SlideShare a Scribd company logo
Key Management System - A Journey on Cloud
Migration
December 2016
Rasananda Behera
Elite Panel Speaker & Industry Leader in Cloud Topology, Cyber Security
Silicon Valley – Cloud Expo
A Journey
DoDAF – Defense in Depth
DoDAF
ENCRYPTION DATA @ REST
Encryption Data at REST
Volume Encryption
Object Encryption
Database Encryption
EBS encryption OS Tools
AWS marketplace/
partnr
S3 server side
encryption[sse]
S3 SSE w/ customer
provided keys
Client side encryption
RDS ORACLE
TDE HSM
RDS MSSQL
TDE
RDS MYSQL
KMS
RDSPostgreSQL
KMS
Anazon Redshift
encryption
AWS KEY MANAGEMENT SERVICE
Introducing AWS Key Management Service
• A Service that enables you to provide and use encryption keys to protect your data
• Allows you to create, use, and manage encryption keys from within
• Your own applications via AWS SDK
• Supported AWS services
• S3
• EBS
• RDS
• Redshift
 Available in all commercial regions
WHAT IS SERVER SIDE ENCRYPTION
SERVER SIDE ENCRYPTION [S3]
SERVER-SIDE ENCRYPTION SSE [S3]
S3 WEBSERVER
KMS INFRASTRUCTURE
AWS KMS CONCEPTS
AWS SERVICES INTEGRATE WITH KMS
S3 SERVER-SIDE ENCRYPTION WITH KMS
RDS ENCRYPTION WITH KMS
REDSHIFT
KMS Provisioning…
KMS GIVES YOU CONTROL
Define who can
• Create a master key
• Use a master key
• Create and export a data key that is encrypted by a master key
• Enable / disable master keys
• Audit use of master key in AWS Cloud Trail
SECURE YOUR KEYS
KMS SECURES YOUR KEYS
• Plaintext keys are never stored in persistent memory on runtime systems
• Separation of duties
• AWS service team operators
– S3
– EBS
– RDS
cannot access KMS hosts that use master keys
 KMS operators cannot access service team hosts that use data keys
• Multi-party controls
• Normal operations requires signatures from two or more KMS operatorson any API calls
to an active host processing customer keys
• Verified claims in SOC1 and public white papers
HARDWARE SECURITY MODULE (HSM)
DATABASE ENCRYPTION
EBS
REDSHFT
CloudHSM
CloudHSM: Custom Software Applications
An architectural building block to help you secure your own applications
• Use standard libraries, with backend HSM rather than software based crypto
• PKCS#11
• JCA/JCE
• Micosoft CAP/CNG
• Code examples and details in the CloudHSM Getting Started Guide make it easier to get
started
aws.amazon.com/cloudhsm
ANALYSIS
KMS On-Premises Vs. CloudHSM Vs. AWS KMS
COMPARISON OF KEY MANAGEMENT
KMS UNIQUENESS
S3 OPTIMIOSATION
IDENTITY & ACCESS MANAGEMENT
IAM Policies
Fine grained
Administer as part of role based access
Apply policies to S3 at
1. Role
2. User
3. Group Level
Allow
Actions
PutObject
Resources
arn:aws:s3:::mybucket/*
Rasa Behera
POLICY
Rasa Behera My Bucket
GRANTS & Permissions
ACL
POLICY
Standards to Glacier
SSE S3 KMS
SSE – CUSTOMER PROVIDED KEYS
With SSE- C,
• Amazon S3 will encrypt the data at rest using the custom encryption keys
• Amazon S3 does NOT store your encryption key anywhere
• The key is discarded after Amazon S3completes your requests
BACK UP Slides
?
QUESTIONS
Please send directly to rasananda.behera@va.gov
BACK UP Slides
PART II:
MICROSOFT AZURE
KMS
RELATED SLIDES in OUR NEXT SESSION
Thank you

More Related Content

What's hot

Maximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWSMaximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWS
Amazon Web Services
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
Amazon Web Services
 
AWS Security
AWS SecurityAWS Security
AWS Security
armincoralic
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
Amazon Web Services
 
Protecting Our Data on AWS
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Getting Started with Amazon QuickSight
Getting Started with Amazon QuickSightGetting Started with Amazon QuickSight
Getting Started with Amazon QuickSight
Amazon Web Services
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Web Services
 
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Amazon Web Services
 
Alert Logic
Alert LogicAlert Logic
Alert Logic
Amazon Web Services
 
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
AWS Enterprise Summit -  AWS로 IT 운영 및 관리 재편하기 - 양승도AWS Enterprise Summit -  AWS로 IT 운영 및 관리 재편하기 - 양승도
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
Amazon Web Services Korea
 
