SlideShare a Scribd company logo
1 of 43
Download to read offline
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Koen van Blijderveen
Security Consultant Professional Services, Amazon Web Services
Leon Kortekaas
Manager Cloud Integration, NN Group
Security & Compliance in the Cloud
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Automate
with deeply
integrated
security services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior visibility
and control
Move to AWS – Strengthen Your Security Posture
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The most sensitive workloads run on AWS
“With AWS, DNAnexus enables enterprises worldwide to perform
genomic analysis and clinical studies in a secure and compliant
environment at a scale not previously possible.”
— Richard Daly, CEO DNAnexus
“The fact that we can rely on the AWS security posture to
boost our own security is really important for our business.
AWS does a much better job at security than we could ever
do running a cage in a data center.”
— Richard Crowley, Director of Operations, Slack
“We determined that security in AWS is superior to our on-premises
data center across several dimensions, including patching,
encryption, auditing and logging, entitlements, and compliance.”
—John Brady, CISO, FINRA (Financial Industry Regulatory Authority)
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Inherit global security and compliance controls
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Humans and Data Don’t Mix
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How do I govern my environment to
ensure it is secure and compliant?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Some definitions
Governance: oversight role and process by which companies
manage and mitigate business risks.
Compliance: process and internal controls to meet the
requirements imposed by a governing body.
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Implementing a governance and compliance program…
What is IT doing?
What are IT
resources doing?
When changes occur
and/or IT resources
become “non-
compliant”
What IT
resources exist?
What is IT supposed
to do?
Define Discover
MonitorRespond
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security & Compliance then and now
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
The challenge
Governance
Speed
• Define
• Discover
• Monitor
• Respond
• Manage
• Report
• Agility
• Innovation
• Scale
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS allows you to do both
With AWS you can programmatically:
• Define how to provision and configure resources
• Discover new resources and changes to existing resources
• Monitor resources and operations for compliance
• Respond to (and report on) changes to your resources
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Security, Risk, Compliance, and Automation
Toolbox
Audit Visibility Protection Automation
AWS
CloudTrail
Amazon
CloudWatch
AWS Systems
Manager
AWS
Config
AWS
CodePipeline
AWS
WAF
AWS
KMS
AWS Trusted
Advisor
AWS
CloudFormation
AWS
Organizations
AWS
Lambda
Amazon
Inspector
AWS
Service Catalog
Amazon
Macie
AWS
Shield
AWS
Config Rules
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How can I view what activity occurred in
my AWS account?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS CloudTrail
You make API calls
On a set of AWS services
around the world
CloudTrail
continuously records
API calls
AWS
CloudTrail
Store or archive logs in
an S3 bucket
AWS Management
Console
IAM AWS CLI
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How do I correlate CloudTrail and other
AWS native logging into tangible
events?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon GuardDuty Threat Detection & Notification
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How can I easily discover what AWS
resources exist and detect if AWS
resources are compliant with rules I
defined?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Config and Config Rules
Enables you to assess, audit, and evaluate the configurations
of your AWS resources.
Changing resources
History
Notifications
API Access
Normalized
AWS
Config
AWS
Config Rules
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How can I monitor the specific state of
a resource and discover what software
is running on my AWS instances?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Systems Manager
Provides visibility and control of your infrastructure on AWS.
You can view operational data from multiple AWS services
and automate operational tasks across your AWS resources
Run command State manager Inventory Maintenance
window
Patch manager Automation Parameter
store
Documents
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
How can I take action when an event
occurs?
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Amazon CloudWatch Events
AWS APIs
Custom Events
Service Events
AWS APIs
event
(time-based)
event
(event-based)
Custom
Rules
Targets
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
AWS Lambda
AWS Lambda allows you to run code in response to an event
Function Services (Anything)
Changes in
data state
Requests to
endpoints
Changes in
resource state
• Node
• Python
• Java
• C#
• Go
Event Source
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
General remediation pattern
Amazon
CloudWatch
AWS
CloudTrail
VPC Flow
Logs
Lambda
function
AWS APIs
AWS WAF
Team
collaboration
(Slack etc.)
• Define/Create
• Discover/Detect
• Monitor/Alert
• Respond/Remediate
• Define counter
measures
• Conduct forensics
Amazon
GuardDuty
AWS
Config
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Putting it into practice…
Compliance in the cloud at NN
Leon Kortekaas
Manager Cloud Integration (AWS, Azure, Windows / Linux and CI/CD tooling)
Leon.kortekaas@nn-group.com
27
• NN’s roots lie in the 18th- century the Netherlands
• Strong business positions; market positions built organically
• Unified international culture with shared best practices
• 17 million customers (excl. NN IP)
• About 15,000 employees
• Successful IPO on 2 July 2014
• Businesses rebranded to “NN” in 2015
• ING’s divestment of NN Group completed in April 2016
• Tender offer for Delta Lloyd successfully completed in April 2017
