SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Top Cloud Security Myths – Dispelled!
Adam Hunter
Solutions Architect, AWS
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
SECURITY IS
JOB ZERO
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
The Three Stages Of Cloud Security Curiosity
General Cloud
Security
Specific Service
Security
Data
Security
New to Cloud
and / or
Business Teams
Experienced in Cloud
and / or
Technology Teams
Advanced in Cloud
and / or
Risk Teams
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Cloud Security
Service Security
Data
Security
Part 1: General Cloud Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 1:
“The public cloud is not as secure as my
on-premises infrastructure and not as
secure as my private cloud.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
1: AWS Security Of The Cloud And In The Cloud
Visible AutomatedPhysical
AWS’s global infrastructure is built to meet the requirements of the
most security-sensitive organisations in the world.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 2:
“When I put my data in the cloud I lose
ownership of it, and it may move across
national borders.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
2: You Control And Own Your Content
Access TraceabilityOwnership
You retain ownership and control of your content, and you
choose which region that content resides in.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 3:
“I am a highly regulated business and I
cannot use the cloud because of my
compliance requirements.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
3: AWS Global Compliance Program
Countries Enterprise
Agreement
Certifications
Our security assurance program meets or exceeds industry, country-
specific and global security requirements.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 4:
“My business requires sensitive personal
data, I can not use the cloud.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
4: Using Encryption On AWS
AWS KMS High
Standards
Ubiquitous
AWS encryption services are integrated into dozens of our
services and meet the strictest industry requirements.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Part 2: Specific Service Security
Cloud Security
Service Security
Data
Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 5:
“I cannot use the cloud to store
sensitive data because everyone will
have access to it.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
7: How To Secure Data In Amazon S3
Notify RespondProtect
Amazon S3 and our other storage services are secure by default.
Customers control who can access their data, and AWS provides
multiple tools so you can understand how access is configured.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 6:
“I hear about secret keys being stolen,
the way you grant access is not secure.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
8: How To Protect AWS Credentials
Temporary
Access
Amazon
GuardDuty
Multi-Factor
Authentication
AWS provides a number of tools to protect your identity and
access credentials and to help you detect misuse.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 7:
“I cannot control the deletion of my data
and I cannot verify it has been deleted.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
9: How AWS Manages Data Deletion
Physical ValidatedLogical
When you delete your data we take multiple steps to wipe it
and eventually destroy it. This process is validated by
independent third parties.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cloud Security
Service Security
Data
Security
Part 3: Data Access Security
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 8:
“The government can access my
data at any time.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
11: How AWS Manages Information Requests
Notification EncryptionValid Requests
Amazon does not disclose customer information unless we’re
required to do so to comply with a legally valid and binding order.
Where we need to act publicly to protect customers, we do.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Myth 9:
“A malicious insider can look at my data
via your shared administrative access.”
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
12: How AWS Manages Administrative Access
Technology
Controls
Process
Controls
Automation
AWS strictly controls our infrequent administrative access to services.
This process has executive oversight within AWS and is
validated by independent third parties.
Cloud
Service
Data
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Cloud Security
Service Security
Data
Security
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Security Benefits Of The AWS Cloud
Automate
with deeply
integrated
security
services
Inherit
global
security and
compliance
controls
Highest
standards
for privacy
and data
security
Largest
network
of security
partners and
solutions
Scale with
superior
visibility and
control
© 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved.
http://amzn.to/2FZdEgH
SECURITY IS
JOB ZERO
Thank you

More Related Content

What's hot

Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
Amazon Web Services
 
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
Amazon Web Services
 
AWSome Day Iceland - Technical Track
AWSome Day Iceland - Technical TrackAWSome Day Iceland - Technical Track
AWSome Day Iceland - Technical Track
Amazon Web Services
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
Amazon Web Services
 
Moving forward with AI
Moving forward with AIMoving forward with AI
Moving forward with AI
Amazon Web Services
 
Future of Enterprise IT
Future of Enterprise IT Future of Enterprise IT
Future of Enterprise IT
Amazon Web Services
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
Amazon Web Services
 
透過資料平台掌握關鍵數據消費者洞察極大化
透過資料平台掌握關鍵數據消費者洞察極大化透過資料平台掌握關鍵數據消費者洞察極大化
透過資料平台掌握關鍵數據消費者洞察極大化
Amazon Web Services
 
AWS 微服務架構分享
AWS 微服務架構分享AWS 微服務架構分享
AWS 微服務架構分享
Amazon Web Services
 
New Tools for a New World
New Tools for a New WorldNew Tools for a New World
New Tools for a New World
Amazon Web Services
 
應用開發新思維
應用開發新思維應用開發新思維
應用開發新思維
Amazon Web Services
 
AWS Customer Presentation - Angelbeat Princeton Seminar
AWS Customer Presentation -  Angelbeat Princeton SeminarAWS Customer Presentation -  Angelbeat Princeton Seminar
AWS Customer Presentation - Angelbeat Princeton Seminar
Amazon Web Services
 
