SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security & Compliance
Paul Ahlgren, Partner Solutions Architect, Nordics & Baltics region
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud Security Myths
The cloud is not secure
The cloud is still too new to be trusted
The cloud is great for productivity apps, but not for securing the network
Cloud solutions requires re-educating IT-teams
Cloud solutions can’t help with compliance
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
UK MoJ CTO David Rogers
“You should probably start engaging with the idea
that the cloud can be considerably more secure
than the private cloud or your own data centre, and
start engaging with the risks that are building in the
spaces where you haven't moved to the cloud yet.”
The Guardian: http://bit.ly/1HXS321
(emphasis added)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Analyst’s Perspective
“CIOs and CISOs need to stop obsessing over unsubstantiated cloud
security worries, and instead apply their imagination and energy to
developing new approaches to cloud control, allowing them to securely,
compliantly and reliably leverage the benefits of this increasingly
ubiquitous computing model.”
Clouds Are Secure: Are You Using Them Securely?
Published: 22 September 2015
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS Foundation Services
Compute Storage Database Networking
AWS Global
Infrastructure Regions
Availability Zones
Edge Locations
Client-side Data
Encryption
Server-side Data
Encryption
Network Traffic
Protection
Platform, Applications, Identity & Access Management
Operating System, Network & Firewall Configuration
Customer content
Customers
AWS Shared Responsibility Model
Customers are
responsible for
their security and
compliance IN
the Cloud
AWS is
responsible for
the security OF
the Cloud
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Products
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Identity
AWS Identity and Access
Management
AWS Organizations
AWS Cognito
AWS Directory Services
AWS Single Sign-On
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Detective Control
AWS Cloudtrail
AWS Config
AWS Cloudwatch
AWS GuardDuty
VPC Flow Logs
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Infrastructure Security
Amazon EC2 Systems Manager
AWS Shield
AWS Web Application Firewall
(WAF)
Amazon Inspector
Amazon Virtual Private Cloud
(VPC)
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Protection
AWS Key Management Service
(KMS)
AWS CloudHSM
Amazon Macie
AWS Certificate Manager
Server Side Encryption
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Incident Response
AWS Config Rules
AWS Lambda
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Enhancing Products
AWS Trusted Advisor
AWS Cloudformation
AWS API Gateway
AWS Service Catalog
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Information Security &
Compliance
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Sovereignty
Customer chooses where to place data
AWS regions are geographically isolated by design
Data is not replicated to other AWS regions and doesn’t move
unless customer chooses to move it
Customers manage access to their customer content and AWS
services and resources
Customers choose how their content is secured
https://aws.amazon.com/compliance/data-privacy-faq/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Data Privacy and Assurance
Certifications / Attestations Laws, Regulations, and Privacy Alignments and Frameworks
C5 [Germany] CISPE CIS
Cyber Essentials Plus [UK] DNB [Netherlands] CJIS
DoD SRG EU Model Clauses CSA
FedRAMP FERPA ENS [Spain]
FIPS GLBA EU-US Privacy Shield
IRAP [Australia] HIPAA FISC [Japan]
ISO 9001 HITECH FISMA
ISO 27001 IRS 1075 G-Cloud [UK]
ISO 27017 ITAR GxP (FDA CFR 21 Part 11)
ISO 27018 My Number Act [Japan] ICREA
MLPS Level 3 [China] U.K. DPA - 1988 IT Grundschutz [Germany]
MTCS [Singapore] VPAT / Section 508 MITA 3.0
PCI DSS Level 1 EU Data Protection Directive [EU] MPAA
SEC Rule 17-a-4(f) Privacy Act [Australia & New Zealand] NIST
SOC 1 PDPA - 2010 [Malaysia] PHR
SOC 2 PDPA - 2012 [Singapore] Uptime Institute Tiers
SOC 3 PIPEDA [Canada] UK Cloud Security Principles
Spanish DPA Authorization
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
New generation of compliance tools
Amazon GuardDuty
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
GDPR
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS and the General Data Protection Regulation
It aims to strengthen the security and protection of personal data
in the EU, and harmonize EU data protection law. GDPR will
replace the EU Data Protection Directive, as well as all local
laws relating to it.
GDPR is the biggest change in data protection laws in Europe
since the introduction of the EU Data Protection Directive, in
1995.
AWS services will comply with the GDPR when it
becomes enforceable on May 25, 2018.
Data Privacy Security by Design AWS Certifications, Programs,
Reports, and Attestations
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
What does GDPR contain?
Data Subject Rights
1. The right to be informed
2. The right of access
3. The right to rectification
4. The right to erasure
5. The right to restrict processing
6. The right to data portability
7. The right to object
8. Rights in relation to automated decision making and profiling
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS and the General Data Protection Regulation
Access Control
Allow only authorized
administrators, users
and applications
Monitoring and Logging
Get an overview about
activities on your AWS
resources
Encryption Encrypt
Data on AWS
Navigating GDPR Compliance on AWS
aws.amazon.com/compliance/gdpr-center/
Download Whitepaper
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS and GDPR
https://aws.amazon.com/compliance/gdpr-center/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Resources
AWS GDPR Resource Center
AWS GDPR Blog
AWS EU Data Protection landing page
AWS DPA Request Page (Console Sign-in required)
AWS GDPR Whitepaper
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Public Sector
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS in the Public Sector
7,000+
educational
institutions
2,300+
government
agencies
22,000+
nonprofit
organizations
25
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Government Agencies and Educational Institutions Use AWS
Worldwide
26
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Resources
Security and compliance pages
https://aws.amazon.com/compliance/
https://aws.amazon.com/security/
Keep yourself updated here:
https://aws.amazon.com/complianc
e/compliance-latest-news/
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
 TiVo: How to Scale New Products with a Data Lake on AWS and Qubole TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
Amazon Web Services
 
