SlideShare a Scribd company logo
1 of 18
Intro
AWS Cloud Security
2
▪ Cloud security at AWS is the highest priority. As an AWS customer,
you will benefit from a data center and network architecture built
to meet the requirements of the most security-sensitive
organizations.
▪ An advantage of the AWS cloud is that it allows customers to scale
and innovate, while maintaining a secure environment. Customers
pay only for the services they use, meaning that you can have the
security you need, but without the upfront expenses, and at a
lower cost than in an on-premises environment.
AWS Compliance & Security
3
▪ Security and Compliance is a shared responsibility between AWS and the
customer.
▪ This shared model can help relieve customer’s operational burden as AWS
operates, manages and controls the components from the host operating
system and virtualization layer down to the physical security of the facilities in
which the service operates.
▪ The customer assumes responsibility and management of the guest operating
system (including updates and security patches), other associated application
software as well as the configuration of the AWS provided security group
firewall.
▪ Customers should carefully consider the services they choose as their
responsibilities vary depending on the services used, the integration of those
services into their IT environment, and applicable laws and regulations.
▪ The nature of this shared responsibility also provides the flexibility and
customer control that permits the deployment. As shown in the chart below,
this differentiation of responsibility is commonly referred to as Security “of” the
Cloud versus Security “in” the Cloud.
AWS Compliance & Security
4
▪ AWS responsibility “Security of the Cloud” - AWS is responsible
for protecting the infrastructure that runs all of the services
offered in the AWS Cloud.This infrastructure is composed of the
hardware, software, networking, and facilities that runAWS Cloud
services.
▪ Customer responsibility “Security in the Cloud” – Customer
responsibility will be determined by the AWS Cloud services that a
customer selects.This determines the amount of configuration
work the customer must perform as part of their security
responsibilities. For example, services such as Amazon Elastic
Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud
(AmazonVPC), and Amazon S3 are categorized as Infrastructure as
a Service (IaaS) and, as such, require the customer to perform all of
the necessary security configuration and management tasks
AWS Compliance & Security
5
▪ AWS responsibility “Security of the Cloud” - AWS is responsible
for protecting the infrastructure that runs all of the services
offered in the AWS Cloud.This infrastructure is composed of the
hardware, software, networking, and facilities that runAWS Cloud
services.
▪ Customer responsibility “Security in the Cloud” – Customer
responsibility will be determined by the AWS Cloud services that a
customer selects.This determines the amount of configuration
work the customer must perform as part of their security
responsibilities. For example, services such as Amazon Elastic
Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud
(AmazonVPC), and Amazon S3 are categorized as Infrastructure as
a Service (IaaS) and, as such, require the customer to perform all of
the necessary security configuration and management tasks
AWS Compliance & Security
6
Shared Responsibility Model
AWS Compliance & Security
7
▪ Inherited Controls – Controls which a customer fully inherits from AWS.
– Physical and Environmental controls
▪ Shared Controls – Controls which apply to both the infrastructure layer and customer layers, but in
completely separate contexts or perspectives. In a shared control, AWS provides the requirements
for the infrastructure and the customer must provide their own control implementation within their
use of AWS services. Examples include:
– Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure,
but customers are responsible for patching their guest OS and applications.
– Configuration Management – AWS maintains the configuration of its infrastructure devices, but
a customer is responsible for configuring their own guest operating systems, databases, and
applications.
– Awareness &Training - AWS trains AWS employees, but a customer must train their own
employees.
▪ Customer Specific – Controls which are solely the responsibility of the customer based on the
