SlideShare a Scribd company logo
1 of 45
Download to read offline
Securing Media Content and Applications in
the Cloud
Usman Shakeel, Amazon Web Services
Ben Masek. Sony Media Cloud Services
November 14, 2013

© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
Does AWS meet customer’s
security requirements?
Does AWS meet customer’s
security requirements?

Can my media content and
applications on AWS be
aligned to MPAA?
TOGETHER
Core Differentiators

Constant Pressures

Better customer experience
Reach more customers
Better quality content
More cool features
More analytics

Better vendor relationships
Shorten procurement cycle
Audits and compliance
Cut costs

Cost of Business
Infrastructure management
Infrastructure security
Infrastructure audit
DR, HA
Your $$$$ Can Go Farther !
Cost of Business

Core Differentiators

•
•
•
•

•
•
•
•

Infrastructure management
Infrastructure security
Infrastructure audit
DR and HA is complicated

New product features
Better customer experience
More analytics
More monetization opportunities

Happy Customers !!
The Shared Responsibility Model
Application
OS firewalls
Security groups
Operating system
Account management
Network configuration

Virtualization infrastructure
Network infrastructure
Physical infrastructure
Physical security
Facilities
Certifications and Compliances
Certifications
Facilities
Physical security
Physical infrastructure
Network infrastructure
Virtualization infrastructure

• SOC 1, SOC 2 & SOC 3
(SSAE16/ISAE 3402 audit)

• ISO 27001 certification
•

PCI level 1 service provider

•

FedRAMP (FISMA)

•

AWS GovCloud (US)

• MPAA best practices alignment

Customer are running Sarbanes-Oxley (SOX), HIPAA
(healthcare), FISMA (US federal government), DIACAP
MAC III sensitive ATO, International Traffic in Arms
Regulations (ITAR)
Security Innovation – Customer Driven Improvements

Everyone’s Applications

Requirements

Requirements

Requirements

AWS Security Infrastructure
AWS Services Stack in a Media Workflow

Amazon
EC2

AWS Storage
Gateway

Process

Store

Ingest

AMI
Amazon
S3

AWS Direct Connect

Amazon
EBS

Amazon
EC2

Amazon
RDS

Amazon
VPC

Elasti
Cache

Amazon
EMR

Deliver

Amazon
Elastic
Transcoder

CloudFront

Amazon
CloudSearch Amazon SQS
Route 53

Elastic Load
Balancing

AWS Import/
Export

DynamoDB
Amazon
Glacier

Amazon
Redshift

Amazon
SNS

Amazon
SWF
MPAA Security Best Practices
AWS alignment to MPAA security best practices reviewed October 2012
Based on AWS shared responsibility model
(MPAA Best Practices) – AWS Services in Scope
–
–
–
–
–
–
–
–
–
–
–
–
–
–
–

Amazon Elastic Compute Cloud (EC2)
Amazon Virtual Private Cloud (VPC)
Amazon Simple Storage Service (S3)
Amazon Elastic Block Store (EBS)
Amazon Relational Database Service (RDS)
Amazon DynamoDB
Elastic Load Balancing (ELB)
AWS Identity and Access Management (IAM)
Amazon CloudFront
Amazon Glacier
AWS Import/Export
AWS Direct Connect
Amazon Route 53
Amazon Elastic Transcoder
and the supporting data centers

Amazon
EC2

Amazon
VPC

Amazon
RDS

CloudFront

Elastic
Transcoder

Amazon
S3

Amazon
DynamoDB

Amazon
Glacier

Route 53

Amazon
EBS

AWS Import/
Export

AWS Direct Connect

Elastic Load
Balancing
(MPAA Best Practices) - Content Types in Scope
Preproduction

Storyboards
Scripts
Location
Footage
Screen
Tests

Production

Production Wrap

Call Sheets
Raw Files
Dailies
Script Edits
Editorial
Audio Files

Postproduction

Media Files
VFX
Master Files
Editorial

Distribution

Theatrical
Prints
MPAA Content Security Best Practices
MPAA Content Security Best Practices on AWS
Management Systems

Physical Security

Digital Security

Organization &
Management

Facility

Infrastructure

Competency

Asset Management

Content Management

Transport

Content Transfer
MPAA Content Security Best Practices on AWS

Facility
Physical
Security

Asset Management
Transport

Management
Systems

Organization & Management
Competency

Management
Systems

Organization & Management
Virtual Resources
Competency

Infrastructure
Digital
Security

Content Management

Digital
Security

Content Management
Content Transfer
AWS Physical Infrastructure Security
What AWS controls do
have in the
shared responsibility model?
AWS Security Controls
• Access points
•
•

