SlideShare a Scribd company logo
1 of 40
Download to read offline
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS re:INVENT
Big Data, AWS, and Security
How FINRA Secures Its Big Data and Data
Science Platform on AWS
V i n c e n t S a u l y s
D a v i d Y a c o n o
A B D 3 1 0
N o v e m b e r 2 9 , 2 0 1 7
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Who is FINRA?
• Financial Industry Regulatory Authority.
• Our Mission: “Investor Protection—Market Integrity.”
• We are a private sector not-for-profit organization authorized by Congress to protect America’s
investors.
• We do this by:
• Writing and enforcing rules that govern the activities of 3,800 broker-dealers with 634,000 brokers.
• Examining firms for compliance with those rules.
• Fostering market transparency.
• Educating investors.
And most significant to this discussion:
• FINRA uses big data and data science technologies to detect and analyze fraud, market manipulation,
and insider trading across US capital markets.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Over
25 PETABYTES
of storage
Market
reconstruction
containing
TRILLIONS
of nodes and edges
FINRA Technology
Innovating
to protect investors and ensure market integrity
3 - 4 years
QUERYABLE
data online
4 years
ARCHIVAL
storage
Up to
75 BILLION
events
per day
BUY
SELL
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Session takeaways
• Learn to be realistic in your risk assessment of
using the cloud.
• Learn about Amazon Web Services and its
foundational security controls and practices
relevant to safeguarding your big data workloads.
• See how FINRA securely enables our data
scientists, and other big data projects, in AWS by
achieving a balance between productivity and
security.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data science needs
• Data discovery and exploration.
• Bring disparate sources of data together.
• Semantic understanding of the data sets.
• Ease of use: Enable users without having to understand underlying
data infrastructure.
• Safeguard information with a high degree of security and least
privileges access.
• Model migration from research to prototype to production.
• Avoid time spent on environment administration.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Lake
Diver MIRS DOMT Ad-Hoc FOLA Marketspace
Crosstab UI
personal marts
with billons of
rows
Domain-specific
interactive reports
and visualizations
Visualize
depth of market
over time
Investigation
and data profiling
via SQL
Retrieve market
events to render
order lifecycle
Exception and
alert viewer
Interactive big data portfolio
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Threat sources: Private data center
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Threat sources: Cloud-based architecture
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Evaluating the risk
Key factors
Compare risk of alternatives
• Cloud vs. legacy data center
• The “idealized zero-risk scenario” is unrealistic.
• Legacy data centers have risk!
Evaluate risk in context
• “Cloud” risks get the most press.
• Many existing risks are unchanged by adoption of cloud.
• Many existing risks are significantly “riskier” than new “cloud”
risks.
• The “unknown” creates a powerful perception of risk.
Cybersecurity is only one dimension of risk
• Operational, legal, and opportunity risks as well
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shared responsibility model plus
Security “ABOVE” the cloud
• All the security controls
you’re already using.
Security “IN” the cloud
• Controls to supplement
Cloud Service Provider
(CSP) controls.
Security “OF” the cloud
• CSP provides these controls.
Customer due diligence through
third-party risk management.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• AWS security best practices
• Access management
• Authentication
• Authorization/Separation of Duties
(SoD)
• Policy enforcement and oversight
• Logging/monitoring/alerting/UEBA
• Controls for Economic DoS
• Network architecture
• Encryption and Key Management (KMS)
• Governance
Foundational security controls
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Access mgmt: Human
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Access mgmt: Machine
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Access mgmt: Robust SoD
Almost 100,000 entitlements
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Access mgmt: Entitlements
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Secrets management
• Credstash: Application Credential
Vault
• Minimize Exposure of privileged
credentials
• Secrets stored in Dynamo DB;
Encrypted with KMS
• Resource/Object Owner
creates/stores Secrets
• Automation deploys secrets to
Subject
• IAM Role limits secrets access
• Minimum exposure of credentials
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Pervasive logging
Depth
• AWS service layer (AWS CloudTrail)
• OS (Splunk agent in Amazon EC2 AMI)
• Platform layer
• FINRA Platforms of course
• Amazon EMR – Splunk agent for underlying
Amazon EC2 bootstrapped into cluster launch
• Application layer
Breadth
• AWS CloudTrail logging is robust.
Logging, monitoring, and alerting
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Logging, monitoring, and alerting
Avoid Economic DoS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• Architecture distributed across multiple
Availability Zones
• Cross-region replication used where:
• Geographic dispersion is needed
• Single region data durability is not
considered sufficient
Network architecture
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Encryption and AWS KMS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security governance
Security controls must comply and enhance the organization’s overall governance policies.
FINRA Cybersecurity has a uniform process for creating and updating governance policies and
standards.
FINRA Cybersecurity governance policies and standards are approved and monitored by
• Cloud Compliance Working Group (CCWG)
• Infrastructure Security Posture Review
• Information Security Steering Committee
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AMI updates
• Created at least monthly
• Plus out-of-cycle for critical security
patches
• Start: Latest Amazon AMI
• Harden: Remove unneeded packages,
update remaining packages (security
patches) [Yum], apply compliance modules
[Puppet]
• Extend: Install common tools (AWS CLI,
Puppet agent, Splunk agent, Trend Micro
agent, etc.);
• Snapshot new AMI.
Security Groups
• Goals:
• Narrowly crafted (microsegmentation),
• Policy of least privilege,
• Separation of Duties
• Challenges: Many groups to manage!
• Solution: FINRA Portus
Strictly Limited Access
• Goal: No access to production.
