SlideShare a Scribd company logo
1 of 52
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Using AWS Services to Automate Governance of
Security Controls and Remediate Violations
January 19, 2017
Security Ops
Which AWS services do I use?
Michael Braendle
, pprahlad@amazon.com
Principal Product Manager, AWS
What to Expect from the Session
• SecDevOps: What?
• Services and features galore: What do I use?
• Using relevant services
• Customer example: Siemens AG - Making it real
Improve your quality of life
What’s the problem?
Meet Toby, Software developer
Flexibility,
Speed,
Low cost,
Reliability,
..
..
..
Freedom to be creative
….throughout his professional career of 2 full years!
Is a do-er
Wants impact
Meet Joe, Mr. Security
• Leading cloud adoption efforts
• Part of central cloud security team
• Manages other infrastructures
• Deals with security escalations
• Does not like being in critical path
• Wants to works smart, but has to
work hard
Ultimately responsible for security
Security: A lot going on
Security Policy
Compliance regimes
Report compliance
Evangelize cloud within the org and outside
Put out fires
Investigate issues deeply
AWS Tools could help
AWS Config Rules
AWS CloudTrail
Trusted Advisor
CloudWatch Events
VPC Flow Logs
AWS WAF
Security Certificate Manager
IAM
Security Certificate Manager
Security: A lot going on
Security Policy
Compliance regimes
Report compliance
Evangelize cloud within the org and outside
Put fires out
Investigate issues deeply
Many Many services
Many Many features
How do I sustain this?
Joe’s typical tasks
1. Create security policies
2. Assess compliance; help others check for compliance
3. Investigate and analyze relevant information; fix critical
security issues quickly
4. Deal with escalations
5. Generate evidence and reports
Create Policies
Policies in code
Trusted Advisor Best Practice checks
• Get 35+ checks with zero effort
• Example: ELBs with missing security groups, S3 Bucket open
access permissions, etc.
• Create an administrator role in each account
• Assume admin role to read check status using TA APIs
• DescribeTrustedAdvisorCheckSummaries
• DescribeTrustedAdvisorCheckResult
Useful for broadly applicable policies with no specific exceptions
Policies in code
Config Rules Managed and Custom Rules
Managed Rules
• Pre-built, but need to turn on
• Triggered periodically/on changes and apply to specific resources
• Modify publishes source on GitHub to customize further
Useful for resources with specific policies. Flexible.
Policies in code
Custom Rules
• Write up your own rules. Ultimate flexibility
• Publish your best practices on GitHub
• Annotate results to add policy details or tickets
Codify recommendations
Also see:
https://github.com/awslabs/aws-config-rules
Create Policies in code
Assess Compliance
Assess compliance
• Audit assessment is a spot check
• Policies in code  Continuous assessments
• Self service governance
• Prioritize assessments
• Find an owner for the result
Options for assessing compliance
Config Rules to assess and report configuration
compliance
• Annotate results with resource owner
• Custom Rules integrate with ticketing
AWS Config + Inventory
Assess compliance using Config Rules
EC2 Systems Manager and AWS Config will capture
• Software Inventory in EC2 instance
• Firewall rules
• Patch level
• Application version
Inventory Assessment
Create Policies in code
Assessment and Governance
Fix violations quickly
Using Config Rules and CloudWatch Events
Use CloudWatch Events and Lambda triggers to fix things
Custom Config Rules for remediations in Lambda
Enable traceability and logging for audit
CloudTrail Data Events for S3
Act on API activity immediately in CloudWatch Events
• Data Events for S3
• Trigger rules that “fix” the problem
• Trace invocations and actions in CloudWatch Logs
S3, CloudTrail, CloudWatch Events, Lambda
Create Policies in code
Assessment and Governance
Fix Violations
Deal with Escalations
Security Escalations
• Logs, activity data is critical
• Use automation to increase surveillance on suspicious
activity (e.g. CloudTrail is turned off)
• Timely response could be to quarantine
• SOP should be in code!
Create Policies in code
Assessment and Governance
Fix Violations
Deal with Escalations
Generating Evidence
Reports
• Weekly Trusted Advisor reports
• Archived CloudTrail activity in S3 (never delete)
• CloudTrail Lookup for 1 week, CloudWatch Logs for
longer term lookup
• AWS Config Snapshot for broad, point-in-time views
• AWS Config GetResourceConfigHistory
>get-resource-config-history --resource-type <value> --resource-id <value> [--later-time <value>] [--earlier-time
<value>]
Create Policies in code
Assessment and Governance
