SlideShare a Scribd company logo
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
December 5, 2017 | 8:00 AM PT
How to Achieve PCI DSS
Compliance on AWS
© 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Today’s Presenters
Scott Ward, Solutions Architect, Amazon Web Services
Ryan Leatherbury, Product Manager, AlienVault
Jason Harper, CEO & Founder, CeloPay
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Today’s Agenda
• Security on AWS
• AlienVault USM Anywhere for AWS workloads
• Case Study: CeloPay
• Q&A/Discussion
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Learning Objectives
• How AWS enables you to build a secure platform
• How AlienVault can help you simplify security monitoring
and compliance on AWS
• How AWS and AlienVault customer CeloPay transformed
their PCI DSS compliance efforts with AlienVault USM
Anywhere
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security and Compliance on AWS
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
$6.53M 56% 70%
Your data and IP are your most valuable assets
https://www.csid.com/resources/stats/data-breaches/
Increase in theft of hard
intellectual property
http://www.pwc.com/gx/en/issues/cyber-
security/information-security-survey.html
Of consumers indicated
they’d avoid businesses
following a security breach
https://www.csid.com/resources/stats/data-
breaches/
Average cost of a
data breach
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
How?
AWS can be more secure than your existing environment
Automating logging
and monitoring
Simplifying
resource access
Making it easy to
encrypt properly
Enforcing strong
authentication
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Compute Storage Database Networking
AWS Global Infrastructure
Regions
Availability Zones
Edge Locations
Identity &
Access Control
Network
Security
Customer applications & content
You get to
define your
controls ON
the Cloud
AWS takes
care of the
security OF
the Cloud
You
Inventory
& Config
Data
Encryption
AWS and you share responsibility for security
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Leverage AWS services to have constant visibility into what is going on in
your AWS account:
 AWS CloudTrail lets you monitor
and record all API calls
 Amazon Inspector automatically assesses
applications for vulnerabilities
 VPC Flow Logs provides details about traffic
flowing in and out of your VPC
 AWS Config gives an inventory of your AWS
account and visibility into changes
Constantly Monitor Your Environment
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Implement data protection to meet your security requirements
• 44 Availability Zones in 16 regions for
multi-synchronous geographic redundancy
 Retain control of where your data resides
for compliance with regulatory requirements
 Use AWS Shield to protect your infrastructure and
applications from DDoS attacks
 Implement server side or client side encryption to
protect the data you store in AWS
Control and Protect Your Data
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS enables you to improve your security using many of your existing
tools and practices
• Integrate your existing Active Directory
• Use dedicated connections as a secure,
low-latency extension of your data center
• Provide and manage your own encryption
keys if you choose
• Implement partner security solutions in the
customer portion of the shared responsibility model
Integrated with your existing resources
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Our Audit and Certification Approach
70+
services
7,710 Audit
Artifacts
2,670
Controls
3,030 Audit
Requirements https://aws.amazon.com/compliance/
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Compliance
AWS Artifact
Speeding Access to Compliance
Reports
Get the answers you need to how
AWS is addressing compliance
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure
Regions
Availability Zones
Edge Locations
Customers
You can build end-to-end compliant solutions
• Culture of security and continual
improvement
• Ongoing audits and assurance
• Protection of large-scale service
endpoints
• Achieve PCI, HIPAA and MPAA
compliance
• Certify against ISO27001 with a
reduced scope
• Have key controls audited or
publish your own independent
attestations
• Use partner solutions to help with
compliance
Your own compliant
solutions
Your own 27001 and
9001 certifications
Your own financial or
SOC audits if you are a
service provider
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Encryption Key
Management
Client and Server
Encryption
Network Traffic Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer contentCustomers
Security is Shared Between AWS and Customers
