SlideShare a Scribd company logo
Security on  AWS(overview)
Bertram  Dorn
EMEA  Specialized Solutions  Architect
Security  and Compliance
Agenda: • Overview
• AWS  Regions
• Availability Zones
• Shared Responsibility
• Security  Features
• Best  Practices  for
• IAM
• Data  at  Rest
AWS  Global  Footprint
US  West  (N.California)
US  West  (Oregon)
GovCloud
US  East  (Virginia)
EU  West  (Ireland)
Asia  Pacific  (Tokyo)
Asia  Pacific  (Singapore)
Asia  Pacific  (Sydney)
China  (Beijing)
São  Paulo
EU  Central  (Frankfurt)
Korea  (Seul)
Region
An independent collection of AWS resources in
a defined geography
A solid foundation for meeting location-
dependent privacy and compliance
requirements
Example	
  AWS	
  Region
AZ
AZ
AZ AZ AZ
Transit
Transit
• Mesh	
  of	
  Availability	
  Zones	
  (AZ)	
  and	
  Transit	
  Centers
• Redundant paths	
  to	
  transit	
  centers
• Transit	
  centers	
  connect	
  to:
– Private	
  links	
  to	
  other	
  AWS	
  regions
– Private	
  links	
  to	
  customers
– Internet	
  through	
  peering	
  &	
  paid	
  transit
• Metro-­‐area	
  DWDM	
  links	
  between	
  AZs
• 82,864 fiber	
  strands	
  in	
  region
• AZs	
  <2ms	
  apart	
  &	
  usually	
  <1ms
• 25Tbps peak	
  inter-­‐AZs	
  traffic
AWS  Global  Footprint
Availability Zone
Designed as independent failure zones
Physically separated within a typical metropolitan
region
Example	
  AWS	
  Availability	
  Zone
• 1	
  of	
  30	
  AZs	
  world-­‐wide
• All	
  regions	
  have	
  2	
  or	
  more	
  AZs
• Each	
  AZ	
  is	
  1	
  or	
  more	
  DC
– No	
  data	
  center	
  is	
  in	
  two	
  AZs
– Some	
  AZs	
  have	
  as	
  many	
  as	
  6	
  DCs
• DCs	
  in	
  AZ	
  less	
  than	
  ¼	
  ms apart
AZ
AZ
AZ AZ AZ
Transit
Transit
Example	
  AWS	
  Data	
  Center
• Single	
  DC	
  typically	
  over	
  50,000	
  
servers	
  &	
  often	
  over	
  80,000	
  
• Larger	
  DCs	
  undesirable	
  (blast	
  radius)
• Up	
  to	
  102Tbps	
  provisioned	
   to	
  a	
  
single	
  DC	
  (inter	
  DC	
  not	
  intra)
Shared Responsibility
Cross-service Controls
Service-specific Controls
Managed by
AWS
Managed by
Customer
Security of the Cloud
Security in the Cloud
Cloud Service Provider
Controls
Optimized
Network/OS/App Controls
Request reports at:
aws.amazon.com/compliance/#contact
ISO
27000
ISO
9001
What  is  AWS?
AWS  Global  Infrastructure
Application  Services
Networking
Deployment  &  Administration
DatabaseStorageCompute
©	
  2015,	
  Amazon	
  Web	
  Services,	
  Inc.	
  or	
  its	
  Affiliates.	
  All	
  rights	
  reserved.
Service	
  Breadth	
  &	
  Depth
Features  Overview
©	
  2015,	
  Amazon	
  Web	
  Services,	
  Inc.	
  or	
  its	
  Affiliates.	
  All	
  rights	
  reserved.
Network	
  Security Choose	
  and	
  combine	
  a	
  bunch	
  of	
  build	
  in	
  network	
  related	
  
options:
ü Build	
  in	
  firewall	
  features	
  (Security	
  Groups	
  and	
  NACL’s)
ü Virtual	
  Private	
  Cloud
ü Transport	
  Encryption	
  (IPsec	
  and	
  TLS)
ü Dedicated	
  Network	
  Connection	
  (Direct	
  Connect)
ü Cypher	
  Suites	
  with	
  Perfect	
  Forward	
  Secrecy	
  