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
Amazon Web Services
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Amazon Web Services
 
2016 Utah Cloud Summit: AWS S3
2016 Utah Cloud Summit: AWS S32016 Utah Cloud Summit: AWS S3
2016 Utah Cloud Summit: AWS S3
1Strategy
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
Amazon Web Services
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
Amazon Web Services
 
Container Stories from the Trenches
Container Stories from the TrenchesContainer Stories from the Trenches
Container Stories from the Trenches
Amazon Web Services
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOps
Amazon Web Services
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
Amazon Web Services
 

What's hot (20)

Maximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWSMaximizing Business Value as You Migrate to AWS
Maximizing Business Value as You Migrate to AWS
 
Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017Security Best Practices - AWS Summit Bahrain 2017
Security Best Practices - AWS Summit Bahrain 2017
 
AWS Security
AWS SecurityAWS Security
AWS Security
 
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
AWS re:Invent 2016: Chalk Talk: Applying Security-by-Design to Drive Complian...
 
Protecting Our Data on AWS
Protecting Our Data on AWSProtecting Our Data on AWS
Protecting Our Data on AWS
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Getting Started with Amazon QuickSight
Getting Started with Amazon QuickSightGetting Started with Amazon QuickSight
Getting Started with Amazon QuickSight
 
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
Amazon Virtual Private Cloud (VPC): Networking Fundamentals and Connectivity ...
 
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
Building Performance Clinical Systems' HIPAA-Compliant Clinical Workflow Plat...
 
Alert Logic
Alert LogicAlert Logic
Alert Logic
 
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
AWS Enterprise Summit -  AWS로 IT 운영 및 관리 재편하기 - 양승도AWS Enterprise Summit -  AWS로 IT 운영 및 관리 재편하기 - 양승도
AWS Enterprise Summit - AWS로 IT 운영 및 관리 재편하기 - 양승도
 
(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale(SPOT303) Security Operations at Massive Scale
(SPOT303) Security Operations at Massive Scale
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
Accelerating cloud adoption for your regulated workloads - AWS PS Summit Canb...
 
2016 Utah Cloud Summit: AWS S3
2016 Utah Cloud Summit: AWS S32016 Utah Cloud Summit: AWS S3
2016 Utah Cloud Summit: AWS S3
 
Understanding AWS Security
Understanding AWS SecurityUnderstanding AWS Security
Understanding AWS Security
 
(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises(SEC321) Implementing Policy, Governance & Security for Enterprises
(SEC321) Implementing Policy, Governance & Security for Enterprises
 
Container Stories from the Trenches
Container Stories from the TrenchesContainer Stories from the Trenches
Container Stories from the Trenches
 
Improving Security Agility using DevSecOps
Improving Security Agility using DevSecOpsImproving Security Agility using DevSecOps
Improving Security Agility using DevSecOps
 
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
AWS re:Invent 2016: Tips for Passing APN Technical Validations (GPSISV2)
 

Similar to Presentation by R Behera on KMS aws

AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Amazon Web Services Korea
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
Amazon Web Services
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
Amazon Web Services
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Protecting Your Data in AWS
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
Amazon Web Services
 
protecting your data in aws
protecting your data in aws protecting your data in aws
protecting your data in aws
Amazon Web Services
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)
Amazon Web Services
 
Deep Dive on Amazon RDS (Relational Database Service)
Deep Dive on Amazon RDS (Relational Database Service)Deep Dive on Amazon RDS (Relational Database Service)
Deep Dive on Amazon RDS (Relational Database Service)
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS
Dinah Barrett
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
Amazon Web Services
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
Amazon Web Services
 

Similar to Presentation by R Behera on KMS aws (20)

AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
 
Encryption and Key Management in AWS
Encryption and Key Management in AWS Encryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
Encryption and Key Management in AWS
Encryption and Key Management in AWSEncryption and Key Management in AWS
Encryption and Key Management in AWS
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS EncryptionAWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
AWS June Webinar Series - Deep Dive: Protecting Your Data with AWS Encryption
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting your data in aws - Toronto
Protecting your data in aws - TorontoProtecting your data in aws - Toronto
Protecting your data in aws - Toronto
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
 Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS(SEC301) Strategies for Protecting Data Using Encryption in AWS
(SEC301) Strategies for Protecting Data Using Encryption in AWS
 
protecting your data in aws
protecting your data in aws protecting your data in aws
protecting your data in aws
 
Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)Deep Dive: AWS CloudHSM (Classic)
Deep Dive: AWS CloudHSM (Classic)
 