Fits Here
Jeff Olen, Senior Product Manager, AlienVault
Kate MacLean, Senior Product Marketing Manager, Cisco
How to Implement Effective
Security Monitoring for AWS
Environments
Ryan Leatherbury, AlienVault Product Manager
PCI Objective
Asset
Discovery
Vulnerability
Assessment
Security
Monitoring
Intrusion
Detection
Event / Log
Management
Build and maintain a secure
network & systems
Protect Cardholder Data
Maintain a Vulnerability
Management Program
Implement Strong Access
Control Measures
Regularly Test & Monitor
Networks
Maintain an Information
Security Policy
PCI Compliance is Hard, and Requires Multiple
Solutions
Unified Security Management with Five Security Essentials
Vulnerability Assessment
Know where the vulnerabilities are to avoid easy
exploitation and compromise
Behavioral Monitoring
Identify suspicious behavior and potentially
compromised systems
Intrusion Detection
Know when suspicious activities happen in
your environment
SIEM Log Management
Correlate and analyze security event data from across
your network and respond
Asset Discovery
Know who and what is connected to your cloud or
on-premises environments at all times
Designed to natively monitor cloud
environments from a single cloud-
based pane of glass
Compliance Is Faster & Easier with USM
Anywhere
Streamline Compliance &
Security in One Solution
Continuous protection for your
cloud & on-premises environments
 Asset Discovery
 Vulnerability Assessment
 Intrusion Detection
 Incident Response
 SIEM & Log Management
 PCI, HIPAA & SOC 2 Certified
Automate Your Log
Collection & Analysis
• Collect, analyze, and report on
log data with up to 90 days of
online, searchable events.
• Be alerted to suspicious or
anomalous activities in your
environment.
• Store logs in our secure,
compliant log storage for 12 mos.
Accelerate & Maintain
Your Compliance
• Continuous security monitoring,
threat detection and automated
incident response
• Threat Intelligence from the
AlienVault Labs security
research team, delivered
automatically and continuously
updated.
Compliance Reporting out of the Box
Predefined, customizable reports for PCI DSS that map
directly to regulatory requirements,
• Event reports from your security tools such as firewalls,
and by key event types such as authentication
Customize alarm and event views, and save or
export them into new reports quickly, easily
Add visual elements for an executive-level summary
Integrity of raw log data is ensured with a “Write
Once, Ready Many (WORM)” method, and data is
timestamped as required by PCI DSS Section 10.4
AWS Integration
AUTOMATED ASSET DISCOVERY
Manage security the way your infrastructure is managed
AWS INFRASTRUCTURE ASSESSMENT
Double check configuration and detect changes
LOG MANAGEMENT & CORRELATION
Monitor your applications & systems for compliance & security
CLOUDTRAIL MONITORING & ALERTING
Notification of environmental changes & abuse
AWS Integration
Customer Story: CeloPay
About CeloPay
• Jason Harper, CEO & Founder
• Founded in 2011, CeloPay provides a
solution for businesses to securely
collect credit card information from their
customers
• AlienVault customer for 2 years
Customer Story: CeloPay
Key challenges:
• Security monitoring - manual log reviews
were cumbersome and susceptible to error
• PCI DSS Compliance
• Strong desire to do everything possible to
protect customer data from threats, not just
“checking the boxes” for compliance
Customer Story: CeloPay
We chose AlienVault USM because:
• Comprehensive product: One product, easy to use,
no integrations to worry about
• Ease of deployment: Deployed with internal
resources, no expensive services needed, up and
running quickly (under 2 hours)
• Affordable: Price point accessible to a small business
• Low maintenance: Because it is a SaaS-based
product, no maintenance or upgrades to manage
Customer Story: CeloPay
Benefits gained using USM include:
• Centralized Log Management: Ability to pull in
Amazon CloudTrail, Amazon S3 and other AWS logs
into one place for reporting and alerting
• PCI DSS Compliance: Makes it really simple to prove
compliance. Can produce what the auditor needs in
seconds - very powerful
• Full security visibility and intelligent alerting: No
longer reliant on manual log reviews to spot threats
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Q & A
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Next Steps and Further Information
Free Trial:
• Go to https://aws.amazon.com/marketplace/
• Search for “AlienVault”
Learn more about AlienVault on AWS:
• https://www.alienvault.com/
Try AWS for free:
• https://aws.amazon.com/
© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