ü Managed	
  NAT	
  Gateways
ü WebApplicationFilters
Virtual  Private  Cloud  Security  Layers
Security Group
Subnet  10.0.0.0/24
Routing Table
Network ACL
Subnet  10.0.1.0/24
Routing Table
Network ACL
Virtual Private Gateway Internet Gateway
Lockdown at
instance level
Isolate network
functions
Lockdown at
network level
Route restrictively
Router
Availability Zone A Availability Zone B
Security
Group
Security
Group
©	
  2015,	
  Amazon	
  Web	
  Services,	
  Inc.	
  or	
  its	
  Affiliates.	
  All	
  rights	
  reserved.
Access	
  Control Allow	
  only	
  	
  authorized	
  administrators	
  and	
  applications	
  access	
  
on	
  AWS	
  resources	
  
ü Multi-­‐Factor-­‐Authentication	
  (MFA)
ü Fine	
  granular	
  access	
  to	
  AWS	
  object	
  inS3-­‐Buckets/SQS/SNS	
  
and	
  others
ü API-­‐Request	
  Authentication
ü Geo-­‐Restrictions
ü Temporary	
  access	
  tokens	
  through	
   STS
©	
  2015,	
  Amazon	
  Web	
  Services,	
  Inc.	
  or	
  its	
  Affiliates.	
  All	
  rights	
  reserved.
Monitoring	
  and	
  Logging Get	
  an	
  overview	
  about	
  activities	
  on	
  your	
  AWS	
  ressources
ü Asset-­‐Management	
  and	
  -­‐Configuration	
   with	
  AWS	
  Config
ü Compliance	
  Auditing	
   and	
  security	
  analytics	
  with	
  AWS	
  
CloudTrail
ü Identifications	
  of	
  configuration	
   challenges	
  through	
  
TrustedAdvisor
ü Fine	
  granular	
  logging	
   of	
  access	
  to	
  S3	
  objects
ü Detailed	
  informations about	
  flows	
  in	
  the	
  network	
  through	
  
VPC-­‐FlowLogs
ü Rule	
  based	
  config checks	
  and	
  actions	
  with	
  AWS	
  Config Rules
ü Filter	
  and	
  monitoring	
   of	
  HTTP	
  access	
  to	
  applications	
  with	
  
WAF	
  functions	
  in	
  CloudFront
©	
  2015,	
  Amazon	
  Web	
  Services,	
  Inc.	
  or	
  its	
  Affiliates.	
  All	
  rights	
  reserved.
Encryption
Security	
  is	
  the	
  first	
  priority	
  for	
  AWS
ü Encryption	
  of	
  your	
  data	
  at	
  rest	
  with	
  AES256	
  
