SlideShare a Scribd company logo
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Scalable encryption: A key to public
sector compliance
Patrick J. Woods, DIT, CISM
Security Assurance Lead – US Public Sector
Amazon Web Services
G R C 3 4 2
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda
Why encrypt?
Encryption challenges using legacy technology
Background of CJIS and FERPA origins and requirements
How to leverage AWS KMS to achieve compliance and a more sophisticated
security posture
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Data breaches since 2013 by the numbers1
Over 14.7 billion records have been lost or stolen
Nearly 6.3 million records every day
Statistically, over 260,000 records will be lost or stolen during this session
Of these incidents, only ~4 percent of incidents involve encrypted data
1- Breachliveindex.com
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Encryption security gains
Principle of least privilege
Limits exposure of regulated or sensitive data
Protection from outsiders, insiders, and third parties
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Why organizations don’t encrypt
Encryption isn’t scalable across multiple disparate legacy technologies
Proper encryption demands efficient and strong key management
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
CJIS security policy
CJIS – Criminal Justice Information Services
Policies are written and voted on through the Advisory Policy Board (APB)
Policy is published annually by the FBI CJIS Division
Governance and enforcement is distributed
FBI CJIS Division
State CJIS system agencies
Local agencies
US Code of Federal Regulations, Title 28 Part 20
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
FERPA
Federal Educational Rights and Privacy Act
Oversight provided by the US Department of Education as well as state education
boards and agencies
US Code of Federal Regulations, Title 34 Part 99
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comparison
CJIS
Protected data:
• CHRI – Criminal History Record Information
• CJI – Criminal Justice Information
Applicability:
Applies to all agencies receiving protected data
from FBI CJIS
Data protection requirements:
• Hundreds of prescriptive controls
• Two paths relative to third parties
Audits:
Triennial audit cycles
FERPA
Protected data:
Education records
Applicability:
Applies to all educational agencies/
institutions receiving federal funding
Data protection requirements:
• No specific controls
• “Reasonable methods”
Audits:
Largely ad hoc
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Comparison
CJIS
Access permitted for:
• Administration of criminal justice
• As authorized under state or federal law
• (IT support is an exception)
Encryption standard:
• FIPS 140-2 – In-transit
• FIPS 140-2 or FIPS 197 – At-rest
FERPA
Access permitted for:
• Parent/student review
• Legitimate educational interest
• (IT support is an exception)
Encryption standard:
No specific standard beyond
“reasonable measures”
Both CJIS and FERPA require technical controls to restrict the scope of who has access and contractual and
training requirements for those who must have access
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Third-party access – CJIS
Contractual/physical
Assumptions:
• The contractor has a legitimate operational
need to access the CJI in clear text to support
the authorized agency
• The data will be stored and transmitted in
clear text within the boundary of the CJIS-
defined “physically secure location”
Technical/logical
Assumptions:
• The contractor has no legitimate operational
need to know the CJI in clear text to support
the authorized agency
• The data will be stored and transmitted in an
encrypted state
CJIS provides two methods for data protection as it relates to the involvement of a third-party
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Third-party access – CJIS
Contractual/physical
Compliance requirements:
• Fingerprint-based background checks of all
contractor employees with “unescorted
access to unencrypted CJI” or access to the
“physically secure location”
• Annual or bi-annual security awareness
training for all contractor employees with
“unescorted access to unencrypted CJI” or
access to the “physically secure location”
• Physical security controls “sufficient to protect
CJI” with regular validation of the CJIS-defined
“physically secure location”
• Agreement/contract incorporating the CJIS
security addendum
Technical/logical
Compliance requirements:
• The data will be encrypted in-transit and at-
rest using CJIS-compliant encryption, and the
encryption keys will be managed by the
authorized agency or cleared partner
• Strong encryption becomes the primary data
protection control with any inherited physical
controls as secondary and complementary
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Third-party access – FERPA
Contractual/physical
Assumptions:
• The contractor has a “legitimate educational
interest” to access the educational data in
clear text to support the authorized
agency/institution
• The data will be stored and transmitted in
clear text
Technical/logical
Assumptions:
• The contractor has no “legitimate educational
interest” to access the educational data in
clear text to support the authorized
agency/institution
• The data will be stored and transmitted in an
encrypted state
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Third-party access – FERPA
Contractual/physical
Compliance requirements:
• “Reasonable measures” inclusive of
contractors and their personnel
• Security and awareness training
• Contract language establishing contractual
control for agency/institution
• Regular reviews of contractors to determine
compliance
Technical/logical
Compliance requirements:
• The data will be encrypted using strong
encryption, and the encryption keys will be
managed by the authorized agency or
authorized partner
• Strong encryption becomes the primary data
protection control with any inherited physical
controls as secondary and complementary
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Advantages to using scalable encryption to comply
Significantly reduces the number of personnel with access to your data
Demonstrates the adoption of best practice to protect data
Empowers you with control over your own compliance and security
Reduces compliance complexity
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Methods to encrypt on AWS
Bring your own encryption (client-side)
AWS Marketplace third-party providers
AWS native tools
With any of these methods, effective key management is essential
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Key Management Service (KMS)
Provides a secure, resilient, and scalable method to create and manage your own
encryption keys
Built on FIPS 140-2-validated hardware to meet the CJIS requirements
All access to the key is controlled by the agency or trusted partner, and all use is
tracked and auditable
Over 40 AWS services with direct AWS KMS integration
Integrate with your own applications through AWS Encryption SDK
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case #1: Amazon DynamoDB (global scale DB)
DynamoDB integrates with AWS
KMS to support the encryption-
at-rest server-side encryption
feature
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Use case #2: Manage application secrets
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
For more information on AWS KMS
https://aws.amazon.com/kms/
Thank you!
© 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
Patrick Woods, DIT, CISM
woop@amazon.com

