud - September 2016 Webinar Series
Automating Compliance Defense in the Cloud - September 2016 Webinar Series
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Aws security-pillar
Aws security-pillarAws security-pillar
Aws security-pillar
 
Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
Security and compliance
Security and complianceSecurity and compliance
Security and compliance
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 
Security best practices
Security best practices Security best practices
Security best practices
 
Aws auditing security_checklist
Aws auditing security_checklistAws auditing security_checklist
Aws auditing security_checklist
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

Mais de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Mais de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ..."I see eyes in my soup": How Delivery Hero implemented the safety system for ...
"I see eyes in my soup": How Delivery Hero implemented the safety system for ...
 
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
Apidays New York 2024 - APIs in 2030: The Risk of Technological Sleepwalk by ...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

Security Assurance and Governance in AWS (SEC203) | AWS re:Invent 2013

  • 1. Security Assurance and Governance in AWS Chad Woolf, Director, AWS Risk and Compliance November 13, 2013 © 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
  • 2. Better Security in the Cloud “…We’ll also see organizations adopt cloud services for the improved security protections and compliance controls that they otherwise could not provide as efficiently or effectively themselves.” - Security’s Cloud Revolution Is Upon Us, Forrester Research, Inc., August 2, 2013
  • 3. Better Security in AWS Optimized Network/OS/App Controls Service-specific Controls Managed by Customer Security in the Cloud Cross-service Controls Cloud Service Provider Controls Security of the Cloud Managed by AWS Request reports at: aws.amazon.com/compliance/#contact
  • 4. Governance, Security, Compliance Enablers Governance in AWS AWS Security Best Practices AWS Auditing Security Checklist AWS Risk and Compliance AWS Compliance Forum AWS Trusted Advisor
  • 5. Security at Scale: Governance in AWS 1. 2. 3. 4. 5. Financial Control IT Asset Identification Asset Configuration and Management Logical Access Control Physical Access Control Get this whitepaper at: aws.amazon.com/compliance/ 6. 7. Data Encryption Network Configuration and Management 8. Security Logging and Monitoring 9. Security Incident Response 10. Disaster Recovery
  • 6. Examples Governance Domain On-prem Challenge AWS Enabler Control Provided 8. Security Logging and Monitoring Centralized logging of user actions taken against a set of IT resources AWS CloudTrail Provides logging of API or console actions (e.g., logs when someone changes a bucket policy, stops and instance, etc.) Advanced monitoring capabilities of actions taken and changes made 10. Disaster Recovery Producing point in time, usable incremental backups EBS Snapshots Point-in-time full volume copies of Amazon EBS data into persistent storage of Amazon S3 Anytime incremental point-in-time backup of server data
  • 7.
  • 8. Examples Governance Domain On-prem Challenge AWS Enabler Control Provided 8. Security Logging and Monitoring Centralized logging of user actions taken against a set of IT resources AWS CloudTrail Provides logging of API or console actions (e.g., logs when someone changes a bucket policy, stops and instance, etc.) Advanced monitoring capabilities of actions taken and changes made 10. Disaster Recovery Producing point in time, usable incremental backups EBS Snapshots Point-in-time full volume copies of Amazon EBS data into persistent storage of Amazon S3 Anytime incremental point-in-time backup of server data
  • 9.
  • 10. Security at Scale: Governance in AWS 1. 2. 3. 4. 5. Financial Control IT Asset Identification Asset Configuration and Management Logical Access Control Physical Access Control Get this whitepaper at: aws.amazon.com/compliance/ 6. 7. Data Encryption Network Configuration and Management 8. Security Logging and Monitoring 9. Security Incident Response 10. Disaster Recovery
  • 12. AWS Compliance Forum Join the AWS Compliance Forum by emailing us at: awscompliance@amazon.com
  • 13. Governance Tool: AWS Trusted Advisor • Online service from AWS Support – Analyzes account for various kinds of issues and possible concerns – Soon available as an API for integration with your tools or 3rd party solutions • Four categories: – – – – Cost savings Security Fault tolerance Performance
  • 14. Innovative Governance Tool: AWS Trusted Advisor Since 1/1/2013: • 10,000 + customers • 700,000 recommendations reviewed • $140M in annualized savings Learn more about Trusted Advisor at: https://aws.amazon.com/premiumsupport/trustedadvisor/
  • 16. Case: Pegasystems Company: Provides software for business process management, CRM, and case management Challenge: Pega tech is used cross-functionally across the healthcare industry; all data is considered PHI Results: Pega and their customers are HIPAA compliant on AWS
  • 17. Case: NASDAQ FinQloud Company: provides products and services to manage the entire life cycle of a trade Challenge: Securely storing and managing vast amounts of data with strict compliance requirements Results: NASDAQ and FinQloud customers meets stringent SEC 17a-4 requirements for financial record retention
  • 18. Case: Cognia Company: Global communications platform for call centers to capture communications data Challenge: must comply with PCI DSS so their customers can process payment card data on the platform Results: PCI certified on AWS
  • 19. AWS: centralized security controls - visible, testable, automated
  • 20. Resource Links AWS Compliance site - provides AWS Compliance Forum links, descriptions of audit reports available, contact links, and relevant whitepapers http://aws.amazon.com/ compliance/ AWS Security Center – provides links to a detailed whitepaper on how we manage security at AWS and provides links to contact AWS Security http://aws.amazon.com/ security/ AWS Security Blog – posts contain security best practices for AWS services, how-to guides, compliance milestones, and customer and partner stories http://blogs.aws.amazon .com/security/ AWS Trusted Advisor - information on the tool, the nature of the checks, and how to access it https://aws.amazon.com /premiumsupport/trusted advisor/ Case studies – features of a wide range of companies doing amazing things on AWS http://aws.amazon.com/ solutions/casestudies/all/
  • 21. Recommended Sessions • • • • • • • SEC402 - Intrusion Detection in the Cloud SEC204 - Building Secure Applications and Navigating FedRAMP in the AWS GovCloud (US) Region ARC308 - Architecting for End-to-End Security in the Enterprise SEC306 - Implementing Bullet-Proof HIPAA Solutions on AWS SEC206 - Taking the Fear Out of PCI DSS Compliance in the Cloud ENT206 - Using AWS Enterprise Support to the Fullest SEC201 - Overview of AWS Identity and Access Management (IAM) “Come talk security with AWS” Event - between 4 and 6pm on Thursday in Toscana 3605.
  • 22. Please give us your feedback on this presentation SEC203 As a thank you, we will select prize winners daily for completed surveys!