Successfully reported this slideshow.
We use your LinkedIn profile and activity data to personalize ads and to show you more relevant ads. You can change your ad preferences anytime.

AWS Security and Best Practices Meetup

450 views

Published on

This event was intended for Cloud enthusiasts, technology professionals who want to learn, share their knowledge on AWS Security and its best practices. Our goal was to get technology evangelists interested in security on Cloud along with its best practices and share resources about the latest in this field.

Published in: Technology
  • Be the first to comment

  • Be the first to like this

AWS Security and Best Practices Meetup

  1. 1. AWS Security and Best Practices 1
  2. 2. About Us: Founded in 2010 Born in the Cloud Technical skillsVast experience AWS Premier Consulting Partner Audited Managed Services Partner Partner of the Year 2015- ASEAN AWS Big Data Competency AWS Customer Obsession Recognition 2014 & 2015 AWS Consulting Partner of Year 2015 - West 2
  3. 3. Featured in India Public Market outlook- 2017 published by Zinnov Recognized in Gartner Report “Choose the right type of MSP for a Hype Scale Cloud use case by Lydia Leong AWS Public Sector Partner Recognition APN Certification Distinction- 50 Certified 3
  4. 4. France India Belgium Malaysia Singapore USA & Canada Our Presence 4
  5. 5. Our Services and Select Clientele Cloud Advisory Services and Migration Big Data on AWSCloud Native Application and Product Development Managed Services 5
  6. 6. AWS Security Best Practices Security- a state of mind Evolution in operations Follow Best Practices 6
  7. 7. How to feel secure on AWS Securing Accounts Categorization of assets Securing Infrastructure Securing OS and Applications Securing data Monitoring 7
  8. 8. Securing Accounts • AWS account separation • AWS MFA for account login • AWS Directory service • IAM • User policies • User Roles • Service roles • Managing AWS Credentials • Categorization of assets • Using Multiple AWS Accounts • Understanding Delegation Using IAM Roles and Temporary • Security Credentials • IAM Roles for Amazon EC2 • Cross-Account Access • Identity Federation 8
  9. 9. Securing Infrastructure • Using Amazon Virtual Private Cloud • Using Security Zoning and Network Segmentation • Strengthening Network Security • Securing Periphery Systems: User Repositories, DNS, NTP • Building Threat Protection Layers • Test Security • Managing Metrics and Improvement • Mitigating and Protecting Against DoS & DDoS Attacks 9
  10. 10. Securing OS and Applications • Creating Custom AMIs • Bootstrapping • Managing Patches • Controlling Security for Public AMIs • Protecting Your System from Malware • Using Additional Application Security Practices 10
  11. 11. Securing data • Hardware Security Modules for storing private keys • Protecting Data at Rest & in Transit on • Amazon S3 • Amazon EBS • Amazon RDS • Amazon Glacier • DynamoDB • EMR • Decommission Data and Media Securely 34 Protect Data in Transit 11
  12. 12. Monitoring • CloudTrail • VPN Flow logs • Partner tools available on AWS marketplace • TrendMicro • CloudWatch • Using Change Management Logs • Managing Logs for Critical Transactions 12
  13. 13. AWS Tools & Services to secure workloads on Cloud • Account and Environment • Trusted Advisor • IAM • CloudTrail • VPN Flow logs • Config • Service catalog • Application • Inspector • WAF & Shield 13 • OS & Network • AMI • Cloudformation • CloudTrail • VPN Flow logs • Config • Service catalog • Application • Inspector • WAF & Shield
  14. 14. Talk to Us! THANKYOU Company Address BlazeClan Technologies Pvt. Ltd. A-Wing, 3rd Floor, Pride Silicon Plaza, Gokhale Nagar, Pune – 411016 Maharashtra. Phone: 91 20 6529 0035 Website: www.blazeclan.com Email: sales@blazeClan.com 14

×