SlideShare a Scribd company logo
1 of 32
Download to read offline
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
A P R I L 3 , 2 0 1 8
Benjamin Andrew
Global Leader, Security & Network Infrastructure
AWS Marketplace – Amazon Web Services
S E S S I O N # E N T 3 0 5
Compliance and Cloud
Security for Regulated
Industries
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Compliance and Cloud Security for
Regulated Industries
• What we hear from customers
• AWS Marketplace
• Security & compliance is a shared responsibility
• A healthcare customer’s journey to the cloud
• Establishing a Cloud Center of Excellence
• Heuristics: cloud-first and security by
design
• Secure Amazon Machine Image (AMI) Factory
• Mapping security to compliance controls
• RansomWare? No More Ransom
2
A G E N D A
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
What we hear from our customers
• Software entitlement
& deployment models
• Complex agreement management
• Constant renewal and replacement
• Out-of-date procurement mechanisms
• No single approved catalog
of software in place
• Compliance in hybrid and cloud
computing
• Rapidly innovate by buying and
deploying software solutions on-
demand
• Simplify and streamline purchasing,
license management, and invoicing
• Upgrade on demand
• Reduce cost while picking new
standards
• Know what AWS Services and third-
party software provide compliance
3
C H A L L E N G E S C U S T O M E R S W A N T T O
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.4
AWS Marketplace: Find, buy, deploy, and
manage software in the cloud
• Deploy software on demand
• 1,280+ ISVs
• 4,200+ product listings
• Simplified procurement and
deployment
• Billed through AWS account
• Deployed in 15 regions around the
world
• 160,000 active customers
• 481M EC2 hours deployed per month
A B O U T A W S M A R K E T P L A C E
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security & compliance is a shared responsibility
Customer
Responsible
for security
IN the cloud
AWS
Responsible
for security
OF the cloud
Customer data
Platform, applications, identity & access management
Operating system, network & firewall configuration
Client-side data
encryption & Data integrity
authentication
Server-side encryption
(file system and/or data)
Network traffic protection
(encryption/
integrity/identity)
Compute Storage Database Networking
AWS global
infrastructure
Regions
Edge locations
Availability Zones
5
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security subcategories
Network
security
Security
intelligence
Identity & access
management
Security
orchestration
Cloud workload
security
Data
security
Application
security
Easy, fast, and secure
way to search, analyze,
and visualize massive
data streams
Okta is an integrated
identity and mobility
management service
Protection of data,
digital identities, payments,
and transactions from
the edge to the core
Get hourly proactive
protection for your AWS
workloads with Trend Micro
Deep Security
Alert Logic Cloud Defender
gives you the technology
and managed security
services to assess
vulnerabilities and
streamline compliance
Imperva SecureSphere
WAF for AWS extends
all of the security and
management capabilities
of the world's most-trusted
web application firewall to
Amazon Web Services
environments
Quickly create a hybrid
architecture that
extends your existing
data center into AWS
via encrypted tunnels
With Sumo Logic, you can
collect, compress, and
securely transfer all of your
log data regardless of
volume, type, or location
OneLogin, the innovator
in Identity and Access
Management-as-
a-Service (IDaaS)
Proactive security
from a single agent
designed for AWS
Dome9 automates AWS
security groups and adds
an extra layer of protection
against hackers
Many AWS-hosted apps
choose Barracuda, an AWS
Preferred Security
Competency Partner,
due to its continuous
monitoring & policy tuning by
world-class security experts.
Other popular
solutions:
Fortinet
Other popular
solutions:
Bitium, ClearLogin,
Ping Identity
Other popular
solutions:
HyTrust, CTERA
Other popular
solutions:
Tenable, Qualys
Other popular
solutions:
McAfee, CrowdStrike
Other popular
solutions:
Fortinet
Other popular
solutions:
Check Point,
Fortinet, Alert Logic
The F5 WAF secures
applications from layer
7 DDoS attacks,
malicious bot traffic,
common application
vulnerabilities and all
OWASP top 10 threats.
Symantec Cloud Workload
Protection automates
security for public cloud
workloads, enabling
agility, risk reduction, and
cost savings, while easing
DevOps & admin burdens.
6
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.7
A healthcare customer’s journey to the cloud
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.8
A healthcare customer’s journey to the cloud
2 Accounts | 20 VPCs
Production
Non-Prod
2015
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.9
A healthcare customer’s journey to the cloud
29 Accounts | 62 VPCs2 Accounts | 20 VPCs
Production
Non-Prod
2016
+
2015
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
A healthcare customer’s journey to the cloud
10
Shared Services
Security