(EBS/S3/Glacier/RDS)
ü Centralized	
  (by	
  Region)	
  managed	
  Key-­‐Management
ü IPsec	
  tunnels	
  into	
  AWS	
  with	
  the	
  VPN-­‐Gateways
ü Deicated HSM	
  modules	
  in	
  the	
  cloud	
  with	
  CloudHSM
IAM  Overview
Identity  and  Access  Management
• Users  &  Groups
Identity  and  Access  Management
• Users  &  Groups
• Unique  Security  Credentials
Identity  and  Access  Management
• Users  &  Groups
• Unique  Security  Credentials
• Temporary  Security  
Credentials
Identity  and  Access  Management
• Users  &  Groups
• Unique  Security  Credentials
• Temporary  Security  
Credentials
• Policies  &  Permissions
Identity  and  Access  Management
• Users  &  Groups
• Unique  Security  Credentials
• Temporary  Security  
Credentials
• Policies  &  Permissions
• Roles
Identity  and  Access  Management
• Users  &  Groups
• Unique  Security  Credentials
• Temporary  Security  
Credentials
• Policies  &  Permissions
• Roles
• Multi-­factor  Authentication
IAM  Best  Practices
Root  Accounts  Do  Not  Need  Access  Keys
Root  Accounts  Do  Normally Not  Log  In
Best  Practices
Lock  away  your  AWS  account  
access  keys
Create  individual  IAM  users
Use  groups  to  assign  
permissions  to  IAM  users
Grant  least  privilege
Configure  a  strong  password  
policy  for  your  users
Enable  MFA  for  privileged  
users
Use  roles  for  applications  that  
run  on  Amazon  EC2  instances
Delegate  by  using  roles  
instead  of  by  sharing  
credentials
Rotate  credentials  regularly
Remove  unnecessary  
credentials
Use  policy  conditions
Keep  a  history  of  activity
What  type  of  events  should  I  monitor  for?
v You  can  monitor  any  specific  event  recorded  by  CloudTrail  and  receive  
notification  from  CloudWatch
v Monitor  for  security  or  network  related  events  that  are  likely  to  have  a  high  
blast  radius
v Popular  examples  based  on  customer  feedback
1. Creation,  deletion  and  modification  of  security  groups  and  VPCs
2. Changes  to  IAM  policies  or  S3  bucket  policies
3. Failed  AWS  Management  Console  sign-­in  events
4. API  calls  that  resulted  in  authorization  failures
5. Launching,  terminating,  stopping,  starting  and  rebooting  EC2  instances
v Fully  defined  and  pre-­built  CloudFormation  template  to  get  started
Receive  email  notifications  of  specific  API  activity
Demo:  Kibana
Data  at  Rest:  Simplified
Securing  Data  at  Rest
Amazon  RDS Redshift
Amazon  S3GlacierAmazon  EBS
> AES-­256  key
> KMS  integration
> Easy  one-­click  
encryption
Securing  Data  at  Rest
Amazon  S3 Glacier
> AES-­256  key
> Each  object  is  encrypted
> Each  key  is  encrypted  with  a  
master  key
> Master  key  is  rotated  regularly
> KMS  integration
Amazon  EBS
Securing  Data  at  Rest
> AES-­256  key
> Performed  on  EC2  host
> Snapshots
> KMS  integrated
> Each Volume  gets it‘s DataKey
> DataKey is encrypted with
MasterKey
Amazon  RDS
Securing  Data  at  Rest
> AES-­256  key
> Logs,  backups,  and  snapshots
> Read  replicas
> Active  and  backup
> CloudHSM  (Oracle  TDE  only)
> KMS  integration
Redshift
Securing  Data  at  Rest
> AES-­256  key
> Data  blocks
> Metadata
> Active  and  backup
> CloudHSM  integration
> 4-­tier  encryption  architecture
Securing  Data  at  Rest
CloudHSM
> Hardware  Security  Module
> Single  tenancy
> Private  key  material  never  
leaves  the  HSM
> AWS  provisioned,  customer  
managed
Whitepaper:  Encrypting  Data  at  Rest
https://d0.awsstatic.com/whitepapers/aws-­securing-­data-­at-­rest-­with-­encryption.pdf
Thank  You
Content  Providers:
Bertram  Dorn
Brian  Wagner
Dave  Walker

More Related Content

What's hot

Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
Amazon Web Services
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
Amazon Web Services Korea
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
Amazon Web Services LATAM
 
Compliance in the cloud using sb d toronto-summit-v1.0
Compliance in the cloud using sb d toronto-summit-v1.0Compliance in the cloud using sb d toronto-summit-v1.0
Compliance in the cloud using sb d toronto-summit-v1.0
Amazon Web Services
 
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit SydneyVMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
Amazon Web Services
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
Amazon Web Services
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
Amazon Web Services
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
Amazon Web Services
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
Amazon Web Services
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Amazon Web Services
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Amazon Web Services
 
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Amazon Web Services
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWS
Amazon Web Services
 
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
 HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017 HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
Amazon Web Services
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
Amazon Web Services
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
Amazon Web Services
 

What's hot (20)

Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Network Security and Access Control in AWS
Network Security and Access Control in AWSNetwork Security and Access Control in AWS
Network Security and Access Control in AWS
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Compliance in the cloud using sb d toronto-summit-v1.0
Compliance in the cloud using sb d toronto-summit-v1.0Compliance in the cloud using sb d toronto-summit-v1.0
Compliance in the cloud using sb d toronto-summit-v1.0
 
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit SydneyVMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
VMware Cloud on AWS - Technical Deep Dive - AWS Summit Sydney
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201Creating your Hybrid Cloud with AWS -Technical 201
Creating your Hybrid Cloud with AWS -Technical 201
 
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
Advanced Techniques for DDoS Mitigation and Web Application Defense | AWS Pub...
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
The AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in PracticeThe AWS Shared Security Responsibility Model in Practice
The AWS Shared Security Responsibility Model in Practice
 
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
AWS re:Invent 2016: Enabling Enterprise Migrations: Creating an AWS Landing Z...
 
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
Creating Your Virtual Data Center: VPC Fundamentals and Connectivity Options
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
Best Practices for Managing Security Operations in AWS - AWS July 2016 Webina...
 
