SlideShare a Scribd company logo
1 of 22
Download to read offline
LET'S START!
BUILDING A
GDPR-COMPLIANT
ARCHITECTURE
ON AWS
Expert in full-stack development and AWS
Proficient in modern technologies including ReactJS, NodeJS,
GraphQL, TypeScript
In-depth knowledge of cloud cost optimization techniques
and strategies
Proven experience in cloud migration and deployment
Skilled in cloud security and data management
Familiar with cloud monitoring and analytics tools, such as
Amazon CloudWatch
Knowledge of cloud resource management tools, such as AWS
Auto Scaling or Kubernetes
Experienced with cloud-based storage solutions, such as
Amazon S3 or Google Cloud Storage
About Speaker
$42.00 $42.00
1. What is GDPR?
The GDPR Territory Penalty
Сompliance with the GDPR
(General Data Protection
Regulation) includes
robust requirements that
raise and harmonize
standards for data
protection, security, and
compliance.
Applies to all processing
of personal data either
by organizations that
have an establishment
in the EU.
EU supervisory authorities
can issue fines of up to
EUR 20 million, or 4% of
annual worldwide
turnover, whichever is
higher, for a breach of the
GDPR.
Article 25 of
the GDPR
States that the controller
“shall implement appropriate
technical and organisational
measures for ensuring that, by
default, only personal data which
are necessary for each specific
purpose of the processing are
processed”.
2. Data Access Controls
AWS Identity and Access
Management
Control Access to Web
Applications and Mobile
Apps
Multi-Factor-Authentication
Access to AWS Resources
Defining Boundaries for
Regional Services Access
Temporary Access Tokens
Through AWS STS
Example: you can define a policy that allows full access to all AWS API operations in Amazon EC2,
but explicitly denies access to specific API operations—such as StopInstances and
TerminateInstances—if the user is not authenticated with MFA.
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Sid”: “AllowAllActionsForEC2”,
“Effect”: “Allow”,
“Action”: “ec2:*”,
“Resource”: “*”
},
{
“Sid”: “DenyStopAndTerminateWhenMFAIsNotPResent”,
“Effect”: “Deny”,
“Action”: [
“ec2:StopInstances”,
“ec2:TerminateInstances”
],
“Resource”: “*”,
“Conditions”: {
“BoolIfExists”: {“aws:MultiFactorAuthPresent”:false}
}
}
}
}
The following policy is an example of one method you can use to allow all actions on a specific
Amazon S3 bucket and explicitly deny access to every AWS service that is not Amazon S3.
{
“Version”: “2012-10-17”,
“Statement”: [
{
“Effect”: “Allow”,
“Action”: “s3:*”,
“Resource”: [
“arn:aws:s3:::bucket-name”,
“arn:aws:s3:::bucket-name/*”
],
},
{
“Effect”: “Deny”,
“NotAction”: “s3:*”,
“NotResource”: [
“arn:aws:s3:::bucket-name”,
“arn:aws:s3:::bucket-name/*”
]
}
]
}
2. Data Access Controls
AWS Identity and Access
Management
Control Access to Web
Applications and Mobile
Apps
Multi-Factor-Authentication
Access to AWS Resources
Defining Boundaries for
Regional Services Access
Temporary Access Tokens
Through AWS STS
Monitoring and
Logging
Article 30 of the GDPR states that
“...each controller and, where
applicable, the controller’s
representative, shall maintain a
record of processing activities
under its responsibility”.
3.1 Monitoring and Logging
Manage and Configure Assets with AWS Config
3.2 Monitoring and Logging
Compliance Auditing and Security Analytics -
With AWS CloudTrail, you can continuously monitor AWS account activity.
3.3 Monitoring and Logging
Compliance Auditing and Security Analytics -
AWS CloudTrail logs can also trigger preconfigured Amazon CloudWatch events.
3.4 Monitoring and Logging
Collecting and Processing Logs
Granular logging of access
to Amazon S3 objects
Filtering and monitoring of
HTTP access to
applications with WAF
functions in CloudFront
Detailed information about
flows in the network
through VPC-Flow Logs
Rule-based configuration
verification and actions
with AWS Config rules
3.5 Monitoring and Logging
Discovering and Protecting Data at Scale with Amazon Macie
Article32 of the GDPR states that
“…the controller and the processor shall
implement appropriate technical and
organisational measures to ensure a level of
security appropriate to the risk, including inter
alia as appropriate: […]
(b) the ability to ensure the ongoing
confidentiality, integrity, availability and
resilience of processing systems and services;
[…]
(d) a process for regularly testing, assessing
and evaluating the effectiveness of technical
and organisational measures for ensuring the
security of the processing.”
3.6 Monitoring and Logging
Amazon GuardDuty
is an intelligent threat detection service
that can help customers more accurately
and easily monitor and protect their AWS
accounts
Amazon Inspector
is an automated security assessment
service that helps improve the security
and compliance of applications
deployed on Amazon EC2 instances
AWS Security Hub
Security Hub centralizes and prioritizes
security and compliance findings from
across AWS accounts and services
AWS Control Tower
provides a method to set up and govern
a new, secure, multi-account AWS
environment
Centralized Security Management
Amazon CloudWatch Events
enables you to set up your AWS account
to send events
AWS Systems Manager
provides you visibility and control of your
infrastructure on AWS
AWS Organizations
helps you centrally manage and
govern complex environments
3.6 Monitoring and Logging
Centralized Security Management
Centralized Security Management -
Taking action with AWS Security Hub and Amazon CloudWatch Events
3.6 Monitoring and Logging
Protecting your
Data on AWS
Article 32 of the GDPR requires that
organizations must “…implement appropriate
technical and organisational measures to
ensure a level of security appropriate to the
risk, including …the pseudonymisation and
encryption of personal data[...]”. In addition,
organizations must safeguard against the
unauthorized disclosure of or access to
personal data.”
Encrypt Data at Rest
4.1 Protecting your Data on AWS
Encrypting data at rest is vital for
regulatory compliance and
data protection. It helps to
ensure that sensitive data
saved on disks is not readable
by any user or application
without a valid key. AWS
provides multiple options for
encryption at rest and
encryption key management.
Encrypt Data in Transit
AWS strongly recommends
encrypting data in transit from one
system to another, including
resources within and outside of AWS.
When you create an AWS account, a
logically isolated section of the AWS
Cloud—the Amazon Virtual Private
Cloud (Amazon VPC—is provisioned
to it.
Types of Encryption
4.2 Protecting your Data on AWS
Encryption Tools
AWS Key Management Service AWS Cryptographic Services and Tools
AWS CloudHSM
They securely store a variety of your self-
managed cryptographic keys, including
KMS keys and data keys.
AWS Encryption SDK
Provides a client-side encryption library
for implementing encryption and
decryption operations on all types of data.
Amazon DynamoDB Encryption Client
Provides a client-side encryption
library for encrypting data tables
before sending them to a database
service
Article 32 of the GDPR requires that organizations
must “…implement appropriate technical and
organisational measures to ensure a level of security
appropriate to the risk, including …the
pseudonymisation and encryption of personal data[...]”.
In addition, organizations must safeguard against the
unauthorized disclosure of or access to personal data.”
Data Protection by Design and by Default
Contact us
We will be glad to answer on any questions!
Liudmyla Dziubynska
CTO at Zenbit Tech
Scan the QR-Code to get Lyudmila's
contacts and link to our Cloud
Solutions Hub LinkedIn Group!
Join our Cloud Solutions Hub LinkedIn Group!