Amazon VPC allows VPN access as well

•
•

HTTP or HTTPS using SSL access
Redundant connection to more than one communication service at each
Internet-facing edge

API requests
•

SOAP – must be signed (using X.509 certs with an RSA public key)

•

Query – SHA1 and SHA-256 cryptographic hash signature

•

SSH to Amazon EC2 instances – Require a public/private key pair or RDP certificate

•

AWS multi-factor authentication (MFA)

•

Key management and rotation
AWS Identity and Access Management (IAM)
Unique security credentials
•

Access keys, login/password, MFA device

•

Federated authentication (AWS Security Token Service STS)

Policies control access to AWS APIs
•

API calls must be signed by either: X.509 certificate or secret key

Deep integration with other AWS services
•

Amazon S3: policies on objects and buckets

•

Amazon SimpleDB: domains

•

Amazon EC2 resource permissions
Amazon EC2 Security Controls
EC2 (guest) operating system
•

Controlled by YOU

•

YOU have admin/root

•

AWS has NO visibility

•

YOU generate the key pairs

Instance
Security Group
Availability Zone A

Security groups (stateful filters)
•

•
•

AWS Cloud

YOU control the mandatory inbound firewall
Default is deny all

+Egress in the case of Amazon VPC

Signed API calls

Security Group Adobe_FMS Configuration
Protocol

Port range

Source

TCP

80

0.0.0.0/0

TCP

1111

0.0.0.0/0

TCP

1935

0.0.0.0/0

UDP

1935

0.0.0.0/0

SSH

22

192.168.0.41/10
Amazon Virtual Private Cloud (VPC)

•
•
•
•

Isolated environment
Ingress and egress filters
Network ACLs
Routing rules

Internet Gateway

Elastic IP
VPN Gateway
Instances

Instances
Security
Group

Security
Group

VPC Public Subnet

VPC Private Subnet

Virtual Private Cloud

VPN Connection

Corporate
Data Center
Amazon S3 Security Controls
•
•
•
•
•

Bucket- and object-level permissions
• Owner only access (by default)
Signed URLs/query string authentication
IAM policies
Versioning (MFA delete)
Detailed access logging

✔Access Logs
S3 Client Side Encryption with AWS SDK for Java
Look for AmazonS3EncryptionClient class (subclass of AmazonS3Client)

Content

Envelope Key

Encrypted Content

Encrypted Envelope Key
Master Key

AWS SDK for Java
Corporate Data Center
S3 Server-Side Encryption (at Rest)
• Encryption
• Decryption
• Key management

Amazon S3
Master S3 Key

(Encrypted by S3 master key)
(Stored separately from your data)

• 256-bit AES encryption
Envelop Key

Content to be Uploaded
(encryption enabled in the
HTTP header)

Encrypted Stored Data

Encrypted Stored Key
Example S3 Policies
{
"Statement":[
{
"Effect":"Allow",
"Action":["s3:ListAllMyBuckets”],
"Resource":"arn:aws:s3:::*"
},
{
"Effect":"Allow",
"Action":["s3:ListBucket”,"s3:GetBucketLocation"
],
"Resource":"arn:aws:s3:::examplebucket"
},
{
"Effect":"Allow",
"Action":["s3:PutObject”,"s3:GetObject”,"s3:DeleteObject"
],
"Resource":"arn:aws:s3:::examplebucket/*"
}
]

}
Example S3 Policies
"Statement":[
{
"Effect":"Allow",
"Action":[
"s3:PutObject",
"s3:GetObject",
"s3:GetObjectVersion",
"s3:DeleteObject",
"s3:DeleteObjectVersion"
],
"Resource":"arn:aws:s3:::examplebucket/${aws:username}/*"
}
]
}
Amazon CloudFront Security
• CloudFront’s private content feature
Only deliver content to securely signed requests

• HTTPS ONLY requests/delivery
• CloudFront origin access identity
• Signed URL verification

Amazon S3
(Logs Storage)

Amazon CloudFront

Signed Request
HTTP
End User

Policy based on a timed URL or a CIDR block of the requestor

• HTTPS ONLY origin fetches
• Trusted signers
• Access logs

Delivery EC2 Instances
Security Group

Amazon S3
(Media Storage)
Cloudfront Origin Access Identity
"Statement":[{
"Sid":" Grant a CloudFront Origin Identity access",
"Effect":"Allow",
"Principal":{

"CanonicalUser":"79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8"
},
"Action":"s3:GetObject",
"Resource":"arn:aws:s3:::example-bucket/*"
}
]
A Word on Content Location..

