Your SlideShare is downloading. ×
  • Like
  • Save
SEC206 Security OF the AWS Cloud - AWS re: Invent 2012
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Now you can save presentations on your phone or tablet

Available for both IPhone and Android

Text the download link to your phone

Standard text messaging rates apply

SEC206 Security OF the AWS Cloud - AWS re: Invent 2012

  • 2,602 views
Published

Security must be the number one priority for any cloud provider and that’s no different for Amazon Web Services. Stephen Schmidt, vice president and chief information officer for AWS, will share his …

Security must be the number one priority for any cloud provider and that’s no different for Amazon Web Services. Stephen Schmidt, vice president and chief information officer for AWS, will share his insights into cloud security and how AWS meets the needs of today’s IT security challenges. Stephen, with his background with the FBI and his work with AWS customers in the government and space exploration, research, and financial services organizations, shares an industry perspective that’s unique and invaluable for today’s IT decision makers. At the conclusion of this session, Stephen also provides a brief summary of the other sessions available to you in the security track.

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
2,602
On SlideShare
0
From Embeds
0
Number of Embeds
7

Actions

Shares
Downloads
62
Comments
0
Likes
4

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide

Transcript

  • 1. this orthis?
  • 2. Australia
  • 3. … Customer 1 Customer 2 Customer n Hypervisor Virtual interfaces Customer 1Security groups Customer 2 Security groups … Customer n Security groups Firewall Physical interfaces
  • 4. Amazon VPC Architecture Customer’s isolated AWS resources Subnets NAT Router Internet VPN gateway Secure VPN connection Amazon over the Internet Web Services cloud AWS Direct Connect – Dedicated Path/Bandwidth Customer’s network
  • 5. Logical Server Granular Logical Physical Government Only ITAR Sample Workloads and Information Network server Physical Network Compliant Application Access Policy Isolation Isolation and Facility (US Persons Isolation Isolation Only)Commercial Cloud   Public-facing apps, web sites, dev, test, etc.Virtual Private     Datacenter extension,Cloud (VPC) TIC environment, email, FISMA low and ModerateAWS GovCloud       US Persons Compliant(US) and Government Specific Apps
  • 6. http://aws.amazon.com/security/
  • 7. We are sincerely eager to hear your feedback on thispresentation and on re:Invent. Please fill out an evaluation form when you have a chance.