More Related Content

What's hot

Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Amazon Web Services
 
Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...
Amazon Web Services
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
Amazon Web Services
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Amazon Web Services
 
The economics of incidents, and creative ways to thwart future threats - SEP3...
The economics of incidents, and creative ways to thwart future threats - SEP3...The economics of incidents, and creative ways to thwart future threats - SEP3...
The economics of incidents, and creative ways to thwart future threats - SEP3...
Amazon Web Services
 
Leverage the security & resiliency of the cloud & IoT for industry use cases ...
Leverage the security & resiliency of the cloud & IoT for industry use cases ...Leverage the security & resiliency of the cloud & IoT for industry use cases ...
Leverage the security & resiliency of the cloud & IoT for industry use cases ...
Amazon Web Services
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
Amazon Web Services
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Amazon Web Services
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Amazon Web Services
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Amazon Web Services
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Amazon Web Services
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Amazon Web Services
 
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Amazon Web Services
 
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
Amazon Web Services
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
Amazon Web Services
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Amazon Web Services
 
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Amazon Web Services
 
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Amazon Web Services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Amazon Web Services
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
Amazon Web Services
 

What's hot (20)

Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
Deploying critical Microsoft workloads on AWS at Capital One - SDD337 - AWS r...
 
Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...Everything you wanted to know about compliance but were afraid to ask - GRC20...
Everything you wanted to know about compliance but were afraid to ask - GRC20...
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
 
The economics of incidents, and creative ways to thwart future threats - SEP3...
The economics of incidents, and creative ways to thwart future threats - SEP3...The economics of incidents, and creative ways to thwart future threats - SEP3...
The economics of incidents, and creative ways to thwart future threats - SEP3...
 
Leverage the security & resiliency of the cloud & IoT for industry use cases ...
Leverage the security & resiliency of the cloud & IoT for industry use cases ...Leverage the security & resiliency of the cloud & IoT for industry use cases ...
Leverage the security & resiliency of the cloud & IoT for industry use cases ...
 
How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...How policymakers can fulfill promises of security for cloud services - SEP205...
How policymakers can fulfill promises of security for cloud services - SEP205...
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
 
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
Using AWS WAF to protect against bots and scrapers - SDD311 - AWS re:Inforce ...
 
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
Ensure the integrity of your code for fast and secure deployments - SDD319 - ...
 
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
Presenting Radar: Validation and remediation of AWS cloud resources - GRC343 ...
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
 
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
Architect proper segmentation for PCI DSS workloads on AWS - GRC306 - AWS re:...
 
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
AWS GovCloud (US): A path to high compliance in the cloud - GRC344 - AWS re:I...
 
