SlideShare a Scribd company logo
1 of 42
GDPR
TOP 10 AWS CLOUD
SECURITY & COMPLIANCE
BEST PRACTICES
• Faisal Jawaid
Dir of Product Management
Security & Compliance
• Ahmed Khan
AWS Partner Manager – Strategic Sales
Meet Our Speakers
What we will learn today?
• Overview of GDPR
• How to inventory GDPR PII in your AWS & other databases?
• Article 5 Six Principals of GDPR Data Accountability
• Article 32 Security of Processing
• Article 25 Data Privacy by Design and by Default
• Article 28 Third Party Compliance
• Article 44 International Transfers
• TOP 10 AWS BEST PRACTICES for GDPR – Technical Controls
• Cloudnosys Security & Compliance Platform
• Q & A
GDPR
Overview of GDPR
1. One Law for privacy across 28 countries - EU 679/2017 (GDPR)
2. GDPR will implement from 25 May 2018
3. Accountability detailed data rights and restrictions on (See
Articles for details) – Data processors and Controllers both!
4. New GDPR framework is complex yet detailed
5. Data Scope: Beyond DOB, NI#, Biometric, Geo Locations, --
User Inferencing data (Identifiers)
6. Breach Notification – 72 Hours
7. The regulation establishes for enforcement: Business
Organization will only have to deal with one single data
protection authority.
8. Privacy by Design – Demonstrate testable controls, Information
Governance.
9. Must have specified, explicit and legitimate purposes to collect
and process data (Article 5)
10. The GDPR applies to all companies worldwide that process
personal data of European Union (EU) citizens.
Essentially any information relating to an individual who could be identified based on
one or more identifiers. GDPR online identifiers and combination of online and
unique identifiers
●Article 4 (1), “‘personal data’ means any information relating to an identified or identifiable natural person
(‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in
particular by reference to an identifier such as a name, an identification number, location data, an online
identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic,
cultural or social identity of that natural person.”
●Recital – 30 Natural persons may be associated with online identifiers provided by their devices,
applications, tools and protocols, such as internet protocol addresses, cookie identifiers or other identifiers
such as radio frequency identification tags. This may leave traces which, in particular when combined with
unique identifiers and other information received by the servers, may be used to create profiles of the
natural persons and identify them.
What is personal data of a Natural Person?
●Leverage AWS Macie
Service to identify PII and
classify your datasets in S3
●For other databases, like
Mongo, MS SQL, Oracle,
RDS etc. Use Dataguise,
Datasunrise, Imperva and
also free open source DB
Scanning tools on GitHub.
Obvious examples of personal data include:
• Full name
• Home address
• Email address (work email addresses are classed as personal data)
• Telephone number
• NI number (National Identity)
• Date of birth
• Driver’s license number
• Vehicle license plate
• Credit card number
• Geo locations
• IP Addresses
• Cookies
• RFID
• Race, Ethnic, Origin, Gender (Article 7-9 Consent)
First Inventory your PII data on AWS – How?
The purpose of GDPR is to improve the way personal data is stored and used. It is founded on six
principles of data accountability (Article 5), specifically that personal data shall be:
1. Processed lawfully, fairly and in a transparent manner
2. Collected for specified, explicit and legitimate purposes
3. Adequate, relevant and limited to what is necessary
4. Accurate and, where necessary, kept up to date
5. Kept in a form which permits identification of Data Subjects for no longer than is necessary
6. Processed in a way that ensures appropriate security of the personal data
The Data Controller is responsible for, and must be able to demonstrate, compliance with these principles.
Also secure against, accidental loss, damage or destruction – Article -5
Article – 5
Six principles of data accountability
“the controller and the processor shall implement appropriate technical
and organisational measures to ensure a level of security appropriate
to the risk.”
What does this mean?
Implement a Risk Assessment process – Update Risk Register –
Privacy Impact Assessment (PIA) Article 35 – (Risk of Data Loss,
Breach etc.)
Article 32 – Security of Processing
Article 25 of the GDPR codifies both the concepts of privacy by design and privacy by
default. Under this Article a data controller is required to implement appropriate technical
and organisational measures both at the time of determination of the means for
processing and at the time of the processing itself in order to ensure data protection
principles such as data minimisation are met. Any such privacy by design measures may
include, for example, pseudonymisation or other privacy-enhancing technologies.
What this means?
- User does not have to inform you to secure their data (by Default)
- You must implement Encryption, Config Mngt, and IAM controls for the cloud
- (Technical) –AWS Security & Compliance Controls
Article – 25
Data Privacy by Design and by Default
What does it mean for cloud providers?
Legal:
● Standard Contractual Clauses for Controller to Processor - Transfers of Personal Data (sample
legal doc @ iapp.org)
● AWS is providing a GDPR BAA agreement now, please review.
Technical:
● Request CIS GDPR specific AWS Cloud scan results every month/quarter based on volume
from your third parties that are on AWS. Have that on your contract!
Article 28 – Third Party Compliance
Article 44 of the GDPR prohibits the transfer of personal data beyond EU/EEA,
unless the recipient country can prove it provides adequate data protection.
Descriptions of acceptable proof are detailed in Articles 45 – 49
● Whitelisted Jurisdictions: The European Commission can make a finding that a non-
EU/EEA jurisdiction enforces data protection laws that are essentially equivalent to the
GDPR. Currently, the following jurisdictions enjoy an Adequacy Decision: Andorra,
Argentina, Canada (some provinces), Faeroe Islands, Guernsey, Israel, the Isle of Man,
Jersey, New Zealand, Switzerland, and Uruguay.
● Privacy Shield Framework: The Framework, approved on July 16, 2016, allows U.S.
organizations to self-certify to the U.S. Department of Commerce and then publically commit
to comply with the Framework’s data protection requirements. The public commitment is