• Reality: Occasional prod access may be needed
• Modified Goals: Temporary, just-in-time access
• Restricted by IAM Role, AWS Tag
• Approved and Logged
• Solution: FINRA Gatekeeper
Securing the services—Amazon EC2
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security group mgmt: Portus
FINRA-developed Centralized Security Groups Management tool for Developers and the
FINRA Cyber & Information Security Department
• Cyber & Information Security DEFINE security policies
• Developers SELF MANAGE AGS security groups
• Maximizes FLEXIBILITY for developers
• SIMPLIFIES administration for InfoSec
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Portus dashboard
Security Policy for each type of logical system
Policy is a set of Whitelisted Rules (inbound and outbound)
Only these Whitelisted Rules are allowed in Security Groups
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Only rules Whitelisted in the policy allowed
Only five Security Groups allowed per AGS
Portus developer dashboard
Select AGS from drop down list
Create Security Group by selecting a Policy
Access only to the AGS owned by developer (priv_aws_<AGS>_dev_d AD group)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Gatekeeper (High level)
GATEKEEPER
APP
Users
Call SSM
on VPC
Store request
data
Search EC2 &
AWS API
SSM
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Gatekeeper detailed
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Securing the services–Amazon S3
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• AWS::EMR::SecurityConfiguration
• At-rest encryption
• Local volumes (LUKS), HDFS
encryption
• In-transit encryption
• Inter-node: Spark/Presto/Hive
(TLS). HBase in 2018?
• EMR-S3: EMRFS/TLS
Securing big data services–Amazon EMR
• Logging–Splunk agent in bootstrap:
• JobCode ID, project code logged
• Access Controls
• No access to underlying cluster. (App
layer AuthN/AuthZ)
• Gatekeeper for admin access (rare)
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data sanitization
• One-way hash/tokenization
Preserves ability to associate related
records by the sensitive data element,
search on tokenized values
• Format-preserving encryption
Preserves ability to associate related
records, some limited ability to operate on
data (search, sort, categorize)
• Generalization, subsetting
• De-identification
• Be wary of re-identification strategies
Limit Credential Exposure
• IAM Role-based access is ideal
• Secrets Management (Credstash)
Make Security Easy
• Internal mirrors of external resources
preserves isolation
• Empower users, managers with
utilization/cost information, necessary
entitlements to provide oversight.
Securing the architecture
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
• The same security policies apply to all
systems within the organization.
• Risks must be identified and mitigated.
• Sufficient controls need to be in place to
protect the work being done.
• Security should not get in the way of getting
the work done.
• When possible, use security tools to make
doing the right thing the easiest thing.
P r o d u c t i vi t yS e c u r i t y
Striking a balance
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data science tooling before UDSP
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data science platform V1
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security & productivity collide
Users were fine if they only needed what the system provided.
Users, unfortunately, may NEED to add packages/libraries.
How did one add new packages/libraries with V1?
• The official way
1. Put in a request to Technology
2. Technology downloads, builds, and bundles into next release
3. Available when a release deploys
• The unofficial way
1. Download package to local machine
2. Upload to cloud
3. Build and install to instance
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What went wrong?
Needs driven by technology
• IT: Reduce costs
• Users: Need more compute
Secure but inflexible
• Local machines were more flexible
• Install any package and experiment
Data availability
• On-premises databases not reachable
Setup still required
• Driver configuration to connect to databases
Technology in the way
• Technology required to install any new package
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Universal Data Science Platform
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Completely self service, no Technology
administration
• Users select UDSP version and machine capacity
Users associated to groups
• Users manage their instances
• AWS billing tags and machine selection choices to
group
Create, stop, terminate (delete)
• Managers can administer their teams’ instances
Dashboard to monitor resource usage
• Stop instances from the dashboard
Reports for historical usage
What went right?
USAGE INCREASED
20 FOLD!!!!
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Recap
• Be realistic in your risk assessment. The
security risks in using your own data
center are equal to or more than going to
the cloud.
• Use of strong foundational cloud
security controls is paramount.
• AWS provides controls which, when
properly applied, balance productivity and
security.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Related FINRA presentations
2017 re:INVENT
• SID326 - AWS Security State of the Union
Steve Schmidt, chief information security officer of AWS, addresses the current state of security in the cloud. As part of t his presentation, John Brady
(CISO of FINRA) shares the FINRA journey to the cloud. Wednesday, Nov 29, 12:15 p.m. – 1:15 p.m. MGM, Level 3, Premier Ballroom 316
• FSV307 - Capital Markets Discovery: How FINRA Runs Trade Analytics and Surveillance on AWS
The FINRA analytics platform unlocks the value in capital markets data by accelerating trade analytics and providing a founda tion for machine learning at
scale. Monday, Nov 27, 10:45 a.m. – 11:45 a.m. Venetian, Level 5, Palazzo P
• ENT328 - FINRA's Managed Data Lake: Next-Gen Analytics in the Cloud
The Financial Impact Regulatory Authority (FINRA) Technology Group has changed its customers' relationships with data by crea ting a managed data lake
Thursday, Nov 30, 1 p.m. – 2 p.m. MGM, Level 3, Premier Ballroom 319
• DEV335 - Manage Infrastructure Securely at Scale and Eliminate Operational Risks
Managing AWS and hybrid environments securely and safely while having actionable insights is an operational priority and busi ness driver for all
customers. Thursday, Nov 30, 4 p.m. – 4 p.m. Venetian, Level 2, Venetian E
2016 re:INVENT
• BDM203: Building a Secure Data Science Platform on AWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!
T o l e a r n m o r e : t e c h n o l o g y . f i n r a . o r g