Getting started with AWS Security
Getting started with AWS SecurityGetting started with AWS Security
Getting started with AWS Security
Amazon Web Services
 
WIN401_Migrating Microsoft Applications to AWS
WIN401_Migrating Microsoft Applications to AWSWIN401_Migrating Microsoft Applications to AWS
WIN401_Migrating Microsoft Applications to AWS
Amazon Web Services
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Amazon Web Services
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
Amazon Web Services
 
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDSDAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
Amazon Web Services
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Amazon Web Services
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
Amazon Web Services
 
Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
AWS Germany
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand Curve
Amazon Web Services
 
Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS
Amazon Web Services
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
Amazon Web Services
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Amazon Web Services
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
Amazon Web Services
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
Amazon Web Services
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS Resources
Amazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Amazon Web Services
 
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
 Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit... Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
Amazon Web Services
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 

What's hot (20)

Getting started with AWS Security
Getting started with AWS SecurityGetting started with AWS Security
Getting started with AWS Security
 
WIN401_Migrating Microsoft Applications to AWS
WIN401_Migrating Microsoft Applications to AWSWIN401_Migrating Microsoft Applications to AWS
WIN401_Migrating Microsoft Applications to AWS
 
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing ZoneSimplify & Standardise Your Migration to AWS with a Migration Landing Zone
Simplify & Standardise Your Migration to AWS with a Migration Landing Zone
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
 
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDSDAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
DAT309_Best Practices for Migrating from Oracle and SQL Server to Amazon RDS
 
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech TalksDeep Dive on AWS Single Sign-On - AWS Online Tech Talks
Deep Dive on AWS Single Sign-On - AWS Online Tech Talks
 
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
How BrightEdge Achieves End-to-End Security Visibility with Splunk and AWS
 
Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017Inside the IC Marketplace | AWS Public Sector Summit 2017
Inside the IC Marketplace | AWS Public Sector Summit 2017
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?Warum ist Cloud-Sicherheit und Compliance wichtig?
Warum ist Cloud-Sicherheit und Compliance wichtig?
 
Keeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand CurveKeeping Security In-Step with your Application Demand Curve
Keeping Security In-Step with your Application Demand Curve
 
Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing Zone
 
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer ToolsDevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
DevOps on AWS: Deep Dive on Continuous Delivery and the AWS Developer Tools
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Automate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS ResourcesAutomate Best Practices and Operational Health for your AWS Resources
Automate Best Practices and Operational Health for your AWS Resources
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
 Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit... Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
Deliver Your Agency Mission Faster With cloud.gov | AWS Public Sector Summit...
 
Getting Started with AWS Security
 Getting Started with AWS Security Getting Started with AWS Security
Getting Started with AWS Security
 

Similar to How to Achieve PCI DSS Compliance on AWS

AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
Vladimir Simek
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
Amazon Web Services
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
Amazon Web Services
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
Amazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
Amazon Web Services
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
Ahmad Khan
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
Amazon Web Services
 
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
Amazon Web Services
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
Amazon Web Services
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Amazon Web Services
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Amazon Web Services
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Amazon Web Services
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Amazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
Amazon Web Services
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
Amazon Web Services
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
Amazon Web Services
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
Amazon Web Services
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
Amazon Web Services
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 

Similar to How to Achieve PCI DSS Compliance on AWS (20)

AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS clouduAWS Webinar CZSK 02 Bezpecnost v AWS cloudu
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
 
AWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the CloudAWS Enterprise Day | Securing your Web Applications in the Cloud
AWS Enterprise Day | Securing your Web Applications in the Cloud
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
How Redlock Automates Security on AWS
How Redlock Automates Security on AWSHow Redlock Automates Security on AWS
How Redlock Automates Security on AWS
 
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
GPSMKT201-Expanding Channel Opportunities Using AWS Marketplace as a Fulfillm...
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
Security Validation through Continuous Delivery at Verizon - DEV403 - re:Inve...
 