Best Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWSBest Practices for Deploying Microsoft Workloads on AWS
Best Practices for Deploying Microsoft Workloads on AWS
 
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
 HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017 HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
HIPAA / HITRUST Account Governance Strategies | | AWS Public Sector Summit 2017
 
(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud(SEC310) Keeping Developers and Auditors Happy in the Cloud
(SEC310) Keeping Developers and Auditors Happy in the Cloud
 
Security Best Practices on AWS
Security Best Practices on AWSSecurity Best Practices on AWS
Security Best Practices on AWS
 

Viewers also liked

PRESENTATION - Migrating AWS EBS backed AMI's between Regions
PRESENTATION - Migrating AWS EBS backed AMI's between RegionsPRESENTATION - Migrating AWS EBS backed AMI's between Regions
PRESENTATION - Migrating AWS EBS backed AMI's between Regions
Rob Linton
 
AWS Webinar - Design for Availability-13_09_10
AWS Webinar - Design for Availability-13_09_10AWS Webinar - Design for Availability-13_09_10
AWS Webinar - Design for Availability-13_09_10
Amazon Web Services
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
Amazon Web Services
 
Introduction to AWS
Introduction to AWSIntroduction to AWS
Introduction to AWS
Hesham Amin
 
Aws introduction
Aws introductionAws introduction
Aws introduction
MouryaKumar Reddy Rajala
 
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
Amazon Web Services
 
AWS Webcast - Best Practices for Deploying SAP Workloads on AWS
AWS Webcast - Best Practices for Deploying SAP Workloads on AWSAWS Webcast - Best Practices for Deploying SAP Workloads on AWS
AWS Webcast - Best Practices for Deploying SAP Workloads on AWS
Amazon Web Services
 
AWS Webcast - Running SAP HANA on the AWS Cloud
AWS Webcast - Running SAP HANA on the AWS CloudAWS Webcast - Running SAP HANA on the AWS Cloud
AWS Webcast - Running SAP HANA on the AWS Cloud
Amazon Web Services
 
AWS re:Invent Recap 2016 Taiwan part 1
AWS re:Invent Recap 2016 Taiwan part 1AWS re:Invent Recap 2016 Taiwan part 1
AWS re:Invent Recap 2016 Taiwan part 1
Amazon Web Services
 
Getting Started on AWS
Getting Started on AWSGetting Started on AWS
Getting Started on AWS
Amazon Web Services
 
Architecting for High Availability
Architecting for High AvailabilityArchitecting for High Availability
Architecting for High Availability
Amazon Web Services
 
Infrastructure Continuous Delivery Using AWS CloudFormation
Infrastructure Continuous Delivery Using AWS CloudFormationInfrastructure Continuous Delivery Using AWS CloudFormation
Infrastructure Continuous Delivery Using AWS CloudFormation
Amazon Web Services
 
AWS Re:Invent - High Availability Architecture at Netflix
AWS Re:Invent - High Availability Architecture at NetflixAWS Re:Invent - High Availability Architecture at Netflix
AWS Re:Invent - High Availability Architecture at Netflix
Adrian Cockcroft
 
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
Amazon Web Services
 
Getting Started with Docker on AWS
Getting Started with Docker on AWSGetting Started with Docker on AWS
Getting Started with Docker on AWS
Amazon Web Services
 

Viewers also liked (15)

PRESENTATION - Migrating AWS EBS backed AMI's between Regions
PRESENTATION - Migrating AWS EBS backed AMI's between RegionsPRESENTATION - Migrating AWS EBS backed AMI's between Regions
PRESENTATION - Migrating AWS EBS backed AMI's between Regions
 
AWS Webinar - Design for Availability-13_09_10
AWS Webinar - Design for Availability-13_09_10AWS Webinar - Design for Availability-13_09_10
AWS Webinar - Design for Availability-13_09_10
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
Introduction to AWS
Introduction to AWSIntroduction to AWS
Introduction to AWS
 
Aws introduction
Aws introductionAws introduction
Aws introduction
 
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
AWS re:Invent 2016| HLC302 | AWS Infrastructure for a Global Population Healt...
 
