SlideShare a Scribd company logo
©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.
Dob  Todorov
Regional  Technology  Officer,  Public  Sector  and  Principal  
Architect  Security  &  Compliance  EMEA
Security  in  the  Cloud  
21st Century  IT  Security
Cloud  
Security
“Based  on  our  experience,  I  believe  that  we  
can  be  even  more  secure  in  the  AWS  cloud  
than  in  our  own  data  centers”
Tom  Soderstrom – CTO  NASA  JPL
Cost  of  Security  on  Premises  /  Hosted  Facility
CapEx OpEx
Technology
(Physical Security,  
Infrastructure,  Power,  
Networking)
£££££ £££
Processes
(standards,  procedures,  
guidelines,  assurance,  
compliance)
£££ ££
People
(hire,  upskill, compensate,  
train,  manage)
££ ££££
Security  and  Business  Value
Security  as  a  “Feature”:
• Qualitative  measure:  either  secure  or  
insecure
• No  added  end  user  value
Objective  Reality:
• Small  or  shrinking  budgets
• Threat  vectors  and  agents  rising  in  
number  and  sophistication
Challenge:
How  do  we  justify  the  cost  of  security?
Cost  of  Security  in  the  Cloud
CapEx OpEx
Technology
(Physical Security,  
Infrastructure,  Power,  
Networking)
-­ -­
Processes
(standards,  procedures,  
guidelines,  assurance,  
compliance)
-­ -­
People
(hire,  upskill, compensate,  
train,  manage)
-­ -­
Infrastructure  secure  &  compliant  at  
no  extra  cost
Cloud  Security  Principles  Compliance
o Issued  1  Apr  2014  by  the  CESG
o They  replace  the  Business  Impact  Levels  model  (BIL:  IL1-­IL5+)
o Distributed  certification  model
o Risk-­based  approach:  suitability  for  purpose
o New  protective  marking  mechanisms
o AWS  Whitepaper  Available
Cyber  Essentials  Plus  Compliance  in  Dublin
Cyber  Essentials  Plus  is  a  UK  Government-­
backed,  industry-­supported  certification  
scheme  that  helps  organisations demonstrate  
security  against  common  cyber  attacks.
The  ‘Plus’  scheme  benefits  from  independent  
testing  and  validation  compared  to  the  
baseline  ‘Cyber  Essentials’  scheme  that  is  
self-­attested.
ISO  27018
Based on certification examination in conformity with defined
requirements in ISO/IEC17021:2011 and ISO/IEC 27006:2011,
the Information Security Management System
as defined and implemented by
headquartered in Seattle, Washington, United States of America,
certified under certification number [2013-009],
is also compliant with the requirements as stated in the standard:
EY CertifyPoint will, according to the certification agreement
dated October 23, 2014, perform surveillance audits and acknowledge the
certificate until the expiration date of this certificate or the expiration of the
related ISMS certificate with number [2013-009].
*This certificate is applicable for the assets, services and locations as described in the
scoping section on the back of this certificate, with regard to the specific requirements
for information security and protection of personally identifiable information (PII)
as stated in Statement of Applicability version 2015,01, approved on September 15, 2015.
ISO/IEC 27018:2014
Issue date of certificate: October 1, 2015
Expiration date of certificate: November 12, 2016
Amazon Web Services, Inc.*
Certificate
Certificate number: 2015-016
Certified by EY CertifyPoint since:
October 1, 2015
© Copyrights with regard to this document reside with Ernst & Young CertifyPoint B.V. headquartered at
Antonio Vivaldistraat 150, 1083 HP Amsterdam, The Netherlands. All rights reserved.
Drs. R. Toppen RA
Director EY CertifyPoint
DIGITAL COPY1/3
o Customers  control  their  content.
o Customers'  content  will  not  be  used  for  any  
unauthorized  purposes.
o Physical  media  is  destroyed  prior  to  leaving  
AWS  data  centers.
o AWS  provides  customers  the  means  to  
delete  their  content.
