Stefan Rehberg
Technical Consultant | PreSales Engineer
Protecting Your Applications
and Data in AWS
Trend Micro
Kurz und Knapp
Trend Micro
500.000 Unternehmenskunden &
155 Mio. geschützte Endpunkte
Privatan
wender
Großunternehmen
Mittelstands-
unternehmen
Klein-
unternehmen
Privat-
anwender
 29 Jahre fokusiert auf Security Software
 Hauptsitz in Japan
 Tokyo Exchange Nikkei Index, Symbol 4704
 45 der Top 50-Unternehmen weltweit sind Trend Micro
Kunde
 Über 5500 Mitarbeiter in 38 Landesniederlassungen
The cloud has changed
how we look at security
Automation is the main
key driver to cloud
adoption
Microservices are
becoming a norm
Docker and Serverless are spurning this movement
How do you design security
Serverless
101
010
Physical Cloud Containers
& PaaS
Virtual
If we have access to
those powerful tools
How about the bad guys?
500,000
new malware per day
60%
of malicious domains are alive by one hour
95%
connects to Command and Control Networks
80%
of companies had security attacks or exploits
What can you do?
What are the techniques
Track every move
Enable Cloudtrail
Action on Specific API Calls
Cloudwatch Events
Keep Consistency across the
Infrastructure
Use Config Rules
Protect your Account
Learn IAM
How do you effectively
mitigate threats
Automate
Automated Security needs
Automated Response
Security Products
Built for AWS
Host-Based is still the
best approach
Source: SANS The State of Dynamic Data Center and Cloud Security in the Modern Enterprise October 2015
Bryce Industries
Analytics Company
Brenda the
Developer
Benny the Cloud
Architect
Barry the Security
Guy
Houdini the Hacker
Security Incident Response
Source: NIST
Benny the
Cloud Architect
SSH Control
What Happened
Scenario
Turning Off Cloudtrail
Benny the
Cloud Architect
What Happened
Uploading Suspicious
Objects to ContainersHoudini the
Hacker
What Happened
Running unauthorized
SoftwareBrenda the
Developer
What Happened
Shielding Vulnerable
AppsBrenda the
Developer
How does it work
Investigate
Barry the
Security Guy
Tools used
Amazon
Lambda
AWS CloudTrail CloudWatch AWS
Config
Amazon SNSDeep
Security
Coding is Required
Amazon
Lambda
AWS CloudTrail CloudWatch AWS
Config
Amazon SNSDeep
Security
or ask your friend to
Last Year we talked about
Superheroes and powers
This year we have new superpowers
Trend Micro
Deep Security 10
Cross-generational blend of threat
defense techniques
Powered by global
threat intelligence
Intelligently applies the right
technique at the right timeGen
TM

Developers.IO World in Berlin / Trend Micro Presentation