• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013
 

How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

on

  • 758 views

(Presented by Trend Micro) ...

(Presented by Trend Micro)
In this session, you learn about the AWS shared security model, including considerations and best practices for deploying a secure and compliant application on AWS, and how to leverage the features and APIs provided by AWS. You also learn how to use best-in-class security and compliance solutions that have been optimized for enterprises deploying in AWS.

Key topics covered are Amazon EC2 and Amazon EBS encryption, including several key management methodologies as well as intrusion detection and prevention, anti-malware, anti-virus, integrity monitoring, firewall, and web reputation in the cloud.

Statistics

Views

Total Views
758
Views on SlideShare
758
Embed Views
0

Actions

Likes
0
Downloads
20
Comments
0

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Adobe PDF

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013 How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013 Presentation Transcript

    • How to Meet Strict Security Compliance Requirements in the Cloud JD Sherry, VP Technology & Solutions, Trend Micro Mark Nunnikhoven, Principal Engineer, Cloud & Emerging Technologies, Trend Micro November 13, 2013 © 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
    • Enterprises & the Cloud • Security & compliance are top priorities for enterprises, regardless of where things are deployed • Many organizations recognize the benefits of the cloud – and need to understand security requirements
    • Enterprises & the Cloud • Data sovereignty • Multi-tenancy • Compliance Source: Trend Micro survey, May 2013 76% indicated they had compliance or data confidentiality requirements
    • PCI Requirements as a Reference … February, 2013 You!
    • Shared responsibility • Facilities • Operating System • Physical Security • Application • Physical Infrastructure • Account Management • Network Infrastructure • Security Groups • Virtualization Infrastructure • Network Configuration
    • Deep Security Deep Security Manager Amazon EC2 instances
    • What does Deep Security deliver? Centralized security control management Technical details Unified management interface for multiple regions/credentials Simplified policy management across the organization Broad platform support Agent provides protection on the Amazon EC2 instance Your needs Helps address compliance challenges Enforces security policy within your organization
    • Customer Challenges Managing another binary Flexible deployment to fit any situation Deploy via user-data, Chef, Puppet, SSH/PowerShell, etc. Install the agent in an AMI and activate on demand Keeping up to date Agent updates via Deep Security, no extra tools needed
    • Demo – User-data deployment
    • Demo – Manager-initiated activation
    • Customer Challenges Being aware of assets in AWS Deep AWS integration AWS cloud connector automatically polls region Automate security actions for new instances Full visibility of unprotected instances Keeping up to date Connector syncs regularly for constant awareness
    • Demo – Automated decision making
    • Deep Security + SecureCloud Deep Security Manager Amazon EC2 instances SecureCloud
    • What does SecureCloud deliver? Full disk encryption Technical details Intelligent block level encrypted Used AES-256 cipher from FIPS 140-2 certified library Broad platform support Agent provides protection on the Amazon EC2 instance Your needs Helps address compliance challenges Enforces security policy within your organization
    • Customer Challenges Preventing unauthorized access to data Deep AWS integration Leverage AWS metadata for key management policies Boot-volume encryption for Windows & Linux Keeping up to date Integrity check regularly validates encryption policy
    • Demo – Advanced key release policy
    • Session Summary Meet strict security and compliance requirements with a security solution that is: • Smart: Automatically apply security controls • Simple: Manage through a single console with reporting and alerting • Security that fits: Embed security into your cloud architecture
    • Learn about Trend Micro at AWS re:Invent • Join us at our booth to meet R&D experts and see indepth product demo • SEC 309: Learn How Trend Micro Used AWS to Build their Enterprise Security Offering (Deep Security as a Service) – Thursday 11 am - noon
    • Try out Trend Micro today! • Test Drive: aws.amazon.com/testdrive • Free Trials: – DeepSecurity.TrendMicro.com – Webappsecurity.trendmicro.com – securecloud.com
    • We are sincerely eager to hear your feedback on this presentation and on re:Invent. Please fill out an evaluation form when you have a chance.