Submit Search
Upload
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
•
0 likes
•
284 views
Amazon Web Services
Follow
Top Cloud Security Myths presented at AWS Initiate Day in Dublin on April 11, 2019.
Read less
Read more
Report
Share
Report
Share
1 of 45
Download now
Download to read offline
Recommended
AWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - Plenary
Amazon Web Services
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
Amazon Web Services
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
Amazon Web Services
Initiate Edinburgh 2019 - Moving to DevOps the Amazon Way
Initiate Edinburgh 2019 - Moving to DevOps the Amazon Way
Amazon Web Services
Initiate Edinburgh 2019 - Migrating Data to the Cloud
Initiate Edinburgh 2019 - Migrating Data to the Cloud
Amazon Web Services
AWS Initiate Day Dublin 2019 – The Culture of Innovation at Amazon
AWS Initiate Day Dublin 2019 – The Culture of Innovation at Amazon
Amazon Web Services
Elevate your security with the cloud
Elevate your security with the cloud
Amazon Web Services
AWS Initiate Day Dublin 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Dublin 2019 – Moving to DevOps the Amazon Way
Amazon Web Services
Recommended
AWS Initiate Day Dublin 2019 - Plenary
AWS Initiate Day Dublin 2019 - Plenary
Amazon Web Services
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
Amazon Web Services
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
AWS Initiate Day Dublin 2019 – Migrating Data to the Cloud
Amazon Web Services
Initiate Edinburgh 2019 - Moving to DevOps the Amazon Way
Initiate Edinburgh 2019 - Moving to DevOps the Amazon Way
Amazon Web Services
Initiate Edinburgh 2019 - Migrating Data to the Cloud
Initiate Edinburgh 2019 - Migrating Data to the Cloud
Amazon Web Services
AWS Initiate Day Dublin 2019 – The Culture of Innovation at Amazon
AWS Initiate Day Dublin 2019 – The Culture of Innovation at Amazon
Amazon Web Services
Elevate your security with the cloud
Elevate your security with the cloud
Amazon Web Services
AWS Initiate Day Dublin 2019 – Moving to DevOps the Amazon Way
AWS Initiate Day Dublin 2019 – Moving to DevOps the Amazon Way
Amazon Web Services
Migrate and Modernize Your Database
Migrate and Modernize Your Database
Amazon Web Services
AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用
Amazon Web Services
Becoming A High Frequency Enterprise
Becoming A High Frequency Enterprise
Amazon Web Services
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Amazon Web Services
AWS AI and Machine Learning Journey
AWS AI and Machine Learning Journey
Amazon Web Services
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
Amazon Web Services
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
Amazon Web Services
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Amazon Web Services
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Amazon Web Services
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
Amazon Web Services
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
Amazon Web Services LATAM
The Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration Journey
Amazon Web Services
AWS Initiate Day Dublin 2019 – AWS Foundations
AWS Initiate Day Dublin 2019 – AWS Foundations
Amazon Web Services
Open Data on AWS
Open Data on AWS
Amazon Web Services
Keynote_AWS_BecomingAHighFrequencyEnterprise
Keynote_AWS_BecomingAHighFrequencyEnterprise
Amazon Web Services
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Amazon Web Services
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS Foundations
Amazon Web Services
‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms
Amazon Web Services
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Amazon Web Services
Moving to DevOps
Moving to DevOps
Amazon Web Services
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
More Related Content
What's hot
Migrate and Modernize Your Database
Migrate and Modernize Your Database
Amazon Web Services
AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用
Amazon Web Services
Becoming A High Frequency Enterprise
Becoming A High Frequency Enterprise
Amazon Web Services
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Amazon Web Services
AWS AI and Machine Learning Journey
AWS AI and Machine Learning Journey
Amazon Web Services
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
Amazon Web Services
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
Amazon Web Services
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Amazon Web Services
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Amazon Web Services
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
Amazon Web Services
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
Amazon Web Services LATAM
The Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration Journey
Amazon Web Services
AWS Initiate Day Dublin 2019 – AWS Foundations
AWS Initiate Day Dublin 2019 – AWS Foundations
Amazon Web Services
Open Data on AWS
Open Data on AWS
Amazon Web Services
Keynote_AWS_BecomingAHighFrequencyEnterprise
Keynote_AWS_BecomingAHighFrequencyEnterprise
Amazon Web Services
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Amazon Web Services
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS Foundations
Amazon Web Services
‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms
Amazon Web Services
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Amazon Web Services
Moving to DevOps
Moving to DevOps
Amazon Web Services
What's hot
(20)