Data Center
29 Accounts | 62 VPCs 35 Accounts | 35 VPCs2 Accounts | 20 VPCs
Production
Non-Prod
2016 2017
+
2015
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.11
Healthcare customer - where they are
today
AWS CLOUD
VIRTUAL PRIVATE CLOUD
AWS IAM AWS KMS Amazon
CloudWatch
AWS
CloudTrail
AWS
Config
AMI Flow logs
Amazon
EC2
Elastic Load
Balancing
Amazon
RDS
Amazon
SQS
Amazon
SES
Amazon
S3
AWS Direct
Connect
VPC SUBNET
AUTO SCALING GROUP
SECURITY GROUP
Non-Prod Prod
VPC
peering
DNS SSO
Logging
Log
Analysis
SHARED SERVICES SECURITY
Corporate
data center
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.12
AWS CLOUD
VIRTUAL PRIVATE CLOUD
AWS IAM AWS KMS Amazon
CloudWatch
AWS
CloudTrail
AWS
Config
AMI Flow logs
Amazon
EC2
Elastic Load
Balancing
Amazon
RDS
Amazon
SQS
Amazon
SES
Amazon
S3
AWS Direct
Connect
VPC SUBNET
AUTO SCALING GROUP
SECURITY GROUP
Non-Prod Prod
Shared Services
Security
Data Center
Healthcare customer - where they are
today
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.13
• The cloud is not just another data
center with virtual machines
• Leverage managed services
• For every problem, ask: how do we best solve
this in the cloud using current best practices?
• Let modern tools solve old hard problems
C L O U D - F I R S T
• Secure every part all the time
• Apply the principle of Least Privilege
S E C U R I T Y B Y D E S I G N
• Build everything as Infrastructure as Code
• Do not log in to the console
and make changes
• Never log in to a server
A U T O M A T E E V E R Y T H I N G
Cloud-first & automated security by design
Establishment of Engineering Heuristics - rules you won’t break
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.14
Cloud-first & automated security by design
Establishment of Engineering Heuristics - rules you won’t break
Secure Managed Standards Documented
Infrastructure
as code
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
DevSecOps Secure
AMI Factory
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS
Marketplace
AWS Service
Catalog
Approved
AppStack
BUILD VALIDATE APPROVE DISTRIBUTE
16
Secure AMI Factory:
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Instance
Base AMI
Instance
Candidate
AMI
Scan
Scripts
Updates
Software
Secure AMI Factory: Build Phase
17
SSM
Automatio
n
Document
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SSM
Automatio
n
Document
Secure AMI Factory: Build Phase
18
Ansible AMI
Ansible Instance
ssh keys
Execute Playbook Download Playbook
Instance
Base AMI
Gold AMI
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SSM
Automatio
n
Document
Secure AMI Factory: Build Phase
19
Instance
Base AMI
Amazon
Inspector
Email
Notification
ApproveApprover
AMI ID
SSM
Parameter Store
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Region
us-east-1
Region
us-west-2
Region
ca-central-1
SSMPS
CIE TEAM DEV TEAM A DEV TEAM B
COPY
SHARE
20
Secure AMI Factory: Distribution (Regions &
Accounts)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Service catalog
SSM
Parameter
Store
Product
template
Product
template
Product
template
AWS SERVICE CATALOG
Product
Product
Product
Portfolio
Portfolio
21
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
Mapping Security
to compliance
controls
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
Allgress Regulatory
Product Mapping
ToolReduce complexity and
shorten the timeframe of
achieving security compliance
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
• Identifies solutions in AWS
Marketplace that can
implement the
requirements of each
security control.
• FedRAMP moderate
example:
24
Allgress RPM:
Product Explorer
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Allgress RPM:
Product Explorer
25
• Compliance controls are
mapped directly to the
associated AWS Marketplace
product.
• Select a product and quickly see
all the controls it fulfills.
• Generate a report of selected
products; visit the AWS
Marketplace listing page to
purchase.
D E T A I L
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
Ransomware?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.#NoMoreRansom 27
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
#NoMoreRansom
Stats
28
• Can decrypt 84 ransomware families with 52
decryption tools in 29 languages
• 120 partners: (including founding members,
Barracuda and AWS)
• 40 LEA: New: Cypriot & Estonian police
• 80 non-LEA: New: KPN; Telenor; CPIC
• 1.6 million visitors from more than 180
countries
• More than 35,000 people have retrieved
their files for free, preventing criminals from
profiting from more than $12M USD
• CryptXXX, CrySIS, and Dharma are the most
detected infections.
• NoMoreRansom.org
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
Q&A
© 2018, Amazon Web Services, Inc.
or its affiliates. All rights reserved.
Thank You!
B E N J A M I N A N D R E W
benand@amazon.com
linkedin.com/in/benandrew
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Please complete the session survey in
the summit mobile app.
Submit Session Feedback
1. Tap the Schedule icon. 2. Select the session
you attended.
3. Tap Session
Evaluation to submit your
feedback.