Fix Violations
Deal with Escalations
Evidence for Audit
Automate and share: Templatize
across accounts, regions, industries
The real world
The Company
Siemens Mobility Services
Digital Services
Smart remote monitoring and data services for
maximum reliability
Siemens AG - MO CS STC SC-SO October 2016
Rail vehicles deliver large volumes of data –
but what do we do with it to generate value?
• Modern trains send 1
billion data points per
year
• Additionally:
Work orders
Spare parts list
Geo data
The basis
Turn all this
data
into
information
und derive
actions
The challenge
100%
Availability
for you
Siemens AG - MO CS STC SC-SO October 2016
We provide a common data policy
• The collected technical data belongs to the customer.
• The data will be stored by Siemens or by contracted sub-
suppliers of Siemens.
• Siemens shall fulfill it‘s contractual obligations, e.g.
providing cockpit or reports. For other reasons than this,
Siemens is not obliged to store the data and is not liable
for loss of data (unless this is contracted).
• However, Siemens is obliged to protect the customers
data by applying state-of-the-art security measures to do
so.
• Siemens can use the data for its own purposes
during the contract period (right to use).
Selling the data is not permitted!
• Customer may request after the end of the contract
that Siemens erases all the data with regards
to the customer contract.
Customer “owns” the data from the assets and
Siemens can “use” it
Data input
Big data
from assets
Data analytics
Algorithmic
processes
Data output
Smart data generated
by Siemens Experts
SiemensCustomer Customer
and Siemens
Siemens AG - MO CS STC SC-SO October 2016
10
11
Railigent™
The platform to manage your assets smarter
10
01
011010101101
00
0
1
1
1
0
1
1
0 1 0
00101011010 00111
0 1 1 0
01100110100111011010
10101011010 0 0 1101110
0 1 1 010 1 0 11
0 1
0
0
0
1
1
1
0
11010
011 010 1010
10 101 10111
001001011
1011010111
011001111
001001011
11010
01110
Management
Dispatcher
Maintenance engineer
Data visualizationData evaluationData processingData transmission
Railigent Connect
Secure data transmission
from sensor to central
data storage
Turning data into value and enabling Digital Services
solutions (Smart Monitoring,
Smart Data Analysis and Smart Prediction)
Railigent
powered by Sinalytics
Advanced
algorithms
Expertise domain
Know-how
Best practises
Modular
Customized solution packages:
Define reports as you need them
Scalable
From basic to advanced solutions:
Upgrade your system as needed
Open
Fits into your environment:
Standard interfaces ensure
interoperability
Siemens AG - MO CS STC SC-SO October 2016
GovernanceTools
AWS Architecture
AWS
Config / rules
Amazon
CloudWatch
AWS
CloudTrail
AWS Trusted
Advisor
AWS IAM AWS KMS
AWS
CloudFormation
Siemens AG - MO CS STC SC-SO October 2016
Topics to Service mapping
Comliance and Security Topic
Basd on ISO 27001 / 27002 an IEC 62443
Access Control (9) P P
Asset Management (8) P
Communications Security P P
Compliance (18) P P P P
AWS
Config
AWS
CloudTrail
Amazon
CloudWatch
AWS Trusted
Advisor
Siemens AG - MO CS STC SC-SO October 2016
Topics to Service mapping
Comliance and Security Topic
ISO 27001 / 27002
Cryptography (10) P P
Information Security Aspects of Business Continuity
Management (17) P P
Information Security Incident Management (16) P P
Operations Security P P
AWS
Config
AWS
CloudTrail
Amazon
CloudWatch
AWS Trusted
Advisor
Siemens AG - MO CS STC SC-SO October 2016
Used AWS Config Rules:
Pre defined Rules Custom Rules
encrypted-volumes rds-in-private-subnet
s3-bucket-logging-enabled advaced iam policy on diffrent user types
cloud-trail-enabled Advanced security group requirements
eip-attached
root-account-mfa-enabled
iam-password-policy
rds-storage-encrypted
required-tags
Siemens AG - MO CS STC SC-SO October 2016
Good source for star with own rules is:
https://github.com/awslabs/aws-config-rules
Siemens Governance Requirements
Audit
Logfiles
Config
changes AWS
Config
Amazon
CloudWatch
AWS
CloudTrail
Amazon
SNS
AWS
Config rules
https://s3-us-west-2.amazonaws.com/awscloudtrail/cloudwatch-
alarms-for-cloudtrail-api-
activity/CloudWatch_Alarms_for_CloudTrail_API_Activity.json.
Siemens AG - MO CS STC SC-SO October 2016
4 eyes
principle
Regular
checks
Connection
list
Siemens Governance Requirements
AWS Trusted
Advisor
flow logs
AWS Trusted
Advisor
Siemens AG - MO CS STC SC-SO October 2016
Conclusions
• Security shall be the initial part of the development  SecDevOps
• Get a clear view what are the requirements, AWS provides a lot of
tools to fulfill most of the requirements.
• Automation is the key to success.
Siemens AG - MO CS STC SC-SO October 2016
Remember to complete
your evaluations!
Thank you!