More Related Content

What's hot

Optimising Cost and Efficiency on AWS
Optimising Cost and Efficiency on AWSOptimising Cost and Efficiency on AWS
Optimising Cost and Efficiency on AWSAmazon Web Services
 
STG206_Big Data Data Lakes and Data Oceans
STG206_Big Data Data Lakes and Data OceansSTG206_Big Data Data Lakes and Data Oceans
STG206_Big Data Data Lakes and Data OceansAmazon Web Services
 
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...Amazon Web Services
 
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...Amazon Web Services
 
AWS Commercial Management and Cost Optimisation - Dec 2017
AWS Commercial Management and Cost Optimisation - Dec 2017AWS Commercial Management and Cost Optimisation - Dec 2017
AWS Commercial Management and Cost Optimisation - Dec 2017Amazon Web Services
 
ABD201-Big Data Architectural Patterns and Best Practices on AWS
ABD201-Big Data Architectural Patterns and Best Practices on AWSABD201-Big Data Architectural Patterns and Best Practices on AWS
ABD201-Big Data Architectural Patterns and Best Practices on AWSAmazon Web Services
 
DAT310_Which Database to Use When
DAT310_Which Database to Use WhenDAT310_Which Database to Use When
DAT310_Which Database to Use WhenAmazon Web Services
 
Deployment of SAP Solutions on AWS (Level 200)
Deployment of SAP Solutions on AWS (Level 200)Deployment of SAP Solutions on AWS (Level 200)
Deployment of SAP Solutions on AWS (Level 200)Amazon Web Services
 
