SlideShare a Scribd company logo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Pop-up Loft
Enabling Compliance with the General Data Protection Regulation
(GDPR) on AWS
Brad Dispesa,
Specialist, Security / Compliance
What is the GDPR?
Media Coverage – Fear, Uncertainty, Doubt
What is the GDPR?
• The "GDPR" is the General Data Protection Regulation, a significant new
EU Data Protection Regulation
• Introduces robust requirements that will raise and harmonize standards for
data protection, security, and compliance across the EU
• The GDPR is enforceable May 25th, 2018 and it replaces the EU Data
Protection Directive (Directive 95/46/EC)
• Territorial scope: Organisations established in the EU and Organisations
without an EU presence who target or monitor EU individuals
Content vs. Personal Data
Content
= anything that a customer
(or any end user) stores, or
processes using AWS services,
including:
Software ǀ Data ǀ Text ǀ Audio ǀ Video
Personal Data
= information from which a
living individual may be
identified or identifiable
(under EU data protection
law)
• Customer’s “content” might
include “personal data”
What Else Comes With GDPR?
Individuals have the right to a copy of all
the personal data that controllers have
regarding him or her. It also must be
provided in a way that facilitates reuse.
What Else Comes With GDPR?
This gives individuals the right to have
certain personal data deleted so third
parties can no longer trace them.
This helps to facilitate the inclusion of
policies, guidelines, and work instructions
related to data protection in the earliest
stages of projects including personal data.
What Else Comes With GDPR?
Controllers must report personal data breaches
to the relevant supervisory authority within 72
hours. If there is a high risk to the rights and
freedoms of data subjects, they must also
notify the data subjects.
What Else Comes With GDPR?
Potential Consequences
• Penalties – Apply to both controllers and processors
• Fines of up to €20,000,000 or 4% of global turnover
• Fines will be dissuasive
• Claims from individuals and class action suits
How AWS Can Help Customers
Achieve GDPR Compliance
Security of Content and Data Breaches
ProcessorData Subject Controller
x
x
X
Must implement appropriate
technical and organizational
measures (“TOMs”)
Must monitor own environment
Must notify regulators and data
subjects
Content agnostic
Own TOMs
Under GDPR Controllers and Processors are required to implement
appropriate Technical and Organization Measures (“TOMs”)
1) Pseudonymisation and
encryption of personal data
(2) Ensure ongoing
confidentiality, integrity,
availability, and resilience of
processing systems and services
(3) Ability to restore availability
and access to personal data in a
timely manner in the event of a
physical or technical incident
(4) Process for regularly testing,
assessing, and evaluating the
effectiveness of TOMs
GDPR in Practice: Implementing TOMs
What AWS Provides
Tools and Services
Compliance Framework
Partner Network
§§ Data Protection Contract§§
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge
Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Customers
AWS Shared Responsibility Model
Customers are
responsible for
their security
and compliance
IN the Cloud
AWS is
responsible for
the security OF
the Cloud
GDPR is also a “Shared Responsibility”
Legal Compliance
(both controllers and processors)
System Security and Data Protection by Design
(both controllers and processors; AWS has tooling to help)
Records of Processing Activities
(both controllers and processors; AWS has tooling to help)
Encryption
(both controllers and processors; AWS has have tooling to help)
Security of Personal Data
(controller responsibility)
Managing Data Subject Consent
(controller responsibility)
Managing Personal Data Deletion
(both controllers and processors; AWS has tooling to help)
Managing Personal Data Portability
(controller responsibility)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Navigating GDPR Compliance
‘Security of processing’‘Data protection by design and default’
‘Records of processing activities’
Amazon
Snowball
Amazon
Virtual Private
Cloud (VPC)
Amazon API
Gateway
AWS
KMS
AWS
CloudHSM
Server-side
Encryption
AWS Identity
and Access
Management
SAML
Federation
Active
Directory
Integration
AWS Service
Catalog
AWS
CloudTrail
AWS
Config
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Automating Security
Goal
Ensure ongoing confidentiality, integrity, availability,
and resilience of processing systems and services
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Automating Security
There are multiple ways to assess and evaluate
infrastructure against best practices …
How?
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon GuardDuty
Managed threat detection service that continuously monitors for
malicious or unauthorized behavior
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon GuardDuty
Detects items such as:
- Unusual API calls
- Potentially unauthorized
deployments that indicate a
possible account compromise
- Potentially compromised
instances or reconnaissance by
attackers
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon GuardDuty
Integrate with Amazon
CloudWatch Events for:
- Alerting
- Remediation
