How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013
- 865 views
(Presented by Trend Micro) ...
(Presented by Trend Micro)
In this session, you learn about the AWS shared security model, including considerations and best practices for deploying a secure and compliant application on AWS, and how to leverage the features and APIs provided by AWS. You also learn how to use best-in-class security and compliance solutions that have been optimized for enterprises deploying in AWS.
Key topics covered are Amazon EC2 and Amazon EBS encryption, including several key management methodologies as well as intrusion detection and prevention, anti-malware, anti-virus, integrity monitoring, firewall, and web reputation in the cloud.
- Total Views
- Views on SlideShare
- Embed Views