enforceable under U.S. law.
Article – 44 International Transfers
Summary : A quick checklist for your Cloud
Legal Responsibility and Obligations
Review AWS BAA for GDPR. Also AWS is working on improving Infrastructure services to be more
GDPR compliant by May 2018. Review Privacy Shield Framework –Self certify
Organizational Responsibilities
Assign a Data Protection officer which will govern and benchmark the program.
Technical Responsibility and Obligations
Inventory data, and implement strong controls to maintain data privacy. Pay attention to DLP, Encryption,
and CIS/PCI/HIPAA equivalent controls around AWS configuration monitoring. Audit trail management.
Implement cloud compliance automation to manage these controls and continually monitor in near real time.
• The Center for Internet Security is a non-profit
entity that harnesses the power of a global IT
community to safeguard private and public
organizations against cyber threats.
• CIS AWS Benchmarks
44 AWS Controls
• CIS - OS hardening & AWS
Configurations
• https://d0.awsstatic.com/whitepapers/compliance/A
WS_CIS_Foundations_Benchmark.pdf
– CIS Controls
© 2018 - Cloudnosys | Security, Compliance, Cost.
1. Unauthorized API calls
2. Management Console sign-in without MFA
3. Usage of “root” account
4. IAM policy changes
5. CloudTrail configuration changes
6. AWS Management Console authentication failures
7. Disabling or deletion of customer created CMKs
8. S3 bucket policy changes
9. AWS Config configuration changes
10. Security group changes
11. Changes to Network Access Control Lists (NACL)
12. Changes to network gateways
13. Route table changes
14. VPC changes
15. Ensure security contact information is registered
16. Ensure appropriate subscribers to each SNS topic
Cost of Breach – Security & Compliance
© 2017 - Cloudnosys | Security, Compliance, Cost.
Average cost of a
data breach
$6.53M 56% 70%
Increase in theft of hard
intellectual property
Of consumers indicated
they’d avoid businesses
following a security breach
95% of all Cloud Breaches will be due to misconfigurations*
https://www.csid.com/resources/stats/data/breaches/
http://www.pwc.com/gx/en/issues/cyber-
Security/information-security-security-survey.html https://www.csid.com/resources/stats/data/breaches/
**By Gartner – Viveca Woods “Top Predictions for IT Organizations for 2016”
© 2017 - Cloudnosys | Security, Compliance, Cost.
Company AWS
Service
@ Fault
Breach Details
S3 –
Public,
IAM
4 Million exposed. SQL database dumps, code, access
logs, customer billings address and phone numbers by
BroadSoft. (TPRM)
IAM, SG,
MFA
Administrative consoles of AWS were not password
protected, for Aviva and Gemalto, leading hackers to mine
Bit Coin on their EC2 instances.
S3 -
Public,
IAM
Viacom AWS Misconfiguration exposes Entire IT
Infrastructure, including passwords, access and secret
keys for their corporate AWS account.
S3,
MFA,
IAM
Dow Jones AWS misconfigurations left sensitive customer
financial data exposed.
S3 –
Public,
IAM
Accenture AWS misconfiguration exposes 40,000 plaintext
passwords. Verizon AWS exposed via Third Party (TPRM)
© 2018 - Cloudnosys | Security, Compliance, Cost.
AWS Misconfigurations = GDPR Breach!
● Cannot humanly scan thousands of Configurations
● Need Automation & New tooling
● Implement a Third Party Risk Management program
for the cloud that includes contract language for 44 CIS
Controls.
Missing Link in AWS GDPR Cloud Security
© 2018 - Cloudnosys | Security, Compliance, Cost.
AWS Shared Security Model
YOU
© 2018 - Cloudnosys | Security, Compliance, Cost.
GDPR Top 10 AWS Best Practices for
Security and Compliance
• Faisal Jawaid
Dir of Product Management
Security & Compliance
© 2018 - Cloudnosys | Security, Compliance, Cost.
#1 Use IAM and not the “Root Account”
An API key are credentials passed in by computer programs
calling an application programming interface (API) to identify the
calling program, its developer, or its user to the Web site.
• The “Root” account has access to everything! Not
restricted.
• For Administrative Tasks, create users with Admin rights
using IAM
• Update billing and contact information
that would be required to recover the account.
1 in 3 customers have root API access keys enabled!
© 2018 - Cloudnosys | Security, Compliance, Cost.
#2 Review permissions, use strong passwords
AWS Identity and Access Management (IAM) enables you
to securely control access to AWS services and resources
for your users. Using IAM, you can create and manage AWS
users and groups, and use permissions to allow and deny
their access to AWS resources.
• Review IAM policies on Users, Groups and Roles.
Does your user really need access to all of these services?
• Do your Third Party Applications need all of these
permissions?
• How many people have unrestricted access?
• Use the IAM policy generator and policy simulator for assistance.
© 2018 - Cloudnosys | Security, Compliance, Cost.
#3 Enable Multi Factor Authentication
MFA is an extra layer of security that requires not only a
password and username but also something that only, and only,
that user has on them.
• MFA is available to all IAM users,
including the root account.
• MFA options are Token Based and Text
Message – SMS based.
• Token based options include hardware
Devices, and virtual software options,
such as Google Authenticator, etc.
© 2018 - Cloudnosys | Security, Compliance, Cost.
#4 Don’t leave the front door open
A Security Group acts as a virtual firewall for your instance
to control inbound and outbound traffic. Each instance in
a subnet in your VPC could be assigned to a different set
of security groups.
• Open VPC’s affects:
Amazon Elastic Load Balancing
Amazon RDS
Amazon ElastiCache
Amazon RedShift
• Monitor Security Groups regularly
• AWS WAF is a web application firewall that helps protect your web
applications from common web exploits that could affect application
availability, compromise security, or consume excessive resources.
© 2018 - Cloudnosys | Security, Compliance, Cost.
#5 Build a secure Amazon Machine Image (AMI)
An Amazon Machine Image (AMI) provides the information
required to launch an instance, which is a virtual server in the
Amazon Elastic Compute Cloud (EC2).
These instances are entirely customer managed, so their
security falls onto the customer.
• Disabling password-only access to hosts. Use ssh-
keys.
• Disabling remote “root” account logins. Do we want to
allow root access?