application they are deploying within AWS services. Examples include:
– Service and Communications Protection or Zone Security which may require a customer to
route or zone data within specific security environments.
AWS WAF
8
▪ AWSWAF is a web application firewall that lets you monitor the
HTTP and HTTPS requests that are forwarded toAmazon
CloudFront or an Application Load Balancer.
▪ AWSWAF also lets you control access to your content.
▪ Based on conditions that you specify, such as the IP addresses
that requests originate from or the values of query strings,
CloudFront or an Application Load Balancer responds to requests
either with the requested content or with an HTTP 403 status
code (Forbidden).
▪ You also can configure CloudFront to return a custom error page
when a request is blocked.
AWS WAF Working
9
▪ You use AWS WAF to control how Amazon CloudFront or an Application
Load Balancer responds to web requests.You start by creating
conditions, rules, and web access control lists (web ACLs).You define
your conditions, combine your conditions into rules, and combine the
rules into a web ACL.
– Conditions
▪ Conditions define the basic characteristics that you want AWSWAF to watch for in web
requests
– Rules
▪ You combine conditions into rules to precisely target the requests that you want to
allow, block, or count. AWSWAF provides two types of rules
– Web ACLs
▪ After you combine your conditions into rules, you combine the rules into a web ACL.
This is where you define an action for each rule—allow, block, or count—and a default
action
– A default action
▪ The default action determines whetherAWSWAF allows or blocks a request that
doesn't match all the conditions in any of the rules in the web ACL.
AWS Shield
10
▪ AWS provides AWS Shield Standard and AWS Shield Advanced for
protection against DDoS attacks.
▪ AWS Shield Standard is automatically included at no extra cost
beyond what you already pay forAWSWAF and your other AWS
services.
▪ For added protection against DDoS attacks, AWS offersAWS
Shield Advanced.
▪ AWS Shield Advanced provides expanded DDoS attack protection
for yourAmazon EC2 instances, Elastic Load Balancing load
balancers, CloudFront distributions, and Route 53 hosted zones.
AWS Shield Working
11
▪ A distributed denial of service (DDoS) attack is an attack in which
multiple compromised systems attempt to flood a target, such as
a network or web application, with traffic. A DDoS attack can
prevent legitimate users from accessing a service and can cause
the system to crash due to the overwhelming traffic volume.
▪ AWS provides two levels of protection against DDoS attacks: AWS
Shield Standard and AWS Shield Advanced.
– AWS Shield Standard
– AWS Shield Advanced
AWS Shield Working
12
▪ AWS Shield Standard
– All AWS customers benefit from the automatic protections of AWS Shield
Standard, at no additional charge.
– AWS Shield Standard defends against most common, frequently occurring
network and transport layer DDoS attacks that target your web site or
applications.
– WhileAWS Shield Standard helps protect allAWS customers, you get
particular benefit if you are using Amazon CloudFront and Amazon Route 53.
– These services receive comprehensive availability protection against all
known infrastructure (Layer 3 and 4) attacks.
AWS Shield Working
13
▪ AWS Shield Advanced
– For higher levels of protection against attacks targeting your web
applications running on Amazon EC2, Elastic Load Balancing (ELB),
CloudFront, and Route 53 resources, you can subscribe to AWS Shield
Advanced.
– AWS ShieldAdvanced provides expanded DDoS attack protection for these
resources.
AWS Trusted Advisor
14
▪ Trusted Advisor provides advice about yourAWS Account in the
areas of:
– Cost Optimization
– FaultTolerance
– Performance
– Service Limits
– Security
It highlights potential problems with the way you use AWS.
AWS Inspector
15
▪ Amazon Inspector checks the configuration of EC2 instances. An
agent runs on EC2 instances and checks operating system
patches, known vulnerabilities, and common issues.
AWS Inspector vs Trusted
Advisor
16
▪ Trusted Advisor applies to the AWS account and AWS services
▪ Amazon Inspector applies to the content of multiple EC2
instances
AWS Inspector vs Trusted
Advisor
17
▪ Trusted Advisor applies to the AWS account and AWS services
▪ Amazon Inspector applies to the content of multiple EC2
instances
Summary
18
AWS Shared Security Responsibility Model