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Macie
Security service that uses
machine learning to
continuously and automatically
discover, classify, and protect
sensitive data in AWS
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Macie
Recognizes and classify sensitive
data such as:
- Personally identifiable
information (PII)
- Intellectual property
- Sensitive AWS Account
information
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Macie
Powerful research functionality
- Find individual record types
- Where do I have IPv4 addresses?
- Tie research to Alerting
- Tell me when you find source code
- Tell me when you find open S3 bucket
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Macie
Automation
- Tie Research -> Alerting -> Automation
- If AWSCred: disable keys
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Trusted Advisor
Helps you reduce cost, increase
performance, and improve security by
providing real-time guidance to help
you provision your resources following
AWS best practices
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Trusted Advisor
Comes with pre-baked controls around
- Unrestricted security groups
- MFA not on root accounts
- Publically exposed AWS credentials
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Trusted Advisor
Integrated with CloudWatch Events
Build automation for things like
- Exposed keys
- Auto disable?
- Security Groups
- Alert?
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon and OSS
Example:
CIS AWS benchmarks
Purpose:
Allows you to continuously or spot evaluate the
configuration of resources and account settings of an AWS
account against the CIS AWS Foundation Benchmark
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon and OSS
Example:
CIS AWS benchmark assessment
Provides:
Assess against 48 control statements. Including
- No multi-factor authentication (MFA) usage on the root account
- Overly open IAM policies
- Lack of enabled logging on the account
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon and OSS
Example:
CIS AWS benchmark assessment
Provides:
Single report with assessment result
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon and OSS
Example:
CIS AWS benchmark assessment
Provides:
Ability to integrate with other tools
using standard JSON output
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon and OSS
Plenty of Code Out There!
AWS
http://github.com/awslabs
http://github.com/awslabs/aws-security-automation
https://github.com/awslabs/aws-security-benchmark
Non-AWS
• ThreatResponse.cloud - https://threatresponse.cloud
• Cloud Custodian-
https://github.com/capitalone/cloud-custodian
• Security Monkey -
https://github.com/Netflix/security_monkey
• FIDO - https://github.com/Netflix/Fido
• CloudSploit - https://github.com/cloudsploit
• Prowler - https://github.com/Alfresco/prowler
• StreamAlert - https://github.com/airbnb/streamalert
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR –
Additional Service Integration
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Encryption
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Amazon Key Management Service (KMS)
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Monitoring & Logging
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Monitoring & Logging
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Access Control
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Access Control
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
If you can API it …
You can automate it!
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
Data Protection by Default
We have developed a security assurance program using additional global
privacy and data protection best practices in order to help customers
establish, operate and leverage our security control environment. These
security protections and control processes are independently validated by
multiple third-party independent assessments.
•ISO 27001/9001 certified
•ISO 27017/27018 certified
•Cloud Computing Compliance Controls Catalog (C5)
AWS Foundation Services
AWS Global Infrastructure
Your own
accreditations
Meet Your Own Security Objectives
Your own
certifications
Your own
external audits
Customer scope
and effort is
reduced
Better results
through focused
efforts
Built on AWS
consistent
baseline controls
Customers
GDPR
Code of
Conducts
AWS Marketplace: One Stop Shop for Familiar Tools
AWS Services will be compliant with GDPR by May 25, 2018
Will your services be ready? What will that require?
AWS will help educate and enable customers to architect their AWS
environment to support data protection and privacy
Scope of Work Includes
Review current AWS architecture
Educate on AWS services & defined controls
Recommend Partners and Solutions who can support/provide technical
solutions
Professional Services: Privacy-by-Design Offering
Contact Us: aws-preserve-src-gdpr@amazon.com
AWS Partner Network (APN) & GDPR
Consulting Partners
APN consulting partners can help
your customers get ready for GDPR.
Technology Partners
APN technology partners offer
security & identity solutions.
/
© 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS & The GDPR
https://aws.amazon.com/compliance/gdpr-center/
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved
Pop-up Loft
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