More Related Content

What's hot

GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017Amazon Web Services
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersAmazon Web Services
 
Migrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSMigrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSAmazon Web Services
 
Compute Without Servers – Building Applications with AWS Lambda
Compute Without Servers – Building Applications with AWS LambdaCompute Without Servers – Building Applications with AWS Lambda
Compute Without Servers – Building Applications with AWS LambdaAmazon Web Services
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...Amazon Web Services
 
SRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWSSRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWSAmazon Web Services
 
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017Amazon Web Services
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignAmazon Web Services
 
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Amazon Web Services
 
AWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow IntroAWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow IntroIan Massingham
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSAmazon Web Services
 
I servizi AWS per le applicazioni mobili: sviluppo, test e produzione
I servizi AWS per le applicazioni mobili: sviluppo, test e produzioneI servizi AWS per le applicazioni mobili: sviluppo, test e produzione
I servizi AWS per le applicazioni mobili: sviluppo, test e produzioneAmazon Web Services
 
Microservices: Architecting for Innovation - Level 300
Microservices: Architecting for Innovation - Level 300Microservices: Architecting for Innovation - Level 300
Microservices: Architecting for Innovation - Level 300Amazon Web Services
 
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017Building a Data Processing Pipeline on AWS - AWS Summit SG 2017
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS SecurityAmazon Web Services
 
Vancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakVancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakAmazon Web Services
 

What's hot (20)

GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
GitHub Enterprise and Automation with Codedeploy - AWS Summit SG 2017
 
Build an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million UsersBuild an App on AWS for Your First 10 Million Users
Build an App on AWS for Your First 10 Million Users
 
Protecting Our Data on AWS
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
 
Migrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWSMigrating to the cloud - Windows on AWS
Migrating to the cloud - Windows on AWS
 
AWS Governance Overview - Beach
AWS Governance Overview - BeachAWS Governance Overview - Beach
AWS Governance Overview - Beach
 
Compute Without Servers – Building Applications with AWS Lambda
Compute Without Servers – Building Applications with AWS LambdaCompute Without Servers – Building Applications with AWS Lambda
Compute Without Servers – Building Applications with AWS Lambda
 
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
3 Secrets to Becoming a Cloud Security Superhero - Session Sponsored by Trend...
 
SRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWSSRV411 Deep Dive on Mobile Application Development with AWS
SRV411 Deep Dive on Mobile Application Development with AWS
 
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
Governance @ Scale: Compliance Automation in AWS | AWS Public Sector Summit 2017
 
Migrating Large Scale Datasets
Migrating Large Scale DatasetsMigrating Large Scale Datasets
Migrating Large Scale Datasets
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
Security Day - Intro
Security Day - IntroSecurity Day - Intro
Security Day - Intro
 
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017
 
AWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow IntroAWS AWSome Day Roadshow Intro
AWS AWSome Day Roadshow Intro
 
Customer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWSCustomer Case Study: Achieving PCI Compliance in AWS
Customer Case Study: Achieving PCI Compliance in AWS
 
I servizi AWS per le applicazioni mobili: sviluppo, test e produzione
I servizi AWS per le applicazioni mobili: sviluppo, test e produzioneI servizi AWS per le applicazioni mobili: sviluppo, test e produzione
I servizi AWS per le applicazioni mobili: sviluppo, test e produzione
 
Microservices: Architecting for Innovation - Level 300
Microservices: Architecting for Innovation - Level 300Microservices: Architecting for Innovation - Level 300
Microservices: Architecting for Innovation - Level 300
 
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017Building a Data Processing Pipeline on AWS - AWS Summit SG 2017
Building a Data Processing Pipeline on AWS - AWS Summit SG 2017
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Vancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam ElmalakVancouver keynote - AWS Innovate - Sam Elmalak
Vancouver keynote - AWS Innovate - Sam Elmalak
 