More Related Content

What's hot

Amazon CI-CD Practices for Software Development Teams
Amazon CI-CD Practices for Software Development Teams Amazon CI-CD Practices for Software Development Teams
Amazon CI-CD Practices for Software Development Teams Amazon Web Services
 
SID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CASID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CAAmazon Web Services
 
ENT201 Simplifying Microsoft Architectures with AWS Services
ENT201 Simplifying Microsoft Architectures with AWS ServicesENT201 Simplifying Microsoft Architectures with AWS Services
ENT201 Simplifying Microsoft Architectures with AWS ServicesAmazon Web Services
 
Hitchhiker's Guide to Cloud Ops
Hitchhiker's Guide to Cloud Ops Hitchhiker's Guide to Cloud Ops
Hitchhiker's Guide to Cloud Ops Amazon Web Services
 
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018Amazon Web Services
 
SRV315 Building Enterprise-Grade Serverless Apps
 SRV315 Building Enterprise-Grade Serverless Apps SRV315 Building Enterprise-Grade Serverless Apps
SRV315 Building Enterprise-Grade Serverless AppsAmazon Web Services
 
BDA210 AWS DeepLens Workshop Building Computer Vision Applications
BDA210 AWS DeepLens Workshop Building Computer Vision Applications BDA210 AWS DeepLens Workshop Building Computer Vision Applications
BDA210 AWS DeepLens Workshop Building Computer Vision Applications Amazon Web Services
 
Amazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon Web Services
 
AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions Amazon Web Services
 
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...Amazon Web Services
 
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...Amazon Web Services
 
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Amazon Web Services
 
Multi-Account Strategy and Security with Centrica Hive
Multi-Account Strategy and Security with Centrica HiveMulti-Account Strategy and Security with Centrica Hive
Multi-Account Strategy and Security with Centrica HiveAmazon Web Services
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your FirewallAmazon Web Services
 
Building Highly Scalable Retail Order Management Systems with Serverless
Building Highly Scalable Retail Order Management Systems with ServerlessBuilding Highly Scalable Retail Order Management Systems with Serverless
Building Highly Scalable Retail Order Management Systems with ServerlessAmazon Web Services
 
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...Amazon Web Services
 
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Amazon Web Services
 
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...Amazon Web Services
 

What's hot (20)

Amazon CI-CD Practices for Software Development Teams
Amazon CI-CD Practices for Software Development Teams Amazon CI-CD Practices for Software Development Teams
Amazon CI-CD Practices for Software Development Teams
 
SID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CASID305 AWS Certificate Manager Private CA
SID305 AWS Certificate Manager Private CA
 
ENT201 Simplifying Microsoft Architectures with AWS Services
ENT201 Simplifying Microsoft Architectures with AWS ServicesENT201 Simplifying Microsoft Architectures with AWS Services
ENT201 Simplifying Microsoft Architectures with AWS Services
 
Hitchhiker's Guide to Cloud Ops
Hitchhiker's Guide to Cloud Ops Hitchhiker's Guide to Cloud Ops
Hitchhiker's Guide to Cloud Ops
 
Container Scheduling
Container SchedulingContainer Scheduling
Container Scheduling
 