How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...How encryption works in AWS: What assurances do you have that unauthorized us...
How encryption works in AWS: What assurances do you have that unauthorized us...
 
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
Serverless remediation in Financial Services: A custom tool - SEP311 - AWS re...
 
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019 Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
Leadership session: Security deep dive - SDD334-L - AWS re:Inforce 2019
 
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
Root CA hierarchies for AWS Certificate Manager (ACM) Private CA - FND320 - A...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...How to act on your security and compliance alerts with AWS Security Hub - FND...
How to act on your security and compliance alerts with AWS Security Hub - FND...
 

Similar to Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Inforce 2019

Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Amazon Web Services
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
Amazon Web Services
 
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Amazon Web Services
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Precisely
 
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
Amazon Web Services
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
Ahmad Khan
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
Amazon Web Services
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
 
Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.
Amazon Web Services
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
IDERA Software
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
Net4All
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
Priyanka Aash
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
Reham Maher El-Safarini
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
Katherine Cola
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
Amazon Web Services
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
stevemeltzer
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in China
Amazon Web Services
 

Similar to Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Inforce 2019 (20)

Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
Unlock Highly Regulated Enterprise Workloads with SaaS on AWS GovCloud (US) (...
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019 Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
Protect customer privacy with AWS - GRC351 - AWS re:Inforce 2019
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
Privacy, ethics, and engineering in emerging technology - SEP204 - AWS re:Inf...
 
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be SecuredCountdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
Countdown to CCPA: 48 Days Until Your IBM i Data Needs to Be Secured
 
人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用人工智慧雲服務與金融服務應用
人工智慧雲服務與金融服務應用
 
GDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best PracticesGDPR - Top 10 AWS Security and Compliance Best Practices
GDPR - Top 10 AWS Security and Compliance Best Practices
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.Cybersecurity: scenario e strategie.
Cybersecurity: scenario e strategie.
 
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
Geek Sync: Database Auditing Essentials: Tracking Who Did What to Which Data ...
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
 
Simplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdfSimplifying data privacy and protection.pdf
Simplifying data privacy and protection.pdf
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Smart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud WorldSmart Identity for the Hybrid Multicloud World
Smart Identity for the Hybrid Multicloud World
 
Enabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TICEnabling Cloud Smart, Zero-Trust, and TIC
Enabling Cloud Smart, Zero-Trust, and TIC
 
The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1The new massachusetts privacy rules v5.35.1
The new massachusetts privacy rules v5.35.1
 
Navigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in ChinaNavigating GDPR Compliance on AWS & Data Regulations in China
Navigating GDPR Compliance on AWS & Data Regulations in China
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Scalable encryption: A key to public sector compliance - GRC342 - AWS re:Inforce 2019

