SlideShare una empresa de Scribd logo
1 de 32
Move Better, Faster, and More Securely
Cloud-Enabled Security Solutions
Pawan Agnihotri– AWS Principal Security Solutions Architect
Takeaways from today’s session
I. Revolution: Why the Cloud? The Inspirations and Motivations
II. Myth Busting: Common Security Misconceptions
III. Protection: Benefits of Cloud-Enabled Security for the Enterprise
IV. Transformation: Common Best Practices When Migrating to the Cloud
Revolution
“There has never been a time of greater promise, or one of greater potential peril. Today’s
decision-makers, however, are too often trapped in traditional, linear thinking, or too absorbed
by the multiple crises demanding their attention, to think strategically about the forces of
disruption and innovation shaping our future.”
- Klaus Schwab, Founder & Executive Chairman, World Economic Forum
1784
Steam Power
Mechanical
Production
1870
Electricity
Mass
Production
1969
Electronics
Automated
Production
Today
Cloud
IoT
Digital
We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one
another. In its scale, scope, and complexity, the transformation will be unlike anything humankind has experienced before.
”
“
”
“
- Klaus Schwab, Founder & Executive Chairman, World Economic Forum
The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create mass
production. The Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is
building on the Third, the digital revolution that has been occurring since the middle of the last century. It is characterized by a
fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.
FinTech
Challenger BanksMarket Agility
Improved Margins
Risk Reduction
Onerous Regulations
Greater Transparency
Improved Responsiveness
Responsiveness
Resiliency
The Digital Agenda
Cost Reduction
Increased Productivity
Inspirations and Motivations for Migration
OR
Move
Fast
Stay
Secure
AND
Move
Fast
Stay
Secure
Myth Busting
“Cyber security is better in the cloud than it is in private managed data centers.”
- Steve Randich, EVP and CIO of FINRA
Some API-enabled services
Disparate APIs
No true control plane
Physical concealments
Often co-habited
Physical vs API
Fully API-enabled
API homogeneity
A “source of truth” control plane
Nowhere to hide
Nobody can “climb into” your account
State of the Art Facilities
Documented and Verified Controls
We’ve helped our FSI customers successfully address regulatory requirements from these agencies, and many others around the world.
APAC Regulatory Landscape
Tested by Millions and Standardized for all
Capital One
Protection
“We worked closely with the Amazon team to develop a security model, which we believe
enables us to operate more securely in the public cloud than we can even in our data
centers.”
- Rob Alexander, CIO of Capital One
16 Regions – 42 Availability Zones – 68 Edge Locations Region & Number of Availability Zones
AWS GovCloud (2) EU
Ireland (3)
US West Frankfurt (2)
Oregon (3) London (2)
Northern California (3)
Asia Pacific
US East Singapore (2)
N. Virginia (5) Ohio (3) Sydney (2), Tokyo (3)
Seoul (2), Mumbai (2)
Canada
Central (2) China
Beijing (2)
South America
São Paulo (3) New regions coming soon
Paris, Ningxia
Deploy Faster Wherever You Like
Local Versus Global View
> 90% driven by customers needs
2007 2008 2009 2010 2011 2012 2013 2014 2015 2016
AWS AWS Security
Security Innovation: AWS Innovates Constantly
1017
722
516
280
159
82
6148
0 8 14 20
51
71
24
48 61
82
159
235
0
50
100
150
200
250
2008 2009 2010 2011 2012 2013
Security Features All Significant Services & Features 2 per Mov. Avg. (security features) 2 per. Mov. Ag (all significant services & features)
Pace of Innovation: Security versus All
Multi-Dimensional Protection at Many Layers