o AWS  doesn’t  disclose  customers'  content
AWS  Security  Tools
AWS  Trusted  Advisor
AWS  Config Rules
Amazon  Inspector
Periodic  evaluation  of  alignment  with  AWS  Best  
Practices.  Not  just  Security-­related.
Create  rules  that  govern  configuration  of  your  
AWS  resources.  Continuous  evaluation.
Security  insights  into  your  applications.
Runs  on  EC2  instances;;  on-­demand  scans
AWS  Compliance AWS:  Security  of the  cloud
Customer:  Security  in the  cloud
Cloud  Config Rules
Security  by  Design  -­ SbD
• Systematic  approach  to  
ensure  security
• Formalizes  AWS  account  design
• Automates  security  controls
• Streamlines  auditing
• Provides  control  insights  
throughout  the  IT  
management  process
AWS  
CloudTrail
AWS  
CloudHSM
AWS  IAM
AWS  KMS
AWS
Config
GoldBase -­ Scripting  your  governance  policy
Set  of  CloudFormation Templates  &  Reference  
Arhcitectures that  accelerate  compliance  with  PCI,  EU  
Personal  Data  Protection,  HIPAA,  FFIEC,  FISMA,  CJIS
Result:  Reliable  technical  implementation  of  administrative  
controls
What  is  Inspector?
• Application  security  assessment
• Selectable  built-­in  rules
• Security  findings
• Guidance  and  management
• Automatable  via  APIs
Rule  packages
• CVE  (common  vulnerabilities  and  exposures)
• Network  security  best  practices
• Authentication  best  practices
• Operating  system  security  best  practices
• Application  security  best  practices
• PCI  DSS  3.0  readiness
Why  AWS  WAF?
Application  DDoS,  Vulnerabilities,  Abuse
Good  users
Bad  guys
Web  server Database
What  is  AWS  WAF?
Application  DDoS
Good  users
Bad  guys
Web  server Database
AWS
WAF
AWS  WAF  rules:
1:  BLOCK  requests  from  bad  guys.
2:  ALLOW  requests  from  good  guys.
Types  of  conditions  in  rules:
1:  Source  IP/range
2:  String  Match
3:  SQL  Injection
S2N  – AWS  Implementation  of  TLS
• Small:    
• ~6,000  lines  of  code,  all  audited
• ~80%  less  memory  consumed
• Fast:    
• 12%  faster
• Simple:    
• Avoid  rarely  used  options/extensions
VPC  Flow  Logs
Certification  &  Education
• Security  Fundamentals  on  AWS
• free,  online  course  for  security  auditors  and  
analysts
• Security  Operations  on  AWS
• 3-­day  class  for  Security  engineers,  architects,  
analysts,  and  auditors
• AWS  Certification
• Security  is  part  of  all  AWS  exams
Rich  Security  Capabilities  in  the  Cloud
Prepare
Prevent
Detect
Respond
o AWS  Security  Solutions  Architects
o AWS  Professional  Services
o AWS  Secure  by  Design  &  Gold  Base
o AWS  Security  Best  Practices
o Partner  Professional  Services
o AWS  Training  and  Certification
o Understand  Compliance  Requirements
Prepare
o Use  IAM  – consider  MFA,  roles,  federation,  SSO
o Implement  Amazon  WAF
o Leverage  S2N  for  secure  TLS  connections
o Implement  Config Rules  to  enforce  compliance
o Implement  Amazon  Inspector  to  identify  
vulnerabilities  early  on
Prevent
o Cloud  Trail  enabled  across  all  accounts  and  services
o Consider  Config &  Config Rules  logs
o Inspector  can  be  used  as  a  detective  tool
o Trusted  Advisor  goes  beyond  just  security
o Use  CloudWatch logs
o VPC  Flow  Logs  give  insight  into  intended  and  
unintended  communication  taking  place  into  your  VPC
o Do  look  at  partner  log  management  and  security  
monitoring  solutions
Detect
o Be  Prepared:  
o Develop,  acquire  or  hire  Security  Incident  Response  
capabilities
o Test  preparedness  via  game  days
o Automated  response  and  containment  is  always  
better  than  manual  response
o AWS  supports  forensic  investigations
o Leverage  AWS  Support  for  best  results
o Talk  to  our  security  partners
Respond
Be  Secure  &  Compliant  in  
the  Cloud!