Region
Availability Zone

London (2)

New York (3)

South Bend

Edge Locations

Amsterdam (2)

Stockholm

Newark

Tokyo (2)
Seattle

Dublin

San Jose
Palo Alto
Hayward

Paris (2)

Frankfurt (2)
Seoul

Madrid
Ashburn (3)

Milan
Osaka

Los Angeles (2)

Jacksonville
Mumbai

Dallas (2)

Hong Kong (2)

Chennai
St.Louis
Miami

Singapore(2)

Sao Paulo

Sydney
Introducing AWS CloudTrail

You are making API
calls...

On a growing set of
services around the
world..

CloudTrail is
continuously
recording API calls…

And delivering log
files to you…
AWS CloudTrail
• Conduct audits for compliance
• Review API call activity within your account
• User activity logs to demonstrate compliance with government and
industry regulatory standards
• Monitor user activity for suspicious behavior
• Monitor user activity for specific known undesired behavior(s) and
raise alarms using their (SIEM) solutions
• Conduct security analytics to identify potential security issues
• Identify suspicious behavior and latent patterns that don’t trigger
immediate alarms but that may represent a security issue
AWS CloudTrail Usage
1. Create an S3 bucket on the customer's account (default name generated
or customer specified)
• Permissions added to the bucket to allow AWS CloudTrail to write to it
• User-specified bucket expiration policy applied
2. Optionally, create an Amazon SNS topic in the same manner as the bucket
above
3. Call CreateTrail to provide the bucket, topic, and S3 object prefix
4. Call StartLogging to start event processing for the account
Lines 1 and 2 are called directly as the user to Amazon S3/SNS
Lines 3 and 4 are the only AWS CloudTrail calls.
Path to MPAA Best Practices Alignment
Application
Security groups
Operating system

Access management

Third-Party
Auditor

Network configuration

Virtualization infrastructure
Network infrastructure
Physical infrastructure
Physical security
Facilities

SOC 1/2
ISO 27001
MPAA Alignment for Sony MCS
(Powered by AWS)
Who?
Sony Media Cloud Services
On-demand cloud-based solutions designed
to empower media professionals to create
and securely manage high-value, highresolution content.

Why?
EXPONENTIAL
GROWTH
SECURELY ORGANIZE,
MANAGE & ARCHIVE
MAJOR MOTION
PICTURE DAILIES
PREVIEWING

MARKETING &
STOCK FOOTAGE
OPERATIONS

PUTTING
THE CLOUD TO
WORK.
EMERGENCY
CONTENT
BACKUP

TELEVISION
EDITORIAL &
LEGAL REVIEW

SMALL BUDGET
PRODUCTIONS &
ORIGINAL CONTENT

ARCHIVED
CONTENT
Sony MCS Alignment to MPAA
•
•
•
•
•
•

Ensure security becomes part of tech team DNA
Leverage internal + MPAA best practices
Leverage AWS security features (IAM, VPC…)
ISO 27001 certification preparation
Vulnerability assessments – penetration testing
On-going security program

• MCS alignment to MPAA Security Best Practices
reviewed March 2013
MCS – MPAA Content Security Best Practices Alignment
Infrastructure Security

Logical Security

AWS Accelerators

Applications deployed
on the AWS Cloud

•
•
•
•

Facilities
Physical security
Network infrastructure
Virtualization infrastructure

Applications deployed
on-premises

•
•
•
•
•

Operating system
Applications
Security goups/ VPCs
Network config
Account mgmnt

•
•
•
•
•

IAM
VPCs
S3 security features
EC2 security features
CloudFront security
features
WORKFLOWS AND CLOUD CHALLENGES

Access
Control
Store/
Process
UPLOAD/
INGEST

SHARE/
DOWNLOAD
VFX

SEARCH/
MANAGE

CREATIVE
DIRECTO
R

LOG/
REVIEW
ROUGH CUT

Integrity
Availability

EDITOR

PREVIEW

Stream/
W-Mark

STREAM/
INTERACT

ARCHIVE

MARKETING
PRODUCER
LEGAL
Sony MCS AWS Security Considerations
Auth

UI
Auto scaling
Group

CloudFront

File check
Virus scan

W-mark / https
Signed url
verification

Content
Processing

•

VPC isolation

•

Security groups

•

Transfe
r
Cluster

Monitorin
g

API

Auto scaling
Group

Encrypted
transfer

Not shown…

Access
control
Auto scaling
Group

NoSQL ElastiCache RDS

Logging

SWF

SQS

Other

Signed url/
SSE/
checksum

STS

S3

Glacier

SES
Partner with AWS to Innovate on Security

AWS Controls

AWS solution architects
AWS professional services

AWS IAM

AWS premium support

Agile trust zones
(Security groups + VPC)

AWS Trusted Advisor

Standardized environments

AWS Partner Network
More Information – Where to Go Next ..
• AWS Security Center (aws.amazon.com/security)
•

AWS security white paper

•

AWS security procedures

• AWS Compliance website (aws.amazon.com/compliance)
•
•

Third-party attestations, reports, and certifications

•

•

AWS compliance white paper
AWS assurance programs

Contact us
•

Contact your sales team

•

AWS help and support center
Please give us your feedback on this
presentation

MED 401
As a thank you, we will select prize
winners daily for completed surveys!