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
SPEKE-ing of Content Protection & DRM (MAE302) - AWS re:Invent 2018
 
SRV315 Building Enterprise-Grade Serverless Apps
 SRV315 Building Enterprise-Grade Serverless Apps SRV315 Building Enterprise-Grade Serverless Apps
SRV315 Building Enterprise-Grade Serverless Apps
 
BDA210 AWS DeepLens Workshop Building Computer Vision Applications
BDA210 AWS DeepLens Workshop Building Computer Vision Applications BDA210 AWS DeepLens Workshop Building Computer Vision Applications
BDA210 AWS DeepLens Workshop Building Computer Vision Applications
 
Amazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and RemediationAmazon GuardDuty Threat Detection and Remediation
Amazon GuardDuty Threat Detection and Remediation
 
AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions AWS IoT_Connected Home Solutions
AWS IoT_Connected Home Solutions
 
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...
Deep Dive on Cloud File System Offerings: What to Use, Where, and Why (STG392...
 
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...
CI/CD for Serverless and Containerized Applications (DEV309-R1) - AWS re:Inve...
 
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
Inside AWS: Technology Choices for Modern Applications (SRV305-R1) - AWS re:I...
 
Building a Monitoring Plan.pdf
Building a Monitoring Plan.pdfBuilding a Monitoring Plan.pdf
Building a Monitoring Plan.pdf
 
Multi-Account Strategy and Security with Centrica Hive
Multi-Account Strategy and Security with Centrica HiveMulti-Account Strategy and Security with Centrica Hive
Multi-Account Strategy and Security with Centrica Hive
 
Come Out From Behind Your Firewall
Come Out From Behind Your FirewallCome Out From Behind Your Firewall
Come Out From Behind Your Firewall
 
Building Highly Scalable Retail Order Management Systems with Serverless
Building Highly Scalable Retail Order Management Systems with ServerlessBuilding Highly Scalable Retail Order Management Systems with Serverless
Building Highly Scalable Retail Order Management Systems with Serverless
 
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...
How Amazon.com Migrates Inventory Management Systems (DAT346) - AWS re:Invent...
 
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
Autonomous DevSecOps: Five Steps to a Self-Driving Cloud (ENT214-S) - AWS re:...
 
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...
Securing Machine Learning Deployments for the Enterprise (SEC369-R1) - AWS re...
 

Similar to ENT305 Compliance and Cloud Security for Regulated Industries

Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareAmazon Web Services
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersAmazon Web Services
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...Amazon Web Services
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Amazon Web Services
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadAmazon Web Services
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...Martin Klie
 
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...Amazon Web Services
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneAmazon Web Services
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Amazon Web Services
 
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon Web Services
 
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...Amazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationAmazon Web Services
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureAmazon Web Services
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAmazon Web Services
 
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeAmazon Web Services
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAmazon Web Services
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Amazon Web Services
 
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018Amazon Web Services
 

Similar to ENT305 Compliance and Cloud Security for Regulated Industries (20)

Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
[REPEAT 1] Safeguard the Integrity of Your Code for Fast and Secure Deploymen...
 
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
Safeguard the Integrity of Your Code for Fast and Secure Deployments (DEV349-...
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
New AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your WorkloadNew AWS Security Solutions to Protect Your Workload
New AWS Security Solutions to Protect Your Workload
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
 
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
Moving 400 Engineers to AWS: Our Journey to Secure Adoption (SEC306-S) - AWS ...
 
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
Amazon FreeRTOS: IoT Operating System for Microcontrollers (IOT208-R1) - AWS ...
 
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
 
Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To Insure
 
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPCAWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
AWS Initiate Day Manchester 2019 – AWS Security Compliance in your VPC
 
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_SingaporeSecure End User Computing in the Cloud_AWSPSSummit_Singapore
Secure End User Computing in the Cloud_AWSPSSummit_Singapore
 
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPCAWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
AWS Initiate Day Dublin 2019 – Security and Compliance in your VPC
 
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
Layered Perimeter Protection for Apps Running on AWS (CTD201-R1) - AWS re:Inv...
 