Viewers also liked

Web Security Automation: Spend Less Time Securing your Applications
 	  Web Security Automation: Spend Less Time Securing your Applications 	  Web Security Automation: Spend Less Time Securing your Applications
Web Security Automation: Spend Less Time Securing your ApplicationsAmazon Web Services
 
Introduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceIntroduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceAmazon Web Services
 
Getting Started with Amazon Redshift
Getting Started with Amazon RedshiftGetting Started with Amazon Redshift
Getting Started with Amazon RedshiftAmazon Web Services
 
2015 Internet Trends Report
2015 Internet Trends Report2015 Internet Trends Report
2015 Internet Trends ReportIQbal KHan
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...Amazon Web Services
 
Improving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSImproving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSAmazon Web Services
 
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile Apps
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile AppsIntroducing Amazon Pinpoint – Targeted Push Notifications for Mobile Apps
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile AppsAmazon Web Services
 
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQLNEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQLAmazon Web Services
 
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)Amazon Web Services
 
Amazon Redshift Deep Dive - February Online Tech Talks
Amazon Redshift Deep Dive - February Online Tech TalksAmazon Redshift Deep Dive - February Online Tech Talks
Amazon Redshift Deep Dive - February Online Tech TalksAmazon Web Services
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Amazon Web Services
 
Making (Almost) Any Database Faster and Cheaper with Caching
Making (Almost) Any Database Faster and Cheaper with CachingMaking (Almost) Any Database Faster and Cheaper with Caching
Making (Almost) Any Database Faster and Cheaper with CachingAmazon Web Services
 
Agile Data Science 2.0 - Big Data Science Meetup
Agile Data Science 2.0 - Big Data Science MeetupAgile Data Science 2.0 - Big Data Science Meetup
Agile Data Science 2.0 - Big Data Science MeetupRussell Jurney
 
Tugas4 1412510602 dewi_apriliani
Tugas4 1412510602 dewi_aprilianiTugas4 1412510602 dewi_apriliani
Tugas4 1412510602 dewi_aprilianidewiapril1996
 
Deep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech TalksDeep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech TalksAmazon Web Services
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaperRajesh Kumar
 
Lessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiLessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiAmazon Web Services
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Amazon Web Services
 

Viewers also liked (20)

Web Security Automation: Spend Less Time Securing your Applications
 	  Web Security Automation: Spend Less Time Securing your Applications 	  Web Security Automation: Spend Less Time Securing your Applications
Web Security Automation: Spend Less Time Securing your Applications
 
Introduction to Amazon Relational Database Service
Introduction to Amazon Relational Database ServiceIntroduction to Amazon Relational Database Service
Introduction to Amazon Relational Database Service
 
Getting Started with Amazon Redshift
Getting Started with Amazon RedshiftGetting Started with Amazon Redshift
Getting Started with Amazon Redshift
 
2015 Internet Trends Report
2015 Internet Trends Report2015 Internet Trends Report
2015 Internet Trends Report
 
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
AWS re:Invent 2016: Securing Serverless Architectures, and API Filtering at L...
 
Improving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWSImproving Infrastructure Governance on AWS
Improving Infrastructure Governance on AWS
 
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile Apps
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile AppsIntroducing Amazon Pinpoint – Targeted Push Notifications for Mobile Apps
Introducing Amazon Pinpoint – Targeted Push Notifications for Mobile Apps
 
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQLNEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
NEW LAUNCH! Intro to Amazon Athena. Analyze data in S3, using SQL
 
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)
AWS re:Invent 2016: Deep Dive on Amazon Elastic Block Store (STG301)
 
Amazon Redshift Deep Dive - February Online Tech Talks
Amazon Redshift Deep Dive - February Online Tech TalksAmazon Redshift Deep Dive - February Online Tech Talks
Amazon Redshift Deep Dive - February Online Tech Talks
 
Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)Introduction to Identity and Access Management (IAM)
Introduction to Identity and Access Management (IAM)
 
Introduction to AWS Batch
Introduction to AWS BatchIntroduction to AWS Batch
Introduction to AWS Batch
 
Making (Almost) Any Database Faster and Cheaper with Caching
Making (Almost) Any Database Faster and Cheaper with CachingMaking (Almost) Any Database Faster and Cheaper with Caching
Making (Almost) Any Database Faster and Cheaper with Caching
 