DAT322_The Nanoservices Architecture That Powers BBC Online
DAT322_The Nanoservices Architecture That Powers BBC OnlineDAT322_The Nanoservices Architecture That Powers BBC Online
DAT322_The Nanoservices Architecture That Powers BBC OnlineAmazon Web Services
 
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise Workloads
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise WorkloadsDAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise Workloads
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise WorkloadsAmazon Web Services
 
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...Amazon Web Services
 
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...Amazon Web Services
 
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWS
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWSGPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWS
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWSAmazon Web Services
 
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017Amazon Web Services
 
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at Scale
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at ScaleDEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at Scale
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at ScaleAmazon Web Services
 
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...Amazon Web Services
 
SRV334-Making Things Right with AWS Config Rules and AWS Lambda
SRV334-Making Things Right with AWS Config Rules and AWS LambdaSRV334-Making Things Right with AWS Config Rules and AWS Lambda
SRV334-Making Things Right with AWS Config Rules and AWS LambdaAmazon Web Services
 
ABD215_Serverless Data Prep with AWS Glue
ABD215_Serverless Data Prep with AWS GlueABD215_Serverless Data Prep with AWS Glue
ABD215_Serverless Data Prep with AWS GlueAmazon Web Services
 
ENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsAmazon Web Services
 

What's hot (20)

Optimising Cost and Efficiency on AWS
Optimising Cost and Efficiency on AWSOptimising Cost and Efficiency on AWS
Optimising Cost and Efficiency on AWS
 
STG206_Big Data Data Lakes and Data Oceans
STG206_Big Data Data Lakes and Data OceansSTG206_Big Data Data Lakes and Data Oceans
STG206_Big Data Data Lakes and Data Oceans
 
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...
DAT339_Replicate, Analyze, and Visualize Datasets Using AWS Database Migratio...
 
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...
MSC203_How Citrix Uses AWS Marketplace Solutions To Accelerate Analytic Workl...
 
AWS Commercial Management and Cost Optimisation - Dec 2017
AWS Commercial Management and Cost Optimisation - Dec 2017AWS Commercial Management and Cost Optimisation - Dec 2017
AWS Commercial Management and Cost Optimisation - Dec 2017
 
ABD201-Big Data Architectural Patterns and Best Practices on AWS
ABD201-Big Data Architectural Patterns and Best Practices on AWSABD201-Big Data Architectural Patterns and Best Practices on AWS
ABD201-Big Data Architectural Patterns and Best Practices on AWS
 
DAT310_Which Database to Use When
DAT310_Which Database to Use WhenDAT310_Which Database to Use When
DAT310_Which Database to Use When
 
Deployment of SAP Solutions on AWS (Level 200)
Deployment of SAP Solutions on AWS (Level 200)Deployment of SAP Solutions on AWS (Level 200)
Deployment of SAP Solutions on AWS (Level 200)
 
DAT322_The Nanoservices Architecture That Powers BBC Online
DAT322_The Nanoservices Architecture That Powers BBC OnlineDAT322_The Nanoservices Architecture That Powers BBC Online
DAT322_The Nanoservices Architecture That Powers BBC Online
 
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise Workloads
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise WorkloadsDAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise Workloads
DAT332_How Verizon is Adopting Amazon Aurora PostgreSQL for Enterprise Workloads
 
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...
Deep Dive on Data Archiving in Amazon S3 & Amazon Glacier, with Special Guest...
 
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...
GPSTEC313_GPS Real-Time Data Processing with AWS Lambda Quickly, at Scale, an...
 
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWS
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWSGPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWS
GPSWKS407-Strategies for Migrating Microsoft SQL Databases to AWS
 
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017
Migrating Large Scale Data Sets to the Cloud - STG204 - re:Invent 2017
 
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at Scale
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at ScaleDEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at Scale
DEV333_Using Amazon CloudWatch for Amazon ECS Resource Monitoring at Scale
 
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...
Best Practices for Building a Data Lake in Amazon S3 and Amazon Glacier, with...
 