BI & Analytics - A Datalake on AWS
BI & Analytics - A Datalake on AWSBI & Analytics - A Datalake on AWS
BI & Analytics - A Datalake on AWS
Amazon Web Services
 
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Amazon Web Services
 
Enterprise Cloud Adoption
Enterprise Cloud Adoption Enterprise Cloud Adoption
Enterprise Cloud Adoption
Tom Laszewski
 
Accelerate your cloud migration
Accelerate your cloud migrationAccelerate your cloud migration
Accelerate your cloud migration
Amazon Web Services
 
Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境
Amazon Web Services
 
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptxTrack 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
Amazon Web Services
 
AWS101 Cloud is the New Normal
AWS101  Cloud is the New Normal AWS101  Cloud is the New Normal
AWS101 Cloud is the New Normal
Sandy Carter
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Amazon Web Services
 

What's hot (20)

Digital Transformation
Digital TransformationDigital Transformation
Digital Transformation
 
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
Track 6 Session 6_ 透過 AWS AI 服務模擬、部署機器人於產業之應用
 
AWSome Day Iceland - Technical Track
AWSome Day Iceland - Technical TrackAWSome Day Iceland - Technical Track
AWSome Day Iceland - Technical Track
 
The Future of Enterprise IT
The Future of Enterprise IT The Future of Enterprise IT
The Future of Enterprise IT
 
Moving forward with AI
Moving forward with AIMoving forward with AI
Moving forward with AI
 
Future of Enterprise IT
Future of Enterprise IT Future of Enterprise IT
Future of Enterprise IT
 
ENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdfENT207-The Future of Enterprise IT.pdf
ENT207-The Future of Enterprise IT.pdf
 
透過資料平台掌握關鍵數據消費者洞察極大化
透過資料平台掌握關鍵數據消費者洞察極大化透過資料平台掌握關鍵數據消費者洞察極大化
透過資料平台掌握關鍵數據消費者洞察極大化
 
AWS 微服務架構分享
AWS 微服務架構分享AWS 微服務架構分享
AWS 微服務架構分享
 
New Tools for a New World
New Tools for a New WorldNew Tools for a New World
New Tools for a New World
 
應用開發新思維
應用開發新思維應用開發新思維
應用開發新思維
 
AWS Customer Presentation - Angelbeat Princeton Seminar
AWS Customer Presentation -  Angelbeat Princeton SeminarAWS Customer Presentation -  Angelbeat Princeton Seminar
AWS Customer Presentation - Angelbeat Princeton Seminar
 
BI & Analytics - A Datalake on AWS
BI & Analytics - A Datalake on AWSBI & Analytics - A Datalake on AWS
BI & Analytics - A Datalake on AWS
 
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
Digital Transformation: Leveraging AWS as a Launchpad (CMP205-S) - AWS re:Inv...
 
Enterprise Cloud Adoption
Enterprise Cloud Adoption Enterprise Cloud Adoption
Enterprise Cloud Adoption
 
Accelerate your cloud migration
Accelerate your cloud migrationAccelerate your cloud migration
Accelerate your cloud migration
 
Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境Track 1 Session 3_建構安全高效的電子設計自動化環境
Track 1 Session 3_建構安全高效的電子設計自動化環境
 
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptxTrack 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
Track 2 Session 3_ 日本電視直播技術革命串流平台不容忽視的技術創新.pptx
 
AWS101 Cloud is the New Normal
AWS101  Cloud is the New Normal AWS101  Cloud is the New Normal
AWS101 Cloud is the New Normal
 
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
Securing SaaS/Web and Windows Apps in a Hybrid Cloud World (SEC314-S) - AWS r...
 

Similar to Top Security Myths Dispelled

Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
Amazon Web Services
 
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
AWS Initiate Day Dublin 2019 – Top Cloud Security MythsAWS Initiate Day Dublin 2019 – Top Cloud Security Myths
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
Amazon Web Services
 
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths DispelledInitiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Amazon Web Services
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
Amazon Web Services
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
Amazon Web Services
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
Amazon Web Services
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
Amazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
Amazon Web Services
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
Amazon Web Services
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
Amazon Web Services
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Amazon Web Services
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
Amazon Web Services
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Alert Logic
 

Similar to Top Security Myths Dispelled (20)

Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018 Top Security Myths Dispelled - AWS Summit Sydney 2018
Top Security Myths Dispelled - AWS Summit Sydney 2018
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
Top Cloud Security Myths - Dispelled! (SEC202-R1) - AWS re:Invent 2018
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
 
Top Cloud Security Myths - Dispelled
Top Cloud Security Myths - DispelledTop Cloud Security Myths - Dispelled
Top Cloud Security Myths - Dispelled
 
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
AWS Initiate Day Dublin 2019 – Top Cloud Security MythsAWS Initiate Day Dublin 2019 – Top Cloud Security Myths
AWS Initiate Day Dublin 2019 – Top Cloud Security Myths
 
