SlideShare a Scribd company logo
1 of 9
Download to read offline
CONFIDENTIAL DO NOT DISTRIBUTE
FORGING THE PATHWAY TOCLOUD
SECURITY WITH ARMOR ANYWHERE
ALEX HUMPHREY Solutions Consultant
Alex.Humphrey@Armor.com
Twitter: @entreprelife
LinkedIn: humphreyalex
MONTH 00, 2018
CONFIDENTIAL DO NOT DISTRIBUTE
Agenda
1. The Road to theCloud
2. Transitioning your security stack to the cloud
3. Security Pillar Framework
4. Shared responsibilitymodel
5. Filling in thegaps
3
CONFIDENTIAL DO NOT DISTRIBUTE
The Road to theCloud
Reasons to transition toAWS:
▪ Operational Excellence
▪ Performance Efficiency
▪ Reliability
▪ Cost Optimization
▪ Security
4
CONFIDENTIAL DO NOT DISTRIBUTE
Transitioning Your Traditional Security Stack to the Cloud
Traditional Security Stacks need to be updated to meet the unique security needs of the
Cloud.
▪ How is your security focus changing?
▪ Do you understand your role in the Shared Responsibility Model?
▪ How must your security stack change to fulfill cloud specific needs?
5
CONFIDENTIAL DO NOT DISTRIBUTE
Security Perspective – Moving Security to the Cloud
▪ Identity and Access Management(IAM)
▪ Logging &Monitoring
▪ Infrastructure Security
▪ Data Protection
▪ Incident Response
6
Shared Responsibility Model
7CONFIDENTIAL. DO NOT DISTRIBUTE.
CUSTOMER
RESPONSIBILTIY FOR
SECURITY ‘IN’ THECLOUD
CUSTOMER DATA
PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT
OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION
CLIENT-SIDE DATA
ENCRYPTION & DATA INTEGRITY
AUTHENTICATION
SERVER-SIDE ENCRYPTION
(FILE SYSTEM AND/OR DATA)
NETWORKING TRAFFIC
PROTECTION (ENCRYPTION,
INTEGRITY, IDENTITY)
AWS
RESPONSIBILTIY FOR
SECURITY ‘OF’ THECLOUD
HARDWARE/AWS GLOBAL INFRASTRUCTURE
REGIONS AVAILABILITY ZONES EDGE LOCATIONS
SOFTWARE
COMPUTE STORAGE DATABASE NETWORKING
Tenant Responsibility – Filling in the Gaps
CUSTOMER
RESPONSIBILTIY FOR
SECURITY ‘IN’ THECLOUD
CUSTOMER DATA
PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT
OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION
CLIENT-SIDE DATA
ENCRYPTION & DATA INTEGRITY
AUTHENTICATION
SERVER-SIDE ENCRYPTION
(FILE SYSTEM AND/OR DATA)
NETWORKING TRAFFIC
PROTECTION (ENCRYPTION,
INTEGRITY, IDENTITY)
LOG COLLECTION & MANAGEMENT
WAF, FIM, AM, VULNERABILITY SCANS
AM, PATCH MONITORING, IDS, VULNERABILTIY SCANS
AWS KMS-MANAGED CUSTOMER
MASTER KEY
AWS S3-MANAGED KEY,
AWS KMS-MANAGED KEY
ELB, WAF,TLS, & SSL
CONFIDENTIAL. DO NOT DISTRIBUTE.
Incident Response
CONFIDENTIAL DO NOT DISTRIBUTE
COME BY OURBOOTH
9
CONFIDENTIAL DO NOT DISTRIBUTE
THANK YOU

More Related Content

Similar to Forging the Pathway to Cloud Security with Armor Anywhere - DEM08 - Chicago AWS Summit

Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesScalr
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the CloudDori Degenhardt
 
7 Myths about Cloud Computing
7 Myths about Cloud Computing7 Myths about Cloud Computing
7 Myths about Cloud ComputingNUS-ISS
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Scalar Decisions
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - KloudlearnKloudLearn
 
Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.Amazon Web Services
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate OverviewScott Dierks
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by designaccenture
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24
 
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxNavigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxkathyzink87
 
Enterprise Cloud Strategy & Adoption
Enterprise Cloud Strategy & AdoptionEnterprise Cloud Strategy & Adoption
Enterprise Cloud Strategy & AdoptionAndrew Alaniz
 
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into Cloud
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into CloudIf You’re Out of Cloud, You’re Out of Work; Key Skills to Move into Cloud
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into CloudTristano Vacondio
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud SecurityRightScale
 
Camelot - Manyhats club meetup 23 10 18
Camelot - Manyhats club meetup 23 10 18Camelot - Manyhats club meetup 23 10 18
Camelot - Manyhats club meetup 23 10 18NSC42 Ltd
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROTelecomValley
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?IndSightsResearchSG
 

Similar to Forging the Pathway to Cloud Security with Armor Anywhere - DEM08 - Chicago AWS Summit (20)

Key considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdlesKey considerations when adopting cloud: expectations vs hurdles
Key considerations when adopting cloud: expectations vs hurdles
 
Your Journey to the Cloud
Your Journey to the CloudYour Journey to the Cloud
Your Journey to the Cloud
 
7 Myths about Cloud Computing
7 Myths about Cloud Computing7 Myths about Cloud Computing
7 Myths about Cloud Computing
 
6 FAQs About Multi-Cloud
6 FAQs About Multi-Cloud6 FAQs About Multi-Cloud
6 FAQs About Multi-Cloud
 
Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6Cloud Perspectives - Ottawa Seminar - Oct 6
Cloud Perspectives - Ottawa Seminar - Oct 6
 
MULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTUREMULTI-CLOUD ARCHITECTURE
MULTI-CLOUD ARCHITECTURE
 
Cloud Security - Kloudlearn
Cloud Security - KloudlearnCloud Security - Kloudlearn
Cloud Security - Kloudlearn
 
Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.Successful Cloud Adoption for the Enterprise. Not If. When.
Successful Cloud Adoption for the Enterprise. Not If. When.
 