AWS Webcast - Best Practices for Deploying SAP Workloads on AWS
AWS Webcast - Best Practices for Deploying SAP Workloads on AWSAWS Webcast - Best Practices for Deploying SAP Workloads on AWS
AWS Webcast - Best Practices for Deploying SAP Workloads on AWS
 
AWS Webcast - Running SAP HANA on the AWS Cloud
AWS Webcast - Running SAP HANA on the AWS CloudAWS Webcast - Running SAP HANA on the AWS Cloud
AWS Webcast - Running SAP HANA on the AWS Cloud
 
AWS re:Invent Recap 2016 Taiwan part 1
AWS re:Invent Recap 2016 Taiwan part 1AWS re:Invent Recap 2016 Taiwan part 1
AWS re:Invent Recap 2016 Taiwan part 1
 
Getting Started on AWS
Getting Started on AWSGetting Started on AWS
Getting Started on AWS
 
Architecting for High Availability
Architecting for High AvailabilityArchitecting for High Availability
Architecting for High Availability
 
Infrastructure Continuous Delivery Using AWS CloudFormation
Infrastructure Continuous Delivery Using AWS CloudFormationInfrastructure Continuous Delivery Using AWS CloudFormation
Infrastructure Continuous Delivery Using AWS CloudFormation
 
AWS Re:Invent - High Availability Architecture at Netflix
AWS Re:Invent - High Availability Architecture at NetflixAWS Re:Invent - High Availability Architecture at Netflix
AWS Re:Invent - High Availability Architecture at Netflix
 
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
AWS re:Invent 2016: Cloud Monitoring - Understanding, Preparing, and Troubles...
 
Getting Started with Docker on AWS
Getting Started with Docker on AWSGetting Started with Docker on AWS
Getting Started with Docker on AWS
 

Similar to Datensicherheit mit AWS - AWS Security Web Day

Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
Amazon Web Services
 
Segurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWSSegurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWS
Alexandre Santos
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
Amazon Web Services
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
Amazon Web Services
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
Amazon Web Services
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
Amazon Web Services LATAM
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
MohammadEnnab4
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
Amazon Web Services
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
Modern Security and Compliance Through Automation
Modern Security and Compliance Through AutomationModern Security and Compliance Through Automation
Modern Security and Compliance Through Automation
Amazon Web Services
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
Sai Kesavamatham
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
Rolf Koski
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
Amazon Web Services
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Amazon Web Services
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
Helen Rogers
 

Similar to Datensicherheit mit AWS - AWS Security Web Day (20)

Intro & Security Update
Intro & Security UpdateIntro & Security Update
Intro & Security Update
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Security on AWS
Security on AWSSecurity on AWS
Security on AWS
 
Segurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWSSegurança de Ponta a Ponta na AWS
Segurança de Ponta a Ponta na AWS
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA PartnersAPN Partner Webinar - Security & Compliance for AWS EMEA Partners
APN Partner Webinar - Security & Compliance for AWS EMEA Partners
 
Staying Secure in the Cloud
Staying Secure in the CloudStaying Secure in the Cloud
Staying Secure in the Cloud
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
4-G.Fitzaptrick AWS-ENISA-RIX-.pptx
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in PracticeCSS 17: NYC - The AWS Shared Responsibility Model in Practice
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
 
Modern Security and Compliance Through Automation
Modern Security and Compliance Through AutomationModern Security and Compliance Through Automation
Modern Security and Compliance Through Automation
 
AWS Security Architecture - Overview
AWS Security Architecture - OverviewAWS Security Architecture - Overview
AWS Security Architecture - Overview
 
AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23AWS Finland User Group Meetup 2017-05-23
AWS Finland User Group Meetup 2017-05-23
 
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security OverviewAWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
AWS Canberra WWPS Summit 2013 - AWS Governance and Security Overview
 
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
Deploy a DoD Secure Cloud Computing Architecture Environment in AWS | AWS Pub...
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 

More from AWS Germany

Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the FieldAnalytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
AWS Germany
 
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
AWS Germany
 
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
AWS Germany
 
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
AWS Germany
 
Modern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWSModern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWS
AWS Germany
 
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with SpinnakerModern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
AWS Germany
 
Building Smart Home skills for Alexa
Building Smart Home skills for AlexaBuilding Smart Home skills for Alexa
Building Smart Home skills for Alexa
AWS Germany
 
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructureHotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
AWS Germany
 
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopWild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
AWS Germany
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
AWS Germany
 
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
AWS Germany
 
AWS Programme für Nonprofits
AWS Programme für NonprofitsAWS Programme für Nonprofits
AWS Programme für Nonprofits
AWS Germany
 
Microservices and Data Design
Microservices and Data DesignMicroservices and Data Design
Microservices and Data Design
AWS Germany
 