• Ensure only required applications and services are
enabled
30% of Customers OS Harden their AMI’s.
© 2018 - Cloudnosys | Security, Compliance, Cost.
#6 Encrypt your Data at REST and on Transit.
Cryptographic best practices discourage extensive reuse of encryption
keys.
Both SSL 2.0 and 3.0 have been deprecated by the IETF (in 2011 and
2015, respectively).
• TLS 1.3 is latest version of TLS, what version are you on?
• Use the Key Management Service to encrypt your data
on AWS
• Enable automatic key rotation for an existing
Customer Master Key (CMK).
© 2018 - Cloudnosys | Security, Compliance, Cost.
#7 Monitor Unauthorized Access
AWS CloudTrail is a service that enables governance,
compliance, operational auditing, and risk auditing of your AWS
account.
The CloudWatch Alarms feature allows you to watch
CloudWatch metrics and to receive notifications.
• CloudTrail is designed to record API activity.
• CloudWatch can send notifications based on
configuration.
• Simple Notification Service can be used in conjunction to
receive alerts.
© 2018 - Cloudnosys | Security, Compliance, Cost.
#8 Use the Simple Token Service for Vendors
The AWS Security Token Service (STS) is a web service that
enables you to request temporary, limited-privilege credentials for
AWS Identity and Access Management (IAM) users or for users
that you authenticate (federated users).
• Can be used in place of privileged
IAM user Access Keys
• Temporary credentials
• Allows for 3rd parties such as
Cloudnosys to access your
AWS accounts more securely (TPRM!)
© 2018 - Cloudnosys | Security, Compliance, Cost.
#9 Secure your S3 buckets
Amazon S3 is object storage built to store and retrieve any amount of data
from anywhere – web sites and mobile apps, corporate applications, and
data from IoT sensors or devices.
• Check your Bucket Access Control Lists regularly
• Watch for all grantees, including Authenticated Users
• Found API Keys, are usually used to open S3 buckets.
• Amazon Macie is available to protect data stored in Amazon S3,
recognizes sensitive data such as personally identifiable information
(PII) or intellectual property, and provides you with dashboards and
alerts that give visibility into how this data is being accessed or moved
© 2018 - Cloudnosys | Security, Compliance, Cost.
#10 Conduct a Vulnerability Assessment
The main objective of the vulnerability assessment is to find as
much vulnerability as possible that an attacker can use to cause
damage to an organization.
• Vulnerability assessments can be run against your assets
in the cloud.
• There are many tools, services and a combination of both
available.
• Customers can fine tune their existing security controls,
after the assessment.
© 2018 - Cloudnosys | Security, Compliance, Cost.
What Next?
• Knowing Top 10 or CIS-44, or 150 control is
not enough
• Writing SOPs and Policies are not enough
• Automation is the new “cloud norm” which
drives enforcement and accountability.
© 2018 - Cloudnosys | Security, Compliance, Cost.
Introducing…
CLOUDNOSYS
AWS SECURITY & COMPLIANCE
PLATFORM
Cloudnosys Security and Compliance Platform
CloudEye Continuously Secure your cloud services and automate
compliance. Over 150+ Cloudnosys best practice rules track and monitor
your AWS services for security and compliance violations. Dashboard and
reports keep you fully informed of any Risks. – Agentless!
• Continuous Security & Compliance Scanning
• Alert on Vulnerabilities
• Audit Reports on Security and Compliance
• Fast Remediation
• Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA
mandates
© 2018 - Cloudnosys | Security, Compliance, Cost.
We mapped the regulatory controls and associated testing for you
CloudEye Continuously scan
your cloud services and
automate compliance.
1- Helps you fully
demonstrate Compliance to
your Auditors
2- Reduce efforts from
months to few minutes
3- Be up and running in 5
minutes
© 2018 - Cloudnosys | Security, Compliance, Cost.
AWS Control Workbooks for Compliance
1. Unauthorized API calls
2. Management Console sign-in without MFA
3. Usage of “root” account
4. IAM policy changes
5. CloudTrail configuration changes
6. AWS Management Console authentication failures
7. Disabling or deletion of customer created CMKs
8. S3 bucket policy changes
9. AWS Config configuration changes
10. Security group changes
11. Changes to Network Access Control Lists (NACL)
12. Changes to network gateways
13. Route table changes
14. VPC changes
15. Ensure security contact information is registered
16. Ensure appropriate subscribers to each SNS topic
Your compliance reports
ready in minutes
Security and Compliance
Dashboards shows, alerts,
violations and how to remediate
these quickly to mitigate risks.
This is generated on the fly after
scanning for all Cloud Services and
Availability Zones.
© 2018 - Cloudnosys | Security, Compliance, Cost.
Dashboards:
Compliance and Security
Reporting: Compliance and Security
Security and Compliance reports shows, alerts, violations and how to
remediate these quickly to avoid any Cyber attacks. This is generated on the
fly after scanning all Cloud Services
© 2018 - Cloudnosys | Security, Compliance, Cost.
How It Works
An AWS native cloud solution that automates key cloud security processes and enables consistent
enforcement of security policies, best practices and compliance requirements across an
organization’s AWS cloud infrastructure.
© 2017 - Cloudnosys | Security, Compliance, Cost.
© 2018 - Cloudnosys | Security, Compliance, Cost.
Sample Cost Savings Report
© 2018 - Cloudnosys | Enterprise Cloud Diagnostics and Remediation.
Cost savings reports
are calculated in
seconds after user
set some schedules
to turn off some
machines on a
schedule.
Summary: What we learned today?
• Cloud Security for GDPR has Shared Responsibility.
• Automation is key to maintain best GDPR compliance posture
• Third Party Risk Management – AWS CIS 44 Rule Enforcement
• Make DevOps accountable for security through automation – CI/CD
• Measure your progress through KPIs via Automation
• Learn and enforce AWS CIS-44 Controls for starters
• Create a baseline by benchmarking AWS through Cloudnosys Platform
© 2018 - Cloudnosys | Security, Compliance, Cost.
Q & A - ANY QUESTIONS?
Type in your questions in chat box now…
Try Cloudnosys
For 14 Days Free
Start monitoring,
optimizing and securing
your AWS.
No Limits evaluation.
© 2018 - Cloudnosys | Security, Compliance, Cost.
info@Cloudnosys.com