Migrate and Modernize Your Database
Migrate and Modernize Your Database
AWS最新區塊鏈服務與應用
AWS最新區塊鏈服務與應用
Becoming A High Frequency Enterprise
Becoming A High Frequency Enterprise
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
Security Framework Shakedown: Chart Your Journey with AWS Best Practices
AWS AI and Machine Learning Journey
AWS AI and Machine Learning Journey
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
AWS Initiate Day Dublin 2019 – Breaking down the Monoliths
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Initiate Edinburgh 2019 - The Culture of Innovation at Amazon
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
AWS 預測性維護與智慧物聯應用
AWS 預測性維護與智慧物聯應用
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
Migrando seus dados para nuvem: Explore as opções da nuvem AWS
The Secret Treasures of Cloud Migration Journey
The Secret Treasures of Cloud Migration Journey
AWS Initiate Day Dublin 2019 – AWS Foundations
AWS Initiate Day Dublin 2019 – AWS Foundations
Open Data on AWS
Open Data on AWS
Keynote_AWS_BecomingAHighFrequencyEnterprise
Keynote_AWS_BecomingAHighFrequencyEnterprise
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Sviluppa, addestra e distribuisci modelli di machine learning.pdf
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS Foundations
‘Smart Place’ Essentials: IoT Networks and Platforms
‘Smart Place’ Essentials: IoT Networks and Platforms
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Initiate Edinburgh 2019 - Governance & Compliance in your VPC
Moving to DevOps
Moving to DevOps
Similar to AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Amazon Web Services
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Amazon Web Services
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
Top Security Myths Dispelled
Top Security Myths Dispelled
Amazon Web Services
Top Cloud Security Myths – Dispelled!
Top Cloud Security Myths – Dispelled!
AWS Summits
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
Amazon Web Services
Virtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_World
Amazon Web Services
Security in the cloud
Security in the cloud
Reham Maher El-Safarini
Introduction to AWS Security
Introduction to AWS Security
Amazon Web Services
Fundamentals of AWS Security
Fundamentals of AWS Security
Amazon Web Services
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
Amazon Web Services
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Amazon Web Services
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
Amazon Web Services
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
Introduction to AWS Security
Introduction to AWS Security
Amazon Web Services
Introduction to AWS Security
Introduction to AWS Security
Amazon Web Services
Similar to AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
(20)
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Top Security Myths Dispelled
Top Security Myths Dispelled
Top Cloud Security Myths – Dispelled!
Top Cloud Security Myths – Dispelled!
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
Virtual_Insurers_New_Tools_For_A_New_World
Virtual_Insurers_New_Tools_For_A_New_World
Security in the cloud
Security in the cloud
Introduction to AWS Security
Introduction to AWS Security
Fundamentals of AWS Security
Fundamentals of AWS Security
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Introduction to AWS Security
Introduction to AWS Security
Introduction to AWS Security
Introduction to AWS Security
More from Amazon Web Services
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
Open banking as a service
Open banking as a service
Amazon Web Services
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
Computer Vision con AWS
Computer Vision con AWS
Amazon Web Services
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
Tools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
How to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
Building a web application without servers
Building a web application without servers
Amazon Web Services
Fundraising Essentials
Fundraising Essentials
Amazon Web Services
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
More from Amazon Web Services
(20)
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Open banking as a service
Open banking as a service
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Computer Vision con AWS
Computer Vision con AWS
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Tools for building your MVP on AWS
Tools for building your MVP on AWS
How to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Building a web application without servers
Building a web application without servers
Fundraising Essentials
Fundraising Essentials
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
1.
2.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Top Cloud Security Myths - Dispelled! Mark Rowlands: Head of Pan-Eu AWS Solutions Architecture Public Sector EMEA.
3.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. SECURITY IS JOB ZERO
4.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. The three stages of cloud security curiosity General cloud security Specific service security Data security New to cloud and / or business teams Experienced in cloud and / or technology teams Advanced in cloud and / or risk teams
5.
6.
Cloud security Service security Data security
7.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 01 “The public cloud is not as secure as my on-premises infrastructure and not as secure as my private cloud.”