More Related Content

What's hot

AWSome Day 2016 - Module 2: Infrastructure Services
AWSome Day 2016 - Module 2: Infrastructure ServicesAWSome Day 2016 - Module 2: Infrastructure Services
AWSome Day 2016 - Module 2: Infrastructure Services
Amazon Web Services
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
Martin Yan
 

What's hot (20)

Cloud Security (AWS)
Cloud Security (AWS)Cloud Security (AWS)
Cloud Security (AWS)
 
Datensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web DayDatensicherheit mit AWS - AWS Security Web Day
Datensicherheit mit AWS - AWS Security Web Day
 
Aws security best practices
Aws security best practicesAws security best practices
Aws security best practices
 
Introduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar SeriesIntroduction to Three AWS Security Services - November 2016 Webinar Series
Introduction to Three AWS Security Services - November 2016 Webinar Series
 
Best Practices in Secure Cloud Migration
Best Practices in Secure Cloud MigrationBest Practices in Secure Cloud Migration
Best Practices in Secure Cloud Migration
 
AWSome Day 2016 - Module 2: Infrastructure Services
AWSome Day 2016 - Module 2: Infrastructure ServicesAWSome Day 2016 - Module 2: Infrastructure Services
AWSome Day 2016 - Module 2: Infrastructure Services
 
Meetup Protect from Ransomware Attacks
Meetup Protect from Ransomware AttacksMeetup Protect from Ransomware Attacks
Meetup Protect from Ransomware Attacks
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Deep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems ManagerDeep Dive on Amazon EC2 Systems Manager
Deep Dive on Amazon EC2 Systems Manager
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 
AWS Well Architected Framework
AWS Well Architected FrameworkAWS Well Architected Framework
AWS Well Architected Framework
 
Understanding AWS Security
 Understanding AWS Security  Understanding AWS Security
Understanding AWS Security
 
Enterprise Applications on AWS
Enterprise Applications on AWSEnterprise Applications on AWS
Enterprise Applications on AWS
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 
AWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's PerspectiveAWS Security: A Practitioner's Perspective
AWS Security: A Practitioner's Perspective
 
What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...
What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...
What is AWS | AWS Certified Solutions Architect | AWS Tutorial | AWS Training...
 
Security best practices on AWS cloud
Security best practices on AWS cloudSecurity best practices on AWS cloud
Security best practices on AWS cloud
 
AWS_Security_Essentials
AWS_Security_EssentialsAWS_Security_Essentials
AWS_Security_Essentials
 
Serverless SecOps Automation on AWS at AWS UG Krakow, Poland
Serverless SecOps Automation on AWS at AWS UG Krakow, PolandServerless SecOps Automation on AWS at AWS UG Krakow, Poland
Serverless SecOps Automation on AWS at AWS UG Krakow, Poland
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 

Similar to Security

Aws auditing security_checklist
Aws auditing security_checklistAws auditing security_checklist
Aws auditing security_checklist
saifam
 
Aws web-hosting-best-practices
Aws web-hosting-best-practicesAws web-hosting-best-practices
Aws web-hosting-best-practices
saifam
 
aws_security_incident_response.pdf
aws_security_incident_response.pdfaws_security_incident_response.pdf
aws_security_incident_response.pdf
NIRMALKUMAR274891
 
Examview cloud security summary
Examview cloud security summaryExamview cloud security summary
Examview cloud security summary
William McIntosh
 

Similar to Security (20)

Shared Responsibility Model.pptx
Shared Responsibility Model.pptxShared Responsibility Model.pptx
Shared Responsibility Model.pptx
 
CLOUD COMPUTING.pptx
CLOUD COMPUTING.pptxCLOUD COMPUTING.pptx
CLOUD COMPUTING.pptx
 
Aws auditing security_checklist
Aws auditing security_checklistAws auditing security_checklist
Aws auditing security_checklist
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Top 15 aws security interview questions
Top 15 aws security interview questionsTop 15 aws security interview questions
Top 15 aws security interview questions
 
awsppt.pptx
awsppt.pptxawsppt.pptx
awsppt.pptx
 
Introduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 NetworksIntroduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 Networks
 
Introduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 NetworksIntroduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 Networks
 
Overview oracle-e-business-suite-aws
Overview oracle-e-business-suite-awsOverview oracle-e-business-suite-aws
Overview oracle-e-business-suite-aws
 
Aws web-hosting-best-practices
Aws web-hosting-best-practicesAws web-hosting-best-practices
Aws web-hosting-best-practices
 
Tcp security white paper
Tcp security white paperTcp security white paper
Tcp security white paper
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
aws_security_incident_response.pdf
aws_security_incident_response.pdfaws_security_incident_response.pdf
aws_security_incident_response.pdf
 
Deep Dive: Hybrid Architectures
Deep Dive: Hybrid ArchitecturesDeep Dive: Hybrid Architectures
Deep Dive: Hybrid Architectures
 
Examview cloud security summary
Examview cloud security summaryExamview cloud security summary
Examview cloud security summary
 
Pitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overviewPitt Immersion Day Module 5 - security overview
Pitt Immersion Day Module 5 - security overview
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 

More from Parag Patil

More from Parag Patil (17)