Agile Data Science 2.0 - Big Data Science Meetup
Agile Data Science 2.0 - Big Data Science MeetupAgile Data Science 2.0 - Big Data Science Meetup
Agile Data Science 2.0 - Big Data Science Meetup
 
Tugas4 1412510602 dewi_apriliani
Tugas4 1412510602 dewi_aprilianiTugas4 1412510602 dewi_apriliani
Tugas4 1412510602 dewi_apriliani
 
Deep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech TalksDeep Dive on Elastic File System - February 2017 AWS Online Tech Talks
Deep Dive on Elastic File System - February 2017 AWS Online Tech Talks
 
MongoDB NoSQL database a deep dive -MyWhitePaper
MongoDB  NoSQL database a deep dive -MyWhitePaperMongoDB  NoSQL database a deep dive -MyWhitePaper
MongoDB NoSQL database a deep dive -MyWhitePaper
 
Introduction on Amazon EC2
 Introduction on Amazon EC2 Introduction on Amazon EC2
Introduction on Amazon EC2
 
Lessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete StanskiLessons & Use-Cases at Scale - Dr. Pete Stanski
Lessons & Use-Cases at Scale - Dr. Pete Stanski
 
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
Introduction to AWS and Cloud Computing - Module 1 Part 1 - AWSome Day 2017
 

Similar to Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?

Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPFaiza Mehar
 
Automating Security Event Reponse
Automating Security Event ReponseAutomating Security Event Reponse
Automating Security Event ReponseAmazon Web Services
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...Amazon Web Services
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)Amazon Web Services
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...Amazon Web Services
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...Amazon Web Services
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersAmazon Web Services
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareAmazon Web Services
 
Best Practices for SecOps on AWS
Best Practices for SecOps on AWSBest Practices for SecOps on AWS
Best Practices for SecOps on AWSAmazon Web Services
 
Automated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAutomated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAmazon Web Services
 
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Amazon Web Services
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the CloudAmazon Web Services
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...Amazon Web Services
 
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018Amazon Web Services
 
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...Amazon Web Services
 
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...AWS Germany
 
The Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudThe Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudAmazon Web Services
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAmazon Web Services
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Amazon Web Services
 

Similar to Scaling Security Operations and Automating Governance: Which AWS Services Should I Use? (20)

Multi cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCPMulti cloud governance best practices - AWS, Azure, GCP
Multi cloud governance best practices - AWS, Azure, GCP
 
Automating Security Event Reponse
Automating Security Event ReponseAutomating Security Event Reponse
Automating Security Event Reponse
 
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
How Greenhouse Software Unlocked the Power of Machine Data Analytics with Sum...
 
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
AWS re:Invent 2016: Automated Governance of Your AWS Resources (DEV302)
 
AWS Webcast - Sumo Logic
AWS Webcast - Sumo LogicAWS Webcast - Sumo Logic
AWS Webcast - Sumo Logic
 
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
AWS re:Invent 2016: Automating and Scaling Infrastructure Administration with...
 
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
AWS re:Invent 2016: Embracing DevSecOps while Improving Compliance and Securi...
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Best Practices for SecOps on AWS
Best Practices for SecOps on AWSBest Practices for SecOps on AWS
Best Practices for SecOps on AWS
 
Automated Governance of Your AWS Resources
Automated Governance of Your AWS ResourcesAutomated Governance of Your AWS Resources
Automated Governance of Your AWS Resources
 
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
Automated Compliance and Governance with AWS Config and AWS CloudTrail - June...
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
AWS and Symantec: Cyber Defense at Scale (SEC311-S) - AWS re:Invent 2018
 
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...
Best Practices for Managing Security Operations in AWS - March 2017 AWS Onlin...
 
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...
Automatisierte Kontrolle und Transparenz in der AWS Cloud – Autopilot für Com...
 
The Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the CloudThe Automation of Supervision Governance in the Cloud
The Automation of Supervision Governance in the Cloud
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
Security Best Practices for Microsoft Workloads (WIN307) - AWS re:Invent 2018
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Neo4j
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraDeakin University
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesSinan KOZAK
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksSoftradix Technologies
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsMark Billinghurst
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfngoud9212
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024BookNet Canada
 

Recently uploaded (20)

Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024Build your next Gen AI Breakthrough - April 2024
Build your next Gen AI Breakthrough - April 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Artificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning eraArtificial intelligence in the post-deep learning era
Artificial intelligence in the post-deep learning era
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Unblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen FramesUnblocking The Main Thread Solving ANRs and Frozen Frames
Unblocking The Main Thread Solving ANRs and Frozen Frames
 
Benefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other FrameworksBenefits Of Flutter Compared To Other Frameworks
Benefits Of Flutter Compared To Other Frameworks
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Human Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR SystemsHuman Factors of XR: Using Human Factors to Design XR Systems
Human Factors of XR: Using Human Factors to Design XR Systems
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 
Pigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food ManufacturingPigging Solutions in Pet Food Manufacturing
Pigging Solutions in Pet Food Manufacturing
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Bluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdfBluetooth Controlled Car with Arduino.pdf
Bluetooth Controlled Car with Arduino.pdf
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC BiblioShare - Tech Forum 2024
 

Scaling Security Operations and Automating Governance: Which AWS Services Should I Use?

  • 1. © 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Using AWS Services to Automate Governance of Security Controls and Remediate Violations January 19, 2017 Security Ops Which AWS services do I use? Michael Braendle , pprahlad@amazon.com Principal Product Manager, AWS
  • 2. What to Expect from the Session • SecDevOps: What? • Services and features galore: What do I use? • Using relevant services • Customer example: Siemens AG - Making it real Improve your quality of life
  • 4. Meet Toby, Software developer Flexibility, Speed, Low cost, Reliability, .. .. .. Freedom to be creative ….throughout his professional career of 2 full years! Is a do-er Wants impact
  • 5. Meet Joe, Mr. Security • Leading cloud adoption efforts • Part of central cloud security team • Manages other infrastructures • Deals with security escalations • Does not like being in critical path • Wants to works smart, but has to work hard Ultimately responsible for security
  • 6. Security: A lot going on Security Policy Compliance regimes Report compliance Evangelize cloud within the org and outside Put out fires Investigate issues deeply
  • 7. AWS Tools could help AWS Config Rules AWS CloudTrail Trusted Advisor CloudWatch Events VPC Flow Logs AWS WAF Security Certificate Manager IAM Security Certificate Manager
  • 8. Security: A lot going on Security Policy Compliance regimes Report compliance Evangelize cloud within the org and outside Put fires out Investigate issues deeply Many Many services Many Many features
  • 9. How do I sustain this?
  • 10. Joe’s typical tasks 1. Create security policies 2. Assess compliance; help others check for compliance 3. Investigate and analyze relevant information; fix critical security issues quickly 4. Deal with escalations 5. Generate evidence and reports
  • 12. Policies in code Trusted Advisor Best Practice checks • Get 35+ checks with zero effort • Example: ELBs with missing security groups, S3 Bucket open access permissions, etc. • Create an administrator role in each account • Assume admin role to read check status using TA APIs • DescribeTrustedAdvisorCheckSummaries • DescribeTrustedAdvisorCheckResult Useful for broadly applicable policies with no specific exceptions
  • 13.
  • 14. Policies in code Config Rules Managed and Custom Rules Managed Rules • Pre-built, but need to turn on • Triggered periodically/on changes and apply to specific resources • Modify publishes source on GitHub to customize further Useful for resources with specific policies. Flexible.
  • 15.
  • 16. Policies in code Custom Rules • Write up your own rules. Ultimate flexibility • Publish your best practices on GitHub • Annotate results to add policy details or tickets
  • 17.
  • 21. Assess compliance • Audit assessment is a spot check • Policies in code  Continuous assessments • Self service governance • Prioritize assessments • Find an owner for the result
  • 22. Options for assessing compliance Config Rules to assess and report configuration compliance • Annotate results with resource owner • Custom Rules integrate with ticketing
  • 23. AWS Config + Inventory Assess compliance using Config Rules EC2 Systems Manager and AWS Config will capture • Software Inventory in EC2 instance • Firewall rules • Patch level • Application version
  • 25. Create Policies in code Assessment and Governance
  • 27. Using Config Rules and CloudWatch Events Use CloudWatch Events and Lambda triggers to fix things Custom Config Rules for remediations in Lambda Enable traceability and logging for audit
  • 28. CloudTrail Data Events for S3 Act on API activity immediately in CloudWatch Events • Data Events for S3 • Trigger rules that “fix” the problem • Trace invocations and actions in CloudWatch Logs
  • 29. S3, CloudTrail, CloudWatch Events, Lambda
  • 30. Create Policies in code Assessment and Governance Fix Violations
  • 32. Security Escalations • Logs, activity data is critical • Use automation to increase surveillance on suspicious activity (e.g. CloudTrail is turned off) • Timely response could be to quarantine • SOP should be in code!
  • 33. Create Policies in code Assessment and Governance Fix Violations Deal with Escalations
