Your SlideShare is downloading. ×
T4 – Understanding aws security
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×
Saving this for later? Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime – even offline.
Text the download link to your phone
Standard text messaging rates apply

T4 – Understanding aws security

438

Published on



The AWS cloud infrastructure has been architected to be one of the most flexible and secure cloud computing environments available today. In this session, we’ll provide a practical understanding of the assurance programs that AWS provides; such as HIPAA, FedRAMP(SM), PCI DSS Level 1, MPAA and many others. We’ll also address the types of business solutions that these certifications enable you to deploy on the AWS Cloud, the tools and services AWS makes available to customers to secure and manage their resources and best practices on how to use them.

This session is recommended for anyone with questions about how AWS can meet the compliance requirements of their applications.

Published in: Technology
0 Comments
2 Likes
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
438
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
66
Comments
0
Likes
2
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. AWS Summit 2014 Understanding AWS Security Carlos Conde Head of EMEA Evangelism @caarlco
  • 2. Different customer viewpoints on security PR exec keep out of the news CEO protect shareholder value CI{S}O preserve the confidentiality, integrity and availability of data
  • 3. Security is Our No.1 Priority Comprehensive Security Capabilities to Support Virtually Any Workload PEOPLE & PROCEDURES NETWORK SECURITY PHYSICAL SECURITY PLATFORM SECURITY
  • 4. SECURITY IS SHARED
  • 5. WHAT NEEDS TO BE DONE TO KEEP THE SYSTEM SAFE
  • 6. WHAT WE DO WHAT YOU HAVE TO DO
  • 7. SOC CONTROL OBJECTIVES 1. SECURITY ORGANIZATION 2. AMAZON USER ACCESS 3. LOGICAL SECURITY 4. SECURE DATA HANDLING 5. PHYSICAL SECURITY AND ENV. SAFEGUARDS 6. CHANGE MANAGEMENT 7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY 8. INCIDENT HANDLING
  • 8. YOUR DATA IS YOUR MOST IMPORTANT ASSET IF YOUR DATA IS NOT SECURE, YOU’RE NOT SECURE
  • 9. NETWORK SECURITY
  • 10. “GAME DAYS” INSERT ARTIFICIAL SECURITY INCIDENTS. MEASURE SPEED OF DETECTION AND EXECUTION.
  • 11. EVERY CUSTOMER HAS ACCESS TO THE SAME SECURITY CAPABILITIES CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS
  • 12. AWS SECURITY OFFERS MORE VISIBILITY AUDITABILITY CONTROL
  • 13. MORE VISIBILITY
  • 14. CAN YOU MAP YOUR NETWORK? WHAT IS IN YOUR ENVIRONMENT RIGHT NOW?
  • 15. TRUSTED ADVISOR
  • 16. MORE AUDITABILITY
  • 17. AWS CLOUDTRAIL
  • 18. You are making API calls... On a growing set of services around the world… CloudTrail is continuously recording API calls… And delivering log files to you
  • 19. Security Analysis Use log files as an input into log management and analysis solutions to perform security analysis and to detect user behavior patterns. Track Changes to AWS Resources Track creation, modification, and deletion of AWS resources such as Amazon EC2 instances, Amazon VPC security groups and Amazon EBS volumes. Troubleshoot Operational Issues Quickly identify the most recent changes made to resources in your environment. Compliance Aid Easier to demonstrate compliance with internal policies and regulatory standards.
  • 20. LOGS OBTAINED, RETAINED, ANALYZED
  • 21. PROTECT YOUR LOGS WITH IAM ARCHIVE YOUR LOGS
  • 22. VULNERABILITY & PENETRATION TESTING
  • 23. VULNERABILITY & PENETRATION TESTING
  • 24. MORE CONTROL
  • 25. LEAST PRIVILEGE PRINCIPLE CONFINE ROLES ONLY TO THE MATERIAL REQUIRED TO DO A SPECIFIC WORK
  • 26. AWS STAFF ACCESS ‣  Staff vetting ‣  Staff has no logical access to customer instances ‣  Staff control-plane access limited & monitored Bastion hosts, Least privileged model, Zoned data center access ‣  Business needs ‣  Separate PAMS
  • 27. USE SEPARATE SETS OF CREDENTIALS
  • 28. USE AWS IAM IDENTITY & ACCESS MANAGEMENT
  • 29. CONTROL WHO CAN DO WHAT IN YOUR AWS ACCOUNT
  • 30. ACCESS TO SERVICE APIs
  • 31. Amazon DynamoDB Fine Grained Access Control Directly and securely access application data in Amazon DynamoDB Specify access permissions at table, item and attribute levels With Web Identity Federation, completely remove the need for proxy servers to perform authorization
  • 32. DEPLOYMENT PROCESS HAS TO BE CONSTRAINED
  • 33. DEV & TEST ENVIRONMENT AWS ACCOUNT A PRODUCTION ENVIRONMENT AWS ACCOUNT B
  • 34. “If you need to SSH into your instance, your deployment process is broken.”
  • 35. VERSIONED AWS CLOUDFORMATION SCRIPTS + AWS OPSWORKS
  • 36. MORE CONTROL ON YOUR DATA
  • 37. MFA PROTECTION
  • 38. YOUR DATA STAYS WHERE YOU PUT IT
  • 39. USE MULTIPLE AZs AMAZON S3 AMAZON DYNAMODB AMAZON RDS MULTI-AZ AMAZON EBS SNAPSHOTS
  • 40. DATA ENCRYPTION CHOOSE WHAT’S RIGHT FOR YOU: Automated – AWS manages encryption Enabled – user manages encryption using AWS Client-side – user manages encryption using their own mean
  • 41. ENCRYPT YOUR DATA AWS CLOUDHSM AMAZON S3 SSE AMAZON GLACIER AMAZON REDSHIFT AMAZON RDS …
  • 42. MORE AUDITABILITY MORE VISIBILITY MORE CONTROL
  • 43. “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers” Tom Soderstrom – CTO – NASA JPL
  • 44. AWS.AMAZON.COM/SECURITY
  • 45. AWS SECURITY WHITEPAPERS RISK & COMPLIANCE AUDITING SECURITY CHECKLIST SECURITY PROCESSES SECURITY BEST PRACTICES
  • 46. Thank You! AWS EXPERT? GET CERTIFIED! aws.amazon.com/certification Carlos Conde Head of EMEA Evangelism @caarlco

×