More Related Content

What's hot

Incident Response on AWS - A Practical Look.pdf
Incident Response on AWS - A Practical Look.pdfIncident Response on AWS - A Practical Look.pdf
Incident Response on AWS - A Practical Look.pdf
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
Amazon Web Services
 
Real-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab PrepReal-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab Prep
Amazon Web Services
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
Amazon Web Services
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
Amazon Web Services
 
Incident Response - Eyes Everywhere
Incident Response - Eyes EverywhereIncident Response - Eyes Everywhere
Incident Response - Eyes Everywhere
Amazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
Amazon Web Services
 
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
Brian Andrzejewski
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
Ahmad Khan
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
Amazon Web Services
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
Amazon Web Services
 
ThreatResponse
ThreatResponseThreatResponse
ThreatResponse
Amazon Web Services
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Amazon Web Services
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
Amazon Web Services
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Amazon Web Services
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...
Amazon Web Services
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
Amazon Web Services
 

What's hot (20)

Incident Response on AWS - A Practical Look.pdf
Incident Response on AWS - A Practical Look.pdfIncident Response on AWS - A Practical Look.pdf
Incident Response on AWS - A Practical Look.pdf
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
How to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdfHow to Implement a Well-Architected Security Solution.pdf
How to Implement a Well-Architected Security Solution.pdf
 
Real-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab PrepReal-Time Insights Lab and Lab Prep
Real-Time Insights Lab and Lab Prep
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
Incident Response - Eyes Everywhere
Incident Response - Eyes EverywhereIncident Response - Eyes Everywhere
Incident Response - Eyes Everywhere
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
AWS ReInvent 2020: SEC313 - A security operator’s guide to practical AWS Clou...
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Cognito Customer Deep Dive
Cognito Customer Deep DiveCognito Customer Deep Dive
Cognito Customer Deep Dive
 
AWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPRAWS Shared Responsibility Model and GDPR
AWS Shared Responsibility Model and GDPR
 
ThreatResponse
ThreatResponseThreatResponse
ThreatResponse
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
 
An Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your ApplicationsAn Active Case Study on Insider Threat Detection in your Applications
An Active Case Study on Insider Threat Detection in your Applications
 
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019 Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
Build security into your golden AMI pipeline - DEM08 - AWS reInforce 2019
 
Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...Monitoring and administrating privilegeMonitoring and administrating privileg...
Monitoring and administrating privilegeMonitoring and administrating privileg...
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 

Similar to GDPR and Automation Overview

Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
Amazon Web Services
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
Net4All
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
Amazon Web Services
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in China
Amazon Web Services
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
Amazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
Amazon Web Services
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
Amazon Web Services
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Amazon Web Services
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
Amazon Web Services
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
Amazon Web Services
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
Amazon Web Services
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
Amazon Web Services
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
Amazon Web Services LATAM
 
Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2
Amazon Web Services
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
Amazon Web Services
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloud
Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
Amazon Web Services
 

Similar to GDPR and Automation Overview (20)

Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in China
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
Navigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWSNavigating GDPR Compliance on AWS
Navigating GDPR Compliance on AWS
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2Threat Detection & Remediation Workshop - Module 2
Threat Detection & Remediation Workshop - Module 2
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloud
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