More Related Content

What's hot

High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
Amazon Web Services
 

What's hot (20)

AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 
Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017Security best practices on AWS - Pop-up Loft TLV 2017
Security best practices on AWS - Pop-up Loft TLV 2017
 
Architecting for Resiliency
Architecting for ResiliencyArchitecting for Resiliency
Architecting for Resiliency
 
Secure Content Delivery with AWS
Secure Content Delivery with AWSSecure Content Delivery with AWS
Secure Content Delivery with AWS
 
Protecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWSProtecting Your Data with Encryption on AWS
Protecting Your Data with Encryption on AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
Creating Your Virtual Data Center: Amazon VPC Fundamentals and Connectivity O...
 
Advanced AWS Security Workshop
Advanced AWS Security WorkshopAdvanced AWS Security Workshop
Advanced AWS Security Workshop
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Announcements for Mobile Developers
Announcements for Mobile DevelopersAnnouncements for Mobile Developers
Announcements for Mobile Developers
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta(SEC401) Encryption Key Storage with AWS KMS at Okta
(SEC401) Encryption Key Storage with AWS KMS at Okta
 
Getting Started with Windows Workloads on Amazon EC2
Getting Started with Windows Workloads on Amazon EC2Getting Started with Windows Workloads on Amazon EC2
Getting Started with Windows Workloads on Amazon EC2
 
NEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the EdgeNEW LAUNCH! Bringing AWS Lambda to the Edge
NEW LAUNCH! Bringing AWS Lambda to the Edge
 
AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)AWS Security Best Practices (March 2017)
AWS Security Best Practices (March 2017)
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
Hybrid Infrastructure Integration
Hybrid Infrastructure IntegrationHybrid Infrastructure Integration
Hybrid Infrastructure Integration
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
AWS re:Invent 2016: Securing Enterprise Big Data Workloads on AWS (SEC308)
AWS re:Invent 2016: Securing Enterprise Big Data Workloads on AWS (SEC308)AWS re:Invent 2016: Securing Enterprise Big Data Workloads on AWS (SEC308)
AWS re:Invent 2016: Securing Enterprise Big Data Workloads on AWS (SEC308)
 
High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
High Performance MongoDB Clusters with Amazon EBS Provisioned IOPS
 

Viewers also liked

AWS Cloud Kata | Bangkok - Getting to Profitability
AWS Cloud Kata | Bangkok - Getting to ProfitabilityAWS Cloud Kata | Bangkok - Getting to Profitability
AWS Cloud Kata | Bangkok - Getting to Profitability
Amazon Web Services
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Amazon Web Services
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
Martin Yan
 
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
Amazon Web Services
 

Viewers also liked (20)

Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013
Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013
Implementing Bullet-Proof HIPAA Solutions on AWS (SEC306) | AWS re:Invent 2013
 
AWS Cloud Kata | Bangkok - Getting to Profitability
AWS Cloud Kata | Bangkok - Getting to ProfitabilityAWS Cloud Kata | Bangkok - Getting to Profitability
AWS Cloud Kata | Bangkok - Getting to Profitability
 
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
Application Darwinism: Why Most Enterprise Apps Will Move to the Cloud (SVC20...
 
Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013
Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013
Zero to Sixty: AWS Elastic Beanstalk (DMG204) | AWS re:Invent 2013
 
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable CustomersSecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
SecureAuth & TeleSign Webinar: Secure Customers are Profitable Customers
 
Bringing Governance to an Existing Cloud at NASA's JPL (ENT201) | AWS re:Inve...
Bringing Governance to an Existing Cloud at NASA's JPL (ENT201) | AWS re:Inve...Bringing Governance to an Existing Cloud at NASA's JPL (ENT201) | AWS re:Inve...
Bringing Governance to an Existing Cloud at NASA's JPL (ENT201) | AWS re:Inve...
 