Secure
DMZs Honeypot
Perimeter
IDS/IPS DLP
Message Security
(anti-virus, anti-malware)
Perimeter
Firewall
DHS
Einstein
Web Proxy Control
Filtering
Enterprise Message
Security
Inline
Patching
Enterprise
Wireless
Security
NAC
VoIP
Protection
Enterprise
Remote
Access
DLP
Enclave/
Datacenter
Firewall
Endpoint Security
Enforcement
Content Security
(anti-virus,
anti-malware)
Host
IDS/IPS
Desktop
Firewall
FDCC
Compliance
Patch
Management
DLP
WAF
Dynamic App
Testing
Database
Monitoring/Scanning
Database Secure
Gateway (Shield)
Static App
TestingCode
Review
Identity & Access
Management
Enterprise Right
Management
Data
Classification
Data Integrity
Monitoring
Data/Drive
Encryption
DAR/DIM
Protection
Data Wiping
Cleansing
PKI
SIEM Digital Forensics Security SLA/SLO Reporting
Escalation
Management
Situational
Awareness
Security
Dashboard
Focused
Ops
Continuous Monitoring &
Assessment
Incident Reporting,
Detection, Response (CIRT)
SOC/NOC
Monitoring (24x7)
Continuous C&A Security Awareness Training Vulnerability Assessment
Penetration
Testing
Security Architecture
& Design
Threat
Modeling
Cyber Threat
Intelligence
Security Policies
& Compliance
IT Security &
Governance
Enterprise
IDS/IPS
DLP
Risk
Management
MISSION
CRITICAL
ASSETS
Reaction Time (Inequality thereof…) – Get Ahead
Deter
Monitor
DetectDiagnose
Secure
Before:
Attackers (minutes) > Defenders (days)
AFTER:
Constant, real-time protection
Administration
& Security
Access
Control
Identity
Management
Key Management
& Storage
Monitoring
& Logs
Resource &
Usage Auditing
Platform
Services
Analytics App Services Developer Tools & Operations Mobile Services
Data
Pipelines
Data
Warehouse
Hadoop
Real-time
Streaming Data
Application
Lifecycle
Management
Containers
Deployment
DevOps
Event-driven
Computing
Resource
Templates
Identity
Mobile
Analytics
Push
Notifications
Sync
App
Streaming
Email
Queuing &
Notifications
Search
Transcoding
Workflow
Core
Services
CDN
Compute
(VMs, Auto-scaling, and
Load Balancing)
Databases
(Relational, NoSQL, and
Caching)
Networking
(VPC, DX, and DNS)
Storage
(Object, Block, EFS,
and Archival)
Infrastructure
Availability
Zones
Points of
Presence
Regions
Enterprise
Applications
Business
Email
Sharing &
Collaboration
Virtual
Desktop
Technical &
Business Support
Account
Management
Partner
Ecosystem
Professional
Services
Security &
Pricing Reports
Solutions
Architects
Support
Training &
Certification
Machine
Learning
What is Amazon Web Services?
Transformation
“There’s so much security built into these cloud computing platforms today. For us, it’s our
No. 1 priority — it’s not even close, relative to anything else.”
- Rob Alexander, CIO of Capital One
Cloud Security – Design Patterns
Access rights just-in-time
Temporary
Credentials
Integrated Identity and Access
Management
+
Durable, Highly
Available Storage
API Logs
Performance, Network, Apps Logs
Durable and Cheap
Archive Storage
Consolidated Logging
+ +
Streaming
Data
Key Storage on HSMManaged KMI
DIY
ArchiveObject
Storage
Block
Storage
Out-of-band
data transfer
Database Data Warehouse Log Trails
Ubiquitous Encryption
+
Auto-ScalingCompute Instances
Non-Persistent & Elastic
+
Logically Isolated Section
of the Cloud
Network Architecture
Agility
+
Virtual Firewall
+
Leased Line
Virtual Firewall
DNS
Web App Firewall
CDN Auto-scalingScaling Load Balancer
Network Architecture
Resiliency
Event-Driven, Server-Less
Code Execution
Monitor and React swiftly
+
Alarms Based on
Performance, Network, Apps
Standardized Environments
& Security as Code
+
Continuous Configuration
Automation
Software Development
Kit (SDKs)
Validate Change at Scale
+
Inventory, Configuration
History and Change
Baselines Rules for
Inventory and Configuration