More Related Content

What's hot

AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
Crishantha Nanayakkara
 
Enabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsEnabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy Laws
Amazon Web Services
 
Closing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day BrusselsClosing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day Brussels
Amazon Web Services
 
AWS Well-Architected Review
AWS Well-Architected ReviewAWS Well-Architected Review
AWS Well-Architected Review
Andrej Maya
 
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
Amazon Web Services
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
Amazon Web Services
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
Amazon Web Services
 
Closing
Closing Closing
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
Amazon Web Services
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
Amazon Web Services
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Helen Rogers
 
Aws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon ElishaAws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon Elisha
Helen Rogers
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
Amazon Web Services
 
Building Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast SessionBuilding Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast Session
Amazon Web Services
 
Mobile Software in AWS Marketplace
Mobile Software in AWS MarketplaceMobile Software in AWS Marketplace
Mobile Software in AWS Marketplace
Amazon Web Services
 
AWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting CertifiedAWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting Certified
Adam Book
 
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
Edureka!
 
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Amazon Web Services
 
re:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loftre:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loft
Amazon Web Services
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
Amazon Web Services
 

What's hot (20)

AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Enabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsEnabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy Laws
 
Closing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day BrusselsClosing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day Brussels
 
AWS Well-Architected Review
AWS Well-Architected ReviewAWS Well-Architected Review
AWS Well-Architected Review
 
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Closing
Closing Closing
Closing
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 
Aws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon ElishaAws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon Elisha
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Building Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast SessionBuilding Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast Session
 
Mobile Software in AWS Marketplace
Mobile Software in AWS MarketplaceMobile Software in AWS Marketplace
Mobile Software in AWS Marketplace
 
AWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting CertifiedAWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting Certified
 
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
 
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017
 
re:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loftre:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loft
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
 

Viewers also liked

MEDINS Multimedia Labs
MEDINS Multimedia LabsMEDINS Multimedia Labs
MEDINS Multimedia Labs
jexxon
 
TLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs forTLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs for
jexxon
 
The Trotternish Landslides
The Trotternish LandslidesThe Trotternish Landslides
The Trotternish Landslides
Alan Doherty
 
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Amazon Web Services
 
Leveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global EnvironmentLeveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global Environment
Callidus Software
 
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)Andrea Rossetti
 
Finding Simple - Seat Map Design for Everyone UX Australia 2014
Finding Simple - Seat Map Design for Everyone  UX Australia 2014Finding Simple - Seat Map Design for Everyone  UX Australia 2014
Finding Simple - Seat Map Design for Everyone UX Australia 2014
Jason Bayly
 
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Jeremy Fuksa
 
Andrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del softwareAndrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del softwareAndrea Rossetti
 
Conte taurons
Conte tauronsConte taurons
Conte tauronsmarblocs
 
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in AziendaLuigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in AziendaAndrea Rossetti
 
Le leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva AvvedutoLe leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva AvvedutoAndrea Rossetti
 
ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由
Hikaru GOTO
 
Het voordeel van de twijfel
Het voordeel van de twijfelHet voordeel van de twijfel
Het voordeel van de twijfel
Jan Lelie
 
Test statsvisualmethod
Test statsvisualmethodTest statsvisualmethod
Test statsvisualmethod
Frank Meissner
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
Amazon Web Services
 
Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS
Amazon Web Services
 

Viewers also liked (20)

MEDINS Multimedia Labs
MEDINS Multimedia LabsMEDINS Multimedia Labs
MEDINS Multimedia Labs
 
TLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs forTLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs for
 
The Trotternish Landslides
The Trotternish LandslidesThe Trotternish Landslides
The Trotternish Landslides
 
Van gogh
Van goghVan gogh
Van gogh
 
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
 
Leveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global EnvironmentLeveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global Environment
 
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
 
Finding Simple - Seat Map Design for Everyone UX Australia 2014
Finding Simple - Seat Map Design for Everyone  UX Australia 2014Finding Simple - Seat Map Design for Everyone  UX Australia 2014
Finding Simple - Seat Map Design for Everyone UX Australia 2014
 