Network-Ready Your Hybrid IT Environment (ENT108) | AWS re:Invent 2013
Network-Ready Your Hybrid IT Environment (ENT108) | AWS re:Invent 2013Network-Ready Your Hybrid IT Environment (ENT108) | AWS re:Invent 2013
Network-Ready Your Hybrid IT Environment (ENT108) | AWS re:Invent 2013
 
AWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS Video
AWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS VideoAWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS Video
AWS Webcast - Using JW Player and Amazon CloudFront to Stream HLS Video
 
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
Netflix: Amazon S3 & Amazon Elastic MapReduce to Monitor at Gigascale (BDT302...
 
Scale Your Application while Improving Performance and Lowering Costs (SVC203...
Scale Your Application while Improving Performance and Lowering Costs (SVC203...Scale Your Application while Improving Performance and Lowering Costs (SVC203...
Scale Your Application while Improving Performance and Lowering Costs (SVC203...
 
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner VogelsBeyond the Fridge, The World of Connected Data - Dr Werner Vogels
Beyond the Fridge, The World of Connected Data - Dr Werner Vogels
 
What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017What's New in SecureAuth IdP in 2017
What's New in SecureAuth IdP in 2017
 
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013From One to Many:  Evolving VPC Design (ARC401) | AWS re:Invent 2013
From One to Many: Evolving VPC Design (ARC401) | AWS re:Invent 2013
 
The Future of Mobile Application Security
The Future of Mobile Application SecurityThe Future of Mobile Application Security
The Future of Mobile Application Security
 
What to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access ControlWhat to Expect in 2016: Top 5 Predictions for Security and Access Control
What to Expect in 2016: Top 5 Predictions for Security and Access Control
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
 
4K Media Workflows on AWS
4K Media Workflows on AWS4K Media Workflows on AWS
4K Media Workflows on AWS
 
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
AWS Mobile Services: Amazon Cognito - Identity Broker and Synchronization Ser...
 
Securing your content and media workflows on AWS
Securing your content and media workflows on AWSSecuring your content and media workflows on AWS
Securing your content and media workflows on AWS
 
AWS Webcast - Best Practices for Content Delivery using Amazon CloudFront
AWS Webcast - Best Practices for Content Delivery using Amazon CloudFrontAWS Webcast - Best Practices for Content Delivery using Amazon CloudFront
AWS Webcast - Best Practices for Content Delivery using Amazon CloudFront
 

Similar to Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent 2013

awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
himanipatel524244
 
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
Amazon Web Services
 

Similar to Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent 2013 (20)

Best Practices for Security at Scale
Best Practices for Security at Scale Best Practices for Security at Scale
Best Practices for Security at Scale
 
Secure your critical workload on AWS
Secure your critical workload on AWSSecure your critical workload on AWS
Secure your critical workload on AWS
 
AWS Cloud Controls for Security - Usman Shakeel
AWS Cloud Controls for Security  - Usman ShakeelAWS Cloud Controls for Security  - Usman Shakeel
AWS Cloud Controls for Security - Usman Shakeel
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
Increase Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web ServicesIncrease Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web Services
 
Increase Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web ServicesIncrease Speed and Agility with Amazon Web Services
Increase Speed and Agility with Amazon Web Services
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
Security & Governance on AWS – Better, Faster, and Cost Effective - Technical...
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
Content Delivery: accelerare in modo sicuro e flessibile siti web e applicazioni
Content Delivery: accelerare in modo sicuro e flessibile siti web e applicazioniContent Delivery: accelerare in modo sicuro e flessibile siti web e applicazioni
Content Delivery: accelerare in modo sicuro e flessibile siti web e applicazioni
 
Security Best Practices_John Hildebrandt
Security Best Practices_John HildebrandtSecurity Best Practices_John Hildebrandt
Security Best Practices_John Hildebrandt
 
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
awsomedaymodules14gettingstartedwithaws161013161135convertedpptx__2022_01_10_...
 
Getting Started on AWS
Getting Started on AWSGetting Started on AWS
Getting Started on AWS
 
Technical Track
Technical TrackTechnical Track
Technical Track
 
Getting Started with AWS
Getting Started with AWSGetting Started with AWS
Getting Started with AWS
 
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
Access Control for the Cloud: AWS Identity and Access Management (IAM) (SEC20...
 