Más contenido relacionado

La actualidad más candente

Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdf
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdfAutomating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdf
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdfAmazon Web Services
 
Successful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesSuccessful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesAmazon Web Services
 
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...Amazon Web Services
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology GovernanceAlert Logic
 
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...Amazon Web Services Korea
 
Innovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your BusinessInnovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your BusinessAmazon Web Services
 
Journey to the Public Cloud
Journey to the Public CloudJourney to the Public Cloud
Journey to the Public CloudIdan Tohami
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesAmazon Web Services
 
Enterprise Cloud Adoption
Enterprise Cloud Adoption Enterprise Cloud Adoption
Enterprise Cloud Adoption Tom Laszewski
 
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台Amazon Web Services
 
The Journey to the Hybrid Multi Cloud
The Journey to the Hybrid Multi CloudThe Journey to the Hybrid Multi Cloud
The Journey to the Hybrid Multi CloudIdan Tohami
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSAlert Logic
 
The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesAmazon Web Services
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summits
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueAmazon Web Services
 
Innovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & MicroservicesInnovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & MicroservicesAmazon Web Services
 
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...Amazon Web Services
 
Hybrid Cloud – Enabling a Borderless Data Center for Your Business
Hybrid Cloud – Enabling a Borderless Data Center for Your BusinessHybrid Cloud – Enabling a Borderless Data Center for Your Business
Hybrid Cloud – Enabling a Borderless Data Center for Your BusinessAmazon Web Services
 

La actualidad más candente (20)

Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdf
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdfAutomating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdf
Automating Event Driven Security in the AWS Cloud - AWS Summit SG 2017pdf
 
Successful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial ServicesSuccessful Cloud Adoption in Financial Services
Successful Cloud Adoption in Financial Services
 
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...
Demystifying Cloud Economics – Think Big: How to Build an Investment Case for...
 
Modernizing Technology Governance
Modernizing Technology GovernanceModernizing Technology Governance
Modernizing Technology Governance
 
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...
AWS 활용을 통한 금융권 혁신 사례 소개 :: Felix Candelario :: AWS Fi...
 
Innovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your BusinessInnovating with AWS: How Microservices on AWS Can Transform Your Business
Innovating with AWS: How Microservices on AWS Can Transform Your Business
 
Top Security Myths Dispelled
Top Security Myths DispelledTop Security Myths Dispelled
Top Security Myths Dispelled
 
Journey to the Public Cloud
Journey to the Public CloudJourney to the Public Cloud
Journey to the Public Cloud
 
Leveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business ServicesLeveraging Hybid IT for More Robust Business Services
Leveraging Hybid IT for More Robust Business Services
 
Enterprise Cloud Adoption
Enterprise Cloud Adoption Enterprise Cloud Adoption
Enterprise Cloud Adoption
 
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台
Build in 2019 建立分佈式、開放式、數據中心的人工智慧數據驅動平台
 
The Journey to the Hybrid Multi Cloud
The Journey to the Hybrid Multi CloudThe Journey to the Hybrid Multi Cloud
The Journey to the Hybrid Multi Cloud
 
From the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWSFrom the Trenches: Building Comprehensive and Secure Solutions in AWS
From the Trenches: Building Comprehensive and Secure Solutions in AWS
 
The Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial ServicesThe Cloud Adoption Program for Financial Services
The Cloud Adoption Program for Financial Services
 
Canberra Symposium Keynote
Canberra Symposium KeynoteCanberra Symposium Keynote
Canberra Symposium Keynote
 
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons LearnedAWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
 
How AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and RevenueHow AWS Cloud Analytics Drives Audience Engagement and Revenue
How AWS Cloud Analytics Drives Audience Engagement and Revenue
 
Innovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & MicroservicesInnovation with AWS: DevOps & Microservices
Innovation with AWS: DevOps & Microservices
 
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
Your Business at the Speed of Cloud. Innovate with Cloud-Native App Delivery,...
 
Hybrid Cloud – Enabling a Borderless Data Center for Your Business
Hybrid Cloud – Enabling a Borderless Data Center for Your BusinessHybrid Cloud – Enabling a Borderless Data Center for Your Business
Hybrid Cloud – Enabling a Borderless Data Center for Your Business
 

Similar a AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud-Enabled Security Solutions

Data security in cloud
Data security in cloudData security in cloud
Data security in cloudInterop
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewPriyanka Aash
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XPrime Infoserv
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Moshe Ferber
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Amazon Web Services
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAmazon Web Services
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Amazon Web Services
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportDell EMC World
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingAmazon Web Services
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observabilityitnewsafrica
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSAmazon Web Services
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersJames Strong
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Emrah Alpa, CISSP CEH CCSK
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2rpark31
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranGSTF
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Den Reymer
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudAmazon Web Services
 