More Related Content

What's hot

Serverless Architecture and Best Practices
Serverless Architecture and Best PracticesServerless Architecture and Best Practices
Serverless Architecture and Best Practices
Amazon Web Services
 

What's hot (20)

HSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundationsHSBC and AWS Day - AWS foundations
HSBC and AWS Day - AWS foundations
 
架構這件事 - Azure 可以幫助什麼 - 如何選擇使用什麼 Azure 服務
架構這件事 - Azure 可以幫助什麼 - 如何選擇使用什麼 Azure 服務架構這件事 - Azure 可以幫助什麼 - 如何選擇使用什麼 Azure 服務
架構這件事 - Azure 可以幫助什麼 - 如何選擇使用什麼 Azure 服務
 
Implementing Multi-Region AWS IoT, ft. Analog Devices (IOT401) - AWS re:Inven...
Implementing Multi-Region AWS IoT, ft. Analog Devices (IOT401) - AWS re:Inven...Implementing Multi-Region AWS IoT, ft. Analog Devices (IOT401) - AWS re:Inven...
Implementing Multi-Region AWS IoT, ft. Analog Devices (IOT401) - AWS re:Inven...
 
How to Use Predictive Scaling (API331-R1) - AWS re:Invent 2018
How to Use Predictive Scaling (API331-R1) - AWS re:Invent 2018How to Use Predictive Scaling (API331-R1) - AWS re:Invent 2018
How to Use Predictive Scaling (API331-R1) - AWS re:Invent 2018
 
Amazon ECS Deep Dive
Amazon ECS Deep DiveAmazon ECS Deep Dive
Amazon ECS Deep Dive
 
Build a Multi-Region Serverless Application for Resilience & High Availabilit...
Build a Multi-Region Serverless Application for Resilience & High Availabilit...Build a Multi-Region Serverless Application for Resilience & High Availabilit...
Build a Multi-Region Serverless Application for Resilience & High Availabilit...
 