AWSome Day | Tech Track
AWSome Day | Tech TrackAWSome Day | Tech Track
AWSome Day | Tech Track
 
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
Track 4 Session 4_ MAD02 MAD 04 如何藉由 CICD 流程管理容器化和無伺服器應用
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million Users
 

More from Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Recently uploaded (20)

ChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps ProductivityChatGPT and Beyond - Elevating DevOps Productivity
ChatGPT and Beyond - Elevating DevOps Productivity
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
JavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate GuideJavaScript Usage Statistics 2024 - The Ultimate Guide
JavaScript Usage Statistics 2024 - The Ultimate Guide
 
Quantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation ComputingQuantum Leap in Next-Generation Computing
Quantum Leap in Next-Generation Computing
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 AmsterdamDEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
DEV meet-up UiPath Document Understanding May 7 2024 Amsterdam
 
API Governance and Monetization - The evolution of API governance
API Governance and Monetization -  The evolution of API governanceAPI Governance and Monetization -  The evolution of API governance
API Governance and Monetization - The evolution of API governance
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 
Choreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software EngineeringChoreo: Empowering the Future of Enterprise Software Engineering
Choreo: Empowering the Future of Enterprise Software Engineering
 
Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)Introduction to Multilingual Retrieval Augmented Generation (RAG)
Introduction to Multilingual Retrieval Augmented Generation (RAG)
 
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
WSO2 Micro Integrator for Enterprise Integration in a Decentralized, Microser...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Decarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational PerformanceDecarbonising Commercial Real Estate: The Role of Operational Performance
Decarbonising Commercial Real Estate: The Role of Operational Performance
 
Simplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptxSimplifying Mobile A11y Presentation.pptx
Simplifying Mobile A11y Presentation.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 

Securing Media Content and Applications in the Cloud (MED401) | AWS re:Invent 2013