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
 
Vergani, RGW 2011 2
Vergani, RGW 2011 2Vergani, RGW 2011 2
Vergani, RGW 2011 2
 
Andrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del softwareAndrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del software
 
Conte taurons
Conte tauronsConte taurons
Conte taurons
 
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in AziendaLuigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
 
Le leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva AvvedutoLe leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva Avveduto
 
ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由
 
Het voordeel van de twijfel
Het voordeel van de twijfelHet voordeel van de twijfel
Het voordeel van de twijfel
 
Test statsvisualmethod
Test statsvisualmethodTest statsvisualmethod
Test statsvisualmethod
 
Who we are
Who we areWho we are
Who we are
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
 
Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS
 

Similar to AWS Enterprise Summit London 2015 | Security in the Cloud

Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
Amazon Web Services
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Amazon Web Services
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
Amazon Web Services
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
Amazon Web Services
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
Amazon Web Services
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
Amazon Web Services
 
What's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinWhat's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow Dublin
Amazon Web Services
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
Amazon Web Services
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
Amazon Web Services
 
Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3
Kimberly Macias
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
Amazon Web Services
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Amazon Web Services
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
Amazon Web Services
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
Amazon Web Services
 
AWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and GovernanceAWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and Governance
Akesh Patil
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
Amazon Web Services
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
Amazon Web Services
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
Karim Hopper
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
Amazon Web Services
 

Similar to AWS Enterprise Summit London 2015 | Security in the Cloud (20)

Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
What's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinWhat's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow Dublin
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
AWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and GovernanceAWS Landing Zone - Architecting Security and Governance
AWS Landing Zone - Architecting Security and Governance
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
Alison B. Lowndes
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
RTTS
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
Cheryl Hung
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
DanBrown980551
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
Guy Korland
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
KatiaHIMEUR1
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
Kari Kakkonen
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
UiPathCommunity
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
Product School
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
Sri Ambati
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Product School
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
Thijs Feryn
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Ramesh Iyer
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
BookNet Canada
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
Prayukth K V
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Inflectra
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
DianaGray10
 

Recently uploaded (20)

Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........Bits & Pixels using AI for Good.........
Bits & Pixels using AI for Good.........
 
JMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and GrafanaJMeter webinar - integration with InfluxDB and Grafana
JMeter webinar - integration with InfluxDB and Grafana
 
Key Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdfKey Trends Shaping the Future of Infrastructure.pdf
Key Trends Shaping the Future of Infrastructure.pdf
 
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...
 
GraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge GraphGraphRAG is All You need? LLM & Knowledge Graph
GraphRAG is All You need? LLM & Knowledge Graph
 
Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !Securing your Kubernetes cluster_ a step-by-step guide to success !
Securing your Kubernetes cluster_ a step-by-step guide to success !
 
DevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA ConnectDevOps and Testing slides at DASA Connect
DevOps and Testing slides at DASA Connect
 
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...
 
Assuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyesAssuring Contact Center Experiences for Your Customers With ThousandEyes
Assuring Contact Center Experiences for Your Customers With ThousandEyes
 
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
AI for Every Business: Unlocking Your Product's Universal Potential by VP of ...
 
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
GenAISummit 2024 May 28 Sri Ambati Keynote: AGI Belongs to The Community in O...
 
Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...Mission to Decommission: Importance of Decommissioning Products to Increase E...
Mission to Decommission: Importance of Decommissioning Products to Increase E...
 
Accelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish CachingAccelerate your Kubernetes clusters with Varnish Caching
Accelerate your Kubernetes clusters with Varnish Caching
 
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdfFIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
FIDO Alliance Osaka Seminar: Passkeys at Amazon.pdf
 
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...
 
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...Transcript: Selling digital books in 2024: Insights from industry leaders - T...
Transcript: Selling digital books in 2024: Insights from industry leaders - T...
 