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018
Unlocking Software Innovation with AWS - Adrian White - AWS TechShift ANZ 2018
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

ENT305 Compliance and Cloud Security for Regulated Industries

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. A P R I L 3 , 2 0 1 8 Benjamin Andrew Global Leader, Security & Network Infrastructure AWS Marketplace – Amazon Web Services S E S S I O N # E N T 3 0 5 Compliance and Cloud Security for Regulated Industries
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Compliance and Cloud Security for Regulated Industries • What we hear from customers • AWS Marketplace • Security & compliance is a shared responsibility • A healthcare customer’s journey to the cloud • Establishing a Cloud Center of Excellence • Heuristics: cloud-first and security by design • Secure Amazon Machine Image (AMI) Factory • Mapping security to compliance controls • RansomWare? No More Ransom 2 A G E N D A
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. What we hear from our customers • Software entitlement & deployment models • Complex agreement management • Constant renewal and replacement • Out-of-date procurement mechanisms • No single approved catalog of software in place • Compliance in hybrid and cloud computing • Rapidly innovate by buying and deploying software solutions on- demand • Simplify and streamline purchasing, license management, and invoicing • Upgrade on demand • Reduce cost while picking new standards • Know what AWS Services and third- party software provide compliance 3 C H A L L E N G E S C U S T O M E R S W A N T T O
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.4 AWS Marketplace: Find, buy, deploy, and manage software in the cloud • Deploy software on demand • 1,280+ ISVs • 4,200+ product listings • Simplified procurement and deployment • Billed through AWS account • Deployed in 15 regions around the world • 160,000 active customers • 481M EC2 hours deployed per month A B O U T A W S M A R K E T P L A C E
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security & compliance is a shared responsibility Customer Responsible for security IN the cloud AWS Responsible for security OF the cloud Customer data Platform, applications, identity & access management Operating system, network & firewall configuration Client-side data encryption & Data integrity authentication Server-side encryption (file system and/or data) Network traffic protection (encryption/ integrity/identity) Compute Storage Database Networking AWS global infrastructure Regions Edge locations Availability Zones 5
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security subcategories Network security Security intelligence Identity & access management Security orchestration Cloud workload security Data security Application security Easy, fast, and secure way to search, analyze, and visualize massive data streams Okta is an integrated identity and mobility management service Protection of data, digital identities, payments, and transactions from the edge to the core Get hourly proactive protection for your AWS workloads with Trend Micro Deep Security Alert Logic Cloud Defender gives you the technology and managed security services to assess vulnerabilities and streamline compliance Imperva SecureSphere WAF for AWS extends all of the security and management capabilities of the world's most-trusted web application firewall to Amazon Web Services environments Quickly create a hybrid architecture that extends your existing data center into AWS via encrypted tunnels With Sumo Logic, you can collect, compress, and securely transfer all of your log data regardless of volume, type, or location OneLogin, the innovator in Identity and Access Management-as- a-Service (IDaaS) Proactive security from a single agent designed for AWS Dome9 automates AWS security groups and adds an extra layer of protection against hackers Many AWS-hosted apps choose Barracuda, an AWS Preferred Security Competency Partner, due to its continuous monitoring & policy tuning by world-class security experts. Other popular solutions: Fortinet Other popular solutions: Bitium, ClearLogin, Ping Identity Other popular solutions: HyTrust, CTERA Other popular solutions: Tenable, Qualys Other popular solutions: McAfee, CrowdStrike Other popular solutions: Fortinet Other popular solutions: Check Point, Fortinet, Alert Logic The F5 WAF secures applications from layer 7 DDoS attacks, malicious bot traffic, common application vulnerabilities and all OWASP top 10 threats. Symantec Cloud Workload Protection automates security for public cloud workloads, enabling agility, risk reduction, and cost savings, while easing DevOps & admin burdens. 6
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.7 A healthcare customer’s journey to the cloud
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.8 A healthcare customer’s journey to the cloud 2 Accounts | 20 VPCs Production Non-Prod 2015
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.9 A healthcare customer’s journey to the cloud 29 Accounts | 62 VPCs2 Accounts | 20 VPCs Production Non-Prod 2016 + 2015