Deep Dive on Amazon RDS (Relational Database Service)
Deep Dive on Amazon RDS (Relational Database Service)Deep Dive on Amazon RDS (Relational Database Service)
Deep Dive on Amazon RDS (Relational Database Service)
 
Protecting Your Data in AWS
Protecting Your Data in AWS Protecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
Protecting your data in AWS
Protecting your data in AWS Protecting your data in AWS
Protecting your data in AWS
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 

More from Rasananda BEHERA

Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
Cloud - AWS Key Management System by Practice head & industry leader Rasanand...Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
Rasananda BEHERA
 
2017 dx world expo speaker Rasananda Behera
2017 dx world expo speaker Rasananda Behera2017 dx world expo speaker Rasananda Behera
2017 dx world expo speaker Rasananda Behera
Rasananda BEHERA
 
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
Rasananda BEHERA
 
Speaker contract
Speaker contractSpeaker contract
Speaker contract
Rasananda BEHERA
 
Rm006sn ca world2010
Rm006sn ca world2010Rm006sn ca world2010
Rm006sn ca world2010
Rasananda BEHERA
 
FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]
Rasananda BEHERA
 
FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]
Rasananda BEHERA
 
rm006sn (2)
rm006sn (2)rm006sn (2)
rm006sn (2)
Rasananda BEHERA
 
Template-FDW
Template-FDWTemplate-FDW
Template-FDW
Rasananda BEHERA
 
Template-FDW-CMFG
Template-FDW-CMFGTemplate-FDW-CMFG
Template-FDW-CMFG
Rasananda BEHERA
 
Template FDW
Template FDWTemplate FDW
Template FDW
Rasananda BEHERA
 
Template FDW business requirement document
Template FDW business requirement documentTemplate FDW business requirement document
Template FDW business requirement document
Rasananda BEHERA
 

More from Rasananda BEHERA (13)

Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
Cloud - AWS Key Management System by Practice head & industry leader Rasanand...Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
Cloud - AWS Key Management System by Practice head & industry leader Rasanand...
 
2017 dx world expo speaker Rasananda Behera
2017 dx world expo speaker Rasananda Behera2017 dx world expo speaker Rasananda Behera
2017 dx world expo speaker Rasananda Behera
 
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
International Conference, June 6-8 2017 DXWorldExpo on digital transformation...
 
Speaker contract
Speaker contractSpeaker contract
Speaker contract
 
Rm006sn ca world2010
Rm006sn ca world2010Rm006sn ca world2010
Rm006sn ca world2010
 
FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]
 
FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]FDD-FDW-Template[Current~Future Architecture]
FDD-FDW-Template[Current~Future Architecture]
 
BIG Data Expo- Speaker
BIG Data Expo- SpeakerBIG Data Expo- Speaker
BIG Data Expo- Speaker
 
rm006sn (2)
rm006sn (2)rm006sn (2)
rm006sn (2)
 
Template-FDW
Template-FDWTemplate-FDW
Template-FDW
 
Template-FDW-CMFG
Template-FDW-CMFGTemplate-FDW-CMFG
Template-FDW-CMFG
 
Template FDW
Template FDWTemplate FDW
Template FDW
 
Template FDW business requirement document
Template FDW business requirement documentTemplate FDW business requirement document
Template FDW business requirement document
 

Recently uploaded

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
Claudio Di Ciccio
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
danishmna97
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
Matthew Sinclair
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
Zilliz
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
akankshawande
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
Uni Systems S.M.S.A.
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
David Brossard
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
Zilliz
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
Matthew Sinclair
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
SitimaJohn
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
Octavian Nadolu
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Tosin Akinosho
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Safe Software
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
Pixlogix Infotech
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
名前 です男
 

Recently uploaded (20)

CAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on BlockchainCAKE: Sharing Slices of Confidential Data on Blockchain
CAKE: Sharing Slices of Confidential Data on Blockchain
 
How to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptxHow to Get CNIC Information System with Paksim Ga.pptx
How to Get CNIC Information System with Paksim Ga.pptx
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
20240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 202420240607 QFM018 Elixir Reading List May 2024
20240607 QFM018 Elixir Reading List May 2024
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Generating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and MilvusGenerating privacy-protected synthetic data using Secludy and Milvus
Generating privacy-protected synthetic data using Secludy and Milvus
 
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development ProvidersYour One-Stop Shop for Python Success: Top 10 US Python Development Providers
Your One-Stop Shop for Python Success: Top 10 US Python Development Providers
 
Microsoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdfMicrosoft - Power Platform_G.Aspiotis.pdf
Microsoft - Power Platform_G.Aspiotis.pdf
 
OpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - AuthorizationOpenID AuthZEN Interop Read Out - Authorization
OpenID AuthZEN Interop Read Out - Authorization
 
Infrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI modelsInfrastructure Challenges in Scaling RAG with Custom AI models
Infrastructure Challenges in Scaling RAG with Custom AI models
 
20240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 202420240609 QFM020 Irresponsible AI Reading List May 2024
20240609 QFM020 Irresponsible AI Reading List May 2024
 
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptxOcean lotus Threat actors project by John Sitima 2024 (1).pptx
Ocean lotus Threat actors project by John Sitima 2024 (1).pptx
 
Artificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopmentArtificial Intelligence for XMLDevelopment
Artificial Intelligence for XMLDevelopment
 
Monitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdfMonitoring and Managing Anomaly Detection on OpenShift.pdf
Monitoring and Managing Anomaly Detection on OpenShift.pdf
 
Driving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success StoryDriving Business Innovation: Latest Generative AI Advancements & Success Story
Driving Business Innovation: Latest Generative AI Advancements & Success Story
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Best 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERPBest 20 SEO Techniques To Improve Website Visibility In SERP
Best 20 SEO Techniques To Improve Website Visibility In SERP
 
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
みなさんこんにちはこれ何文字まで入るの?40文字以下不可とか本当に意味わからないけどこれ限界文字数書いてないからマジでやばい文字数いけるんじゃないの?えこ...
 

Presentation by R Behera on KMS aws

  • 1. Key Management System - A Journey on Cloud Migration December 2016 Rasananda Behera Elite Panel Speaker & Industry Leader in Cloud Topology, Cyber Security Silicon Valley – Cloud Expo
  • 3. DoDAF – Defense in Depth DoDAF
  • 4. ENCRYPTION DATA @ REST Encryption Data at REST Volume Encryption Object Encryption Database Encryption EBS encryption OS Tools AWS marketplace/ partnr S3 server side encryption[sse] S3 SSE w/ customer provided keys Client side encryption RDS ORACLE TDE HSM RDS MSSQL TDE RDS MYSQL KMS RDSPostgreSQL KMS Anazon Redshift encryption
  • 5. AWS KEY MANAGEMENT SERVICE Introducing AWS Key Management Service • A Service that enables you to provide and use encryption keys to protect your data • Allows you to create, use, and manage encryption keys from within • Your own applications via AWS SDK • Supported AWS services • S3 • EBS • RDS • Redshift  Available in all commercial regions
  • 6. WHAT IS SERVER SIDE ENCRYPTION
  • 16. KMS Provisioning… KMS GIVES YOU CONTROL Define who can • Create a master key • Use a master key • Create and export a data key that is encrypted by a master key • Enable / disable master keys • Audit use of master key in AWS Cloud Trail
  • 17. SECURE YOUR KEYS KMS SECURES YOUR KEYS • Plaintext keys are never stored in persistent memory on runtime systems • Separation of duties • AWS service team operators – S3 – EBS – RDS cannot access KMS hosts that use master keys  KMS operators cannot access service team hosts that use data keys • Multi-party controls • Normal operations requires signatures from two or more KMS operatorson any API calls to an active host processing customer keys • Verified claims in SOC1 and public white papers
  • 19.
  • 21. EBS
  • 23. CloudHSM CloudHSM: Custom Software Applications An architectural building block to help you secure your own applications • Use standard libraries, with backend HSM rather than software based crypto • PKCS#11 • JCA/JCE • Micosoft CAP/CNG • Code examples and details in the CloudHSM Getting Started Guide make it easier to get started aws.amazon.com/cloudhsm
  • 25. KMS On-Premises Vs. CloudHSM Vs. AWS KMS COMPARISON OF KEY MANAGEMENT
  • 28. IDENTITY & ACCESS MANAGEMENT IAM Policies Fine grained Administer as part of role based access Apply policies to S3 at 1. Role 2. User 3. Group Level Allow Actions PutObject Resources arn:aws:s3:::mybucket/* Rasa Behera
  • 31. ACL
  • 35. SSE – CUSTOMER PROVIDED KEYS With SSE- C, • Amazon S3 will encrypt the data at rest using the custom encryption keys • Amazon S3 does NOT store your encryption key anywhere • The key is discarded after Amazon S3completes your requests
  • 36. BACK UP Slides ? QUESTIONS Please send directly to rasananda.behera@va.gov
  • 37. BACK UP Slides PART II: MICROSOFT AZURE KMS RELATED SLIDES in OUR NEXT SESSION Thank you