• Shareholders’ equity of EUR 22.7 bn at 15 February 2018
• Credit ratings1: A/stable (S&P), A+/stable (Fitch)
International financial services company with strong
businesses in Europe and Japan
Some facts and figures Our brand promise ‘You matter’
1. Financial Strength Ratings
Key takeaways:
1. We are an European financial company, meaning we
are regulated by the Dutch National Bank but also by
other regulators
2. We have a lot of ‘proven technology’
3. We are of reasonable size
Overview of steps
Step 1: Perform a risk assessment
Step 2: Set boundaries with a set of compliance principles
Step 3: Determine a list of security principles
The security principles are meant to mitigate the risks found
during the cloud risk assessment. The security principles should
be checked against the compliance principles.
This cloud risk and security framework is sent to the regulators
for approval
Step 4: Let the cloud teams build services compliant with the
cloud risk and security framework
Framework for cloud risk control
Compliance
Principles
Security
Principles
Security
Models
Cloud Risk
Assessment
Security
Standards
Security Architecture
Compliance Principles
1. NN is accountable
2. Always compliant
3. Always in control
4. Use of NN security solutions
Assumption: Cloud Services are not compliant by default
Cloud Security Principles
1. Controlled Environment
2. Minimize Trust
3. Secured authentication, secured communication
4. Separation of responsibilities
5. Full control on IAM and key management
6. SIEM separated from operations
7. TSCM/VM separated from operations
Cloud Security Principles example
SEC-01: Controlled environment
Examples of security controls to
be implemented:
• Security logs are sent to our
central SIEM solution
• Connect cloud platform to
central IAM solution
• Encrypt data at-rest and in
transit
• Have a traceable process for
changes
Implementation
Role of the AWS team
32
Responsibility AWS team
Goal
Create value by adding thin layer to the AWS services and platform, making the services easily consumable within NN. We
do this centrally, proving it as a service to our internal customers (business units)
Shared responsibility model
We are responsible for the platform, the business unit / application owner remains responsible for the compliance of its
application
What do we deliver?
•Compliant platform
•Compliant base builds
•CI / CD tooling
33
Delivering consumable cloud services
Concourse CI Pipeline
Build Test DeployVCS
TSC
M
SIEM IAM
Platform compliance
Hardened OS
TSC
M
SIEM
Splu
nk
IAMLinux /
Windows
Base Image
Build
GIT
Test
CICI/CD
capabilities
1
2
3
Cloud team
Platform compliance
34
Platform compliance
Goal
Providing a compliant AWS platform for our customers. Protect NN against mistakes and miscommunication which might
harm the group while providing a lot of freedom to our customers in their accounts.
Lessons learned
•We started by manually creating and deploying Lambda and Cloud config rules to check and enforce compliance. This
did not work because of:
• A lot of manual work (deploying, testing) when creating new accounts (time consuming and error prone)
• No traceable process and hard to understand for non tech people (e.g. what check is implemented, approved by who)
•Adopt market standards (CIS best practice for platform controls)
•When you make compliance easy, customers will come by them selves.
Please remember: You’re not the first organization with additional compliance requirements!
35
Platform compliance
36
Technical state compliance monitoring
• Based on CIS best practice
• Some controls are enforced (risk based: e.g. public IP, disk encryption), the rest monitored
• Cloud custodian is used to implement the controls
IAM
• Automated role provisioning of IAM roles and policies to both AD and AWS
• SSO with multi factor
Security event monitoring
• Sent cloud trail logs to our central SIEM solution (Arcsight)
• Use cases are defined at our SOC. They inform the AWS team or take mitigating action if needed
Change control and traceability
• No manual access to our A/P accounts
• Everything is automatically tested and deployed via our pipeline
Demo: Platform compliance
37
1. Human readable declarative controls
2. Automatically tested
3. Automatically deployed in all accounts
4. Results sent to our team
Compliance of our workloads
38
Base build compliance
Goal
Providing a NN base build for our customers, out of the box secure, connected to our security tooling and easy to use.
Lessons learned
•Build for automation and self service
• It will not scale if not automated, cloud provides all the capabilities needed, so automate!
• Without self service you will nullify one of the most important cloud benefits (speed)
•Use open source tools for hardening, having a huge community behind a tool is a big benefit
• You’re not the first who needs a hardened OS, don’t invent but adopt
•Rethink the status quo, the current solution (non cloud) may not be suited for cloud
39
Base build compliance
Technical state compliance monitoring
•Nessus for runtime, everything on the inside of the server (e.g. vulnerabilities, config)
•Cloud Custodian for everything on the ‘outside’ of the server (e.g. security groups, encryption)
•OpenSCAP during build time
Security event monitoring
•Sent systems and applications logs to our central SIEM solution (Arcsight), scalable setup op collectors behind a ASG
•Use cases are defined at our SOC. They inform the customer or take mitigating action if needed
Change control and traceability
•Users cannot login on the servers
•Everything is automatically tested and deployed via our pipeline
40
Demo: Base build
41
1. Declarative Ansible playbooks
2. Includes hardening, SIEM, TSCM, Splunk
3. Tested and build in our pipeline
4. Checked on compliancy
5. Base builds propagated to other accounts to be used by our customers
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Meet security & compliance requirements by…
Continuous Logging &
Monitoring
Automating Security
& Compliance Controls
Remediate Issues
Automatically
Enforcing Policies
Automatically
Infrastructure-as-code
Continuous and
automated deployments
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Thank you!