Similar a AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud-Enabled Security Solutions (20)

Data security in cloud
Data security in cloudData security in cloud
Data security in cloud
 
ciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overviewciso-platform-annual-summit-2013-Hp enterprise security overview
ciso-platform-annual-summit-2013-Hp enterprise security overview
 
Crush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield XCrush Cloud Complexity, Simplify Security - Shield X
Crush Cloud Complexity, Simplify Security - Shield X
 
Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...Cloud security for banks - the central bank of Israel regulations for cloud s...
Cloud security for banks - the central bank of Israel regulations for cloud s...
 
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
Session Sponsored by Trend Micro: 3 Secrets to Becoming a Cloud Security Supe...
 
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend MicroAWS Summit Auckland Platinum Sponsor presentation - Trend Micro
AWS Summit Auckland Platinum Sponsor presentation - Trend Micro
 
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
Eyes Wide Shut: Cybersecurity Smoke & Mirrors...
 
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
Seeing More Clearly: How Essilor Overcame 3 Common Cloud Security Challenges ...
 
MT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT SupportMT17_Building Integrated and Secure Networks with limited IT Support
MT17_Building Integrated and Secure Networks with limited IT Support
 
CloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security ScalingCloudPassage Best Practices for Automatic Security Scaling
CloudPassage Best Practices for Automatic Security Scaling
 
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security ObservabilityGlenn Lazarus- Why Your Observability Strategy Needs Security Observability
Glenn Lazarus- Why Your Observability Strategy Needs Security Observability
 
Best practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWSBest practices for automating cloud security processes with Evident.io and AWS
Best practices for automating cloud security processes with Evident.io and AWS
 
CSO CXO Series Breakfast
CSO CXO Series BreakfastCSO CXO Series Breakfast
CSO CXO Series Breakfast
 
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS BuildersAWS Cloud Governance & Security through Automation - Atlanta AWS Builders
AWS Cloud Governance & Security through Automation - Atlanta AWS Builders
 
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
Micro Focus SRG Solution Mapping to the New BDDK Regulations for Turkish Fina...
 
Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2Security automation in virtual and cloud environments v2
Security automation in virtual and cloud environments v2
 
Cloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton RavindranCloud Security By Dr. Anton Ravindran
Cloud Security By Dr. Anton Ravindran
 
Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015Gartner: Top 10 Technology Trends 2015
Gartner: Top 10 Technology Trends 2015
 
FireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the CloudFireEye: Seamless Visibility and Detection for the Cloud
FireEye: Seamless Visibility and Detection for the Cloud
 
Rik Ferguson
Rik FergusonRik Ferguson
Rik Ferguson
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsSergiu Bodiu
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyAlfredo García Lavilla
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embeddingZilliz
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...Fwdays
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostZilliz
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenHervé Boutemy
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Último (20)

"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
DevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platformsDevEX - reference for building teams, processes, and platforms
DevEX - reference for building teams, processes, and platforms
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Commit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easyCommit 2024 - Secret Management made easy
Commit 2024 - Secret Management made easy
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Training state-of-the-art general text embedding
Training state-of-the-art general text embeddingTraining state-of-the-art general text embedding
Training state-of-the-art general text embedding
 
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks..."LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
"LLMs for Python Engineers: Advanced Data Analysis and Semantic Kernel",Oleks...
 
SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage CostLeverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
Leverage Zilliz Serverless - Up to 50X Saving for Your Vector Storage Cost
 
DevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache MavenDevoxxFR 2024 Reproducible Builds with Apache Maven
DevoxxFR 2024 Reproducible Builds with Apache Maven
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

AWS at 2017 FS-ISAC APAC Summit: Move Better, Faster and More Securely: Cloud-Enabled Security Solutions

