Your SlideShare is downloading. ×
0
How to Meet Strict Security Compliance
Requirements in the Cloud
JD Sherry, VP Technology & Solutions, Trend Micro
Mark Nu...
Enterprises & the Cloud
• Security & compliance are top priorities for
enterprises, regardless of where things are
deploye...
Enterprises & the Cloud
• Data sovereignty
• Multi-tenancy
• Compliance

Source: Trend Micro survey, May 2013

76% indicat...
PCI Requirements as a Reference …
February, 2013

You!
Shared responsibility

•

Facilities

•

Operating System

•

Physical Security

•

Application

•

Physical Infrastructur...
Deep Security

Deep Security Manager

Amazon EC2 instances
What does Deep Security deliver?

Centralized security control management
Technical details

Unified management interface ...
Customer Challenges

Managing another binary
Flexible deployment to fit any situation

Deploy via user-data, Chef, Puppet,...
Demo – User-data deployment
Demo – Manager-initiated activation
Customer Challenges

Being aware of assets in AWS
Deep AWS integration

AWS cloud connector automatically polls region
Aut...
Demo – Automated decision making
Deep Security + SecureCloud

Deep Security Manager

Amazon EC2 instances

SecureCloud
What does SecureCloud deliver?

Full disk encryption
Technical details

Intelligent block level encrypted
Used AES-256 cip...
Customer Challenges

Preventing unauthorized access to data
Deep AWS integration

Leverage AWS metadata for key management...
Demo – Advanced key release policy
Session Summary

Meet strict security and compliance requirements with a security
solution that is:
• Smart: Automatically...
Learn about Trend Micro at AWS re:Invent

• Join us at our booth to meet R&D experts and see indepth product demo

• SEC 3...
Try out Trend Micro today!

• Test Drive: aws.amazon.com/testdrive
• Free Trials:
– DeepSecurity.TrendMicro.com
– Webappse...
We are sincerely eager to hear
your feedback on this
presentation and on re:Invent.
Please fill out an evaluation form
whe...
Upcoming SlideShare
Loading in...5
×

How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

812

Published on

(Presented by Trend Micro)
In this session, you learn about the AWS shared security model, including considerations and best practices for deploying a secure and compliant application on AWS, and how to leverage the features and APIs provided by AWS. You also learn how to use best-in-class security and compliance solutions that have been optimized for enterprises deploying in AWS.

Key topics covered are Amazon EC2 and Amazon EBS encryption, including several key management methodologies as well as intrusion detection and prevention, anti-malware, anti-virus, integrity monitoring, firewall, and web reputation in the cloud.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
812
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
37
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Transcript of "How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013"

  1. 1. How to Meet Strict Security Compliance Requirements in the Cloud JD Sherry, VP Technology & Solutions, Trend Micro Mark Nunnikhoven, Principal Engineer, Cloud & Emerging Technologies, Trend Micro November 13, 2013 © 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
  2. 2. Enterprises & the Cloud • Security & compliance are top priorities for enterprises, regardless of where things are deployed • Many organizations recognize the benefits of the cloud – and need to understand security requirements
  3. 3. Enterprises & the Cloud • Data sovereignty • Multi-tenancy • Compliance Source: Trend Micro survey, May 2013 76% indicated they had compliance or data confidentiality requirements
  4. 4. PCI Requirements as a Reference … February, 2013 You!
  5. 5. Shared responsibility • Facilities • Operating System • Physical Security • Application • Physical Infrastructure • Account Management • Network Infrastructure • Security Groups • Virtualization Infrastructure • Network Configuration
  6. 6. Deep Security Deep Security Manager Amazon EC2 instances
  7. 7. What does Deep Security deliver? Centralized security control management Technical details Unified management interface for multiple regions/credentials Simplified policy management across the organization Broad platform support Agent provides protection on the Amazon EC2 instance Your needs Helps address compliance challenges Enforces security policy within your organization
  8. 8. Customer Challenges Managing another binary Flexible deployment to fit any situation Deploy via user-data, Chef, Puppet, SSH/PowerShell, etc. Install the agent in an AMI and activate on demand Keeping up to date Agent updates via Deep Security, no extra tools needed
  9. 9. Demo – User-data deployment
  10. 10. Demo – Manager-initiated activation
  11. 11. Customer Challenges Being aware of assets in AWS Deep AWS integration AWS cloud connector automatically polls region Automate security actions for new instances Full visibility of unprotected instances Keeping up to date Connector syncs regularly for constant awareness
  12. 12. Demo – Automated decision making
  13. 13. Deep Security + SecureCloud Deep Security Manager Amazon EC2 instances SecureCloud
  14. 14. What does SecureCloud deliver? Full disk encryption Technical details Intelligent block level encrypted Used AES-256 cipher from FIPS 140-2 certified library Broad platform support Agent provides protection on the Amazon EC2 instance Your needs Helps address compliance challenges Enforces security policy within your organization
  15. 15. Customer Challenges Preventing unauthorized access to data Deep AWS integration Leverage AWS metadata for key management policies Boot-volume encryption for Windows & Linux Keeping up to date Integrity check regularly validates encryption policy
  16. 16. Demo – Advanced key release policy
  17. 17. Session Summary Meet strict security and compliance requirements with a security solution that is: • Smart: Automatically apply security controls • Simple: Manage through a single console with reporting and alerting • Security that fits: Embed security into your cloud architecture
  18. 18. Learn about Trend Micro at AWS re:Invent • Join us at our booth to meet R&D experts and see indepth product demo • SEC 309: Learn How Trend Micro Used AWS to Build their Enterprise Security Offering (Deep Security as a Service) – Thursday 11 am - noon
  19. 19. Try out Trend Micro today! • Test Drive: aws.amazon.com/testdrive • Free Trials: – DeepSecurity.TrendMicro.com – Webappsecurity.trendmicro.com – securecloud.com
  20. 20. We are sincerely eager to hear your feedback on this presentation and on re:Invent. Please fill out an evaluation form when you have a chance.
  1. A particular slide catching your eye?

    Clipping is a handy way to collect important slides you want to go back to later.

×