More Related Content

What's hot

Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
 
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...Amazon Web Services
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control TowerCloudHesive
 
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...Amazon Web Services
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS Amazon Web Services
 
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Amazon Web Services
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Timothy McAliley
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAmazon Web Services
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCAmazon Web Services
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatchAmazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAmazon Web Services
 
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 Barcelona
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 BarcelonaAWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 Barcelona
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 BarcelonaAmazon Web Services
 
Getting Started with AWS Lambda and Serverless
Getting Started with AWS Lambda and ServerlessGetting Started with AWS Lambda and Serverless
Getting Started with AWS Lambda and ServerlessAmazon Web Services
 
Amazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon Web Services
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerAmazon Web Services
 

What's hot (20)

Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...
Deep Dive on Amazon S3 Security and Management (E2471STG303-R1) - AWS re:Inve...
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
AWS Control Tower
AWS Control TowerAWS Control Tower
AWS Control Tower
 
Introduction to Microservices
Introduction to MicroservicesIntroduction to Microservices
Introduction to Microservices
 
Migrating to the Cloud
Migrating to the CloudMigrating to the Cloud
Migrating to the Cloud
 
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
CI/CD Pipeline Security: Advanced Continuous Delivery Best Practices: Securit...
 
Network Security and Access Control within AWS
Network Security and Access Control within AWS Network Security and Access Control within AWS
Network Security and Access Control within AWS
 
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
Introduction to the Well-Architected Framework and Tool - SVC208 - Anaheim AW...
 
