SlideShare a Scribd company logo
1 of 21
Download to read offline
Future of cyber security www.rasoolirfan.com
Maximize your investment with
AWS Native Security Controls
Future of cyber security www.rasoolirfan.com
How customer prefer to migrate workloads from onpremises to AWS
Future of cyber security www.rasoolirfan.com
AWS
Security, Identity, and Compliance
Products
Future of cyber security www.rasoolirfan.com
Service
AWS Artifact
Product Type
Compliance Reports
Description
The AWS Artifact portal
provides on-demand access to
AWS' security and compliance
documents, also known as
audit artifacts.
1
Future of cyber security www.rasoolirfan.com
2
Service
AWS Certificate
Manager
Product Type
SSL/TLS Certificates
Description
AWS Certificate Manager is a
service that lets you easily
provision, manage, and deploy
Secure Sockets
Layer/Transport Layer
Security (SSL/TLS)
certificates.
Future of cyber security www.rasoolirfan.com
3
Service
AWS Cloud Directory
Product Type
Directory
Description
Amazon Cloud Directory
enables you to build flexible
cloud-native directories for
organizing hierarchies of data
along multiple dimensions.
Future of cyber security www.rasoolirfan.com
4
Service
AWS CloudHSM
Product Type
Key Storage &
Management
Description
The AWS CloudHSM service
helps you meet corporate,
contractual and regulatory
compliance requirements for
data security by using
dedicated Hardware Security
Module (HSM) appliances
within the AWS cloud.
Future of cyber security www.rasoolirfan.com
5
Service
Amazon Cognito
Product Type
User Sign Up & Sign In
Description
Amazon Cognito lets you add
user sign-up/sign-in and
access control to your web
and mobile apps quickly and
easily.
Future of cyber security www.rasoolirfan.com
6
Service
AWS Directory Service
Product Type
Directory
Description
AWS Directory Service for
Microsoft Active Directory
(Enterprise Edition), also
known as AWS Microsoft AD,
enables your directory-aware
workloads and AWS resources
to use managed Active
Directory in the AWS Cloud.
Future of cyber security www.rasoolirfan.com
6
Service
AWS Firewall Manager
Product Type
WAF Management
Description
AWS Firewall Manager is a
security management service
that makes it easier to
centrally configure and
manage AWS WAF rules across
your accounts and
applications.
Future of cyber security www.rasoolirfan.com
7
Service
Amazon GuardDuty
Product Type
Threat Detection
Description
Amazon GuardDuty is a
managed threat detection
service that provides you with
a more accurate and easy way
to continuously monitor and
protect your AWS accounts
and workloads.
Future of cyber security www.rasoolirfan.com
8
Service
AWS Identity and Access
Management (IAM)
Product Type
Access Control
Description
Use AWS Identity and Access
Management (IAM) to control
users' access to AWS services.
Create and manage users and
groups, and grant or deny
access.
Future of cyber security www.rasoolirfan.com
9
Service
Amazon Inspector
Product Type
Security Assessment
Description
Amazon Inspector is an
automated security
assessment service that helps
improve the security and
compliance of applications
deployed on AWS.
Future of cyber security www.rasoolirfan.com
10
Service
AWS Key Management
Service
Product Type
Key Storage &
Management
Description
AWS Key Management Service
(KMS) is a managed service
that makes it easy for you to
create and control the
encryption keys used to
encrypt your data.
Future of cyber security www.rasoolirfan.com
11
Service
Amazon Macie
Product Type
Sensitive Data
Classification
Description
Amazon Macie is a machine
learning-powered security
service to discover, classify,
and protect sensitive data.
Future of cyber security www.rasoolirfan.com
12
Service
AWS Organizations
Product Type
Multiple Account
Management
Description
AWS Organizations offers
policy-based management for
multiple AWS accounts. With
Organizations, you can create
groups of accounts and then
apply policies to those groups.
Future of cyber security www.rasoolirfan.com
13
Service
AWS Shield
Product Type
DDoS Protection
Description
AWS Shield is a managed
Distributed Denial of Service
(DDoS) protection service that
safeguards web applications
running on AWS.
Future of cyber security www.rasoolirfan.com
14
Service
AWS Secrets Manager
Product Type
Secrets management
Description
AWS Secrets Manager enables
you to easily rotate, manage,
and retrieve database
credentials, API keys, and
other secrets throughout their
lifecycle.
Future of cyber security www.rasoolirfan.com
15
Service
AWS Single Sign-On
Product Type
Single Sign-On (SSO)
Description
AWS Single Sign-On (SSO) is a
cloud SSO service that makes
it easy to centrally manage
SSO access to multiple AWS
accounts and business
applications.
Future of cyber security www.rasoolirfan.com
16
Service
AWS WAF
Product Type
Web Application
Firewall
Description
AWS WAF is a web application
firewall that helps protect
your web applications from
common web exploits that
could affect application
availability, compromise
security, or consume excessive
resources.
Future of cyber security www.rasoolirfan.com
Thank you

More Related Content

What's hot

AWS Identity and Access Management and Consolidated Billing
AWS Identity and Access Management and Consolidated BillingAWS Identity and Access Management and Consolidated Billing
AWS Identity and Access Management and Consolidated Billing
Amazon Web Services
 

What's hot (20)

ADFS + IAM
ADFS + IAMADFS + IAM
ADFS + IAM
 
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
AWS Identity, Directory, and Access Services: An Overview - SID201 - Chicago ...
 