Aws overview part 1(iam and storage services)
Aws overview   part 1(iam and storage services)Aws overview   part 1(iam and storage services)
Aws overview part 1(iam and storage services)
 
Aws overview part 2(compute services)
Aws overview   part 2(compute services)Aws overview   part 2(compute services)
Aws overview part 2(compute services)
 
Aws object storage and cdn(s3, glacier and cloud front) part 1
Aws object storage and cdn(s3, glacier and cloud front)   part 1Aws object storage and cdn(s3, glacier and cloud front)   part 1
Aws object storage and cdn(s3, glacier and cloud front) part 1
 
Billing & pricing
Billing & pricing Billing & pricing
Billing & pricing
 
Databases overview & concepts
Databases overview & conceptsDatabases overview & concepts
Databases overview & concepts
 
Spring boot-application
Spring boot-applicationSpring boot-application
Spring boot-application
 
Databases on aws part 2
Databases on aws   part 2Databases on aws   part 2
Databases on aws part 2
 
Aws object storage and cdn(s3, glacier and cloud front) part 2
Aws object storage and cdn(s3, glacier and cloud front)   part 2Aws object storage and cdn(s3, glacier and cloud front)   part 2
Aws object storage and cdn(s3, glacier and cloud front) part 2
 
Development tools
Development toolsDevelopment tools
Development tools
 
Cloud concepts-and-technologies
Cloud concepts-and-technologiesCloud concepts-and-technologies
Cloud concepts-and-technologies
 
Aws overview part 3(databases, dns and management services)
Aws overview   part 3(databases, dns and management services)Aws overview   part 3(databases, dns and management services)
Aws overview part 3(databases, dns and management services)
 
Word press site
Word press siteWord press site
Word press site
 
Dynamo db
Dynamo dbDynamo db
Dynamo db
 
Aws object storage and cdn(s3, glacier and cloud front) part 3
Aws object storage and cdn(s3, glacier and cloud front)   part 3Aws object storage and cdn(s3, glacier and cloud front)   part 3
Aws object storage and cdn(s3, glacier and cloud front) part 3
 
Databases on aws part 1
Databases on aws   part 1Databases on aws   part 1
Databases on aws part 1
 
Elastic beanstalk
Elastic beanstalkElastic beanstalk
Elastic beanstalk
 
Identity access management (iam)
Identity access management (iam)Identity access management (iam)
Identity access management (iam)
 

Recently uploaded

Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Sana Rajpoot
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
aakahthapa70
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
aakahthapa70
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048
Ifra Zohaib
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
aakahthapa70
 
Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848
Ifra Zohaib
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
riyasharma00119
 

Recently uploaded (20)

Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
Call Girls in Karachi || 03274100048 || 50+ Hot Sexy Girls Available 24/7
 
Mysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort serviceMysore Call girl service 6289102337 Mysore escort service
Mysore Call girl service 6289102337 Mysore escort service
 
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book nowIndore  ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
Indore ❣️Call Girl 97487*63073 Call Girls in Indore Escort service book now
 
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
Call Girls In {{Connaught Place Delhi}}96679@38988 Indian Russian High Profil...
 
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book nowGuwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
Guwahati ❣️ Call Girl 97487*63073 Call Girls in Guwahati Escort service book now
 
Book_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptxBook_ A Project based approach CHAPTER 1 summary.pptx
Book_ A Project based approach CHAPTER 1 summary.pptx
 
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
Call Girls In {Connaught Place Delhi} 9667938988 IndianRussian High Profile E...
 
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
Call Now ☎9870417354|| Call Girls in Noida Sector 18 Escort Service Noida N.C.R.
 
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
➥🔝9953056974 🔝▻ Anand Vihar Call-girl in Women Seeking Men 🔝Delhi🔝 NCR
 
Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048Call Girls in B-18 Islamabad || 🔝 03274100048
Call Girls in B-18 Islamabad || 🔝 03274100048
 
Udupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort serviceUdupi Call girl service 6289102337 Udupi escort service
Udupi Call girl service 6289102337 Udupi escort service
 
SURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL GSURAT CALL GIRL 92628/71154 SURAT CALL G
SURAT CALL GIRL 92628/71154 SURAT CALL G
 
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls AgencyHire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
Hire 💕 8617370543 Uttara Kannada Call Girls Service Call Girls Agency
 
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
Call Girls In {{Laxmi Nagar Delhi}} 9667938988 Indian Russian High Profile Es...
 
Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848Call Girls in Rawalpindi | 🍆💦 03280288848
Call Girls in Rawalpindi | 🍆💦 03280288848
 
MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154MYSORE CALL GIRLS ESCORT SER 92628/71154
MYSORE CALL GIRLS ESCORT SER 92628/71154
 
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
Low Rate Russian Call Girls In Lajpat Nagar ➡️ 7836950116 Call Girls Service ...
 
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
+91-9310611641 Russian Call Girls In New Delhi Independent Russian Call Girls...
 
BADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL GBADDI CALL GIRL 92628/71154 BADDI CALL G
BADDI CALL GIRL 92628/71154 BADDI CALL G
 
VAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIRVAPI CALL GIRL 92628/71154 VAPI CALL GIR
VAPI CALL GIRL 92628/71154 VAPI CALL GIR
 

Security

  • 2. AWS Cloud Security 2 ▪ Cloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. ▪ An advantage of the AWS cloud is that it allows customers to scale and innovate, while maintaining a secure environment. Customers pay only for the services they use, meaning that you can have the security you need, but without the upfront expenses, and at a lower cost than in an on-premises environment.
  • 3. AWS Compliance & Security 3 ▪ Security and Compliance is a shared responsibility between AWS and the customer. ▪ This shared model can help relieve customer’s operational burden as AWS operates, manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the service operates. ▪ The customer assumes responsibility and management of the guest operating system (including updates and security patches), other associated application software as well as the configuration of the AWS provided security group firewall. ▪ Customers should carefully consider the services they choose as their responsibilities vary depending on the services used, the integration of those services into their IT environment, and applicable laws and regulations. ▪ The nature of this shared responsibility also provides the flexibility and customer control that permits the deployment. As shown in the chart below, this differentiation of responsibility is commonly referred to as Security “of” the Cloud versus Security “in” the Cloud.
  • 4. AWS Compliance & Security 4 ▪ AWS responsibility “Security of the Cloud” - AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud.This infrastructure is composed of the hardware, software, networking, and facilities that runAWS Cloud services. ▪ Customer responsibility “Security in the Cloud” – Customer responsibility will be determined by the AWS Cloud services that a customer selects.This determines the amount of configuration work the customer must perform as part of their security responsibilities. For example, services such as Amazon Elastic Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud (AmazonVPC), and Amazon S3 are categorized as Infrastructure as a Service (IaaS) and, as such, require the customer to perform all of the necessary security configuration and management tasks
  • 5. AWS Compliance & Security 5 ▪ AWS responsibility “Security of the Cloud” - AWS is responsible for protecting the infrastructure that runs all of the services offered in the AWS Cloud.This infrastructure is composed of the hardware, software, networking, and facilities that runAWS Cloud services. ▪ Customer responsibility “Security in the Cloud” – Customer responsibility will be determined by the AWS Cloud services that a customer selects.This determines the amount of configuration work the customer must perform as part of their security responsibilities. For example, services such as Amazon Elastic Compute Cloud (Amazon EC2), AmazonVirtual Private Cloud (AmazonVPC), and Amazon S3 are categorized as Infrastructure as a Service (IaaS) and, as such, require the customer to perform all of the necessary security configuration and management tasks
  • 6. AWS Compliance & Security 6 Shared Responsibility Model
  • 7. AWS Compliance & Security 7 ▪ Inherited Controls – Controls which a customer fully inherits from AWS. – Physical and Environmental controls ▪ Shared Controls – Controls which apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infrastructure and the customer must provide their own control implementation within their use of AWS services. Examples include: – Patch Management – AWS is responsible for patching and fixing flaws within the infrastructure, but customers are responsible for patching their guest OS and applications. – Configuration Management – AWS maintains the configuration of its infrastructure devices, but a customer is responsible for configuring their own guest operating systems, databases, and applications. – Awareness &Training - AWS trains AWS employees, but a customer must train their own employees. ▪ Customer Specific – Controls which are solely the responsibility of the customer based on the application they are deploying within AWS services. Examples include: – Service and Communications Protection or Zone Security which may require a customer to route or zone data within specific security environments.