  • 35. Reports • Weekly Trusted Advisor reports • Archived CloudTrail activity in S3 (never delete) • CloudTrail Lookup for 1 week, CloudWatch Logs for longer term lookup • AWS Config Snapshot for broad, point-in-time views • AWS Config GetResourceConfigHistory >get-resource-config-history --resource-type <value> --resource-id <value> [--later-time <value>] [--earlier-time <value>]
  • 36. Create Policies in code Assessment and Governance Fix Violations Deal with Escalations Evidence for Audit Automate and share: Templatize across accounts, regions, industries
  • 37.
  • 40. Siemens Mobility Services Digital Services Smart remote monitoring and data services for maximum reliability Siemens AG - MO CS STC SC-SO October 2016
  • 41. Rail vehicles deliver large volumes of data – but what do we do with it to generate value? • Modern trains send 1 billion data points per year • Additionally: Work orders Spare parts list Geo data The basis Turn all this data into information und derive actions The challenge 100% Availability for you Siemens AG - MO CS STC SC-SO October 2016
  • 42. We provide a common data policy • The collected technical data belongs to the customer. • The data will be stored by Siemens or by contracted sub- suppliers of Siemens. • Siemens shall fulfill it‘s contractual obligations, e.g. providing cockpit or reports. For other reasons than this, Siemens is not obliged to store the data and is not liable for loss of data (unless this is contracted). • However, Siemens is obliged to protect the customers data by applying state-of-the-art security measures to do so. • Siemens can use the data for its own purposes during the contract period (right to use). Selling the data is not permitted! • Customer may request after the end of the contract that Siemens erases all the data with regards to the customer contract. Customer “owns” the data from the assets and Siemens can “use” it Data input Big data from assets Data analytics Algorithmic processes Data output Smart data generated by Siemens Experts SiemensCustomer Customer and Siemens Siemens AG - MO CS STC SC-SO October 2016
  • 43. 10 11 Railigent™ The platform to manage your assets smarter 10 01 011010101101 00 0 1 1 1 0 1 1 0 1 0 00101011010 00111 0 1 1 0 01100110100111011010 10101011010 0 0 1101110 0 1 1 010 1 0 11 0 1 0 0 0 1 1 1 0 11010 011 010 1010 10 101 10111 001001011 1011010111 011001111 001001011 11010 01110 Management Dispatcher Maintenance engineer Data visualizationData evaluationData processingData transmission Railigent Connect Secure data transmission from sensor to central data storage Turning data into value and enabling Digital Services solutions (Smart Monitoring, Smart Data Analysis and Smart Prediction) Railigent powered by Sinalytics Advanced algorithms Expertise domain Know-how Best practises Modular Customized solution packages: Define reports as you need them Scalable From basic to advanced solutions: Upgrade your system as needed Open Fits into your environment: Standard interfaces ensure interoperability Siemens AG - MO CS STC SC-SO October 2016
  • 44. GovernanceTools AWS Architecture AWS Config / rules Amazon CloudWatch AWS CloudTrail AWS Trusted Advisor AWS IAM AWS KMS AWS CloudFormation Siemens AG - MO CS STC SC-SO October 2016
  • 45. Topics to Service mapping Comliance and Security Topic Basd on ISO 27001 / 27002 an IEC 62443 Access Control (9) P P Asset Management (8) P Communications Security P P Compliance (18) P P P P AWS Config AWS CloudTrail Amazon CloudWatch AWS Trusted Advisor Siemens AG - MO CS STC SC-SO October 2016
  • 46. Topics to Service mapping Comliance and Security Topic ISO 27001 / 27002 Cryptography (10) P P Information Security Aspects of Business Continuity Management (17) P P Information Security Incident Management (16) P P Operations Security P P AWS Config AWS CloudTrail Amazon CloudWatch AWS Trusted Advisor Siemens AG - MO CS STC SC-SO October 2016
  • 47. Used AWS Config Rules: Pre defined Rules Custom Rules encrypted-volumes rds-in-private-subnet s3-bucket-logging-enabled advaced iam policy on diffrent user types cloud-trail-enabled Advanced security group requirements eip-attached root-account-mfa-enabled iam-password-policy rds-storage-encrypted required-tags Siemens AG - MO CS STC SC-SO October 2016 Good source for star with own rules is: https://github.com/awslabs/aws-config-rules
  • 48. Siemens Governance Requirements Audit Logfiles Config changes AWS Config Amazon CloudWatch AWS CloudTrail Amazon SNS AWS Config rules https://s3-us-west-2.amazonaws.com/awscloudtrail/cloudwatch- alarms-for-cloudtrail-api- activity/CloudWatch_Alarms_for_CloudTrail_API_Activity.json. Siemens AG - MO CS STC SC-SO October 2016
  • 49. 4 eyes principle Regular checks Connection list Siemens Governance Requirements AWS Trusted Advisor flow logs AWS Trusted Advisor Siemens AG - MO CS STC SC-SO October 2016
  • 50. Conclusions • Security shall be the initial part of the development  SecDevOps • Get a clear view what are the requirements, AWS provides a lot of tools to fulfill most of the requirements. • Automation is the key to success. Siemens AG - MO CS STC SC-SO October 2016