Securing enterprise big data workloads on AWS
Securing enterprise big data workloads on AWSSecuring enterprise big data workloads on AWS
Securing enterprise big data workloads on AWS
 
AWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc VersionAWS IAM -- Notes of 20130403 Doc Version
AWS IAM -- Notes of 20130403 Doc Version
 
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-OnAWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
AWS Partner Webcast - Get Closer to the Cloud with Federated Single Sign-On
 
(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014
(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014
(MBL401) Social Logins for Mobile Apps with Amazon Cognito | AWS re:Invent 2014
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Intro to AWS Security
Intro to AWS SecurityIntro to AWS Security
Intro to AWS Security
 
Cloud computing - Compute,Storage,Networking & Security
Cloud computing - Compute,Storage,Networking & SecurityCloud computing - Compute,Storage,Networking & Security
Cloud computing - Compute,Storage,Networking & Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Building Secure Architectures on AWS
Building Secure Architectures on AWSBuilding Secure Architectures on AWS
Building Secure Architectures on AWS
 
Iam presentation
Iam presentationIam presentation
Iam presentation
 
Introduction to AWS IAM
Introduction to AWS IAMIntroduction to AWS IAM
Introduction to AWS IAM
 
Aws IAM
Aws IAMAws IAM
Aws IAM
 
AWS Identity and Access Management and Consolidated Billing
AWS Identity and Access Management and Consolidated BillingAWS Identity and Access Management and Consolidated Billing
AWS Identity and Access Management and Consolidated Billing
 
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
20150924 Xylos Technology Day - Stay in control of your identity with Azure A...
 
Secure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPTSecure and Streamline Access to Your AWS Management Console with Okta PPT
Secure and Streamline Access to Your AWS Management Console with Okta PPT
 
AWS Mobile Services & SDK Introduction & Demo
AWS Mobile Services & SDK Introduction & DemoAWS Mobile Services & SDK Introduction & Demo
AWS Mobile Services & SDK Introduction & Demo
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Aws certified-security
Aws certified-securityAws certified-security
Aws certified-security
 

Similar to Maximize your investment with AWS Native Security Controls

Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214
Amazon Web Services
 

Similar to Maximize your investment with AWS Native Security Controls (20)

Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 
Journey Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWSJourney Through the Cloud - Security Best Practices on AWS
Journey Through the Cloud - Security Best Practices on AWS
 
Mastering SaaS deployment on AWS.pptx
Mastering SaaS deployment on AWS.pptxMastering SaaS deployment on AWS.pptx
Mastering SaaS deployment on AWS.pptx
 
AWS IAM Forensics & Incident Response
AWS IAM Forensics & Incident ResponseAWS IAM Forensics & Incident Response
AWS IAM Forensics & Incident Response
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214Aw some day_essentials3.2ish_072214
Aw some day_essentials3.2ish_072214
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Buy Amazon AWS Accounts .pdf
Buy Amazon AWS Accounts .pdfBuy Amazon AWS Accounts .pdf
Buy Amazon AWS Accounts .pdf
 
Security best practices
Security best practices Security best practices
Security best practices
 
Advanced AWS Security Workshop
Advanced AWS Security WorkshopAdvanced AWS Security Workshop
Advanced AWS Security Workshop
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
Frequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptxFrequently Asked Questions in the AWS Security Interview.pptx
Frequently Asked Questions in the AWS Security Interview.pptx
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Security Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management TrackSecurity Best Practices: AWS AWSome Day Management Track
Security Best Practices: AWS AWSome Day Management Track
 
Security Best Practices
Security Best PracticesSecurity Best Practices
Security Best Practices
 
Security & Compliance (Part 1)
Security & Compliance (Part 1)Security & Compliance (Part 1)
Security & Compliance (Part 1)
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

More from Rasool Irfan

More from Rasool Irfan (8)

45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions45 key vendors and thier online fraud prevention solutions
45 key vendors and thier online fraud prevention solutions
 
Digital workplace security for gen z
Digital workplace security for gen zDigital workplace security for gen z
Digital workplace security for gen z
 
Secure your workloads with microsegmentation
Secure your workloads with microsegmentationSecure your workloads with microsegmentation
Secure your workloads with microsegmentation
 
Build cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEMBuild cost effective Security Data Lake + SIEM
Build cost effective Security Data Lake + SIEM
 
Multi Cloud Security Technology Requirements.
Multi Cloud Security Technology Requirements. Multi Cloud Security Technology Requirements.
Multi Cloud Security Technology Requirements.
 