CI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and FargateCI/CD with AWS Developer Tools and Fargate
CI/CD with AWS Developer Tools and Fargate
 
Security practices in OpenShift
Security practices in OpenShiftSecurity practices in OpenShift
Security practices in OpenShift
 
If AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC ArchitectureIf AMD Adopted OMI in their EPYC Architecture
If AMD Adopted OMI in their EPYC Architecture
 
EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud
EKS vs GKE vs AKS - Evaluating Kubernetes in the CloudEKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud
EKS vs GKE vs AKS - Evaluating Kubernetes in the Cloud
 
Reproducible bioinformatics workflows with Nextflow and nf-core
Reproducible bioinformatics workflows with Nextflow and nf-coreReproducible bioinformatics workflows with Nextflow and nf-core
Reproducible bioinformatics workflows with Nextflow and nf-core
 
CodeBuild CodePipeline CodeDeploy CodeCommit in AWS | Edureka
CodeBuild CodePipeline CodeDeploy CodeCommit in AWS | EdurekaCodeBuild CodePipeline CodeDeploy CodeCommit in AWS | Edureka
CodeBuild CodePipeline CodeDeploy CodeCommit in AWS | Edureka
 
20190206 AWS Black Belt Online Seminar Amazon SageMaker Basic Session
20190206 AWS Black Belt Online Seminar Amazon SageMaker Basic Session20190206 AWS Black Belt Online Seminar Amazon SageMaker Basic Session
20190206 AWS Black Belt Online Seminar Amazon SageMaker Basic Session
 
Aspera on demand for AWS (S3 inc) overview
Aspera on demand for AWS (S3 inc) overviewAspera on demand for AWS (S3 inc) overview
Aspera on demand for AWS (S3 inc) overview
 
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"
Booting UEFI-aware OS on coreboot enabled platform - "In God's Name, Why?"
 
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
SEC306 Using Microsoft Active Directory Across On-Premises and AWS Cloud Wind...
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
20200331 AWS Black Belt Online Seminar AWS Elemental MediaConvert
20200331 AWS Black Belt Online Seminar AWS Elemental MediaConvert20200331 AWS Black Belt Online Seminar AWS Elemental MediaConvert
20200331 AWS Black Belt Online Seminar AWS Elemental MediaConvert
 
Serverless Architecture and Best Practices
Serverless Architecture and Best PracticesServerless Architecture and Best Practices
Serverless Architecture and Best Practices
 
DEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLIDEV323_Introduction to the AWS CLI
DEV323_Introduction to the AWS CLI
 

Similar to Building a GDPR-compliant architecture on AWS.pdf

Similar to Building a GDPR-compliant architecture on AWS.pdf (20)

Securing AWS environments by Ankit Giri
Securing AWS environments by Ankit GiriSecuring AWS environments by Ankit Giri
Securing AWS environments by Ankit Giri
 
Well-Architected for Security: Advanced Session
Well-Architected for Security: Advanced SessionWell-Architected for Security: Advanced Session
Well-Architected for Security: Advanced Session
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Compliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” PrinciplesCompliance in the Cloud Using “Security by Design” Principles
Compliance in the Cloud Using “Security by Design” Principles
 
SEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) ScaleSEC301 Security @ (Cloud) Scale
SEC301 Security @ (Cloud) Scale
 
Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017Managing Security with AWS | AWS Public Sector Summit 2017
Managing Security with AWS | AWS Public Sector Summit 2017
 
Secured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWSSecured Hosting of PCI DSS Compliant Web Applications on AWS
Secured Hosting of PCI DSS Compliant Web Applications on AWS
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
AWS Incident Response Cheat Sheet.pdf
AWS Incident Response Cheat Sheet.pdfAWS Incident Response Cheat Sheet.pdf
AWS Incident Response Cheat Sheet.pdf
 
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts Secure your AWS Account and your Organization's Accounts
Secure your AWS Account and your Organization's Accounts
 
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
Secure Your AWS Account and Your Organization's Accounts - SID202 - Chicago A...
 
Compliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by DesignCompliance in the Cloud Using Security by Design
Compliance in the Cloud Using Security by Design
 
Compliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By DesignCompliance In The Cloud Using Security By Design
Compliance In The Cloud Using Security By Design
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices Journey Through The Cloud - Security Best Practices
Journey Through The Cloud - Security Best Practices
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 

More from Zen Bit Tech

More from Zen Bit Tech (6)

Disaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdfDisaster Recovery on AWS Cloud.pdf
Disaster Recovery on AWS Cloud.pdf
 
Service for Storing Secrets on Microsoft Azure.pdf
Service for Storing Secrets on Microsoft Azure.pdfService for Storing Secrets on Microsoft Azure.pdf
Service for Storing Secrets on Microsoft Azure.pdf
 
Services for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdfServices for Storing Secrets on AWS.pdf
Services for Storing Secrets on AWS.pdf
 
Cloud Migration.pdf
Cloud Migration.pdfCloud Migration.pdf
Cloud Migration.pdf
 
Protect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdfProtect your Data on AWS using the Encryption method.pdf
Protect your Data on AWS using the Encryption method.pdf
 
AWS Cost Optimization.pdf
AWS Cost Optimization.pdfAWS Cost Optimization.pdf
AWS Cost Optimization.pdf
 

Recently uploaded

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Victor Rentea
 

Recently uploaded (20)

Exploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with MilvusExploring Multimodal Embeddings with Milvus
Exploring Multimodal Embeddings with Milvus
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost SavingRepurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
Repurposing LNG terminals for Hydrogen Ammonia: Feasibility and Cost Saving
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
Navigating the Deluge_ Dubai Floods and the Resilience of Dubai International...
 
MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024MINDCTI Revenue Release Quarter One 2024
MINDCTI Revenue Release Quarter One 2024
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
Biography Of Angeliki Cooney | Senior Vice President Life Sciences | Albany, ...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
CNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In PakistanCNIC Information System with Pakdata Cf In Pakistan
CNIC Information System with Pakdata Cf In Pakistan
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
Modular Monolith - a Practical Alternative to Microservices @ Devoxx UK 2024
 
Vector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptxVector Search -An Introduction in Oracle Database 23ai.pptx
Vector Search -An Introduction in Oracle Database 23ai.pptx
 
FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024FWD Group - Insurer Innovation Award 2024
FWD Group - Insurer Innovation Award 2024
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​Elevate Developer Efficiency & build GenAI Application with Amazon Q​
Elevate Developer Efficiency & build GenAI Application with Amazon Q​
 