GDPR and Automation Overview

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Pop-up Loft Enabling Compliance with the General Data Protection Regulation (GDPR) on AWS Brad Dispesa, Specialist, Security / Compliance
  • 2. What is the GDPR?
  • 3. Media Coverage – Fear, Uncertainty, Doubt
  • 4. What is the GDPR? • The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection Regulation • Introduces robust requirements that will raise and harmonize standards for data protection, security, and compliance across the EU • The GDPR is enforceable May 25th, 2018 and it replaces the EU Data Protection Directive (Directive 95/46/EC) • Territorial scope: Organisations established in the EU and Organisations without an EU presence who target or monitor EU individuals
  • 5. Content vs. Personal Data Content = anything that a customer (or any end user) stores, or processes using AWS services, including: Software ǀ Data ǀ Text ǀ Audio ǀ Video Personal Data = information from which a living individual may be identified or identifiable (under EU data protection law) • Customer’s “content” might include “personal data”
  • 6. What Else Comes With GDPR? Individuals have the right to a copy of all the personal data that controllers have regarding him or her. It also must be provided in a way that facilitates reuse.
  • 7. What Else Comes With GDPR? This gives individuals the right to have certain personal data deleted so third parties can no longer trace them.
  • 8. This helps to facilitate the inclusion of policies, guidelines, and work instructions related to data protection in the earliest stages of projects including personal data. What Else Comes With GDPR?
  • 9. Controllers must report personal data breaches to the relevant supervisory authority within 72 hours. If there is a high risk to the rights and freedoms of data subjects, they must also notify the data subjects. What Else Comes With GDPR?
  • 10. Potential Consequences • Penalties – Apply to both controllers and processors • Fines of up to €20,000,000 or 4% of global turnover • Fines will be dissuasive • Claims from individuals and class action suits
  • 11. How AWS Can Help Customers Achieve GDPR Compliance
  • 12. Security of Content and Data Breaches ProcessorData Subject Controller x x X Must implement appropriate technical and organizational measures (“TOMs”) Must monitor own environment Must notify regulators and data subjects Content agnostic Own TOMs
  • 13. Under GDPR Controllers and Processors are required to implement appropriate Technical and Organization Measures (“TOMs”) 1) Pseudonymisation and encryption of personal data (2) Ensure ongoing confidentiality, integrity, availability, and resilience of processing systems and services (3) Ability to restore availability and access to personal data in a timely manner in the event of a physical or technical incident (4) Process for regularly testing, assessing, and evaluating the effectiveness of TOMs GDPR in Practice: Implementing TOMs
  • 14. What AWS Provides Tools and Services Compliance Framework Partner Network §§ Data Protection Contract§§
  • 15. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers AWS Shared Responsibility Model Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud
  • 16. GDPR is also a “Shared Responsibility” Legal Compliance (both controllers and processors) System Security and Data Protection by Design (both controllers and processors; AWS has tooling to help) Records of Processing Activities (both controllers and processors; AWS has tooling to help) Encryption (both controllers and processors; AWS has have tooling to help) Security of Personal Data (controller responsibility) Managing Data Subject Consent (controller responsibility) Managing Personal Data Deletion (both controllers and processors; AWS has tooling to help) Managing Personal Data Portability (controller responsibility)
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Navigating GDPR Compliance ‘Security of processing’‘Data protection by design and default’ ‘Records of processing activities’ Amazon Snowball Amazon Virtual Private Cloud (VPC) Amazon API Gateway AWS KMS AWS CloudHSM Server-side Encryption AWS Identity and Access Management SAML Federation Active Directory Integration AWS Service Catalog AWS CloudTrail AWS Config
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Automating Security Goal Ensure ongoing confidentiality, integrity, availability, and resilience of processing systems and services
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Automating Security There are multiple ways to assess and evaluate infrastructure against best practices … How?
  • 20. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon GuardDuty Managed threat detection service that continuously monitors for malicious or unauthorized behavior
  • 21. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon GuardDuty Detects items such as: - Unusual API calls - Potentially unauthorized deployments that indicate a possible account compromise - Potentially compromised instances or reconnaissance by attackers
  • 22. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon GuardDuty Integrate with Amazon CloudWatch Events for: - Alerting - Remediation
  • 23. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Macie Security service that uses machine learning to continuously and automatically discover, classify, and protect sensitive data in AWS