  • 1. Securing Media Content and Applications in the Cloud Usman Shakeel, Amazon Web Services Ben Masek. Sony Media Cloud Services November 14, 2013 © 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
  • 2. Does AWS meet customer’s security requirements?
  • 3. Does AWS meet customer’s security requirements? Can my media content and applications on AWS be aligned to MPAA?
  • 5.
  • 6. Core Differentiators Constant Pressures Better customer experience Reach more customers Better quality content More cool features More analytics Better vendor relationships Shorten procurement cycle Audits and compliance Cut costs Cost of Business Infrastructure management Infrastructure security Infrastructure audit DR, HA
  • 7. Your $$$$ Can Go Farther ! Cost of Business Core Differentiators • • • • • • • • Infrastructure management Infrastructure security Infrastructure audit DR and HA is complicated New product features Better customer experience More analytics More monetization opportunities Happy Customers !!
  • 8. The Shared Responsibility Model Application OS firewalls Security groups Operating system Account management Network configuration Virtualization infrastructure Network infrastructure Physical infrastructure Physical security Facilities
  • 9. Certifications and Compliances Certifications Facilities Physical security Physical infrastructure Network infrastructure Virtualization infrastructure • SOC 1, SOC 2 & SOC 3 (SSAE16/ISAE 3402 audit) • ISO 27001 certification • PCI level 1 service provider • FedRAMP (FISMA) • AWS GovCloud (US) • MPAA best practices alignment Customer are running Sarbanes-Oxley (SOX), HIPAA (healthcare), FISMA (US federal government), DIACAP MAC III sensitive ATO, International Traffic in Arms Regulations (ITAR)
  • 10. Security Innovation – Customer Driven Improvements Everyone’s Applications Requirements Requirements Requirements AWS Security Infrastructure
  • 11. AWS Services Stack in a Media Workflow Amazon EC2 AWS Storage Gateway Process Store Ingest AMI Amazon S3 AWS Direct Connect Amazon EBS Amazon EC2 Amazon RDS Amazon VPC Elasti Cache Amazon EMR Deliver Amazon Elastic Transcoder CloudFront Amazon CloudSearch Amazon SQS Route 53 Elastic Load Balancing AWS Import/ Export DynamoDB Amazon Glacier Amazon Redshift Amazon SNS Amazon SWF
  • 12. MPAA Security Best Practices AWS alignment to MPAA security best practices reviewed October 2012 Based on AWS shared responsibility model
  • 13. (MPAA Best Practices) – AWS Services in Scope – – – – – – – – – – – – – – – Amazon Elastic Compute Cloud (EC2) Amazon Virtual Private Cloud (VPC) Amazon Simple Storage Service (S3) Amazon Elastic Block Store (EBS) Amazon Relational Database Service (RDS) Amazon DynamoDB Elastic Load Balancing (ELB) AWS Identity and Access Management (IAM) Amazon CloudFront Amazon Glacier AWS Import/Export AWS Direct Connect Amazon Route 53 Amazon Elastic Transcoder and the supporting data centers Amazon EC2 Amazon VPC Amazon RDS CloudFront Elastic Transcoder Amazon S3 Amazon DynamoDB Amazon Glacier Route 53 Amazon EBS AWS Import/ Export AWS Direct Connect Elastic Load Balancing
  • 14. (MPAA Best Practices) - Content Types in Scope Preproduction Storyboards Scripts Location Footage Screen Tests Production Production Wrap Call Sheets Raw Files Dailies Script Edits Editorial Audio Files Postproduction Media Files VFX Master Files Editorial Distribution Theatrical Prints
  • 15. MPAA Content Security Best Practices
  • 16. MPAA Content Security Best Practices on AWS Management Systems Physical Security Digital Security Organization & Management Facility Infrastructure Competency Asset Management Content Management Transport Content Transfer
  • 17. MPAA Content Security Best Practices on AWS Facility Physical Security Asset Management Transport Management Systems Organization & Management Competency Management Systems Organization & Management Virtual Resources Competency Infrastructure Digital Security Content Management Digital Security Content Management Content Transfer
  • 19. What AWS controls do have in the shared responsibility model?
  • 20. AWS Security Controls • Access points • • Amazon VPC allows VPN access as well • • HTTP or HTTPS using SSL access Redundant connection to more than one communication service at each Internet-facing edge API requests • SOAP – must be signed (using X.509 certs with an RSA public key) • Query – SHA1 and SHA-256 cryptographic hash signature • SSH to Amazon EC2 instances – Require a public/private key pair or RDP certificate • AWS multi-factor authentication (MFA) • Key management and rotation
  • 21. AWS Identity and Access Management (IAM) Unique security credentials • Access keys, login/password, MFA device • Federated authentication (AWS Security Token Service STS) Policies control access to AWS APIs • API calls must be signed by either: X.509 certificate or secret key Deep integration with other AWS services • Amazon S3: policies on objects and buckets • Amazon SimpleDB: domains • Amazon EC2 resource permissions
  • 22. Amazon EC2 Security Controls EC2 (guest) operating system • Controlled by YOU • YOU have admin/root • AWS has NO visibility • YOU generate the key pairs Instance Security Group Availability Zone A Security groups (stateful filters) • • • AWS Cloud YOU control the mandatory inbound firewall Default is deny all +Egress in the case of Amazon VPC Signed API calls Security Group Adobe_FMS Configuration Protocol Port range Source TCP 80 0.0.0.0/0 TCP 1111 0.0.0.0/0 TCP 1935 0.0.0.0/0 UDP 1935 0.0.0.0/0 SSH 22 192.168.0.41/10
  • 23. Amazon Virtual Private Cloud (VPC) • • • • Isolated environment Ingress and egress filters Network ACLs Routing rules Internet Gateway Elastic IP VPN Gateway Instances Instances Security Group Security Group VPC Public Subnet VPC Private Subnet Virtual Private Cloud VPN Connection Corporate Data Center
  • 24. Amazon S3 Security Controls • • • • • Bucket- and object-level permissions • Owner only access (by default) Signed URLs/query string authentication IAM policies Versioning (MFA delete) Detailed access logging ✔Access Logs