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths DispelledInitiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
Initiate Edinburgh 2019 - Top Cloud Security Myths Dispelled
 
Sicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWSSicurezza e conformità al GDPR con AWS
Sicurezza e conformità al GDPR con AWS
 
AWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPRAWS per la semplificazione del percorso di conformità al GDPR
AWS per la semplificazione del percorso di conformità al GDPR
 
Security & Compliance
Security & ComplianceSecurity & Compliance
Security & Compliance
 
Top Cloud Security Myths Dispelled
Top Cloud Security Myths DispelledTop Cloud Security Myths Dispelled
Top Cloud Security Myths Dispelled
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
GDPR and Automation Overview
GDPR and Automation OverviewGDPR and Automation Overview
GDPR and Automation Overview
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
Leadership Session: AWS Security (SEC305-L) - AWS re:Invent 2018
 
AWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & ComplianceAWS Security Week: Security, Identity, & Compliance
AWS Security Week: Security, Identity, & Compliance
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
Amazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
Amazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
Amazon Web Services
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Amazon Web Services
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
Amazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
Amazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Amazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
Amazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Amazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
Amazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Top Security Myths Dispelled

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Top Cloud Security Myths – Dispelled! Adam Hunter Solutions Architect, AWS
  • 2. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. SECURITY IS JOB ZERO
  • 3. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The Three Stages Of Cloud Security Curiosity General Cloud Security Specific Service Security Data Security New to Cloud and / or Business Teams Experienced in Cloud and / or Technology Teams Advanced in Cloud and / or Risk Teams
  • 4. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Cloud Security Service Security Data Security Part 1: General Cloud Security
  • 5. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 1: “The public cloud is not as secure as my on-premises infrastructure and not as secure as my private cloud.” Cloud Service Data
  • 6. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 1: AWS Security Of The Cloud And In The Cloud Visible AutomatedPhysical AWS’s global infrastructure is built to meet the requirements of the most security-sensitive organisations in the world. Cloud Service Data
  • 7. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 2: “When I put my data in the cloud I lose ownership of it, and it may move across national borders.” Cloud Service Data
  • 8. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2: You Control And Own Your Content Access TraceabilityOwnership You retain ownership and control of your content, and you choose which region that content resides in. Cloud Service Data
  • 9. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 3: “I am a highly regulated business and I cannot use the cloud because of my compliance requirements.” Cloud Service Data
  • 10. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 3: AWS Global Compliance Program Countries Enterprise Agreement Certifications Our security assurance program meets or exceeds industry, country- specific and global security requirements. Cloud Service Data
  • 11. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 4: “My business requires sensitive personal data, I can not use the cloud.” Cloud Service Data
  • 12. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 4: Using Encryption On AWS AWS KMS High Standards Ubiquitous AWS encryption services are integrated into dozens of our services and meet the strictest industry requirements. Cloud Service Data
  • 13. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Part 2: Specific Service Security Cloud Security Service Security Data Security
  • 14. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 5: “I cannot use the cloud to store sensitive data because everyone will have access to it.” Cloud Service Data
  • 15. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 7: How To Secure Data In Amazon S3 Notify RespondProtect Amazon S3 and our other storage services are secure by default. Customers control who can access their data, and AWS provides multiple tools so you can understand how access is configured. Cloud Service Data
  • 16. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 6: “I hear about secret keys being stolen, the way you grant access is not secure.” Cloud Service Data
  • 17. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 8: How To Protect AWS Credentials Temporary Access Amazon GuardDuty Multi-Factor Authentication AWS provides a number of tools to protect your identity and access credentials and to help you detect misuse. Cloud Service Data
  • 18. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 7: “I cannot control the deletion of my data and I cannot verify it has been deleted.” Cloud Service Data
  • 19. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 9: How AWS Manages Data Deletion Physical ValidatedLogical When you delete your data we take multiple steps to wipe it and eventually destroy it. This process is validated by independent third parties. Cloud Service Data
  • 20. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Cloud Security Service Security Data Security Part 3: Data Access Security
  • 21. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 8: “The government can access my data at any time.” Cloud Service Data
  • 22. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 11: How AWS Manages Information Requests Notification EncryptionValid Requests Amazon does not disclose customer information unless we’re required to do so to comply with a legally valid and binding order. Where we need to act publicly to protect customers, we do. Cloud Service Data
  • 23. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Myth 9: “A malicious insider can look at my data via your shared administrative access.” Cloud Service Data
  • 24. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 12: How AWS Manages Administrative Access Technology Controls Process Controls Automation AWS strictly controls our infrequent administrative access to services. This process has executive oversight within AWS and is validated by independent third parties. Cloud Service Data
  • 25. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Cloud Security Service Security Data Security
  • 26. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Security Benefits Of The AWS Cloud Automate with deeply integrated security services Inherit global security and compliance controls Highest standards for privacy and data security Largest network of security partners and solutions Scale with superior visibility and control
  • 27. © 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. http://amzn.to/2FZdEgH SECURITY IS JOB ZERO