  • 1. Move Better, Faster, and More Securely Cloud-Enabled Security Solutions Pawan Agnihotri– AWS Principal Security Solutions Architect
  • 2. Takeaways from today’s session I. Revolution: Why the Cloud? The Inspirations and Motivations II. Myth Busting: Common Security Misconceptions III. Protection: Benefits of Cloud-Enabled Security for the Enterprise IV. Transformation: Common Best Practices When Migrating to the Cloud
  • 3. Revolution “There has never been a time of greater promise, or one of greater potential peril. Today’s decision-makers, however, are too often trapped in traditional, linear thinking, or too absorbed by the multiple crises demanding their attention, to think strategically about the forces of disruption and innovation shaping our future.” - Klaus Schwab, Founder & Executive Chairman, World Economic Forum
  • 4. 1784 Steam Power Mechanical Production 1870 Electricity Mass Production 1969 Electronics Automated Production Today Cloud IoT Digital We stand on the brink of a technological revolution that will fundamentally alter the way we live, work, and relate to one another. In its scale, scope, and complexity, the transformation will be unlike anything humankind has experienced before. ” “ ” “ - Klaus Schwab, Founder & Executive Chairman, World Economic Forum The First Industrial Revolution used water and steam power to mechanize production. The Second used electric power to create mass production. The Third used electronics and information technology to automate production. Now a Fourth Industrial Revolution is building on the Third, the digital revolution that has been occurring since the middle of the last century. It is characterized by a fusion of technologies that is blurring the lines between the physical, digital, and biological spheres.
  • 5. FinTech Challenger BanksMarket Agility Improved Margins Risk Reduction Onerous Regulations Greater Transparency Improved Responsiveness Responsiveness Resiliency The Digital Agenda Cost Reduction Increased Productivity Inspirations and Motivations for Migration
  • 8. Myth Busting “Cyber security is better in the cloud than it is in private managed data centers.” - Steve Randich, EVP and CIO of FINRA
  • 9. Some API-enabled services Disparate APIs No true control plane Physical concealments Often co-habited Physical vs API Fully API-enabled API homogeneity A “source of truth” control plane Nowhere to hide Nobody can “climb into” your account
  • 10. State of the Art Facilities
  • 12. We’ve helped our FSI customers successfully address regulatory requirements from these agencies, and many others around the world. APAC Regulatory Landscape
  • 13. Tested by Millions and Standardized for all Capital One
  • 14. Protection “We worked closely with the Amazon team to develop a security model, which we believe enables us to operate more securely in the public cloud than we can even in our data centers.” - Rob Alexander, CIO of Capital One
  • 15. 16 Regions – 42 Availability Zones – 68 Edge Locations Region & Number of Availability Zones AWS GovCloud (2) EU Ireland (3) US West Frankfurt (2) Oregon (3) London (2) Northern California (3) Asia Pacific US East Singapore (2) N. Virginia (5) Ohio (3) Sydney (2), Tokyo (3) Seoul (2), Mumbai (2) Canada Central (2) China Beijing (2) South America São Paulo (3) New regions coming soon Paris, Ningxia Deploy Faster Wherever You Like
  • 17. > 90% driven by customers needs 2007 2008 2009 2010 2011 2012 2013 2014 2015 2016 AWS AWS Security Security Innovation: AWS Innovates Constantly 1017 722 516 280 159 82 6148
  • 18. 0 8 14 20 51 71 24 48 61 82 159 235 0 50 100 150 200 250 2008 2009 2010 2011 2012 2013 Security Features All Significant Services & Features 2 per Mov. Avg. (security features) 2 per. Mov. Ag (all significant services & features) Pace of Innovation: Security versus All