Cloud Journey & Lessons Learnt
Cloud Journey & Lessons LearntCloud Journey & Lessons Learnt
Cloud Journey & Lessons Learnt
Amazon Web Services
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
Amazon Web Services
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
Amazon Web Services
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
Amazon Web Services
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Riyadh User Group
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWS
Amazon Web Services
 
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
 Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Amazon Web Services
 
Storage Data Management
Storage Data ManagementStorage Data Management
Storage Data Management
Amazon Web Services
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Amazon Web Services
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Amazon Web Services
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Boaz Ziniman
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
Amazon Web Services
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Amazon Web Services
 
AWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS FoundationsAWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS Foundations
Amazon Web Services
 
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech TalksImprove Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
Amazon Web Services
 
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Amazon Web Services
 
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Amazon Web Services
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
Amazon Web Services
 
Lambda Function Security
Lambda Function SecurityLambda Function Security
Lambda Function Security
Amazon Web Services
 

What's hot (20)

TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
 TiVo: How to Scale New Products with a Data Lake on AWS and Qubole TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
TiVo: How to Scale New Products with a Data Lake on AWS and Qubole
 
Cloud Journey & Lessons Learnt
Cloud Journey & Lessons LearntCloud Journey & Lessons Learnt
Cloud Journey & Lessons Learnt
 
Enabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdfEnabling Compliance with GDPR on AWS.pdf
Enabling Compliance with GDPR on AWS.pdf
 
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
McAfee Skyhigh: Elevating Your AWS Security Posture (SEC307-S) - AWS re:Inven...
 
Protecting Your Data
Protecting Your DataProtecting Your Data
Protecting Your Data
 
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Building an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWSBuilding an Automated Security Fabric in AWS
Building an Automated Security Fabric in AWS
 
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
 Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
 
Storage Data Management
Storage Data ManagementStorage Data Management
Storage Data Management
 
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...Meeting Enterprise Security Requirements with AWS Native Security Services (S...
Meeting Enterprise Security Requirements with AWS Native Security Services (S...
 
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
Foundations: Understanding the Critical Building Blocks of AWS Identity and G...
 
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
Starting your Cloud Transformation Journey - Tel Aviv Summit 2018
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
Security, Risk and Compliance of Your Cloud Journey - Tel Aviv Summit 2018
 
AWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS FoundationsAWSome Day MODULE 1 - AWS Foundations
AWSome Day MODULE 1 - AWS Foundations
 
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech TalksImprove Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
Improve Efficiency by Migrating Messaging to Amazon MQ - AWS Online Tech Talks
 
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
 
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
Container Security and Avoiding the 2 A.M. Call (CON303-R1) - AWS re:Invent 2018
 
SID303 Navigating GDPR Compliance on AWS
 SID303 Navigating GDPR Compliance on AWS SID303 Navigating GDPR Compliance on AWS
SID303 Navigating GDPR Compliance on AWS
 
Lambda Function Security
Lambda Function SecurityLambda Function Security
Lambda Function Security
 

Similar to Security & Compliance

GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
Amazon Web Services
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
Amazon Web Services
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
Amazon Web Services
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
Amazon Web Services
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloud
Amazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Amazon Web Services
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
Amazon Web Services
 
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
Amazon Web Services
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
Net4All
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
Amazon Web Services
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Amazon Web Services
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
Amazon Web Services LATAM
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
Martin Klie
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
Amazon Web Services
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
Reham Maher El-Safarini
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Amazon Web Services
 

Similar to Security & Compliance (20)

GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Enabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWSEnabling Compliance with GDPR on AWS
Enabling Compliance with GDPR on AWS
 
GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)GDPR x AWS 導覽 (Level 200)
GDPR x AWS 導覽 (Level 200)
 
Security & Compliance in the cloud
Security & Compliance in the cloudSecurity & Compliance in the cloud
Security & Compliance in the cloud
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
How to Process Transactions Like a Boss! AWS Developer Workshop at Web Summit...
 
Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...Accelerate your Cloud journey with security and compliance by design - Margo ...
Accelerate your Cloud journey with security and compliance by design - Margo ...
 