Serverless vs. Developers – the real crash
Serverless vs. Developers – the real crashServerless vs. Developers – the real crash
Serverless vs. Developers – the real crash
AWS Germany
 
Query your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performanceQuery your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performance
AWS Germany
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s Vault
AWS Germany
 
EKS Workshop
 EKS Workshop EKS Workshop
EKS Workshop
AWS Germany
 
Scale to Infinity with ECS
Scale to Infinity with ECSScale to Infinity with ECS
Scale to Infinity with ECS
AWS Germany
 
Containers on AWS - State of the Union
Containers on AWS - State of the UnionContainers on AWS - State of the Union
Containers on AWS - State of the Union
AWS Germany
 
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon LightsailDeploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
AWS Germany
 

More from AWS Germany (20)

Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the FieldAnalytics Web Day | From Theory to Practice: Big Data Stories from the Field
Analytics Web Day | From Theory to Practice: Big Data Stories from the Field
 
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
Analytics Web Day | Query your Data in S3 with SQL and optimize for Cost and ...
 
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...Modern Applications Web Day | Impress Your Friends with Your First Serverless...
Modern Applications Web Day | Impress Your Friends with Your First Serverless...
 
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
Modern Applications Web Day | Manage Your Infrastructure and Configuration on...
 
Modern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWSModern Applications Web Day | Container Workloads on AWS
Modern Applications Web Day | Container Workloads on AWS
 
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with SpinnakerModern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
Modern Applications Web Day | Continuous Delivery to Amazon EKS with Spinnaker
 
Building Smart Home skills for Alexa
Building Smart Home skills for AlexaBuilding Smart Home skills for Alexa
Building Smart Home skills for Alexa
 
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructureHotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
Hotel or Taxi? "Sorting hat" for travel expenses with AWS ML infrastructure
 
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless WorkshopWild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
Wild Rydes with Big Data/Kinesis focus: AWS Serverless Workshop
 
Log Analytics with AWS
Log Analytics with AWSLog Analytics with AWS
Log Analytics with AWS
 
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
Deep Dive into Concepts and Tools for Analyzing Streaming Data on AWS
 
AWS Programme für Nonprofits
AWS Programme für NonprofitsAWS Programme für Nonprofits
AWS Programme für Nonprofits
 
Microservices and Data Design
Microservices and Data DesignMicroservices and Data Design
Microservices and Data Design
 
Serverless vs. Developers – the real crash
Serverless vs. Developers – the real crashServerless vs. Developers – the real crash
Serverless vs. Developers – the real crash
 
Query your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performanceQuery your data in S3 with SQL and optimize for cost and performance
Query your data in S3 with SQL and optimize for cost and performance
 
Secret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s VaultSecret Management with Hashicorp’s Vault
Secret Management with Hashicorp’s Vault
 
EKS Workshop
 EKS Workshop EKS Workshop
EKS Workshop
 
Scale to Infinity with ECS
Scale to Infinity with ECSScale to Infinity with ECS
Scale to Infinity with ECS
 
Containers on AWS - State of the Union
Containers on AWS - State of the UnionContainers on AWS - State of the Union
Containers on AWS - State of the Union
 
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon LightsailDeploying and Scaling Your First Cloud Application with Amazon Lightsail
Deploying and Scaling Your First Cloud Application with Amazon Lightsail
 

Recently uploaded

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
saastr
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
Wouter Lemaire
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
Tomaz Bratanic
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
Tatiana Kojar
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
innovationoecd
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
Hiroshi SHIBATA
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 

Recently uploaded (20)

Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
Deep Dive: AI-Powered Marketing to Get More Leads and Customers with HyperGro...
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
UI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentationUI5 Controls simplified - UI5con2024 presentation
UI5 Controls simplified - UI5con2024 presentation
 
GraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracyGraphRAG for Life Science to increase LLM accuracy
GraphRAG for Life Science to increase LLM accuracy
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
Skybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoptionSkybuffer SAM4U tool for SAP license adoption
Skybuffer SAM4U tool for SAP license adoption
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 
Presentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of GermanyPresentation of the OECD Artificial Intelligence Review of Germany
Presentation of the OECD Artificial Intelligence Review of Germany
 
Introduction of Cybersecurity with OSS at Code Europe 2024
Introduction of Cybersecurity with OSS  at Code Europe 2024Introduction of Cybersecurity with OSS  at Code Europe 2024
Introduction of Cybersecurity with OSS at Code Europe 2024
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 