  • 19. Multi-Dimensional Protection at Many Layers Secure DMZs Honeypot Perimeter IDS/IPS DLP Message Security (anti-virus, anti-malware) Perimeter Firewall DHS Einstein Web Proxy Control Filtering Enterprise Message Security Inline Patching Enterprise Wireless Security NAC VoIP Protection Enterprise Remote Access DLP Enclave/ Datacenter Firewall Endpoint Security Enforcement Content Security (anti-virus, anti-malware) Host IDS/IPS Desktop Firewall FDCC Compliance Patch Management DLP WAF Dynamic App Testing Database Monitoring/Scanning Database Secure Gateway (Shield) Static App TestingCode Review Identity & Access Management Enterprise Right Management Data Classification Data Integrity Monitoring Data/Drive Encryption DAR/DIM Protection Data Wiping Cleansing PKI SIEM Digital Forensics Security SLA/SLO Reporting Escalation Management Situational Awareness Security Dashboard Focused Ops Continuous Monitoring & Assessment Incident Reporting, Detection, Response (CIRT) SOC/NOC Monitoring (24x7) Continuous C&A Security Awareness Training Vulnerability Assessment Penetration Testing Security Architecture & Design Threat Modeling Cyber Threat Intelligence Security Policies & Compliance IT Security & Governance Enterprise IDS/IPS DLP Risk Management MISSION CRITICAL ASSETS
  • 20. Reaction Time (Inequality thereof…) – Get Ahead Deter Monitor DetectDiagnose Secure Before: Attackers (minutes) > Defenders (days) AFTER: Constant, real-time protection
  • 21. Administration & Security Access Control Identity Management Key Management & Storage Monitoring & Logs Resource & Usage Auditing Platform Services Analytics App Services Developer Tools & Operations Mobile Services Data Pipelines Data Warehouse Hadoop Real-time Streaming Data Application Lifecycle Management Containers Deployment DevOps Event-driven Computing Resource Templates Identity Mobile Analytics Push Notifications Sync App Streaming Email Queuing & Notifications Search Transcoding Workflow Core Services CDN Compute (VMs, Auto-scaling, and Load Balancing) Databases (Relational, NoSQL, and Caching) Networking (VPC, DX, and DNS) Storage (Object, Block, EFS, and Archival) Infrastructure Availability Zones Points of Presence Regions Enterprise Applications Business Email Sharing & Collaboration Virtual Desktop Technical & Business Support Account Management Partner Ecosystem Professional Services Security & Pricing Reports Solutions Architects Support Training & Certification Machine Learning What is Amazon Web Services?
  • 22. Transformation “There’s so much security built into these cloud computing platforms today. For us, it’s our No. 1 priority — it’s not even close, relative to anything else.” - Rob Alexander, CIO of Capital One
  • 23. Cloud Security – Design Patterns
  • 25. Durable, Highly Available Storage API Logs Performance, Network, Apps Logs Durable and Cheap Archive Storage Consolidated Logging + + Streaming Data
  • 26. Key Storage on HSMManaged KMI DIY ArchiveObject Storage Block Storage Out-of-band data transfer Database Data Warehouse Log Trails Ubiquitous Encryption +
  • 28. Logically Isolated Section of the Cloud Network Architecture Agility + Virtual Firewall + Leased Line
  • 29. Virtual Firewall DNS Web App Firewall CDN Auto-scalingScaling Load Balancer Network Architecture Resiliency
  • 30. Event-Driven, Server-Less Code Execution Monitor and React swiftly + Alarms Based on Performance, Network, Apps
  • 31. Standardized Environments & Security as Code + Continuous Configuration Automation Software Development Kit (SDKs)
  • 32. Validate Change at Scale + Inventory, Configuration History and Change Baselines Rules for Inventory and Configuration