AWS Secrets Manager
AWS Secrets ManagerAWS Secrets Manager
AWS Secrets Manager
 
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
Azure Cloud Adoption Framework + Governance - Sana Khan and Jay Kumar
 
Aligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWSAligning to the NIST Cybersecurity Framework in the AWS
Aligning to the NIST Cybersecurity Framework in the AWS
 
VPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPCVPC Design and New Capabilities for Amazon VPC
VPC Design and New Capabilities for Amazon VPC
 
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
(DVO315) Log, Monitor and Analyze your IT with Amazon CloudWatch
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 Barcelona
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 BarcelonaAWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 Barcelona
AWS App Mesh (Service Mesh Magic)- AWS Container Day 2019 Barcelona
 
Getting Started with AWS Lambda and Serverless
Getting Started with AWS Lambda and ServerlessGetting Started with AWS Lambda and Serverless
Getting Started with AWS Lambda and Serverless
 
Amazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for KubernetesAmazon EKS - Elastic Container Service for Kubernetes
Amazon EKS - Elastic Container Service for Kubernetes
 
AWS ECS vs EKS
AWS ECS vs EKSAWS ECS vs EKS
AWS ECS vs EKS
 
Introduction to AWS Secrets Manager
Introduction to AWS Secrets ManagerIntroduction to AWS Secrets Manager
Introduction to AWS Secrets Manager
 

Similar to AWS Security and Compliance Automation

“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...Amazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Amazon Web Services
 
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?How Do I Plan for Security, Risk and Compliance when Migrating to AWS?
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?Amazon Web Services
 
Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Amazon Web Services
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert LogicAmazon Web Services
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWSAmazon Web Services
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentAmazon Web Services
 
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Amazon Web Services
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionAmazon Web Services
 
AWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_SingaporeAWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_SingaporeAmazon Web Services
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationAmazon Web Services
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Amazon Web Services
 

Similar to AWS Security and Compliance Automation (20)

Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
“Cloud First” Helps Hub Intl Grow the Business with Splunk on AWS (ANT330-S) ...
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Security@Scale
Security@ScaleSecurity@Scale
Security@Scale
 
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
Security Framework Shakedown: Chart Your Journey with AWS Best Practices (SEC...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?How Do I Plan for Security, Risk and Compliance when Migrating to AWS?
How Do I Plan for Security, Risk and Compliance when Migrating to AWS?
 
Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS Achieving Continuous Compliance with CTP and AWS
Achieving Continuous Compliance with CTP and AWS
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
Architecting security and governance across your AWS environment
Architecting security and governance across your AWS environmentArchitecting security and governance across your AWS environment
Architecting security and governance across your AWS environment
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
A Case Study on Insider Threat Detection
A Case Study on Insider Threat DetectionA Case Study on Insider Threat Detection
A Case Study on Insider Threat Detection
 
AWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_SingaporeAWS Governance at Scale_AWSPSSummit_Singapore
AWS Governance at Scale_AWSPSSummit_Singapore
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
Enabling Governance, Compliance, Operational, and Risk Auditing with AWS Mana...
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