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. A healthcare customer’s journey to the cloud 10 Shared Services Security Data Center 29 Accounts | 62 VPCs 35 Accounts | 35 VPCs2 Accounts | 20 VPCs Production Non-Prod 2016 2017 + 2015
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.11 Healthcare customer - where they are today AWS CLOUD VIRTUAL PRIVATE CLOUD AWS IAM AWS KMS Amazon CloudWatch AWS CloudTrail AWS Config AMI Flow logs Amazon EC2 Elastic Load Balancing Amazon RDS Amazon SQS Amazon SES Amazon S3 AWS Direct Connect VPC SUBNET AUTO SCALING GROUP SECURITY GROUP Non-Prod Prod VPC peering DNS SSO Logging Log Analysis SHARED SERVICES SECURITY Corporate data center
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.12 AWS CLOUD VIRTUAL PRIVATE CLOUD AWS IAM AWS KMS Amazon CloudWatch AWS CloudTrail AWS Config AMI Flow logs Amazon EC2 Elastic Load Balancing Amazon RDS Amazon SQS Amazon SES Amazon S3 AWS Direct Connect VPC SUBNET AUTO SCALING GROUP SECURITY GROUP Non-Prod Prod Shared Services Security Data Center Healthcare customer - where they are today
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.13 • The cloud is not just another data center with virtual machines • Leverage managed services • For every problem, ask: how do we best solve this in the cloud using current best practices? • Let modern tools solve old hard problems C L O U D - F I R S T • Secure every part all the time • Apply the principle of Least Privilege S E C U R I T Y B Y D E S I G N • Build everything as Infrastructure as Code • Do not log in to the console and make changes • Never log in to a server A U T O M A T E E V E R Y T H I N G Cloud-first & automated security by design Establishment of Engineering Heuristics - rules you won’t break
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.14 Cloud-first & automated security by design Establishment of Engineering Heuristics - rules you won’t break Secure Managed Standards Documented Infrastructure as code
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. DevSecOps Secure AMI Factory
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Marketplace AWS Service Catalog Approved AppStack BUILD VALIDATE APPROVE DISTRIBUTE 16 Secure AMI Factory:
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Instance Base AMI Instance Candidate AMI Scan Scripts Updates Software Secure AMI Factory: Build Phase 17 SSM Automatio n Document
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. SSM Automatio n Document Secure AMI Factory: Build Phase 18 Ansible AMI Ansible Instance ssh keys Execute Playbook Download Playbook Instance Base AMI Gold AMI
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. SSM Automatio n Document Secure AMI Factory: Build Phase 19 Instance Base AMI Amazon Inspector Email Notification ApproveApprover AMI ID SSM Parameter Store
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Region us-east-1 Region us-west-2 Region ca-central-1 SSMPS CIE TEAM DEV TEAM A DEV TEAM B COPY SHARE 20 Secure AMI Factory: Distribution (Regions & Accounts)
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Service catalog SSM Parameter Store Product template Product template Product template AWS SERVICE CATALOG Product Product Product Portfolio Portfolio 21
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Mapping Security to compliance controls
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Allgress Regulatory Product Mapping ToolReduce complexity and shorten the timeframe of achieving security compliance
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. • Identifies solutions in AWS Marketplace that can implement the requirements of each security control. • FedRAMP moderate example: 24 Allgress RPM: Product Explorer
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Allgress RPM: Product Explorer 25 • Compliance controls are mapped directly to the associated AWS Marketplace product. • Select a product and quickly see all the controls it fulfills. • Generate a report of selected products; visit the AWS Marketplace listing page to purchase. D E T A I L
  • 26. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Ransomware?
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.#NoMoreRansom 27
  • 28. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. #NoMoreRansom Stats 28 • Can decrypt 84 ransomware families with 52 decryption tools in 29 languages • 120 partners: (including founding members, Barracuda and AWS) • 40 LEA: New: Cypriot & Estonian police • 80 non-LEA: New: KPN; Telenor; CPIC • 1.6 million visitors from more than 180 countries • More than 35,000 people have retrieved their files for free, preventing criminals from profiting from more than $12M USD • CryptXXX, CrySIS, and Dharma are the most detected infections. • NoMoreRansom.org
  • 29. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Q&A
  • 30. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank You! B E N J A M I N A N D R E W benand@amazon.com linkedin.com/in/benandrew
  • 31. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Please complete the session survey in the summit mobile app.
  • 32. Submit Session Feedback 1. Tap the Schedule icon. 2. Select the session you attended. 3. Tap Session Evaluation to submit your feedback.