SRV334-Making Things Right with AWS Config Rules and AWS Lambda
SRV334-Making Things Right with AWS Config Rules and AWS LambdaSRV334-Making Things Right with AWS Config Rules and AWS Lambda
SRV334-Making Things Right with AWS Config Rules and AWS Lambda
 
ABD215_Serverless Data Prep with AWS Glue
ABD215_Serverless Data Prep with AWS GlueABD215_Serverless Data Prep with AWS Glue
ABD215_Serverless Data Prep with AWS Glue
 
ENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale MigrationsENT212-An Overview of Best Practices for Large-Scale Migrations
ENT212-An Overview of Best Practices for Large-Scale Migrations
 
Optimising for SAP HANA on AWS
Optimising for SAP HANA on AWSOptimising for SAP HANA on AWS
Optimising for SAP HANA on AWS
 

Similar to ABD310 big data aws and security no notes

How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWSAmazon Web Services
 
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Amazon Web Services
 
GPSBUS214-Key Considerations for Cloud Procurement in the Public Sector
GPSBUS214-Key Considerations for Cloud Procurement in the Public SectorGPSBUS214-Key Considerations for Cloud Procurement in the Public Sector
GPSBUS214-Key Considerations for Cloud Procurement in the Public SectorAmazon Web Services
 
Achieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWSAchieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWSAmazon Web Services
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWSAmazon Web Services
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert LogicAmazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkAmazon Web Services
 
SID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategySID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategyAmazon Web Services
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Amazon Web Services
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAmazon Web Services
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooAmazon Web Services
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Amazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Amazon Web Services
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduVladimir Simek
 
Managing Microsoft Workloads on AWS.pdf
Managing Microsoft Workloads on AWS.pdfManaging Microsoft Workloads on AWS.pdf
Managing Microsoft Workloads on AWS.pdfAmazon Web Services
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAmazon Web Services
 

Similar to ABD310 big data aws and security no notes (20)

AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...
Best Practices for Implementing Your Encryption Strategy Using AWS Key Manage...
 
GPSBUS214-Key Considerations for Cloud Procurement in the Public Sector
GPSBUS214-Key Considerations for Cloud Procurement in the Public SectorGPSBUS214-Key Considerations for Cloud Procurement in the Public Sector
GPSBUS214-Key Considerations for Cloud Procurement in the Public Sector
 
Achieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWSAchieving Compliance and Selling to Regulated Markets on AWS
Achieving Compliance and Selling to Regulated Markets on AWS
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
SID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account StrategySID331_Architecting Security and Governance Across a Multi-Account Strategy
SID331_Architecting Security and Governance Across a Multi-Account Strategy
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
AWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About ComplianceAWS Security Week: Why Your Customers Care About Compliance
AWS Security Week: Why Your Customers Care About Compliance
 
Amazon Macie Demo
Amazon Macie DemoAmazon Macie Demo
Amazon Macie Demo
 
Why Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should TooWhy Your Customers Care About Compliance and You Should Too
Why Your Customers Care About Compliance and You Should Too
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
Managing Microsoft Workloads on AWS.pdf
Managing Microsoft Workloads on AWS.pdfManaging Microsoft Workloads on AWS.pdf
Managing Microsoft Workloads on AWS.pdf
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDRafezzaman
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhijennyeacort
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...Boston Institute of Analytics
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Seán Kennedy
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...ssuserf63bd7
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Thomas Poetter
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max PrincetonTimothy Spann
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degreeyuu sss
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理e4aez8ss
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxMike Bennett
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhYasamin16
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...Amil Baba Dawood bangali
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGIThomas Poetter
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanMYRABACSAFRA2
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesTimothy Spann
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)jennyeacort
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxellehsormae
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxaleedritatuxx
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfBoston Institute of Analytics
 

Recently uploaded (20)

INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTDINTERNSHIP ON PURBASHA COMPOSITE TEX LTD
INTERNSHIP ON PURBASHA COMPOSITE TEX LTD
 
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝DelhiRS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
RS 9000 Call In girls Dwarka Mor (DELHI)⇛9711147426🔝Delhi
 
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
NLP Data Science Project Presentation:Predicting Heart Disease with NLP Data ...
 
Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...Student profile product demonstration on grades, ability, well-being and mind...
Student profile product demonstration on grades, ability, well-being and mind...
 
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
Statistics, Data Analysis, and Decision Modeling, 5th edition by James R. Eva...
 
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
Minimizing AI Hallucinations/Confabulations and the Path towards AGI with Exa...
 