More Related Content

What's hot

Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingHostway|HOSTING
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingAmazon Web Services
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project Ayush Mukherjee
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAmazon Web Services
 
Protecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesProtecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesAmazon Web Services
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing riskssripriya78
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
AWS Lake Formation Deep Dive
AWS Lake Formation Deep DiveAWS Lake Formation Deep Dive
AWS Lake Formation Deep DiveCobus Bernard
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Actmrmwood
 
Introducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksIntroducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksAmazon Web Services
 
Building Data Lakes for Analytics on AWS
Building Data Lakes for Analytics on AWSBuilding Data Lakes for Analytics on AWS
Building Data Lakes for Analytics on AWSAmazon Web Services
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consAmritpal Singh Bedi
 

What's hot (20)

Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Cloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud ComputingCloud 101: The Basics of Cloud Computing
Cloud 101: The Basics of Cloud Computing
 
AWS Direct Connect
AWS Direct ConnectAWS Direct Connect
AWS Direct Connect
 
Cloud Security
Cloud SecurityCloud Security
Cloud Security
 
Introduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud ComputingIntroduction to AWS Services and Cloud Computing
Introduction to AWS Services and Cloud Computing
 
Cloud Computing Project
Cloud Computing Project Cloud Computing Project
Cloud Computing Project
 
AWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets ManagerAWS Security Week: AWS Secrets Manager
AWS Security Week: AWS Secrets Manager
 
Protecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and FeaturesProtecting Your Data- AWS Security Tools and Features
Protecting Your Data- AWS Security Tools and Features
 
Cloud services
Cloud servicesCloud services
Cloud services
 
Cloud computing risks
Cloud computing risksCloud computing risks
Cloud computing risks
 
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
Cloud Services: Types of Cloud
Cloud Services: Types of CloudCloud Services: Types of Cloud
Cloud Services: Types of Cloud
 
AWS Lake Formation Deep Dive
AWS Lake Formation Deep DiveAWS Lake Formation Deep Dive
AWS Lake Formation Deep Dive
 
Migrating to the Cloud
Migrating to the CloudMigrating to the Cloud
Migrating to the Cloud
 
Data Protection Act
Data Protection ActData Protection Act
Data Protection Act
 
Introducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech TalksIntroducing AWS Firewall Manager - AWS Online Tech Talks
Introducing AWS Firewall Manager - AWS Online Tech Talks
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Cloud Security Fundamentals Webinar
Cloud Security Fundamentals WebinarCloud Security Fundamentals Webinar
Cloud Security Fundamentals Webinar
 
Building Data Lakes for Analytics on AWS
Building Data Lakes for Analytics on AWSBuilding Data Lakes for Analytics on AWS
Building Data Lakes for Analytics on AWS
 
Cloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and consCloud Computing- components, working, pros and cons
Cloud Computing- components, working, pros and cons
 

Similar to GDPR TOP 10 AWS CLOUD SECURITY & COMPLIANCE BEST PRACTICES

ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniquesUlf Mattsson
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudUlf Mattsson
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSAmazon Web Services
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRMatt Stubbs
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerIdan Tohami
 
Gdpr compliance on_aws
Gdpr compliance on_awsGdpr compliance on_aws
Gdpr compliance on_awssaifam
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyUlf Mattsson
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...Ulf Mattsson
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the CloudRapidScale
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSAUlf Mattsson
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceCloudera, Inc.
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challengesKresimir Popovic
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUAmazon Web Services
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfAmazon Web Services
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help Niklas Hjorthen
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpJason Lackey
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksAmazon Web Services
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataUlf Mattsson
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...Ulf Mattsson
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, RubrikVMUG IT
 

Similar to GDPR TOP 10 AWS CLOUD SECURITY & COMPLIANCE BEST PRACTICES (20)

ISACA Houston - Practical data privacy and de-identification techniques
ISACA Houston  - Practical data privacy and de-identification techniquesISACA Houston  - Practical data privacy and de-identification techniques
ISACA Houston - Practical data privacy and de-identification techniques
 
ISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloudISSA Atlanta - Emerging application and data protection for multi cloud
ISSA Atlanta - Emerging application and data protection for multi cloud
 
Enabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWSEnabling Compliance with the GDPR on AWS
Enabling Compliance with the GDPR on AWS
 
Big Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPRBig Data LDN 2017: Applied AI for GDPR
Big Data LDN 2017: Applied AI for GDPR
 
Cloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran AdlerCloud Regulations and Security Standards by Ran Adler
Cloud Regulations and Security Standards by Ran Adler
 
Gdpr compliance on_aws
Gdpr compliance on_awsGdpr compliance on_aws
Gdpr compliance on_aws
 
Isaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacyIsaca atlanta - practical data security and privacy
Isaca atlanta - practical data security and privacy
 
Jul 16 isaca london data protection, security and privacy risks - on premis...
Jul 16 isaca london   data protection, security and privacy risks - on premis...Jul 16 isaca london   data protection, security and privacy risks - on premis...
Jul 16 isaca london data protection, security and privacy risks - on premis...
 