Datensicherheit mit AWS - AWS Security Web Day

  • 1. Security on  AWS(overview) Bertram  Dorn EMEA  Specialized Solutions  Architect Security  and Compliance
  • 2. Agenda: • Overview • AWS  Regions • Availability Zones • Shared Responsibility • Security  Features • Best  Practices  for • IAM • Data  at  Rest
  • 3. AWS  Global  Footprint US  West  (N.California) US  West  (Oregon) GovCloud US  East  (Virginia) EU  West  (Ireland) Asia  Pacific  (Tokyo) Asia  Pacific  (Singapore) Asia  Pacific  (Sydney) China  (Beijing) São  Paulo EU  Central  (Frankfurt) Korea  (Seul) Region An independent collection of AWS resources in a defined geography A solid foundation for meeting location- dependent privacy and compliance requirements
  • 4. Example  AWS  Region AZ AZ AZ AZ AZ Transit Transit • Mesh  of  Availability  Zones  (AZ)  and  Transit  Centers • Redundant paths  to  transit  centers • Transit  centers  connect  to: – Private  links  to  other  AWS  regions – Private  links  to  customers – Internet  through  peering  &  paid  transit • Metro-­‐area  DWDM  links  between  AZs • 82,864 fiber  strands  in  region • AZs  <2ms  apart  &  usually  <1ms • 25Tbps peak  inter-­‐AZs  traffic
  • 5. AWS  Global  Footprint Availability Zone Designed as independent failure zones Physically separated within a typical metropolitan region
  • 6. Example  AWS  Availability  Zone • 1  of  30  AZs  world-­‐wide • All  regions  have  2  or  more  AZs • Each  AZ  is  1  or  more  DC – No  data  center  is  in  two  AZs – Some  AZs  have  as  many  as  6  DCs • DCs  in  AZ  less  than  ¼  ms apart AZ AZ AZ AZ AZ Transit Transit
  • 7. Example  AWS  Data  Center • Single  DC  typically  over  50,000   servers  &  often  over  80,000   • Larger  DCs  undesirable  (blast  radius) • Up  to  102Tbps  provisioned   to  a   single  DC  (inter  DC  not  intra)
  • 8. Shared Responsibility Cross-service Controls Service-specific Controls Managed by AWS Managed by Customer Security of the Cloud Security in the Cloud Cloud Service Provider Controls Optimized Network/OS/App Controls Request reports at: aws.amazon.com/compliance/#contact ISO 27000 ISO 9001
  • 9. What  is  AWS? AWS  Global  Infrastructure Application  Services Networking Deployment  &  Administration DatabaseStorageCompute
  • 10. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Service  Breadth  &  Depth
  • 12. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Network  Security Choose  and  combine  a  bunch  of  build  in  network  related   options: ü Build  in  firewall  features  (Security  Groups  and  NACL’s) ü Virtual  Private  Cloud ü Transport  Encryption  (IPsec  and  TLS) ü Dedicated  Network  Connection  (Direct  Connect) ü Cypher  Suites  with  Perfect  Forward  Secrecy   ü Managed  NAT  Gateways ü WebApplicationFilters
  • 13. Virtual  Private  Cloud  Security  Layers Security Group Subnet  10.0.0.0/24 Routing Table Network ACL Subnet  10.0.1.0/24 Routing Table Network ACL Virtual Private Gateway Internet Gateway Lockdown at instance level Isolate network functions Lockdown at network level Route restrictively Router Availability Zone A Availability Zone B Security Group Security Group
  • 14. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Access  Control Allow  only    authorized  administrators  and  applications  access   on  AWS  resources   ü Multi-­‐Factor-­‐Authentication  (MFA) ü Fine  granular  access  to  AWS  object  inS3-­‐Buckets/SQS/SNS   and  others ü API-­‐Request  Authentication ü Geo-­‐Restrictions ü Temporary  access  tokens  through   STS
  • 15. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Monitoring  and  Logging Get  an  overview  about  activities  on  your  AWS  ressources ü Asset-­‐Management  and  -­‐Configuration   with  AWS  Config ü Compliance  Auditing   and  security  analytics  with  AWS   CloudTrail ü Identifications  of  configuration   challenges  through   TrustedAdvisor ü Fine  granular  logging   of  access  to  S3  objects ü Detailed  informations about  flows  in  the  network  through   VPC-­‐FlowLogs ü Rule  based  config checks  and  actions  with  AWS  Config Rules ü Filter  and  monitoring   of  HTTP  access  to  applications  with   WAF  functions  in  CloudFront