Real-Time AI Streaming - AI Max Princeton
Real-Time AI  Streaming - AI Max PrincetonReal-Time AI  Streaming - AI Max Princeton
Real-Time AI Streaming - AI Max Princeton
 
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
毕业文凭制作#回国入职#diploma#degree澳洲中央昆士兰大学毕业证成绩单pdf电子版制作修改#毕业文凭制作#回国入职#diploma#degree
 
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
科罗拉多大学波尔得分校毕业证学位证成绩单-可办理
 
Semantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptxSemantic Shed - Squashing and Squeezing.pptx
Semantic Shed - Squashing and Squeezing.pptx
 
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhhThiophen Mechanism khhjjjjjjjhhhhhhhhhhh
Thiophen Mechanism khhjjjjjjjhhhhhhhhhhh
 
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
NO1 Certified Black Magic Specialist Expert Amil baba in Lahore Islamabad Raw...
 
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGILLMs, LMMs, their Improvement Suggestions and the Path towards AGI
LLMs, LMMs, their Improvement Suggestions and the Path towards AGI
 
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
Deep Generative Learning for All - The Gen AI Hype (Spring 2024)
 
Identifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population MeanIdentifying Appropriate Test Statistics Involving Population Mean
Identifying Appropriate Test Statistics Involving Population Mean
 
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming PipelinesConf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
Conf42-LLM_Adding Generative AI to Real-Time Streaming Pipelines
 
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
Call Us ➥97111√47426🤳Call Girls in Aerocity (Delhi NCR)
 
Vision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptxVision, Mission, Goals and Objectives ppt..pptx
Vision, Mission, Goals and Objectives ppt..pptx
 
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptxmodul pembelajaran robotic Workshop _ by Slidesgo.pptx
modul pembelajaran robotic Workshop _ by Slidesgo.pptx
 
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdfPredicting Salary Using Data Science: A Comprehensive Analysis.pdf
Predicting Salary Using Data Science: A Comprehensive Analysis.pdf
 