Compliance in the Cloud
Compliance in the CloudCompliance in the Cloud
Compliance in the Cloud
 
Gdpr action plan - ISSA
Gdpr action plan - ISSAGdpr action plan - ISSA
Gdpr action plan - ISSA
 
How Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR complianceHow Cloudera SDX can aid GDPR compliance
How Cloudera SDX can aid GDPR compliance
 
Cloud computing security issues and challenges
Cloud computing security issues and challengesCloud computing security issues and challenges
Cloud computing security issues and challenges
 
GDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EUGDPR: Raising the Bar for Security & Compliance Across the EU
GDPR: Raising the Bar for Security & Compliance Across the EU
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help The EU General Protection Regulation and how Oracle can help
The EU General Protection Regulation and how Oracle can help
 
GDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can HelpGDPR and NIS Compliance - How HyTrust Can Help
GDPR and NIS Compliance - How HyTrust Can Help
 
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech TalksNavigating GDPR Compliance on AWS - AWS Online Tech Talks
Navigating GDPR Compliance on AWS - AWS Online Tech Talks
 
Isaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big dataIsaca new delhi india - privacy and big data
Isaca new delhi india - privacy and big data
 
May 6 evolving international privacy regulations and cross border data tran...
May 6   evolving international privacy regulations and cross border data tran...May 6   evolving international privacy regulations and cross border data tran...
May 6 evolving international privacy regulations and cross border data tran...
 
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
04 - VMUGIT - Lecce 2018 - Giampiero Petrosi, Rubrik
 

Recently uploaded

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...stazi3110
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxbodapatigopi8531
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfkalichargn70th171
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comFatema Valibhai
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxTier1 app
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software DevelopersVinodh Ram
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfkalichargn70th171
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataBradBedford3
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)OPEN KNOWLEDGE GmbH
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdfWave PLM
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio, Inc.
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackVICTOR MAESTRE RAMIREZ
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityNeo4j
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - InfographicHr365.us smith
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantAxelRicardoTrocheRiq
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsMehedi Hasan Shohan
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyFrank van der Linden
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...gurkirankumar98700
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...MyIntelliSource, Inc.
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationkaushalgiri8080
 

Recently uploaded (20)

Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
Building a General PDE Solving Framework with Symbolic-Numeric Scientific Mac...
 
Hand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptxHand gesture recognition PROJECT PPT.pptx
Hand gesture recognition PROJECT PPT.pptx
 
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdfThe Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
The Essentials of Digital Experience Monitoring_ A Comprehensive Guide.pdf
 
HR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.comHR Software Buyers Guide in 2024 - HRSoftware.com
HR Software Buyers Guide in 2024 - HRSoftware.com
 
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptxKnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
KnowAPIs-UnknownPerf-jaxMainz-2024 (1).pptx
 
Professional Resume Template for Software Developers
Professional Resume Template for Software DevelopersProfessional Resume Template for Software Developers
Professional Resume Template for Software Developers
 
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdfLearn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
Learn the Fundamentals of XCUITest Framework_ A Beginner's Guide.pdf
 
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer DataAdobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
Adobe Marketo Engage Deep Dives: Using Webhooks to Transfer Data
 
Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)Der Spagat zwischen BIAS und FAIRNESS (2024)
Der Spagat zwischen BIAS und FAIRNESS (2024)
 
5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf5 Signs You Need a Fashion PLM Software.pdf
5 Signs You Need a Fashion PLM Software.pdf
 
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed DataAlluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
Alluxio Monthly Webinar | Cloud-Native Model Training on Distributed Data
 
Cloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStackCloud Management Software Platforms: OpenStack
Cloud Management Software Platforms: OpenStack
 
EY_Graph Database Powered Sustainability
EY_Graph Database Powered SustainabilityEY_Graph Database Powered Sustainability
EY_Graph Database Powered Sustainability
 
Asset Management Software - Infographic
Asset Management Software - InfographicAsset Management Software - Infographic
Asset Management Software - Infographic
 
Salesforce Certified Field Service Consultant
Salesforce Certified Field Service ConsultantSalesforce Certified Field Service Consultant
Salesforce Certified Field Service Consultant
 
XpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software SolutionsXpertSolvers: Your Partner in Building Innovative Software Solutions
XpertSolvers: Your Partner in Building Innovative Software Solutions
 
Engage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The UglyEngage Usergroup 2024 - The Good The Bad_The Ugly
Engage Usergroup 2024 - The Good The Bad_The Ugly
 
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
(Genuine) Escort Service Lucknow | Starting ₹,5K To @25k with A/C 🧑🏽‍❤️‍🧑🏻 89...
 
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
Steps To Getting Up And Running Quickly With MyTimeClock Employee Scheduling ...
 