CipherCloud_Corporate Overview
CipherCloud_Corporate OverviewCipherCloud_Corporate Overview
CipherCloud_Corporate Overview
 
Cloud Digital Leader 1
Cloud Digital Leader 1Cloud Digital Leader 1
Cloud Digital Leader 1
 
Zero trust strategy: cloud security by design
Zero trust strategy: cloud security by designZero trust strategy: cloud security by design
Zero trust strategy: cloud security by design
 
Outpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud securityOutpost24 webinar - Mastering the art of multicloud security
Outpost24 webinar - Mastering the art of multicloud security
 
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptxNavigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
Navigating the Cloud A Comprehensive Guide to Cloud Migration Strategies.pptx
 
Enterprise Cloud Strategy & Adoption
Enterprise Cloud Strategy & AdoptionEnterprise Cloud Strategy & Adoption
Enterprise Cloud Strategy & Adoption
 
Cloud-Migrations
Cloud-MigrationsCloud-Migrations
Cloud-Migrations
 
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into Cloud
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into CloudIf You’re Out of Cloud, You’re Out of Work; Key Skills to Move into Cloud
If You’re Out of Cloud, You’re Out of Work; Key Skills to Move into Cloud
 
8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security8 Elements of Multi-Cloud Security
8 Elements of Multi-Cloud Security
 
Camelot - Manyhats club meetup 23 10 18
Camelot - Manyhats club meetup 23 10 18Camelot - Manyhats club meetup 23 10 18
Camelot - Manyhats club meetup 23 10 18
 
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIEROSécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
Sécurité by design + Cloud = Infrastructure as Code par Sergio LOURIERO
 
What is Cloud and what are the best practices?
What is Cloud and what are the best practices?What is Cloud and what are the best practices?
What is Cloud and what are the best practices?
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Forging the Pathway to Cloud Security with Armor Anywhere - DEM08 - Chicago AWS Summit

  • 1. CONFIDENTIAL DO NOT DISTRIBUTE FORGING THE PATHWAY TOCLOUD SECURITY WITH ARMOR ANYWHERE ALEX HUMPHREY Solutions Consultant Alex.Humphrey@Armor.com Twitter: @entreprelife LinkedIn: humphreyalex MONTH 00, 2018
  • 2. CONFIDENTIAL DO NOT DISTRIBUTE Agenda 1. The Road to theCloud 2. Transitioning your security stack to the cloud 3. Security Pillar Framework 4. Shared responsibilitymodel 5. Filling in thegaps 3
  • 3. CONFIDENTIAL DO NOT DISTRIBUTE The Road to theCloud Reasons to transition toAWS: ▪ Operational Excellence ▪ Performance Efficiency ▪ Reliability ▪ Cost Optimization ▪ Security 4
  • 4. CONFIDENTIAL DO NOT DISTRIBUTE Transitioning Your Traditional Security Stack to the Cloud Traditional Security Stacks need to be updated to meet the unique security needs of the Cloud. ▪ How is your security focus changing? ▪ Do you understand your role in the Shared Responsibility Model? ▪ How must your security stack change to fulfill cloud specific needs? 5
  • 5. CONFIDENTIAL DO NOT DISTRIBUTE Security Perspective – Moving Security to the Cloud ▪ Identity and Access Management(IAM) ▪ Logging &Monitoring ▪ Infrastructure Security ▪ Data Protection ▪ Incident Response 6
  • 6. Shared Responsibility Model 7CONFIDENTIAL. DO NOT DISTRIBUTE. CUSTOMER RESPONSIBILTIY FOR SECURITY ‘IN’ THECLOUD CUSTOMER DATA PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) NETWORKING TRAFFIC PROTECTION (ENCRYPTION, INTEGRITY, IDENTITY) AWS RESPONSIBILTIY FOR SECURITY ‘OF’ THECLOUD HARDWARE/AWS GLOBAL INFRASTRUCTURE REGIONS AVAILABILITY ZONES EDGE LOCATIONS SOFTWARE COMPUTE STORAGE DATABASE NETWORKING
  • 7. Tenant Responsibility – Filling in the Gaps CUSTOMER RESPONSIBILTIY FOR SECURITY ‘IN’ THECLOUD CUSTOMER DATA PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT OPERATING SYSTEM, NETWORK & FIREWALL CONFIGURATION CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) NETWORKING TRAFFIC PROTECTION (ENCRYPTION, INTEGRITY, IDENTITY) LOG COLLECTION & MANAGEMENT WAF, FIM, AM, VULNERABILITY SCANS AM, PATCH MONITORING, IDS, VULNERABILTIY SCANS AWS KMS-MANAGED CUSTOMER MASTER KEY AWS S3-MANAGED KEY, AWS KMS-MANAGED KEY ELB, WAF,TLS, & SSL CONFIDENTIAL. DO NOT DISTRIBUTE. Incident Response
  • 8. CONFIDENTIAL DO NOT DISTRIBUTE COME BY OURBOOTH 9
  • 9. CONFIDENTIAL DO NOT DISTRIBUTE THANK YOU