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 previewState of ICS and IoT Cyber Threat Landscape Report 2024 preview
State of ICS and IoT Cyber Threat Landscape Report 2024 preview
 
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdfFIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
FIDO Alliance Osaka Seminar: FIDO Security Aspects.pdf
 
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualitySoftware Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered Quality
 
Connector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a buttonConnector Corner: Automate dynamic content and events by pushing a button
Connector Corner: Automate dynamic content and events by pushing a button
 

AWS Enterprise Summit London 2015 | Security in the Cloud

  • 1. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Dob  Todorov Regional  Technology  Officer,  Public  Sector  and  Principal   Architect  Security  &  Compliance  EMEA Security  in  the  Cloud  
  • 2. 21st Century  IT  Security Cloud   Security
  • 3. “Based  on  our  experience,  I  believe  that  we   can  be  even  more  secure  in  the  AWS  cloud   than  in  our  own  data  centers” Tom  Soderstrom – CTO  NASA  JPL
  • 4. Cost  of  Security  on  Premises  /  Hosted  Facility CapEx OpEx Technology (Physical Security,   Infrastructure,  Power,   Networking) £££££ £££ Processes (standards,  procedures,   guidelines,  assurance,   compliance) £££ ££ People (hire,  upskill, compensate,   train,  manage) ££ ££££
  • 5. Security  and  Business  Value Security  as  a  “Feature”: • Qualitative  measure:  either  secure  or   insecure • No  added  end  user  value Objective  Reality: • Small  or  shrinking  budgets • Threat  vectors  and  agents  rising  in   number  and  sophistication Challenge: How  do  we  justify  the  cost  of  security?
  • 6. Cost  of  Security  in  the  Cloud CapEx OpEx Technology (Physical Security,   Infrastructure,  Power,   Networking) -­ -­ Processes (standards,  procedures,   guidelines,  assurance,   compliance) -­ -­ People (hire,  upskill, compensate,   train,  manage) -­ -­ Infrastructure  secure  &  compliant  at   no  extra  cost
  • 7. Cloud  Security  Principles  Compliance o Issued  1  Apr  2014  by  the  CESG o They  replace  the  Business  Impact  Levels  model  (BIL:  IL1-­IL5+) o Distributed  certification  model o Risk-­based  approach:  suitability  for  purpose o New  protective  marking  mechanisms o AWS  Whitepaper  Available
  • 8. Cyber  Essentials  Plus  Compliance  in  Dublin Cyber  Essentials  Plus  is  a  UK  Government-­ backed,  industry-­supported  certification   scheme  that  helps  organisations demonstrate   security  against  common  cyber  attacks. The  ‘Plus’  scheme  benefits  from  independent   testing  and  validation  compared  to  the   baseline  ‘Cyber  Essentials’  scheme  that  is   self-­attested.
  • 9. ISO  27018 Based on certification examination in conformity with defined requirements in ISO/IEC17021:2011 and ISO/IEC 27006:2011, the Information Security Management System as defined and implemented by headquartered in Seattle, Washington, United States of America, certified under certification number [2013-009], is also compliant with the requirements as stated in the standard: EY CertifyPoint will, according to the certification agreement dated October 23, 2014, perform surveillance audits and acknowledge the certificate until the expiration date of this certificate or the expiration of the related ISMS certificate with number [2013-009]. *This certificate is applicable for the assets, services and locations as described in the scoping section on the back of this certificate, with regard to the specific requirements for information security and protection of personally identifiable information (PII) as stated in Statement of Applicability version 2015,01, approved on September 15, 2015. ISO/IEC 27018:2014 Issue date of certificate: October 1, 2015 Expiration date of certificate: November 12, 2016 Amazon Web Services, Inc.* Certificate Certificate number: 2015-016 Certified by EY CertifyPoint since: October 1, 2015 © Copyrights with regard to this document reside with Ernst & Young CertifyPoint B.V. headquartered at Antonio Vivaldistraat 150, 1083 HP Amsterdam, The Netherlands. All rights reserved. Drs. R. Toppen RA Director EY CertifyPoint DIGITAL COPY1/3 o Customers  control  their  content. o Customers'  content  will  not  be  used  for  any   unauthorized  purposes. o Physical  media  is  destroyed  prior  to  leaving   AWS  data  centers. o AWS  provides  customers  the  means  to   delete  their  content. o AWS  doesn’t  disclose  customers'  content