Editor's Notes

  1. We have this session a the end of the conference because we wanted to showcase some of the new capabilities we just launched You’ll not only learn more about these capabilities, but also see how we can use them
  2. As Siemens mobility we develop highspeed, commuter trains metros ,lightrails and also the rail automation and electrification part for mass transportation systems all over the world.
  3. Our goal is 100% availabilty for the cusotmers fleet
  4. One of our main perquisite is that the data belongs to our customers. We help them with our people expertise and tools to get most out of the data.
  5. The railigent platform based on AWS and is full new cloud native approach to get most out of the data. We benefit from the AWS Ecosystem by gaining modular services with high flexibility and scalability
  6. Complete Environment deployment is done via CloudFormation We have 4 Levels in our Account Structure. 1. the Sandbox where all developers can play around an learn 2. The dev account for develop in an near production environment 3. The test account for pre production tests 4. Finally the production account where the customer data is processed. The dev and test have also access to the production data based on an granular access policy and read-only rights. For Cloud Trail we use the Vault principle as best practice -> store everything in an external account s3-bucket with limited rights
  7. We have an Internal Requirement Database based on classification with shown topics on ISO 27001 and IEC 62443 (industrial automation and control system security ) There we have over a 100 requirements for security and operation assigned to the chapters shown on the slide The numbers in brackets represents the chapters in the ISO 1. For Access Control there are requirements like user management, password complexity and so on. 2. For Asset management there is for example an requirement that we always need to know what was running in past and what's running now. 3. Communications security demands secure communication over all layers. 4. Compliance is more about the process stuff like doing a self-assessment and risk analysis
  8. 5. Cryptography should be clear, it is about preferred cipher suits and allowed algorithm and how to deal with certificates 6. Information Security Aspects of Business Continuity Management is mainly about to having an IT Disaster Recovery Plan 7. Information Security Incident Management how to deal with incidents, think about escalation procedures before something happens. 8. And finally Operations Security, know what's running, document everything do change, demand and capacity management. This is for today the most discussed chapter on our side because of were in a transformation from an classic it operations department to an secdevops team. There are others like Enviromenatal & Physical Controles which i let out because it is fullfiled by AWS directly
  9. We use some of the standart rules and are constantly expanding it by custome rules based on the requirments i showed before. Examples are rds-in-private-subnet advaced iam policy on diffrent user types Advanced security group requirements
  10. We have an Default set which is delivered by our global IT department on every deployed account. There for there is an centralized order process for ordering accounts internally. We have an automated audit process that is established always before the first users access an account full automated by Cloud Watch and Cloud Trial supported by SNS for notifications. In background you see an example code CloudWatch_Alarms_for_CloudTrail_API_Activity which is also public availible and helps us a lot. We´re tracking every config Change by AWS config and controlling the important things by config rules As mentioned before the consolidated billing allows us to use the full functionality from Trusted Advisor
  11. 4eyes principle means alway 2 people each time one with an operations view and one with a secuirty view have to look on the reports and notifications coming out of the trusted advisor and our config rules checks Regular checks are done automatic when new resources are deployed via attached config rules and additionally on an regular time basis by the trusted advisor that 2 layer security checks helps us to gain trust from our info sec department As next step we have activated flow logs and will now establish additional checks on the data flows.
  12. Steven Schmidt -> Security should be step Zero An integrated solution is necessary for an successful development Very help full for us was -> Excellent Support by AWS Experts Excellent Documentation, Whitepapers and Checklists an all points to on major conlusion You´ve heard it all the time on most of the talks but it´s true Automation is the key.