AWS Security and Compliance Automation

  • 1. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Koen van Blijderveen Security Consultant Professional Services, Amazon Web Services Leon Kortekaas Manager Cloud Integration, NN Group Security & Compliance in the Cloud
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control Move to AWS – Strengthen Your Security Posture
  • 3. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The most sensitive workloads run on AWS “With AWS, DNAnexus enables enterprises worldwide to perform genomic analysis and clinical studies in a secure and compliant environment at a scale not previously possible.” — Richard Daly, CEO DNAnexus “The fact that we can rely on the AWS security posture to boost our own security is really important for our business. AWS does a much better job at security than we could ever do running a cage in a data center.” — Richard Crowley, Director of Operations, Slack “We determined that security in AWS is superior to our on-premises data center across several dimensions, including patching, encryption, auditing and logging, entitlements, and compliance.” —John Brady, CISO, FINRA (Financial Industry Regulatory Authority)
  • 4. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Inherit global security and compliance controls
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Humans and Data Don’t Mix
  • 6. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How do I govern my environment to ensure it is secure and compliant?
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Some definitions Governance: oversight role and process by which companies manage and mitigate business risks. Compliance: process and internal controls to meet the requirements imposed by a governing body.
  • 8. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Implementing a governance and compliance program… What is IT doing? What are IT resources doing? When changes occur and/or IT resources become “non- compliant” What IT resources exist? What is IT supposed to do? Define Discover MonitorRespond
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security & Compliance then and now
  • 10. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. The challenge Governance Speed • Define • Discover • Monitor • Respond • Manage • Report • Agility • Innovation • Scale
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS allows you to do both With AWS you can programmatically: • Define how to provision and configure resources • Discover new resources and changes to existing resources • Monitor resources and operations for compliance • Respond to (and report on) changes to your resources
  • 12. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Security, Risk, Compliance, and Automation Toolbox Audit Visibility Protection Automation AWS CloudTrail Amazon CloudWatch AWS Systems Manager AWS Config AWS CodePipeline AWS WAF AWS KMS AWS Trusted Advisor AWS CloudFormation AWS Organizations AWS Lambda Amazon Inspector AWS Service Catalog Amazon Macie AWS Shield AWS Config Rules
  • 13. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How can I view what activity occurred in my AWS account?
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS CloudTrail You make API calls On a set of AWS services around the world CloudTrail continuously records API calls AWS CloudTrail Store or archive logs in an S3 bucket AWS Management Console IAM AWS CLI
  • 15. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How do I correlate CloudTrail and other AWS native logging into tangible events?
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon GuardDuty Threat Detection & Notification
  • 17. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How can I easily discover what AWS resources exist and detect if AWS resources are compliant with rules I defined?
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Config and Config Rules Enables you to assess, audit, and evaluate the configurations of your AWS resources. Changing resources History Notifications API Access Normalized AWS Config AWS Config Rules
  • 19. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How can I monitor the specific state of a resource and discover what software is running on my AWS instances?
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Systems Manager Provides visibility and control of your infrastructure on AWS. You can view operational data from multiple AWS services and automate operational tasks across your AWS resources Run command State manager Inventory Maintenance window Patch manager Automation Parameter store Documents
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. How can I take action when an event occurs?
  • 22. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Amazon CloudWatch Events AWS APIs Custom Events Service Events AWS APIs event (time-based) event (event-based) Custom Rules Targets
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. AWS Lambda AWS Lambda allows you to run code in response to an event Function Services (Anything) Changes in data state Requests to endpoints Changes in resource state • Node • Python • Java • C# • Go Event Source
  • 24. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. General remediation pattern Amazon CloudWatch AWS CloudTrail VPC Flow Logs Lambda function AWS APIs AWS WAF Team collaboration (Slack etc.) • Define/Create • Discover/Detect • Monitor/Alert • Respond/Remediate • Define counter measures • Conduct forensics Amazon GuardDuty AWS Config
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Putting it into practice…
  • 26. Compliance in the cloud at NN Leon Kortekaas Manager Cloud Integration (AWS, Azure, Windows / Linux and CI/CD tooling) Leon.kortekaas@nn-group.com
  • 27. 27 • NN’s roots lie in the 18th- century the Netherlands • Strong business positions; market positions built organically • Unified international culture with shared best practices • 17 million customers (excl. NN IP) • About 15,000 employees • Successful IPO on 2 July 2014 • Businesses rebranded to “NN” in 2015 • ING’s divestment of NN Group completed in April 2016 • Tender offer for Delta Lloyd successfully completed in April 2017 • Shareholders’ equity of EUR 22.7 bn at 15 February 2018 • Credit ratings1: A/stable (S&P), A+/stable (Fitch) International financial services company with strong businesses in Europe and Japan Some facts and figures Our brand promise ‘You matter’ 1. Financial Strength Ratings Key takeaways: 1. We are an European financial company, meaning we are regulated by the Dutch National Bank but also by other regulators 2. We have a lot of ‘proven technology’ 3. We are of reasonable size