ABD310 big data aws and security no notes

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS re:INVENT Big Data, AWS, and Security How FINRA Secures Its Big Data and Data Science Platform on AWS V i n c e n t S a u l y s D a v i d Y a c o n o A B D 3 1 0 N o v e m b e r 2 9 , 2 0 1 7
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Who is FINRA? • Financial Industry Regulatory Authority. • Our Mission: “Investor Protection—Market Integrity.” • We are a private sector not-for-profit organization authorized by Congress to protect America’s investors. • We do this by: • Writing and enforcing rules that govern the activities of 3,800 broker-dealers with 634,000 brokers. • Examining firms for compliance with those rules. • Fostering market transparency. • Educating investors. And most significant to this discussion: • FINRA uses big data and data science technologies to detect and analyze fraud, market manipulation, and insider trading across US capital markets.
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Over 25 PETABYTES of storage Market reconstruction containing TRILLIONS of nodes and edges FINRA Technology Innovating to protect investors and ensure market integrity 3 - 4 years QUERYABLE data online 4 years ARCHIVAL storage Up to 75 BILLION events per day BUY SELL
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Session takeaways • Learn to be realistic in your risk assessment of using the cloud. • Learn about Amazon Web Services and its foundational security controls and practices relevant to safeguarding your big data workloads. • See how FINRA securely enables our data scientists, and other big data projects, in AWS by achieving a balance between productivity and security.
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data science needs • Data discovery and exploration. • Bring disparate sources of data together. • Semantic understanding of the data sets. • Ease of use: Enable users without having to understand underlying data infrastructure. • Safeguard information with a high degree of security and least privileges access. • Model migration from research to prototype to production. • Avoid time spent on environment administration.
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Lake Diver MIRS DOMT Ad-Hoc FOLA Marketspace Crosstab UI personal marts with billons of rows Domain-specific interactive reports and visualizations Visualize depth of market over time Investigation and data profiling via SQL Retrieve market events to render order lifecycle Exception and alert viewer Interactive big data portfolio
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Threat sources: Private data center
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Threat sources: Cloud-based architecture
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Evaluating the risk Key factors Compare risk of alternatives • Cloud vs. legacy data center • The “idealized zero-risk scenario” is unrealistic. • Legacy data centers have risk! Evaluate risk in context • “Cloud” risks get the most press. • Many existing risks are unchanged by adoption of cloud. • Many existing risks are significantly “riskier” than new “cloud” risks. • The “unknown” creates a powerful perception of risk. Cybersecurity is only one dimension of risk • Operational, legal, and opportunity risks as well
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Shared responsibility model plus Security “ABOVE” the cloud • All the security controls you’re already using. Security “IN” the cloud • Controls to supplement Cloud Service Provider (CSP) controls. Security “OF” the cloud • CSP provides these controls. Customer due diligence through third-party risk management.
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • AWS security best practices • Access management • Authentication • Authorization/Separation of Duties (SoD) • Policy enforcement and oversight • Logging/monitoring/alerting/UEBA • Controls for Economic DoS • Network architecture • Encryption and Key Management (KMS) • Governance Foundational security controls
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Access mgmt: Human
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Access mgmt: Machine
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Access mgmt: Robust SoD Almost 100,000 entitlements
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Access mgmt: Entitlements
  • 16. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Secrets management • Credstash: Application Credential Vault • Minimize Exposure of privileged credentials • Secrets stored in Dynamo DB; Encrypted with KMS • Resource/Object Owner creates/stores Secrets • Automation deploys secrets to Subject • IAM Role limits secrets access • Minimum exposure of credentials
  • 17. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Pervasive logging Depth • AWS service layer (AWS CloudTrail) • OS (Splunk agent in Amazon EC2 AMI) • Platform layer • FINRA Platforms of course • Amazon EMR – Splunk agent for underlying Amazon EC2 bootstrapped into cluster launch • Application layer Breadth • AWS CloudTrail logging is robust. Logging, monitoring, and alerting
  • 18. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Logging, monitoring, and alerting Avoid Economic DoS
  • 19. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • Architecture distributed across multiple Availability Zones • Cross-region replication used where: • Geographic dispersion is needed • Single region data durability is not considered sufficient Network architecture
  • 20. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Encryption and AWS KMS
  • 21. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security governance Security controls must comply and enhance the organization’s overall governance policies. FINRA Cybersecurity has a uniform process for creating and updating governance policies and standards. FINRA Cybersecurity governance policies and standards are approved and monitored by • Cloud Compliance Working Group (CCWG) • Infrastructure Security Posture Review • Information Security Steering Committee
  • 22. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AMI updates • Created at least monthly • Plus out-of-cycle for critical security patches • Start: Latest Amazon AMI • Harden: Remove unneeded packages, update remaining packages (security patches) [Yum], apply compliance modules [Puppet] • Extend: Install common tools (AWS CLI, Puppet agent, Splunk agent, Trend Micro agent, etc.); • Snapshot new AMI. Security Groups • Goals: • Narrowly crafted (microsegmentation), • Policy of least privilege, • Separation of Duties • Challenges: Many groups to manage! • Solution: FINRA Portus Strictly Limited Access • Goal: No access to production. • Reality: Occasional prod access may be needed • Modified Goals: Temporary, just-in-time access • Restricted by IAM Role, AWS Tag • Approved and Logged • Solution: FINRA Gatekeeper Securing the services—Amazon EC2