  • 25. S3 Client Side Encryption with AWS SDK for Java Look for AmazonS3EncryptionClient class (subclass of AmazonS3Client) Content Envelope Key Encrypted Content Encrypted Envelope Key Master Key AWS SDK for Java Corporate Data Center
  • 26. S3 Server-Side Encryption (at Rest) • Encryption • Decryption • Key management Amazon S3 Master S3 Key (Encrypted by S3 master key) (Stored separately from your data) • 256-bit AES encryption Envelop Key Content to be Uploaded (encryption enabled in the HTTP header) Encrypted Stored Data Encrypted Stored Key
  • 29. Amazon CloudFront Security • CloudFront’s private content feature Only deliver content to securely signed requests • HTTPS ONLY requests/delivery • CloudFront origin access identity • Signed URL verification Amazon S3 (Logs Storage) Amazon CloudFront Signed Request HTTP End User Policy based on a timed URL or a CIDR block of the requestor • HTTPS ONLY origin fetches • Trusted signers • Access logs Delivery EC2 Instances Security Group Amazon S3 (Media Storage)
  • 30. Cloudfront Origin Access Identity "Statement":[{ "Sid":" Grant a CloudFront Origin Identity access", "Effect":"Allow", "Principal":{ "CanonicalUser":"79a59df900b949e55d96a1e698fbacedfd6e09d98eacf8" }, "Action":"s3:GetObject", "Resource":"arn:aws:s3:::example-bucket/*" } ]
  • 31. A Word on Content Location.. Region Availability Zone London (2) New York (3) South Bend Edge Locations Amsterdam (2) Stockholm Newark Tokyo (2) Seattle Dublin San Jose Palo Alto Hayward Paris (2) Frankfurt (2) Seoul Madrid Ashburn (3) Milan Osaka Los Angeles (2) Jacksonville Mumbai Dallas (2) Hong Kong (2) Chennai St.Louis Miami Singapore(2) Sao Paulo Sydney
  • 32. Introducing AWS CloudTrail You are making API calls... On a growing set of services around the world.. CloudTrail is continuously recording API calls… And delivering log files to you…
  • 33. AWS CloudTrail • Conduct audits for compliance • Review API call activity within your account • User activity logs to demonstrate compliance with government and industry regulatory standards • Monitor user activity for suspicious behavior • Monitor user activity for specific known undesired behavior(s) and raise alarms using their (SIEM) solutions • Conduct security analytics to identify potential security issues • Identify suspicious behavior and latent patterns that don’t trigger immediate alarms but that may represent a security issue
  • 34. AWS CloudTrail Usage 1. Create an S3 bucket on the customer's account (default name generated or customer specified) • Permissions added to the bucket to allow AWS CloudTrail to write to it • User-specified bucket expiration policy applied 2. Optionally, create an Amazon SNS topic in the same manner as the bucket above 3. Call CreateTrail to provide the bucket, topic, and S3 object prefix 4. Call StartLogging to start event processing for the account Lines 1 and 2 are called directly as the user to Amazon S3/SNS Lines 3 and 4 are the only AWS CloudTrail calls.
  • 35. Path to MPAA Best Practices Alignment Application Security groups Operating system Access management Third-Party Auditor Network configuration Virtualization infrastructure Network infrastructure Physical infrastructure Physical security Facilities SOC 1/2 ISO 27001
  • 36. MPAA Alignment for Sony MCS (Powered by AWS)
  • 37. Who? Sony Media Cloud Services On-demand cloud-based solutions designed to empower media professionals to create and securely manage high-value, highresolution content. Why? EXPONENTIAL GROWTH SECURELY ORGANIZE, MANAGE & ARCHIVE
  • 38. MAJOR MOTION PICTURE DAILIES PREVIEWING MARKETING & STOCK FOOTAGE OPERATIONS PUTTING THE CLOUD TO WORK. EMERGENCY CONTENT BACKUP TELEVISION EDITORIAL & LEGAL REVIEW SMALL BUDGET PRODUCTIONS & ORIGINAL CONTENT ARCHIVED CONTENT
  • 39. Sony MCS Alignment to MPAA • • • • • • Ensure security becomes part of tech team DNA Leverage internal + MPAA best practices Leverage AWS security features (IAM, VPC…) ISO 27001 certification preparation Vulnerability assessments – penetration testing On-going security program • MCS alignment to MPAA Security Best Practices reviewed March 2013
  • 40. MCS – MPAA Content Security Best Practices Alignment Infrastructure Security Logical Security AWS Accelerators Applications deployed on the AWS Cloud • • • • Facilities Physical security Network infrastructure Virtualization infrastructure Applications deployed on-premises • • • • • Operating system Applications Security goups/ VPCs Network config Account mgmnt • • • • • IAM VPCs S3 security features EC2 security features CloudFront security features
  • 41. WORKFLOWS AND CLOUD CHALLENGES Access Control Store/ Process UPLOAD/ INGEST SHARE/ DOWNLOAD VFX SEARCH/ MANAGE CREATIVE DIRECTO R LOG/ REVIEW ROUGH CUT Integrity Availability EDITOR PREVIEW Stream/ W-Mark STREAM/ INTERACT ARCHIVE MARKETING PRODUCER LEGAL
  • 42. Sony MCS AWS Security Considerations Auth UI Auto scaling Group CloudFront File check Virus scan W-mark / https Signed url verification Content Processing • VPC isolation • Security groups • Transfe r Cluster Monitorin g API Auto scaling Group Encrypted transfer Not shown… Access control Auto scaling Group NoSQL ElastiCache RDS Logging SWF SQS Other Signed url/ SSE/ checksum STS S3 Glacier SES
  • 43. Partner with AWS to Innovate on Security AWS Controls AWS solution architects AWS professional services AWS IAM AWS premium support Agile trust zones (Security groups + VPC) AWS Trusted Advisor Standardized environments AWS Partner Network
  • 44. More Information – Where to Go Next .. • AWS Security Center (aws.amazon.com/security) • AWS security white paper • AWS security procedures • AWS Compliance website (aws.amazon.com/compliance) • • Third-party attestations, reports, and certifications • • AWS compliance white paper AWS assurance programs Contact us • Contact your sales team • AWS help and support center
  • 45. Please give us your feedback on this presentation MED 401 As a thank you, we will select prize winners daily for completed surveys!