Project Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanationProject Based Learning (A.I).pptx detail explanation
Project Based Learning (A.I).pptx detail explanation
 

GDPR TOP 10 AWS CLOUD SECURITY & COMPLIANCE BEST PRACTICES

  • 1. GDPR TOP 10 AWS CLOUD SECURITY & COMPLIANCE BEST PRACTICES
  • 2. • Faisal Jawaid Dir of Product Management Security & Compliance • Ahmed Khan AWS Partner Manager – Strategic Sales Meet Our Speakers
  • 3. What we will learn today? • Overview of GDPR • How to inventory GDPR PII in your AWS & other databases? • Article 5 Six Principals of GDPR Data Accountability • Article 32 Security of Processing • Article 25 Data Privacy by Design and by Default • Article 28 Third Party Compliance • Article 44 International Transfers • TOP 10 AWS BEST PRACTICES for GDPR – Technical Controls • Cloudnosys Security & Compliance Platform • Q & A
  • 4. GDPR Overview of GDPR 1. One Law for privacy across 28 countries - EU 679/2017 (GDPR) 2. GDPR will implement from 25 May 2018 3. Accountability detailed data rights and restrictions on (See Articles for details) – Data processors and Controllers both! 4. New GDPR framework is complex yet detailed 5. Data Scope: Beyond DOB, NI#, Biometric, Geo Locations, -- User Inferencing data (Identifiers) 6. Breach Notification – 72 Hours 7. The regulation establishes for enforcement: Business Organization will only have to deal with one single data protection authority. 8. Privacy by Design – Demonstrate testable controls, Information Governance. 9. Must have specified, explicit and legitimate purposes to collect and process data (Article 5) 10. The GDPR applies to all companies worldwide that process personal data of European Union (EU) citizens.
  • 5. Essentially any information relating to an individual who could be identified based on one or more identifiers. GDPR online identifiers and combination of online and unique identifiers ●Article 4 (1), “‘personal data’ means any information relating to an identified or identifiable natural person (‘data subject’); an identifiable natural person is one who can be identified, directly or indirectly, in particular by reference to an identifier such as a name, an identification number, location data, an online identifier or to one or more factors specific to the physical, physiological, genetic, mental, economic, cultural or social identity of that natural person.” ●Recital – 30 Natural persons may be associated with online identifiers provided by their devices, applications, tools and protocols, such as internet protocol addresses, cookie identifiers or other identifiers such as radio frequency identification tags. This may leave traces which, in particular when combined with unique identifiers and other information received by the servers, may be used to create profiles of the natural persons and identify them. What is personal data of a Natural Person?
  • 6. ●Leverage AWS Macie Service to identify PII and classify your datasets in S3 ●For other databases, like Mongo, MS SQL, Oracle, RDS etc. Use Dataguise, Datasunrise, Imperva and also free open source DB Scanning tools on GitHub. Obvious examples of personal data include: • Full name • Home address • Email address (work email addresses are classed as personal data) • Telephone number • NI number (National Identity) • Date of birth • Driver’s license number • Vehicle license plate • Credit card number • Geo locations • IP Addresses • Cookies • RFID • Race, Ethnic, Origin, Gender (Article 7-9 Consent) First Inventory your PII data on AWS – How?
  • 7. The purpose of GDPR is to improve the way personal data is stored and used. It is founded on six principles of data accountability (Article 5), specifically that personal data shall be: 1. Processed lawfully, fairly and in a transparent manner 2. Collected for specified, explicit and legitimate purposes 3. Adequate, relevant and limited to what is necessary 4. Accurate and, where necessary, kept up to date 5. Kept in a form which permits identification of Data Subjects for no longer than is necessary 6. Processed in a way that ensures appropriate security of the personal data The Data Controller is responsible for, and must be able to demonstrate, compliance with these principles. Also secure against, accidental loss, damage or destruction – Article -5 Article – 5 Six principles of data accountability
  • 8. “the controller and the processor shall implement appropriate technical and organisational measures to ensure a level of security appropriate to the risk.” What does this mean? Implement a Risk Assessment process – Update Risk Register – Privacy Impact Assessment (PIA) Article 35 – (Risk of Data Loss, Breach etc.) Article 32 – Security of Processing
  • 9. Article 25 of the GDPR codifies both the concepts of privacy by design and privacy by default. Under this Article a data controller is required to implement appropriate technical and organisational measures both at the time of determination of the means for processing and at the time of the processing itself in order to ensure data protection principles such as data minimisation are met. Any such privacy by design measures may include, for example, pseudonymisation or other privacy-enhancing technologies. What this means? - User does not have to inform you to secure their data (by Default) - You must implement Encryption, Config Mngt, and IAM controls for the cloud - (Technical) –AWS Security & Compliance Controls Article – 25 Data Privacy by Design and by Default
  • 10. What does it mean for cloud providers? Legal: ● Standard Contractual Clauses for Controller to Processor - Transfers of Personal Data (sample legal doc @ iapp.org) ● AWS is providing a GDPR BAA agreement now, please review. Technical: ● Request CIS GDPR specific AWS Cloud scan results every month/quarter based on volume from your third parties that are on AWS. Have that on your contract! Article 28 – Third Party Compliance
  • 11. Article 44 of the GDPR prohibits the transfer of personal data beyond EU/EEA, unless the recipient country can prove it provides adequate data protection. Descriptions of acceptable proof are detailed in Articles 45 – 49 ● Whitelisted Jurisdictions: The European Commission can make a finding that a non- EU/EEA jurisdiction enforces data protection laws that are essentially equivalent to the GDPR. Currently, the following jurisdictions enjoy an Adequacy Decision: Andorra, Argentina, Canada (some provinces), Faeroe Islands, Guernsey, Israel, the Isle of Man, Jersey, New Zealand, Switzerland, and Uruguay. ● Privacy Shield Framework: The Framework, approved on July 16, 2016, allows U.S. organizations to self-certify to the U.S. Department of Commerce and then publically commit to comply with the Framework’s data protection requirements. The public commitment is enforceable under U.S. law. Article – 44 International Transfers