Secure Your Customers' Data From Day One
Secure Your Customers' Data From Day OneSecure Your Customers' Data From Day One
Secure Your Customers' Data From Day One
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Security & Compliance

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security & Compliance Paul Ahlgren, Partner Solutions Architect, Nordics & Baltics region
  • 2. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud Security Myths The cloud is not secure The cloud is still too new to be trusted The cloud is great for productivity apps, but not for securing the network Cloud solutions requires re-educating IT-teams Cloud solutions can’t help with compliance
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. UK MoJ CTO David Rogers “You should probably start engaging with the idea that the cloud can be considerably more secure than the private cloud or your own data centre, and start engaging with the risks that are building in the spaces where you haven't moved to the cloud yet.” The Guardian: http://bit.ly/1HXS321 (emphasis added)
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Analyst’s Perspective “CIOs and CISOs need to stop obsessing over unsubstantiated cloud security worries, and instead apply their imagination and energy to developing new approaches to cloud control, allowing them to securely, compliantly and reliably leverage the benefits of this increasingly ubiquitous computing model.” Clouds Are Secure: Are You Using Them Securely? Published: 22 September 2015
  • 5. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers AWS Shared Responsibility Model Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud
  • 7. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Products
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Identity AWS Identity and Access Management AWS Organizations AWS Cognito AWS Directory Services AWS Single Sign-On
  • 9. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Detective Control AWS Cloudtrail AWS Config AWS Cloudwatch AWS GuardDuty VPC Flow Logs
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Infrastructure Security Amazon EC2 Systems Manager AWS Shield AWS Web Application Firewall (WAF) Amazon Inspector Amazon Virtual Private Cloud (VPC)
  • 11. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Protection AWS Key Management Service (KMS) AWS CloudHSM Amazon Macie AWS Certificate Manager Server Side Encryption
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Incident Response AWS Config Rules AWS Lambda
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Enhancing Products AWS Trusted Advisor AWS Cloudformation AWS API Gateway AWS Service Catalog
  • 14. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Information Security & Compliance
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Sovereignty Customer chooses where to place data AWS regions are geographically isolated by design Data is not replicated to other AWS regions and doesn’t move unless customer chooses to move it Customers manage access to their customer content and AWS services and resources Customers choose how their content is secured https://aws.amazon.com/compliance/data-privacy-faq/
  • 16. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Data Privacy and Assurance Certifications / Attestations Laws, Regulations, and Privacy Alignments and Frameworks C5 [Germany] CISPE CIS Cyber Essentials Plus [UK] DNB [Netherlands] CJIS DoD SRG EU Model Clauses CSA FedRAMP FERPA ENS [Spain] FIPS GLBA EU-US Privacy Shield IRAP [Australia] HIPAA FISC [Japan] ISO 9001 HITECH FISMA ISO 27001 IRS 1075 G-Cloud [UK] ISO 27017 ITAR GxP (FDA CFR 21 Part 11) ISO 27018 My Number Act [Japan] ICREA MLPS Level 3 [China] U.K. DPA - 1988 IT Grundschutz [Germany] MTCS [Singapore] VPAT / Section 508 MITA 3.0 PCI DSS Level 1 EU Data Protection Directive [EU] MPAA SEC Rule 17-a-4(f) Privacy Act [Australia & New Zealand] NIST SOC 1 PDPA - 2010 [Malaysia] PHR SOC 2 PDPA - 2012 [Singapore] Uptime Institute Tiers SOC 3 PIPEDA [Canada] UK Cloud Security Principles Spanish DPA Authorization
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. New generation of compliance tools Amazon GuardDuty
  • 18. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. GDPR
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS and the General Data Protection Regulation It aims to strengthen the security and protection of personal data in the EU, and harmonize EU data protection law. GDPR will replace the EU Data Protection Directive, as well as all local laws relating to it. GDPR is the biggest change in data protection laws in Europe since the introduction of the EU Data Protection Directive, in 1995. AWS services will comply with the GDPR when it becomes enforceable on May 25, 2018. Data Privacy Security by Design AWS Certifications, Programs, Reports, and Attestations
  • 20. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What does GDPR contain? Data Subject Rights 1. The right to be informed 2. The right of access 3. The right to rectification 4. The right to erasure 5. The right to restrict processing 6. The right to data portability 7. The right to object 8. Rights in relation to automated decision making and profiling
  • 21. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS and the General Data Protection Regulation Access Control Allow only authorized administrators, users and applications Monitoring and Logging Get an overview about activities on your AWS resources Encryption Encrypt Data on AWS Navigating GDPR Compliance on AWS aws.amazon.com/compliance/gdpr-center/ Download Whitepaper
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS and GDPR https://aws.amazon.com/compliance/gdpr-center/
  • 23. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Resources AWS GDPR Resource Center AWS GDPR Blog AWS EU Data Protection landing page AWS DPA Request Page (Console Sign-in required) AWS GDPR Whitepaper
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Public Sector
  • 25. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. AWS in the Public Sector 7,000+ educational institutions 2,300+ government agencies 22,000+ nonprofit organizations 25
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Government Agencies and Educational Institutions Use AWS Worldwide 26
  • 27. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Resources Security and compliance pages https://aws.amazon.com/compliance/ https://aws.amazon.com/security/ Keep yourself updated here: https://aws.amazon.com/complianc e/compliance-latest-news/
  • 28. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Thank you!