8.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Zoom In: AWS Region Zoom In: AWS AZ Sample Region Datacenter Datacenter Datacenter Sample Availability Zone Availability Zone B Availability Zone A Availability Zone C • Independent geographic areas, isolated from other Regions (security boundary) • Customer chooses in which Region(s) to deploy services • Regions are comprised of multiple Availability Zones (AZs), which enables the deployment of high- availability architecture • AZs are independent failure zones; physically separated; on separate low risk flood plains • Discrete Uninterruptible Power Supply (UPS); Onsite backup generation facilities • Built for continuous availability
9.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Advantages of the API • Authoritative - the interface to, and between, AWS services • Auditable – always know what, and who, is doing what • Secure – verified integrity, authenticated, no covert channels • Fast - can be read and manipulated in sub-second time • Precise – defines the state of all infrastructure and services • Evolving – continuously improving • Uniform - provides consistency across disparate components • Automatable - enables some really cool capabilities
10.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 01: AWS security of the cloud and in the cloud Visible AutomatedPhysical AWS’s global infrastructure is built to meet the requirements of the most security-sensitive organizations in the world
11.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth #1: On-premises IT is more secure than the cloud On AWSOn-premises Big perimeter End-to-End ownership Build it all yourself Server-centric approach De-centralised administration Focus on physical assets Multiple (manual) processes Micro-perimeters Own just enough Focus on your core values Service-centric approach Central control plane (API) Focus on protecting data Everything is automated
12.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 02 “When I put my data in the cloud I lose ownership of it, and it may move across national borders.”
13.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 02: You own and control your content Access TraceabilityOwnership You retain ownership and control of your content, and you choose which region that content resides in
14.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 03 “I am a highly regulated business and I cannot use the cloud because of my compliance requirements.”
15.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved.
16.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Certifications and compliance programs
17.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 03: AWS global compliance program Countries Enterprise agreement Certifications Our security assurance program meets or exceeds industry, country-specific, and global security requirements
18.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 04 “My business requires sensitive personal data, I cannot use the cloud.”
19.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 04: Using encryption on AWS AWS KMS High standards Ubiquitous AWS encryption services are integrated into dozens of our services and meet the strictest industry requirements
20.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 05 “I have a requirement for security testing, I cannot do that in the cloud.”
21.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 05: Security testing on AWS Seek approval Or use pre-approved Shared responsibility AWS permits security testing of your resources in line with our acceptable usage policy, and we provide tools to help you
22.
Cloud security Service security Data security
23.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 06 “All of my operating systems are patched automatically in the cloud.”
24.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 06: Patch management on AWS How we help Our responsibility Your responsibility You are responsible for patching operating systems that you manage. AWS is responsible for patching services that we manage
25.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 07 “I cannot use the cloud to store sensitive data because everyone will have access to it.”
26.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 07: How to secure data in Amazon Simple Storage Service (Amazon S3) Notify RespondProtect Amazon S3 and our other storage services are secure by default. Customers control who can access their data, and AWS provides multiple tools so you can understand how access is configured
27.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 08 “I hear about secret keys being stolen, the way you grant access is not secure.”
28.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. IAM Roles.
29.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 08: How to protect AWS credentials Amazon GuardDuty Multi-factor authentication AWS provides a number of tools to protect your identity and access credentials and to help you detect misuse Temporary access
30.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 09 “I cannot control the deletion of my data and I cannot verify it has been deleted.”
31.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 09: How AWS manages data deletion Physical ValidatedLogical When you delete your data we take multiple steps to wipe it and eventually destroy it. This process is validated by independent third parties
32.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 10 “Serverless services are not secure because they are shared between customers.”
33.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 10: How AWS protects serverless services Identity Limited surface When you use AWS’s serverless services you inherit the multiple layers of strong security controls that are built into our core services Building blocks
34.
Cloud security Service security Data security
35.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 11 “The government can access my data at any time.”
36.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 11: How AWS manages information requests Notification EncryptionValid requests Amazon does not disclose customer information unless we’re required to do so to comply with a legally valid and binding order. Where we need to act publicly to protect customers, we do
37.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 12 “A malicious insider can look at my data via your shared administrative access.”
38.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 12: How AWS manages administrative access Process controls Technology controls AWS strictly controls our infrequent administrative access to services. This process has executive oversight within AWS and is validated by independent third parties Automation
39.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Myth 13 “It is possible to bypass your isolation technology and access someone else’s data.”
40.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. 13: How AWS secures the hypervisor Experience AWS has over a decade of experience securing our virtualization technology. We provide a deep level of isolation within the cloud Customization & innovation Isolation
41.
Cloud security Service security Data security
42.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. Security benefits of the AWS cloud Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control
43.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. SECURITY IS JOB ZERO http://amzn.to/2FZdEgH
44.
© 2019, Amazon
Web Services, Inc. or its affiliates. All rights reserved. “CIOs and CISOs need to stop obsessing over unsubstantiated cloud security worries, and instead apply their imagination and energy to developing new approaches to cloud control, allowing them to securely, compliantly, and reliably leverage the benefits of this increasingly ubiquitous computing model.” Source: “Clouds Are Secure: Are You Using Them Securely?”
45.
Thank you! © 2019,
Amazon Web Services, Inc. or its affiliates. All rights reserved.
Download now