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace SoftwareCloud DevSecOps Considerations Leveraging AWS Marketplace Software
Cloud DevSecOps Considerations Leveraging AWS Marketplace Software
 
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellersCloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
Cloud DevSecOps and compliance considerations leveraging AWS Marketplace sellers
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
Introduction to Threat Detection and Remediation
Introduction to Threat Detection and RemediationIntroduction to Threat Detection and Remediation
Introduction to Threat Detection and Remediation
 
Introduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWSIntroduction to Threat Detection and Remediation on AWS
Introduction to Threat Detection and Remediation on AWS
 
AWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics WebinarAWS Cloud Security & Compliance Basics Webinar
AWS Cloud Security & Compliance Basics Webinar
 
Getting Started With AWS Security
Getting Started With AWS SecurityGetting Started With AWS Security
Getting Started With AWS Security
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

How to Achieve PCI DSS Compliance on AWS

  • 1. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. December 5, 2017 | 8:00 AM PT How to Achieve PCI DSS Compliance on AWS © 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 2. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Today’s Presenters Scott Ward, Solutions Architect, Amazon Web Services Ryan Leatherbury, Product Manager, AlienVault Jason Harper, CEO & Founder, CeloPay
  • 3. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Today’s Agenda • Security on AWS • AlienVault USM Anywhere for AWS workloads • Case Study: CeloPay • Q&A/Discussion
  • 4. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Learning Objectives • How AWS enables you to build a secure platform • How AlienVault can help you simplify security monitoring and compliance on AWS • How AWS and AlienVault customer CeloPay transformed their PCI DSS compliance efforts with AlienVault USM Anywhere
  • 5. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved.© 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security and Compliance on AWS
  • 6. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. $6.53M 56% 70% Your data and IP are your most valuable assets https://www.csid.com/resources/stats/data-breaches/ Increase in theft of hard intellectual property http://www.pwc.com/gx/en/issues/cyber- security/information-security-survey.html Of consumers indicated they’d avoid businesses following a security breach https://www.csid.com/resources/stats/data- breaches/ Average cost of a data breach
  • 7. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. How? AWS can be more secure than your existing environment Automating logging and monitoring Simplifying resource access Making it easy to encrypt properly Enforcing strong authentication
  • 8. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Identity & Access Control Network Security Customer applications & content You get to define your controls ON the Cloud AWS takes care of the security OF the Cloud You Inventory & Config Data Encryption AWS and you share responsibility for security
  • 9. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Leverage AWS services to have constant visibility into what is going on in your AWS account:  AWS CloudTrail lets you monitor and record all API calls  Amazon Inspector automatically assesses applications for vulnerabilities  VPC Flow Logs provides details about traffic flowing in and out of your VPC  AWS Config gives an inventory of your AWS account and visibility into changes Constantly Monitor Your Environment
  • 10. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Implement data protection to meet your security requirements • 44 Availability Zones in 16 regions for multi-synchronous geographic redundancy  Retain control of where your data resides for compliance with regulatory requirements  Use AWS Shield to protect your infrastructure and applications from DDoS attacks  Implement server side or client side encryption to protect the data you store in AWS Control and Protect Your Data
  • 11. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS enables you to improve your security using many of your existing tools and practices • Integrate your existing Active Directory • Use dedicated connections as a secure, low-latency extension of your data center • Provide and manage your own encryption keys if you choose • Implement partner security solutions in the customer portion of the shared responsibility model Integrated with your existing resources
  • 12. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Our Audit and Certification Approach 70+ services 7,710 Audit Artifacts 2,670 Controls 3,030 Audit Requirements https://aws.amazon.com/compliance/
  • 13. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Compliance AWS Artifact Speeding Access to Compliance Reports Get the answers you need to how AWS is addressing compliance