  • 10. AWS  Security  Tools AWS  Trusted  Advisor AWS  Config Rules Amazon  Inspector Periodic  evaluation  of  alignment  with  AWS  Best   Practices.  Not  just  Security-­related. Create  rules  that  govern  configuration  of  your   AWS  resources.  Continuous  evaluation. Security  insights  into  your  applications. Runs  on  EC2  instances;;  on-­demand  scans AWS  Compliance AWS:  Security  of the  cloud Customer:  Security  in the  cloud
  • 11.
  • 13. Security  by  Design  -­ SbD • Systematic  approach  to   ensure  security • Formalizes  AWS  account  design • Automates  security  controls • Streamlines  auditing • Provides  control  insights   throughout  the  IT   management  process AWS   CloudTrail AWS   CloudHSM AWS  IAM AWS  KMS AWS Config
  • 14. GoldBase -­ Scripting  your  governance  policy Set  of  CloudFormation Templates  &  Reference   Arhcitectures that  accelerate  compliance  with  PCI,  EU   Personal  Data  Protection,  HIPAA,  FFIEC,  FISMA,  CJIS Result:  Reliable  technical  implementation  of  administrative   controls
  • 15. What  is  Inspector? • Application  security  assessment • Selectable  built-­in  rules • Security  findings • Guidance  and  management • Automatable  via  APIs
  • 16. Rule  packages • CVE  (common  vulnerabilities  and  exposures) • Network  security  best  practices • Authentication  best  practices • Operating  system  security  best  practices • Application  security  best  practices • PCI  DSS  3.0  readiness
  • 17. Why  AWS  WAF? Application  DDoS,  Vulnerabilities,  Abuse Good  users Bad  guys Web  server Database
  • 18. What  is  AWS  WAF? Application  DDoS Good  users Bad  guys Web  server Database AWS WAF AWS  WAF  rules: 1:  BLOCK  requests  from  bad  guys. 2:  ALLOW  requests  from  good  guys. Types  of  conditions  in  rules: 1:  Source  IP/range 2:  String  Match 3:  SQL  Injection
  • 19. S2N  – AWS  Implementation  of  TLS • Small:     • ~6,000  lines  of  code,  all  audited • ~80%  less  memory  consumed • Fast:     • 12%  faster • Simple:     • Avoid  rarely  used  options/extensions
  • 21. Certification  &  Education • Security  Fundamentals  on  AWS • free,  online  course  for  security  auditors  and   analysts • Security  Operations  on  AWS • 3-­day  class  for  Security  engineers,  architects,   analysts,  and  auditors • AWS  Certification • Security  is  part  of  all  AWS  exams
  • 22. Rich  Security  Capabilities  in  the  Cloud Prepare Prevent Detect Respond
  • 23. o AWS  Security  Solutions  Architects o AWS  Professional  Services o AWS  Secure  by  Design  &  Gold  Base o AWS  Security  Best  Practices o Partner  Professional  Services o AWS  Training  and  Certification o Understand  Compliance  Requirements Prepare
  • 24. o Use  IAM  – consider  MFA,  roles,  federation,  SSO o Implement  Amazon  WAF o Leverage  S2N  for  secure  TLS  connections o Implement  Config Rules  to  enforce  compliance o Implement  Amazon  Inspector  to  identify   vulnerabilities  early  on Prevent
  • 25. o Cloud  Trail  enabled  across  all  accounts  and  services o Consider  Config &  Config Rules  logs o Inspector  can  be  used  as  a  detective  tool o Trusted  Advisor  goes  beyond  just  security o Use  CloudWatch logs o VPC  Flow  Logs  give  insight  into  intended  and   unintended  communication  taking  place  into  your  VPC o Do  look  at  partner  log  management  and  security   monitoring  solutions Detect
  • 26. o Be  Prepared:   o Develop,  acquire  or  hire  Security  Incident  Response   capabilities o Test  preparedness  via  game  days o Automated  response  and  containment  is  always   better  than  manual  response o AWS  supports  forensic  investigations o Leverage  AWS  Support  for  best  results o Talk  to  our  security  partners Respond
  • 27.
  • 28. Be  Secure  &  Compliant  in   the  Cloud!