  • 12. Summary : A quick checklist for your Cloud Legal Responsibility and Obligations Review AWS BAA for GDPR. Also AWS is working on improving Infrastructure services to be more GDPR compliant by May 2018. Review Privacy Shield Framework –Self certify Organizational Responsibilities Assign a Data Protection officer which will govern and benchmark the program. Technical Responsibility and Obligations Inventory data, and implement strong controls to maintain data privacy. Pay attention to DLP, Encryption, and CIS/PCI/HIPAA equivalent controls around AWS configuration monitoring. Audit trail management. Implement cloud compliance automation to manage these controls and continually monitor in near real time.
  • 13. • The Center for Internet Security is a non-profit entity that harnesses the power of a global IT community to safeguard private and public organizations against cyber threats. • CIS AWS Benchmarks 44 AWS Controls • CIS - OS hardening & AWS Configurations • https://d0.awsstatic.com/whitepapers/compliance/A WS_CIS_Foundations_Benchmark.pdf – CIS Controls © 2018 - Cloudnosys | Security, Compliance, Cost. 1. Unauthorized API calls 2. Management Console sign-in without MFA 3. Usage of “root” account 4. IAM policy changes 5. CloudTrail configuration changes 6. AWS Management Console authentication failures 7. Disabling or deletion of customer created CMKs 8. S3 bucket policy changes 9. AWS Config configuration changes 10. Security group changes 11. Changes to Network Access Control Lists (NACL) 12. Changes to network gateways 13. Route table changes 14. VPC changes 15. Ensure security contact information is registered 16. Ensure appropriate subscribers to each SNS topic
  • 14. Cost of Breach – Security & Compliance © 2017 - Cloudnosys | Security, Compliance, Cost. Average cost of a data breach $6.53M 56% 70% Increase in theft of hard intellectual property Of consumers indicated they’d avoid businesses following a security breach 95% of all Cloud Breaches will be due to misconfigurations* https://www.csid.com/resources/stats/data/breaches/ http://www.pwc.com/gx/en/issues/cyber- Security/information-security-security-survey.html https://www.csid.com/resources/stats/data/breaches/ **By Gartner – Viveca Woods “Top Predictions for IT Organizations for 2016”
  • 15. © 2017 - Cloudnosys | Security, Compliance, Cost. Company AWS Service @ Fault Breach Details S3 – Public, IAM 4 Million exposed. SQL database dumps, code, access logs, customer billings address and phone numbers by BroadSoft. (TPRM) IAM, SG, MFA Administrative consoles of AWS were not password protected, for Aviva and Gemalto, leading hackers to mine Bit Coin on their EC2 instances. S3 - Public, IAM Viacom AWS Misconfiguration exposes Entire IT Infrastructure, including passwords, access and secret keys for their corporate AWS account. S3, MFA, IAM Dow Jones AWS misconfigurations left sensitive customer financial data exposed. S3 – Public, IAM Accenture AWS misconfiguration exposes 40,000 plaintext passwords. Verizon AWS exposed via Third Party (TPRM) © 2018 - Cloudnosys | Security, Compliance, Cost. AWS Misconfigurations = GDPR Breach!
  • 16. ● Cannot humanly scan thousands of Configurations ● Need Automation & New tooling ● Implement a Third Party Risk Management program for the cloud that includes contract language for 44 CIS Controls. Missing Link in AWS GDPR Cloud Security © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 17. AWS Shared Security Model YOU © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 18. GDPR Top 10 AWS Best Practices for Security and Compliance • Faisal Jawaid Dir of Product Management Security & Compliance © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 19. #1 Use IAM and not the “Root Account” An API key are credentials passed in by computer programs calling an application programming interface (API) to identify the calling program, its developer, or its user to the Web site. • The “Root” account has access to everything! Not restricted. • For Administrative Tasks, create users with Admin rights using IAM • Update billing and contact information that would be required to recover the account. 1 in 3 customers have root API access keys enabled! © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 20. #2 Review permissions, use strong passwords AWS Identity and Access Management (IAM) enables you to securely control access to AWS services and resources for your users. Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. • Review IAM policies on Users, Groups and Roles. Does your user really need access to all of these services? • Do your Third Party Applications need all of these permissions? • How many people have unrestricted access? • Use the IAM policy generator and policy simulator for assistance. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 21. #3 Enable Multi Factor Authentication MFA is an extra layer of security that requires not only a password and username but also something that only, and only, that user has on them. • MFA is available to all IAM users, including the root account. • MFA options are Token Based and Text Message – SMS based. • Token based options include hardware Devices, and virtual software options, such as Google Authenticator, etc. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 22. #4 Don’t leave the front door open A Security Group acts as a virtual firewall for your instance to control inbound and outbound traffic. Each instance in a subnet in your VPC could be assigned to a different set of security groups. • Open VPC’s affects: Amazon Elastic Load Balancing Amazon RDS Amazon ElastiCache Amazon RedShift • Monitor Security Groups regularly • AWS WAF is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 23. #5 Build a secure Amazon Machine Image (AMI) An Amazon Machine Image (AMI) provides the information required to launch an instance, which is a virtual server in the Amazon Elastic Compute Cloud (EC2). These instances are entirely customer managed, so their security falls onto the customer. • Disabling password-only access to hosts. Use ssh- keys. • Disabling remote “root” account logins. Do we want to allow root access? • Ensure only required applications and services are enabled 30% of Customers OS Harden their AMI’s. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 24. #6 Encrypt your Data at REST and on Transit. Cryptographic best practices discourage extensive reuse of encryption keys. Both SSL 2.0 and 3.0 have been deprecated by the IETF (in 2011 and 2015, respectively). • TLS 1.3 is latest version of TLS, what version are you on? • Use the Key Management Service to encrypt your data on AWS • Enable automatic key rotation for an existing Customer Master Key (CMK). © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 25. #7 Monitor Unauthorized Access AWS CloudTrail is a service that enables governance, compliance, operational auditing, and risk auditing of your AWS account. The CloudWatch Alarms feature allows you to watch CloudWatch metrics and to receive notifications. • CloudTrail is designed to record API activity. • CloudWatch can send notifications based on configuration. • Simple Notification Service can be used in conjunction to receive alerts. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 26. #8 Use the Simple Token Service for Vendors The AWS Security Token Service (STS) is a web service that enables you to request temporary, limited-privilege credentials for AWS Identity and Access Management (IAM) users or for users that you authenticate (federated users). • Can be used in place of privileged IAM user Access Keys • Temporary credentials • Allows for 3rd parties such as Cloudnosys to access your AWS accounts more securely (TPRM!) © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 27. #9 Secure your S3 buckets Amazon S3 is object storage built to store and retrieve any amount of data from anywhere – web sites and mobile apps, corporate applications, and data from IoT sensors or devices. • Check your Bucket Access Control Lists regularly • Watch for all grantees, including Authenticated Users • Found API Keys, are usually used to open S3 buckets. • Amazon Macie is available to protect data stored in Amazon S3, recognizes sensitive data such as personally identifiable information (PII) or intellectual property, and provides you with dashboards and alerts that give visibility into how this data is being accessed or moved © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 28. #10 Conduct a Vulnerability Assessment The main objective of the vulnerability assessment is to find as much vulnerability as possible that an attacker can use to cause damage to an organization. • Vulnerability assessments can be run against your assets in the cloud. • There are many tools, services and a combination of both available. • Customers can fine tune their existing security controls, after the assessment. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 29. What Next? • Knowing Top 10 or CIS-44, or 150 control is not enough • Writing SOPs and Policies are not enough • Automation is the new “cloud norm” which drives enforcement and accountability. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 31. Cloudnosys Security and Compliance Platform CloudEye Continuously Secure your cloud services and automate compliance. Over 150+ Cloudnosys best practice rules track and monitor your AWS services for security and compliance violations. Dashboard and reports keep you fully informed of any Risks. – Agentless! • Continuous Security & Compliance Scanning • Alert on Vulnerabilities • Audit Reports on Security and Compliance • Fast Remediation • Supports GDPR, PCI-DSS, HIPPA, AWS CIS Benchmark and FISMA mandates © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 32. We mapped the regulatory controls and associated testing for you CloudEye Continuously scan your cloud services and automate compliance. 1- Helps you fully demonstrate Compliance to your Auditors 2- Reduce efforts from months to few minutes 3- Be up and running in 5 minutes © 2018 - Cloudnosys | Security, Compliance, Cost. AWS Control Workbooks for Compliance 1. Unauthorized API calls 2. Management Console sign-in without MFA 3. Usage of “root” account 4. IAM policy changes 5. CloudTrail configuration changes 6. AWS Management Console authentication failures 7. Disabling or deletion of customer created CMKs 8. S3 bucket policy changes 9. AWS Config configuration changes 10. Security group changes 11. Changes to Network Access Control Lists (NACL) 12. Changes to network gateways 13. Route table changes 14. VPC changes 15. Ensure security contact information is registered 16. Ensure appropriate subscribers to each SNS topic Your compliance reports ready in minutes
  • 33. Security and Compliance Dashboards shows, alerts, violations and how to remediate these quickly to mitigate risks. This is generated on the fly after scanning for all Cloud Services and Availability Zones. © 2018 - Cloudnosys | Security, Compliance, Cost. Dashboards: Compliance and Security
  • 34. Reporting: Compliance and Security Security and Compliance reports shows, alerts, violations and how to remediate these quickly to avoid any Cyber attacks. This is generated on the fly after scanning all Cloud Services © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 35.
  • 36.
  • 37. How It Works An AWS native cloud solution that automates key cloud security processes and enables consistent enforcement of security policies, best practices and compliance requirements across an organization’s AWS cloud infrastructure. © 2017 - Cloudnosys | Security, Compliance, Cost.
  • 38.
  • 39. © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 40. Sample Cost Savings Report © 2018 - Cloudnosys | Enterprise Cloud Diagnostics and Remediation. Cost savings reports are calculated in seconds after user set some schedules to turn off some machines on a schedule.
  • 41. Summary: What we learned today? • Cloud Security for GDPR has Shared Responsibility. • Automation is key to maintain best GDPR compliance posture • Third Party Risk Management – AWS CIS 44 Rule Enforcement • Make DevOps accountable for security through automation – CI/CD • Measure your progress through KPIs via Automation • Learn and enforce AWS CIS-44 Controls for starters • Create a baseline by benchmarking AWS through Cloudnosys Platform © 2018 - Cloudnosys | Security, Compliance, Cost.
  • 42. Q & A - ANY QUESTIONS? Type in your questions in chat box now… Try Cloudnosys For 14 Days Free Start monitoring, optimizing and securing your AWS. No Limits evaluation. © 2018 - Cloudnosys | Security, Compliance, Cost. info@Cloudnosys.com

Editor's Notes

  1. I edited introduction text as well