  • 23. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security group mgmt: Portus FINRA-developed Centralized Security Groups Management tool for Developers and the FINRA Cyber & Information Security Department • Cyber & Information Security DEFINE security policies • Developers SELF MANAGE AGS security groups • Maximizes FLEXIBILITY for developers • SIMPLIFIES administration for InfoSec
  • 24. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Portus dashboard Security Policy for each type of logical system Policy is a set of Whitelisted Rules (inbound and outbound) Only these Whitelisted Rules are allowed in Security Groups
  • 25. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Only rules Whitelisted in the policy allowed Only five Security Groups allowed per AGS Portus developer dashboard Select AGS from drop down list Create Security Group by selecting a Policy Access only to the AGS owned by developer (priv_aws_<AGS>_dev_d AD group)
  • 26. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Gatekeeper (High level) GATEKEEPER APP Users Call SSM on VPC Store request data Search EC2 & AWS API SSM
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Gatekeeper detailed
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Securing the services–Amazon S3
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • AWS::EMR::SecurityConfiguration • At-rest encryption • Local volumes (LUKS), HDFS encryption • In-transit encryption • Inter-node: Spark/Presto/Hive (TLS). HBase in 2018? • EMR-S3: EMRFS/TLS Securing big data services–Amazon EMR • Logging–Splunk agent in bootstrap: • JobCode ID, project code logged • Access Controls • No access to underlying cluster. (App layer AuthN/AuthZ) • Gatekeeper for admin access (rare)
  • 30. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data sanitization • One-way hash/tokenization Preserves ability to associate related records by the sensitive data element, search on tokenized values • Format-preserving encryption Preserves ability to associate related records, some limited ability to operate on data (search, sort, categorize) • Generalization, subsetting • De-identification • Be wary of re-identification strategies Limit Credential Exposure • IAM Role-based access is ideal • Secrets Management (Credstash) Make Security Easy • Internal mirrors of external resources preserves isolation • Empower users, managers with utilization/cost information, necessary entitlements to provide oversight. Securing the architecture
  • 31. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. • The same security policies apply to all systems within the organization. • Risks must be identified and mitigated. • Sufficient controls need to be in place to protect the work being done. • Security should not get in the way of getting the work done. • When possible, use security tools to make doing the right thing the easiest thing. P r o d u c t i vi t yS e c u r i t y Striking a balance
  • 32. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data science tooling before UDSP
  • 33. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data science platform V1
  • 34. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security & productivity collide Users were fine if they only needed what the system provided. Users, unfortunately, may NEED to add packages/libraries. How did one add new packages/libraries with V1? • The official way 1. Put in a request to Technology 2. Technology downloads, builds, and bundles into next release 3. Available when a release deploys • The unofficial way 1. Download package to local machine 2. Upload to cloud 3. Build and install to instance
  • 35. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What went wrong? Needs driven by technology • IT: Reduce costs • Users: Need more compute Secure but inflexible • Local machines were more flexible • Install any package and experiment Data availability • On-premises databases not reachable Setup still required • Driver configuration to connect to databases Technology in the way • Technology required to install any new package
  • 36. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Universal Data Science Platform
  • 37. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Completely self service, no Technology administration • Users select UDSP version and machine capacity Users associated to groups • Users manage their instances • AWS billing tags and machine selection choices to group Create, stop, terminate (delete) • Managers can administer their teams’ instances Dashboard to monitor resource usage • Stop instances from the dashboard Reports for historical usage What went right? USAGE INCREASED 20 FOLD!!!!
  • 38. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Recap • Be realistic in your risk assessment. The security risks in using your own data center are equal to or more than going to the cloud. • Use of strong foundational cloud security controls is paramount. • AWS provides controls which, when properly applied, balance productivity and security.
  • 39. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Related FINRA presentations 2017 re:INVENT • SID326 - AWS Security State of the Union Steve Schmidt, chief information security officer of AWS, addresses the current state of security in the cloud. As part of t his presentation, John Brady (CISO of FINRA) shares the FINRA journey to the cloud. Wednesday, Nov 29, 12:15 p.m. – 1:15 p.m. MGM, Level 3, Premier Ballroom 316 • FSV307 - Capital Markets Discovery: How FINRA Runs Trade Analytics and Surveillance on AWS The FINRA analytics platform unlocks the value in capital markets data by accelerating trade analytics and providing a founda tion for machine learning at scale. Monday, Nov 27, 10:45 a.m. – 11:45 a.m. Venetian, Level 5, Palazzo P • ENT328 - FINRA's Managed Data Lake: Next-Gen Analytics in the Cloud The Financial Impact Regulatory Authority (FINRA) Technology Group has changed its customers' relationships with data by crea ting a managed data lake Thursday, Nov 30, 1 p.m. – 2 p.m. MGM, Level 3, Premier Ballroom 319 • DEV335 - Manage Infrastructure Securely at Scale and Eliminate Operational Risks Managing AWS and hybrid environments securely and safely while having actionable insights is an operational priority and busi ness driver for all customers. Thursday, Nov 30, 4 p.m. – 4 p.m. Venetian, Level 2, Venetian E 2016 re:INVENT • BDM203: Building a Secure Data Science Platform on AWS
  • 40. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you! T o l e a r n m o r e : t e c h n o l o g y . f i n r a . o r g