Your SlideShare is downloading. ×
0
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

SEC206 Security OF the AWS Cloud - AWS re: Invent 2012

3,010

Published on

Security must be the number one priority for any cloud provider and that’s no different for Amazon Web Services. Stephen Schmidt, vice president and chief information officer for AWS, will share his …

Security must be the number one priority for any cloud provider and that’s no different for Amazon Web Services. Stephen Schmidt, vice president and chief information officer for AWS, will share his insights into cloud security and how AWS meets the needs of today’s IT security challenges. Stephen, with his background with the FBI and his work with AWS customers in the government and space exploration, research, and financial services organizations, shares an industry perspective that’s unique and invaluable for today’s IT decision makers. At the conclusion of this session, Stephen also provides a brief summary of the other sessions available to you in the security track.

0 Comments
4 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,010
On Slideshare
0
From Embeds
0
Number of Embeds
8
Actions
Shares
0
Downloads
62
Comments
0
Likes
4
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. this orthis?
  • 2. Australia
  • 3. … Customer 1 Customer 2 Customer n Hypervisor Virtual interfaces Customer 1Security groups Customer 2 Security groups … Customer n Security groups Firewall Physical interfaces
  • 4. Amazon VPC Architecture Customer’s isolated AWS resources Subnets NAT Router Internet VPN gateway Secure VPN connection Amazon over the Internet Web Services cloud AWS Direct Connect – Dedicated Path/Bandwidth Customer’s network
  • 5. Logical Server Granular Logical Physical Government Only ITAR Sample Workloads and Information Network server Physical Network Compliant Application Access Policy Isolation Isolation and Facility (US Persons Isolation Isolation Only)Commercial Cloud   Public-facing apps, web sites, dev, test, etc.Virtual Private     Datacenter extension,Cloud (VPC) TIC environment, email, FISMA low and ModerateAWS GovCloud       US Persons Compliant(US) and Government Specific Apps
  • 6. http://aws.amazon.com/security/
  • 7. We are sincerely eager to hear your feedback on thispresentation and on re:Invent. Please fill out an evaluation form when you have a chance.

×