  • 28. Overview of steps Step 1: Perform a risk assessment Step 2: Set boundaries with a set of compliance principles Step 3: Determine a list of security principles The security principles are meant to mitigate the risks found during the cloud risk assessment. The security principles should be checked against the compliance principles. This cloud risk and security framework is sent to the regulators for approval Step 4: Let the cloud teams build services compliant with the cloud risk and security framework Framework for cloud risk control Compliance Principles Security Principles Security Models Cloud Risk Assessment Security Standards Security Architecture
  • 29. Compliance Principles 1. NN is accountable 2. Always compliant 3. Always in control 4. Use of NN security solutions Assumption: Cloud Services are not compliant by default
  • 30. Cloud Security Principles 1. Controlled Environment 2. Minimize Trust 3. Secured authentication, secured communication 4. Separation of responsibilities 5. Full control on IAM and key management 6. SIEM separated from operations 7. TSCM/VM separated from operations
  • 31. Cloud Security Principles example SEC-01: Controlled environment Examples of security controls to be implemented: • Security logs are sent to our central SIEM solution • Connect cloud platform to central IAM solution • Encrypt data at-rest and in transit • Have a traceable process for changes
  • 33. Responsibility AWS team Goal Create value by adding thin layer to the AWS services and platform, making the services easily consumable within NN. We do this centrally, proving it as a service to our internal customers (business units) Shared responsibility model We are responsible for the platform, the business unit / application owner remains responsible for the compliance of its application What do we deliver? •Compliant platform •Compliant base builds •CI / CD tooling 33 Delivering consumable cloud services Concourse CI Pipeline Build Test DeployVCS TSC M SIEM IAM Platform compliance Hardened OS TSC M SIEM Splu nk IAMLinux / Windows Base Image Build GIT Test CICI/CD capabilities 1 2 3 Cloud team
  • 35. Platform compliance Goal Providing a compliant AWS platform for our customers. Protect NN against mistakes and miscommunication which might harm the group while providing a lot of freedom to our customers in their accounts. Lessons learned •We started by manually creating and deploying Lambda and Cloud config rules to check and enforce compliance. This did not work because of: • A lot of manual work (deploying, testing) when creating new accounts (time consuming and error prone) • No traceable process and hard to understand for non tech people (e.g. what check is implemented, approved by who) •Adopt market standards (CIS best practice for platform controls) •When you make compliance easy, customers will come by them selves. Please remember: You’re not the first organization with additional compliance requirements! 35
  • 36. Platform compliance 36 Technical state compliance monitoring • Based on CIS best practice • Some controls are enforced (risk based: e.g. public IP, disk encryption), the rest monitored • Cloud custodian is used to implement the controls IAM • Automated role provisioning of IAM roles and policies to both AD and AWS • SSO with multi factor Security event monitoring • Sent cloud trail logs to our central SIEM solution (Arcsight) • Use cases are defined at our SOC. They inform the AWS team or take mitigating action if needed Change control and traceability • No manual access to our A/P accounts • Everything is automatically tested and deployed via our pipeline
  • 37. Demo: Platform compliance 37 1. Human readable declarative controls 2. Automatically tested 3. Automatically deployed in all accounts 4. Results sent to our team
  • 38. Compliance of our workloads 38
  • 39. Base build compliance Goal Providing a NN base build for our customers, out of the box secure, connected to our security tooling and easy to use. Lessons learned •Build for automation and self service • It will not scale if not automated, cloud provides all the capabilities needed, so automate! • Without self service you will nullify one of the most important cloud benefits (speed) •Use open source tools for hardening, having a huge community behind a tool is a big benefit • You’re not the first who needs a hardened OS, don’t invent but adopt •Rethink the status quo, the current solution (non cloud) may not be suited for cloud 39
  • 40. Base build compliance Technical state compliance monitoring •Nessus for runtime, everything on the inside of the server (e.g. vulnerabilities, config) •Cloud Custodian for everything on the ‘outside’ of the server (e.g. security groups, encryption) •OpenSCAP during build time Security event monitoring •Sent systems and applications logs to our central SIEM solution (Arcsight), scalable setup op collectors behind a ASG •Use cases are defined at our SOC. They inform the customer or take mitigating action if needed Change control and traceability •Users cannot login on the servers •Everything is automatically tested and deployed via our pipeline 40
  • 41. Demo: Base build 41 1. Declarative Ansible playbooks 2. Includes hardening, SIEM, TSCM, Splunk 3. Tested and build in our pipeline 4. Checked on compliancy 5. Base builds propagated to other accounts to be used by our customers
  • 42. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Meet security & compliance requirements by… Continuous Logging & Monitoring Automating Security & Compliance Controls Remediate Issues Automatically Enforcing Policies Automatically Infrastructure-as-code Continuous and automated deployments
  • 43. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Thank you!