  • 1. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Scalable encryption: A key to public sector compliance Patrick J. Woods, DIT, CISM Security Assurance Lead – US Public Sector Amazon Web Services G R C 3 4 2
  • 2. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Agenda Why encrypt? Encryption challenges using legacy technology Background of CJIS and FERPA origins and requirements How to leverage AWS KMS to achieve compliance and a more sophisticated security posture
  • 3. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 4. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Data breaches since 2013 by the numbers1 Over 14.7 billion records have been lost or stolen Nearly 6.3 million records every day Statistically, over 260,000 records will be lost or stolen during this session Of these incidents, only ~4 percent of incidents involve encrypted data 1- Breachliveindex.com
  • 5. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Encryption security gains Principle of least privilege Limits exposure of regulated or sensitive data Protection from outsiders, insiders, and third parties
  • 6. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 7. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Why organizations don’t encrypt Encryption isn’t scalable across multiple disparate legacy technologies Proper encryption demands efficient and strong key management
  • 8. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 9. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. CJIS security policy CJIS – Criminal Justice Information Services Policies are written and voted on through the Advisory Policy Board (APB) Policy is published annually by the FBI CJIS Division Governance and enforcement is distributed FBI CJIS Division State CJIS system agencies Local agencies US Code of Federal Regulations, Title 28 Part 20
  • 10. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. FERPA Federal Educational Rights and Privacy Act Oversight provided by the US Department of Education as well as state education boards and agencies US Code of Federal Regulations, Title 34 Part 99
  • 11. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Comparison CJIS Protected data: • CHRI – Criminal History Record Information • CJI – Criminal Justice Information Applicability: Applies to all agencies receiving protected data from FBI CJIS Data protection requirements: • Hundreds of prescriptive controls • Two paths relative to third parties Audits: Triennial audit cycles FERPA Protected data: Education records Applicability: Applies to all educational agencies/ institutions receiving federal funding Data protection requirements: • No specific controls • “Reasonable methods” Audits: Largely ad hoc
  • 12. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Comparison CJIS Access permitted for: • Administration of criminal justice • As authorized under state or federal law • (IT support is an exception) Encryption standard: • FIPS 140-2 – In-transit • FIPS 140-2 or FIPS 197 – At-rest FERPA Access permitted for: • Parent/student review • Legitimate educational interest • (IT support is an exception) Encryption standard: No specific standard beyond “reasonable measures” Both CJIS and FERPA require technical controls to restrict the scope of who has access and contractual and training requirements for those who must have access
  • 13. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Third-party access – CJIS Contractual/physical Assumptions: • The contractor has a legitimate operational need to access the CJI in clear text to support the authorized agency • The data will be stored and transmitted in clear text within the boundary of the CJIS- defined “physically secure location” Technical/logical Assumptions: • The contractor has no legitimate operational need to know the CJI in clear text to support the authorized agency • The data will be stored and transmitted in an encrypted state CJIS provides two methods for data protection as it relates to the involvement of a third-party
  • 14. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Third-party access – CJIS Contractual/physical Compliance requirements: • Fingerprint-based background checks of all contractor employees with “unescorted access to unencrypted CJI” or access to the “physically secure location” • Annual or bi-annual security awareness training for all contractor employees with “unescorted access to unencrypted CJI” or access to the “physically secure location” • Physical security controls “sufficient to protect CJI” with regular validation of the CJIS-defined “physically secure location” • Agreement/contract incorporating the CJIS security addendum Technical/logical Compliance requirements: • The data will be encrypted in-transit and at- rest using CJIS-compliant encryption, and the encryption keys will be managed by the authorized agency or cleared partner • Strong encryption becomes the primary data protection control with any inherited physical controls as secondary and complementary
  • 15. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Third-party access – FERPA Contractual/physical Assumptions: • The contractor has a “legitimate educational interest” to access the educational data in clear text to support the authorized agency/institution • The data will be stored and transmitted in clear text Technical/logical Assumptions: • The contractor has no “legitimate educational interest” to access the educational data in clear text to support the authorized agency/institution • The data will be stored and transmitted in an encrypted state
  • 16. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Third-party access – FERPA Contractual/physical Compliance requirements: • “Reasonable measures” inclusive of contractors and their personnel • Security and awareness training • Contract language establishing contractual control for agency/institution • Regular reviews of contractors to determine compliance Technical/logical Compliance requirements: • The data will be encrypted using strong encryption, and the encryption keys will be managed by the authorized agency or authorized partner • Strong encryption becomes the primary data protection control with any inherited physical controls as secondary and complementary
  • 17. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Advantages to using scalable encryption to comply Significantly reduces the number of personnel with access to your data Demonstrates the adoption of best practice to protect data Empowers you with control over your own compliance and security Reduces compliance complexity
  • 18. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved.
  • 19. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Methods to encrypt on AWS Bring your own encryption (client-side) AWS Marketplace third-party providers AWS native tools With any of these methods, effective key management is essential
  • 20. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Key Management Service (KMS) Provides a secure, resilient, and scalable method to create and manage your own encryption keys Built on FIPS 140-2-validated hardware to meet the CJIS requirements All access to the key is controlled by the agency or trusted partner, and all use is tracked and auditable Over 40 AWS services with direct AWS KMS integration Integrate with your own applications through AWS Encryption SDK
  • 21. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case #1: Amazon DynamoDB (global scale DB) DynamoDB integrates with AWS KMS to support the encryption- at-rest server-side encryption feature
  • 22. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Use case #2: Manage application secrets
  • 23. © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. For more information on AWS KMS https://aws.amazon.com/kms/
  • 24. Thank you! © 2019,Amazon Web Services, Inc. or its affiliates. All rights reserved. Patrick Woods, DIT, CISM woop@amazon.com