  • 24. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Macie Recognizes and classify sensitive data such as: - Personally identifiable information (PII) - Intellectual property - Sensitive AWS Account information
  • 25. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Macie Powerful research functionality - Find individual record types - Where do I have IPv4 addresses? - Tie research to Alerting - Tell me when you find source code - Tell me when you find open S3 bucket
  • 26. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Macie Automation - Tie Research -> Alerting -> Automation - If AWSCred: disable keys
  • 27. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Trusted Advisor Helps you reduce cost, increase performance, and improve security by providing real-time guidance to help you provision your resources following AWS best practices
  • 28. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Trusted Advisor Comes with pre-baked controls around - Unrestricted security groups - MFA not on root accounts - Publically exposed AWS credentials
  • 29. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Trusted Advisor Integrated with CloudWatch Events Build automation for things like - Exposed keys - Auto disable? - Security Groups - Alert?
  • 30. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon and OSS Example: CIS AWS benchmarks Purpose: Allows you to continuously or spot evaluate the configuration of resources and account settings of an AWS account against the CIS AWS Foundation Benchmark
  • 31. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon and OSS Example: CIS AWS benchmark assessment Provides: Assess against 48 control statements. Including - No multi-factor authentication (MFA) usage on the root account - Overly open IAM policies - Lack of enabled logging on the account
  • 32. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon and OSS Example: CIS AWS benchmark assessment Provides: Single report with assessment result
  • 33. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon and OSS Example: CIS AWS benchmark assessment Provides: Ability to integrate with other tools using standard JSON output
  • 34. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon and OSS Plenty of Code Out There! AWS http://github.com/awslabs http://github.com/awslabs/aws-security-automation https://github.com/awslabs/aws-security-benchmark Non-AWS • ThreatResponse.cloud - https://threatresponse.cloud • Cloud Custodian- https://github.com/capitalone/cloud-custodian • Security Monkey - https://github.com/Netflix/security_monkey • FIDO - https://github.com/Netflix/Fido • CloudSploit - https://github.com/cloudsploit • Prowler - https://github.com/Alfresco/prowler • StreamAlert - https://github.com/airbnb/streamalert
  • 35. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR – Additional Service Integration
  • 36. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Encryption
  • 37. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Amazon Key Management Service (KMS)
  • 38. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Monitoring & Logging
  • 39. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Monitoring & Logging
  • 40. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Access Control
  • 41. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Access Control
  • 42. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR If you can API it … You can automate it!
  • 43. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR Data Protection by Default We have developed a security assurance program using additional global privacy and data protection best practices in order to help customers establish, operate and leverage our security control environment. These security protections and control processes are independently validated by multiple third-party independent assessments. •ISO 27001/9001 certified •ISO 27017/27018 certified •Cloud Computing Compliance Controls Catalog (C5)
  • 44. AWS Foundation Services AWS Global Infrastructure Your own accreditations Meet Your Own Security Objectives Your own certifications Your own external audits Customer scope and effort is reduced Better results through focused efforts Built on AWS consistent baseline controls Customers GDPR Code of Conducts
  • 45. AWS Marketplace: One Stop Shop for Familiar Tools
  • 46. AWS Services will be compliant with GDPR by May 25, 2018 Will your services be ready? What will that require? AWS will help educate and enable customers to architect their AWS environment to support data protection and privacy Scope of Work Includes Review current AWS architecture Educate on AWS services & defined controls Recommend Partners and Solutions who can support/provide technical solutions Professional Services: Privacy-by-Design Offering Contact Us: aws-preserve-src-gdpr@amazon.com
  • 47. AWS Partner Network (APN) & GDPR Consulting Partners APN consulting partners can help your customers get ready for GDPR. Technology Partners APN technology partners offer security & identity solutions. /
  • 48. © 2018, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS & The GDPR https://aws.amazon.com/compliance/gdpr-center/
  • 49. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved Pop-up Loft aws.amazon.com/activate Everything and Anything Startups Need to Get Started on AWS