  • 8. AWS WAF 8 ▪ AWSWAF is a web application firewall that lets you monitor the HTTP and HTTPS requests that are forwarded toAmazon CloudFront or an Application Load Balancer. ▪ AWSWAF also lets you control access to your content. ▪ Based on conditions that you specify, such as the IP addresses that requests originate from or the values of query strings, CloudFront or an Application Load Balancer responds to requests either with the requested content or with an HTTP 403 status code (Forbidden). ▪ You also can configure CloudFront to return a custom error page when a request is blocked.
  • 9. AWS WAF Working 9 ▪ You use AWS WAF to control how Amazon CloudFront or an Application Load Balancer responds to web requests.You start by creating conditions, rules, and web access control lists (web ACLs).You define your conditions, combine your conditions into rules, and combine the rules into a web ACL. – Conditions ▪ Conditions define the basic characteristics that you want AWSWAF to watch for in web requests – Rules ▪ You combine conditions into rules to precisely target the requests that you want to allow, block, or count. AWSWAF provides two types of rules – Web ACLs ▪ After you combine your conditions into rules, you combine the rules into a web ACL. This is where you define an action for each rule—allow, block, or count—and a default action – A default action ▪ The default action determines whetherAWSWAF allows or blocks a request that doesn't match all the conditions in any of the rules in the web ACL.
  • 10. AWS Shield 10 ▪ AWS provides AWS Shield Standard and AWS Shield Advanced for protection against DDoS attacks. ▪ AWS Shield Standard is automatically included at no extra cost beyond what you already pay forAWSWAF and your other AWS services. ▪ For added protection against DDoS attacks, AWS offersAWS Shield Advanced. ▪ AWS Shield Advanced provides expanded DDoS attack protection for yourAmazon EC2 instances, Elastic Load Balancing load balancers, CloudFront distributions, and Route 53 hosted zones.
  • 11. AWS Shield Working 11 ▪ A distributed denial of service (DDoS) attack is an attack in which multiple compromised systems attempt to flood a target, such as a network or web application, with traffic. A DDoS attack can prevent legitimate users from accessing a service and can cause the system to crash due to the overwhelming traffic volume. ▪ AWS provides two levels of protection against DDoS attacks: AWS Shield Standard and AWS Shield Advanced. – AWS Shield Standard – AWS Shield Advanced
  • 12. AWS Shield Working 12 ▪ AWS Shield Standard – All AWS customers benefit from the automatic protections of AWS Shield Standard, at no additional charge. – AWS Shield Standard defends against most common, frequently occurring network and transport layer DDoS attacks that target your web site or applications. – WhileAWS Shield Standard helps protect allAWS customers, you get particular benefit if you are using Amazon CloudFront and Amazon Route 53. – These services receive comprehensive availability protection against all known infrastructure (Layer 3 and 4) attacks.
  • 13. AWS Shield Working 13 ▪ AWS Shield Advanced – For higher levels of protection against attacks targeting your web applications running on Amazon EC2, Elastic Load Balancing (ELB), CloudFront, and Route 53 resources, you can subscribe to AWS Shield Advanced. – AWS ShieldAdvanced provides expanded DDoS attack protection for these resources.
  • 14. AWS Trusted Advisor 14 ▪ Trusted Advisor provides advice about yourAWS Account in the areas of: – Cost Optimization – FaultTolerance – Performance – Service Limits – Security It highlights potential problems with the way you use AWS.
  • 15. AWS Inspector 15 ▪ Amazon Inspector checks the configuration of EC2 instances. An agent runs on EC2 instances and checks operating system patches, known vulnerabilities, and common issues.
  • 16. AWS Inspector vs Trusted Advisor 16 ▪ Trusted Advisor applies to the AWS account and AWS services ▪ Amazon Inspector applies to the content of multiple EC2 instances
  • 17. AWS Inspector vs Trusted Advisor 17 ▪ Trusted Advisor applies to the AWS account and AWS services ▪ Amazon Inspector applies to the content of multiple EC2 instances
  • 18. Summary 18 AWS Shared Security Responsibility Model

Editor's Notes

  1. https://aws.amazon.com/compliance/shared-responsibility-model/
  2. https://aws.amazon.com/blogs/aws/route53-cloudtrail-checks-for-the-aws-trusted-advisor/
  3. https://blog.cloudthat.com/amazon-inspector-application-security-service-in-aws-cloud/
  4. https://www.slideshare.net/AlertLogic/the-aws-shared-responsibility-model-presented-by-amazon-web-services