  • 14. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Customers You can build end-to-end compliant solutions • Culture of security and continual improvement • Ongoing audits and assurance • Protection of large-scale service endpoints • Achieve PCI, HIPAA and MPAA compliance • Certify against ISO27001 with a reduced scope • Have key controls audited or publish your own independent attestations • Use partner solutions to help with compliance Your own compliant solutions Your own 27001 and 9001 certifications Your own financial or SOC audits if you are a service provider
  • 15. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Encryption Key Management Client and Server Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer contentCustomers Security is Shared Between AWS and Customers Fits Here
  • 16. Jeff Olen, Senior Product Manager, AlienVault Kate MacLean, Senior Product Marketing Manager, Cisco How to Implement Effective Security Monitoring for AWS Environments Ryan Leatherbury, AlienVault Product Manager
  • 17. PCI Objective Asset Discovery Vulnerability Assessment Security Monitoring Intrusion Detection Event / Log Management Build and maintain a secure network & systems Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Test & Monitor Networks Maintain an Information Security Policy PCI Compliance is Hard, and Requires Multiple Solutions
  • 18. Unified Security Management with Five Security Essentials Vulnerability Assessment Know where the vulnerabilities are to avoid easy exploitation and compromise Behavioral Monitoring Identify suspicious behavior and potentially compromised systems Intrusion Detection Know when suspicious activities happen in your environment SIEM Log Management Correlate and analyze security event data from across your network and respond Asset Discovery Know who and what is connected to your cloud or on-premises environments at all times Designed to natively monitor cloud environments from a single cloud- based pane of glass
  • 19. Compliance Is Faster & Easier with USM Anywhere Streamline Compliance & Security in One Solution Continuous protection for your cloud & on-premises environments  Asset Discovery  Vulnerability Assessment  Intrusion Detection  Incident Response  SIEM & Log Management  PCI, HIPAA & SOC 2 Certified Automate Your Log Collection & Analysis • Collect, analyze, and report on log data with up to 90 days of online, searchable events. • Be alerted to suspicious or anomalous activities in your environment. • Store logs in our secure, compliant log storage for 12 mos. Accelerate & Maintain Your Compliance • Continuous security monitoring, threat detection and automated incident response • Threat Intelligence from the AlienVault Labs security research team, delivered automatically and continuously updated.
  • 20. Compliance Reporting out of the Box Predefined, customizable reports for PCI DSS that map directly to regulatory requirements, • Event reports from your security tools such as firewalls, and by key event types such as authentication Customize alarm and event views, and save or export them into new reports quickly, easily Add visual elements for an executive-level summary Integrity of raw log data is ensured with a “Write Once, Ready Many (WORM)” method, and data is timestamped as required by PCI DSS Section 10.4
  • 22. AUTOMATED ASSET DISCOVERY Manage security the way your infrastructure is managed AWS INFRASTRUCTURE ASSESSMENT Double check configuration and detect changes LOG MANAGEMENT & CORRELATION Monitor your applications & systems for compliance & security CLOUDTRAIL MONITORING & ALERTING Notification of environmental changes & abuse AWS Integration
  • 23. Customer Story: CeloPay About CeloPay • Jason Harper, CEO & Founder • Founded in 2011, CeloPay provides a solution for businesses to securely collect credit card information from their customers • AlienVault customer for 2 years
  • 24. Customer Story: CeloPay Key challenges: • Security monitoring - manual log reviews were cumbersome and susceptible to error • PCI DSS Compliance • Strong desire to do everything possible to protect customer data from threats, not just “checking the boxes” for compliance
  • 25. Customer Story: CeloPay We chose AlienVault USM because: • Comprehensive product: One product, easy to use, no integrations to worry about • Ease of deployment: Deployed with internal resources, no expensive services needed, up and running quickly (under 2 hours) • Affordable: Price point accessible to a small business • Low maintenance: Because it is a SaaS-based product, no maintenance or upgrades to manage
  • 26. Customer Story: CeloPay Benefits gained using USM include: • Centralized Log Management: Ability to pull in Amazon CloudTrail, Amazon S3 and other AWS logs into one place for reporting and alerting • PCI DSS Compliance: Makes it really simple to prove compliance. Can produce what the auditor needs in seconds - very powerful • Full security visibility and intelligent alerting: No longer reliant on manual log reviews to spot threats
  • 27. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Q & A
  • 28. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Next Steps and Further Information Free Trial: • Go to https://aws.amazon.com/marketplace/ • Search for “AlienVault” Learn more about AlienVault on AWS: • https://www.alienvault.com/ Try AWS for free: • https://aws.amazon.com/
  • 29. © 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!