Building a GDPR-compliant architecture on AWS.pdf

  • 2. Expert in full-stack development and AWS Proficient in modern technologies including ReactJS, NodeJS, GraphQL, TypeScript In-depth knowledge of cloud cost optimization techniques and strategies Proven experience in cloud migration and deployment Skilled in cloud security and data management Familiar with cloud monitoring and analytics tools, such as Amazon CloudWatch Knowledge of cloud resource management tools, such as AWS Auto Scaling or Kubernetes Experienced with cloud-based storage solutions, such as Amazon S3 or Google Cloud Storage About Speaker
  • 3. $42.00 $42.00 1. What is GDPR? The GDPR Territory Penalty Сompliance with the GDPR (General Data Protection Regulation) includes robust requirements that raise and harmonize standards for data protection, security, and compliance. Applies to all processing of personal data either by organizations that have an establishment in the EU. EU supervisory authorities can issue fines of up to EUR 20 million, or 4% of annual worldwide turnover, whichever is higher, for a breach of the GDPR.
  • 4. Article 25 of the GDPR States that the controller “shall implement appropriate technical and organisational measures for ensuring that, by default, only personal data which are necessary for each specific purpose of the processing are processed”.
  • 5. 2. Data Access Controls AWS Identity and Access Management Control Access to Web Applications and Mobile Apps Multi-Factor-Authentication Access to AWS Resources Defining Boundaries for Regional Services Access Temporary Access Tokens Through AWS STS
  • 6. Example: you can define a policy that allows full access to all AWS API operations in Amazon EC2, but explicitly denies access to specific API operations—such as StopInstances and TerminateInstances—if the user is not authenticated with MFA. { “Version”: “2012-10-17”, “Statement”: [ { “Sid”: “AllowAllActionsForEC2”, “Effect”: “Allow”, “Action”: “ec2:*”, “Resource”: “*” }, { “Sid”: “DenyStopAndTerminateWhenMFAIsNotPResent”, “Effect”: “Deny”, “Action”: [ “ec2:StopInstances”, “ec2:TerminateInstances” ], “Resource”: “*”, “Conditions”: { “BoolIfExists”: {“aws:MultiFactorAuthPresent”:false} } } } }
  • 7. The following policy is an example of one method you can use to allow all actions on a specific Amazon S3 bucket and explicitly deny access to every AWS service that is not Amazon S3. { “Version”: “2012-10-17”, “Statement”: [ { “Effect”: “Allow”, “Action”: “s3:*”, “Resource”: [ “arn:aws:s3:::bucket-name”, “arn:aws:s3:::bucket-name/*” ], }, { “Effect”: “Deny”, “NotAction”: “s3:*”, “NotResource”: [ “arn:aws:s3:::bucket-name”, “arn:aws:s3:::bucket-name/*” ] } ] }
  • 8. 2. Data Access Controls AWS Identity and Access Management Control Access to Web Applications and Mobile Apps Multi-Factor-Authentication Access to AWS Resources Defining Boundaries for Regional Services Access Temporary Access Tokens Through AWS STS
  • 9. Monitoring and Logging Article 30 of the GDPR states that “...each controller and, where applicable, the controller’s representative, shall maintain a record of processing activities under its responsibility”.
  • 10. 3.1 Monitoring and Logging Manage and Configure Assets with AWS Config
  • 11. 3.2 Monitoring and Logging Compliance Auditing and Security Analytics - With AWS CloudTrail, you can continuously monitor AWS account activity.
  • 12. 3.3 Monitoring and Logging Compliance Auditing and Security Analytics - AWS CloudTrail logs can also trigger preconfigured Amazon CloudWatch events.
  • 13. 3.4 Monitoring and Logging Collecting and Processing Logs Granular logging of access to Amazon S3 objects Filtering and monitoring of HTTP access to applications with WAF functions in CloudFront Detailed information about flows in the network through VPC-Flow Logs Rule-based configuration verification and actions with AWS Config rules
  • 14. 3.5 Monitoring and Logging Discovering and Protecting Data at Scale with Amazon Macie Article32 of the GDPR states that “…the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including inter alia as appropriate: […] (b) the ability to ensure the ongoing confidentiality, integrity, availability and resilience of processing systems and services; […] (d) a process for regularly testing, assessing and evaluating the effectiveness of technical and organisational measures for ensuring the security of the processing.”
  • 15. 3.6 Monitoring and Logging Amazon GuardDuty is an intelligent threat detection service that can help customers more accurately and easily monitor and protect their AWS accounts Amazon Inspector is an automated security assessment service that helps improve the security and compliance of applications deployed on Amazon EC2 instances AWS Security Hub Security Hub centralizes and prioritizes security and compliance findings from across AWS accounts and services AWS Control Tower provides a method to set up and govern a new, secure, multi-account AWS environment Centralized Security Management
  • 16. Amazon CloudWatch Events enables you to set up your AWS account to send events AWS Systems Manager provides you visibility and control of your infrastructure on AWS AWS Organizations helps you centrally manage and govern complex environments 3.6 Monitoring and Logging Centralized Security Management
  • 17. Centralized Security Management - Taking action with AWS Security Hub and Amazon CloudWatch Events 3.6 Monitoring and Logging
  • 18. Protecting your Data on AWS Article 32 of the GDPR requires that organizations must “…implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including …the pseudonymisation and encryption of personal data[...]”. In addition, organizations must safeguard against the unauthorized disclosure of or access to personal data.”
  • 19. Encrypt Data at Rest 4.1 Protecting your Data on AWS Encrypting data at rest is vital for regulatory compliance and data protection. It helps to ensure that sensitive data saved on disks is not readable by any user or application without a valid key. AWS provides multiple options for encryption at rest and encryption key management. Encrypt Data in Transit AWS strongly recommends encrypting data in transit from one system to another, including resources within and outside of AWS. When you create an AWS account, a logically isolated section of the AWS Cloud—the Amazon Virtual Private Cloud (Amazon VPC—is provisioned to it. Types of Encryption
  • 20. 4.2 Protecting your Data on AWS Encryption Tools AWS Key Management Service AWS Cryptographic Services and Tools AWS CloudHSM They securely store a variety of your self- managed cryptographic keys, including KMS keys and data keys. AWS Encryption SDK Provides a client-side encryption library for implementing encryption and decryption operations on all types of data. Amazon DynamoDB Encryption Client Provides a client-side encryption library for encrypting data tables before sending them to a database service
  • 21. Article 32 of the GDPR requires that organizations must “…implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk, including …the pseudonymisation and encryption of personal data[...]”. In addition, organizations must safeguard against the unauthorized disclosure of or access to personal data.” Data Protection by Design and by Default
  • 22. Contact us We will be glad to answer on any questions! Liudmyla Dziubynska CTO at Zenbit Tech Scan the QR-Code to get Lyudmila's contacts and link to our Cloud Solutions Hub LinkedIn Group! Join our Cloud Solutions Hub LinkedIn Group!