Notas del editor

  1. TALKING POINTS: - THE INDUSTRY IS CHANGING, AND THIS CHANGE IS BEING REFERRED TO AS THE “FOURTH INDUSTRIAL REVOLUTION” – THE DIGITAL REVOLUTION. – THIS QUOTE IS FROM THE EXEC CHAIRMAN OF THE WORLD ECONOMIC FORUM FROM THEIR MEETING THIS YEAR AT DAVOS
  2. TALKING POINTS: THIS REVOLUTION IS IN PROGRESS, AND ITS DIFFERENT THAN PRIOR ONES IT WILL FUNDAMENTALLY ALTER HOW WE LIVE, WORK, AND RELATE TO ONE ANOTHER
  3. TALKING POINTS: WE COMMONLY HEAR FROM OUR CUSTOMERS THAT THESE ARE THINGS THAT ARE MOTIVATING THEIR EXPLORATION OF CLOUD. ASK THE CUSTOMER: DO THESE RESONATE WITH YOU? WHAT IS MOTIVATING YOU IN YOUR EXPLORATION OF CLOUD?
  4. For a long time, most organizations have had to make a choice between moving fast or maintaining a high degree of security
  5. However, one of the fundamental benefits of the cloud is that it let’s you do both.
  6. TALKING POINTS: - THE INDUSTRY IS CHANGING, AND THIS CHANGE IS BEING REFERRED TO AS THE “FOURTH INDUSTRIAL REVOLUTION” – THE DIGITAL REVOLUTION. – THIS QUOTE IS FROM THE EXEC CHAIRMAN OF THE WORLD ECONOMIC FORUM FROM THEIR MEETING THIS YEAR AT DAVOS
  7. TALKING POINTS: BASED ON CONFIDENTIALITY, WE’RE NOT ALWAYS PERMITED TO SPEAK OPENLY ABOUT OUR CUSTOMERS IN THE FINANCIAL SERVICES INDUSTRY THE ORGANIZATIONS LISTED ON THIS SLIDE REPRESENT A SMALL # OF THOSE FIRMS THAT ALLOW US TO SPEAK ABOUT THEIR USE OF AWS. WE CAN SPEAK ABOUT EACH OF THESE FIRMS IN VARYING DEGREES OF DEPTH/BREADTH BASED ON EACH ORGANIZATIONS PREFERENCE
  8. TALKING POINTS: - THE INDUSTRY IS CHANGING, AND THIS CHANGE IS BEING REFERRED TO AS THE “FOURTH INDUSTRIAL REVOLUTION” – THE DIGITAL REVOLUTION. – THIS QUOTE IS FROM THE EXEC CHAIRMAN OF THE WORLD ECONOMIC FORUM FROM THEIR MEETING THIS YEAR AT DAVOS
  9. And finally… lots of options for global deployment. Gartner estimates that AWS has significantly more compute capacity than all other major cloud providers combined, and we do that while providing extremely high reliability. We currently provide 15 regions and 40 availability zones (or AZ’s). For us, a region will always contain at least two AZ’s on wholly separate power grids and flood plains, and an AZ is always comprised of multiple data centers to provide redundancy within the AZ. We don’t build single data center regions, because it wouldn’t offer the reliability required for enterprise businesses.   This highly available global network allows you deploy your applications near your customers much faster and simpler than what can be achieved with a traditional model.
  10. SUGGESTED TALKING POINTS: AWS has developed the broadest collection of services available from any cloud provider. Our approach to regions, availability zones, and POPs provides global coverage for high availability, low latency applications. Foundation services across compute, storage, security, and networking offer customers flexibility in their architecture. We have a full spectrum of options to meet most price-to-performance scenarios. We offer the capability for both managed and unmanaged database options. The offerings for Analytics and Application Services enable advanced data processing and workloads. - AWS Redshift, our cloud-based data warehouse, is the fastest growing service in the history of AWS. Our management tools offer a lot of insight and flexibility to let you manage your AWS resources through either our tools or the management tools you’re already familiar with. Recent expansion into enterprise applications has been entirely driven by customer feedback on where they’d like us to deliver value.
  11. TALKING POINTS: - THE INDUSTRY IS CHANGING, AND THIS CHANGE IS BEING REFERRED TO AS THE “FOURTH INDUSTRIAL REVOLUTION” – THE DIGITAL REVOLUTION. – THIS QUOTE IS FROM THE EXEC CHAIRMAN OF THE WORLD ECONOMIC FORUM FROM THEIR MEETING THIS YEAR AT DAVOS
  12. 1: Why it is an “and” 2: How AWS to do it 3: Case study 1: How do I share credentials, manage lifecycle of applications/users. 2: Temporary credentials + two way trust between AWS account (no creds sharing) + Application/3rd Party/Users as well 3:
  13. 1: Encryption is hard. It is a good security hygiene. 2: 3: Omise: Payment uses KMS Talen Energy: an independent nuclear power producer CloudHSM decided to migrate all of their IT assets to AWS because we could meet their operational, regulatory, and security needs through the breadth, depth, and maturity of the platform and people supporting it. Nuclear Regulatory Commission (NRC) and the Federal Energy Regulatory Commission (FERC)
  14. Resiliency against DDoS, against App failure, Infrastructure failure. 12 regions (10 Public, China Region and GovCloud Region) 2016 – Canada, Ohio, India, UK and another China Region 33 Availability zones (adding 11 more in 2016 across new Regions) 54 Edge locations Over 1 million active customers across 190 countries (We define an “active customer” as non-Amazon customers who have account usage activity within the past month)
  15. Get inventory of AWS resources Discover new and deleted resources Record configuration changes continuously Get notified when configurations change