  • 16. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Encryption Security  is  the  first  priority  for  AWS ü Encryption  of  your  data  at  rest  with  AES256   (EBS/S3/Glacier/RDS) ü Centralized  (by  Region)  managed  Key-­‐Management ü IPsec  tunnels  into  AWS  with  the  VPN-­‐Gateways ü Deicated HSM  modules  in  the  cloud  with  CloudHSM
  • 18. Identity  and  Access  Management • Users  &  Groups
  • 19. Identity  and  Access  Management • Users  &  Groups • Unique  Security  Credentials
  • 20. Identity  and  Access  Management • Users  &  Groups • Unique  Security  Credentials • Temporary  Security   Credentials
  • 21. Identity  and  Access  Management • Users  &  Groups • Unique  Security  Credentials • Temporary  Security   Credentials • Policies  &  Permissions
  • 22. Identity  and  Access  Management • Users  &  Groups • Unique  Security  Credentials • Temporary  Security   Credentials • Policies  &  Permissions • Roles
  • 23. Identity  and  Access  Management • Users  &  Groups • Unique  Security  Credentials • Temporary  Security   Credentials • Policies  &  Permissions • Roles • Multi-­factor  Authentication
  • 25. Root  Accounts  Do  Not  Need  Access  Keys Root  Accounts  Do  Normally Not  Log  In
  • 26. Best  Practices Lock  away  your  AWS  account   access  keys Create  individual  IAM  users Use  groups  to  assign   permissions  to  IAM  users Grant  least  privilege Configure  a  strong  password   policy  for  your  users Enable  MFA  for  privileged   users Use  roles  for  applications  that   run  on  Amazon  EC2  instances Delegate  by  using  roles   instead  of  by  sharing   credentials Rotate  credentials  regularly Remove  unnecessary   credentials Use  policy  conditions Keep  a  history  of  activity
  • 27. What  type  of  events  should  I  monitor  for? v You  can  monitor  any  specific  event  recorded  by  CloudTrail  and  receive   notification  from  CloudWatch v Monitor  for  security  or  network  related  events  that  are  likely  to  have  a  high   blast  radius v Popular  examples  based  on  customer  feedback 1. Creation,  deletion  and  modification  of  security  groups  and  VPCs 2. Changes  to  IAM  policies  or  S3  bucket  policies 3. Failed  AWS  Management  Console  sign-­in  events 4. API  calls  that  resulted  in  authorization  failures 5. Launching,  terminating,  stopping,  starting  and  rebooting  EC2  instances v Fully  defined  and  pre-­built  CloudFormation  template  to  get  started
  • 28. Receive  email  notifications  of  specific  API  activity
  • 30. Data  at  Rest:  Simplified
  • 31. Securing  Data  at  Rest Amazon  RDS Redshift Amazon  S3GlacierAmazon  EBS > AES-­256  key > KMS  integration > Easy  one-­click   encryption
  • 32. Securing  Data  at  Rest Amazon  S3 Glacier > AES-­256  key > Each  object  is  encrypted > Each  key  is  encrypted  with  a   master  key > Master  key  is  rotated  regularly > KMS  integration
  • 33. Amazon  EBS Securing  Data  at  Rest > AES-­256  key > Performed  on  EC2  host > Snapshots > KMS  integrated > Each Volume  gets it‘s DataKey > DataKey is encrypted with MasterKey
  • 34. Amazon  RDS Securing  Data  at  Rest > AES-­256  key > Logs,  backups,  and  snapshots > Read  replicas > Active  and  backup > CloudHSM  (Oracle  TDE  only) > KMS  integration
  • 35. Redshift Securing  Data  at  Rest > AES-­256  key > Data  blocks > Metadata > Active  and  backup > CloudHSM  integration > 4-­tier  encryption  architecture
  • 36. Securing  Data  at  Rest CloudHSM > Hardware  Security  Module > Single  tenancy > Private  key  material  never   leaves  the  HSM > AWS  provisioned,  customer   managed
  • 37. Whitepaper:  Encrypting  Data  at  Rest https://d0.awsstatic.com/whitepapers/aws-­securing-­data-­at-­rest-­with-­encryption.pdf
  • 38. Thank  You Content  Providers: Bertram  Dorn Brian  Wagner Dave  Walker