Ethical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem IrfanEthical Hacking by Rasool Kareem Irfan
Ethical Hacking by Rasool Kareem Irfan
 
Honeypots and honeynets
Honeypots and honeynetsHoneypots and honeynets
Honeypots and honeynets
 
Your growth in corporate life
Your growth in corporate lifeYour growth in corporate life
Your growth in corporate life
 

Recently uploaded

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 

Recently uploaded (20)

Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUKSpring Boot vs Quarkus the ultimate battle - DevoxxUK
Spring Boot vs Quarkus the ultimate battle - DevoxxUK
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, AdobeApidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
Apidays New York 2024 - Scaling API-first by Ian Reasor and Radu Cotescu, Adobe
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf[BuildWithAI] Introduction to Gemini.pdf
[BuildWithAI] Introduction to Gemini.pdf
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdfRising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
Rising Above_ Dubai Floods and the Fortitude of Dubai International Airport.pdf
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Maximize your investment with AWS Native Security Controls

  • 1. Future of cyber security www.rasoolirfan.com Maximize your investment with AWS Native Security Controls
  • 2. Future of cyber security www.rasoolirfan.com How customer prefer to migrate workloads from onpremises to AWS
  • 3. Future of cyber security www.rasoolirfan.com AWS Security, Identity, and Compliance Products
  • 4. Future of cyber security www.rasoolirfan.com Service AWS Artifact Product Type Compliance Reports Description The AWS Artifact portal provides on-demand access to AWS' security and compliance documents, also known as audit artifacts. 1
  • 5. Future of cyber security www.rasoolirfan.com 2 Service AWS Certificate Manager Product Type SSL/TLS Certificates Description AWS Certificate Manager is a service that lets you easily provision, manage, and deploy Secure Sockets Layer/Transport Layer Security (SSL/TLS) certificates.
  • 6. Future of cyber security www.rasoolirfan.com 3 Service AWS Cloud Directory Product Type Directory Description Amazon Cloud Directory enables you to build flexible cloud-native directories for organizing hierarchies of data along multiple dimensions.
  • 7. Future of cyber security www.rasoolirfan.com 4 Service AWS CloudHSM Product Type Key Storage & Management Description The AWS CloudHSM service helps you meet corporate, contractual and regulatory compliance requirements for data security by using dedicated Hardware Security Module (HSM) appliances within the AWS cloud.
  • 8. Future of cyber security www.rasoolirfan.com 5 Service Amazon Cognito Product Type User Sign Up & Sign In Description Amazon Cognito lets you add user sign-up/sign-in and access control to your web and mobile apps quickly and easily.
  • 9. Future of cyber security www.rasoolirfan.com 6 Service AWS Directory Service Product Type Directory Description AWS Directory Service for Microsoft Active Directory (Enterprise Edition), also known as AWS Microsoft AD, enables your directory-aware workloads and AWS resources to use managed Active Directory in the AWS Cloud.
  • 10. Future of cyber security www.rasoolirfan.com 6 Service AWS Firewall Manager Product Type WAF Management Description AWS Firewall Manager is a security management service that makes it easier to centrally configure and manage AWS WAF rules across your accounts and applications.
  • 11. Future of cyber security www.rasoolirfan.com 7 Service Amazon GuardDuty Product Type Threat Detection Description Amazon GuardDuty is a managed threat detection service that provides you with a more accurate and easy way to continuously monitor and protect your AWS accounts and workloads.
  • 12. Future of cyber security www.rasoolirfan.com 8 Service AWS Identity and Access Management (IAM) Product Type Access Control Description Use AWS Identity and Access Management (IAM) to control users' access to AWS services. Create and manage users and groups, and grant or deny access.
  • 13. Future of cyber security www.rasoolirfan.com 9 Service Amazon Inspector Product Type Security Assessment Description Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS.
  • 14. Future of cyber security www.rasoolirfan.com 10 Service AWS Key Management Service Product Type Key Storage & Management Description AWS Key Management Service (KMS) is a managed service that makes it easy for you to create and control the encryption keys used to encrypt your data.
  • 15. Future of cyber security www.rasoolirfan.com 11 Service Amazon Macie Product Type Sensitive Data Classification Description Amazon Macie is a machine learning-powered security service to discover, classify, and protect sensitive data.
  • 16. Future of cyber security www.rasoolirfan.com 12 Service AWS Organizations Product Type Multiple Account Management Description AWS Organizations offers policy-based management for multiple AWS accounts. With Organizations, you can create groups of accounts and then apply policies to those groups.
  • 17. Future of cyber security www.rasoolirfan.com 13 Service AWS Shield Product Type DDoS Protection Description AWS Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards web applications running on AWS.
  • 18. Future of cyber security www.rasoolirfan.com 14 Service AWS Secrets Manager Product Type Secrets management Description AWS Secrets Manager enables you to easily rotate, manage, and retrieve database credentials, API keys, and other secrets throughout their lifecycle.
  • 19. Future of cyber security www.rasoolirfan.com 15 Service AWS Single Sign-On Product Type Single Sign-On (SSO) Description AWS Single Sign-On (SSO) is a cloud SSO service that makes it easy to centrally manage SSO access to multiple AWS accounts and business applications.
  • 20. Future of cyber security www.rasoolirfan.com 16 Service AWS WAF Product Type Web Application Firewall Description AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
  • 21. Future of cyber security www.rasoolirfan.com Thank you