SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved.
Dob  Todorov
Regional  Technology  Officer,  Public  Sector  and  Principal  
Architect  Security  &  Compliance  EMEA
Security  in  the  Cloud  
21st Century  IT  Security
Cloud  
Security
“Based  on  our  experience,  I  believe  that  we  
can  be  even  more  secure  in  the  AWS  cloud  
than  in  our  own  data  centers”
Tom  Soderstrom – CTO  NASA  JPL
Cost  of  Security  on  Premises  /  Hosted  Facility
CapEx OpEx
Technology
(Physical Security,  
Infrastructure,  Power,  
Networking)
£££££ £££
Processes
(standards,  procedures,  
guidelines,  assurance,  
compliance)
£££ ££
People
(hire,  upskill, compensate,  
train,  manage)
££ ££££
Security  and  Business  Value
Security  as  a  “Feature”:
• Qualitative  measure:  either  secure  or  
insecure
• No  added  end  user  value
Objective  Reality:
• Small  or  shrinking  budgets
• Threat  vectors  and  agents  rising  in  
number  and  sophistication
Challenge:
How  do  we  justify  the  cost  of  security?
Cost  of  Security  in  the  Cloud
CapEx OpEx
Technology
(Physical Security,  
Infrastructure,  Power,  
Networking)
-­ -­
Processes
(standards,  procedures,  
guidelines,  assurance,  
compliance)
-­ -­
People
(hire,  upskill, compensate,  
train,  manage)
-­ -­
Infrastructure  secure  &  compliant  at  
no  extra  cost
Cloud  Security  Principles  Compliance
o Issued  1  Apr  2014  by  the  CESG
o They  replace  the  Business  Impact  Levels  model  (BIL:  IL1-­IL5+)
o Distributed  certification  model
o Risk-­based  approach:  suitability  for  purpose
o New  protective  marking  mechanisms
o AWS  Whitepaper  Available
Cyber  Essentials  Plus  Compliance  in  Dublin
Cyber  Essentials  Plus  is  a  UK  Government-­
backed,  industry-­supported  certification  
scheme  that  helps  organisations demonstrate  
security  against  common  cyber  attacks.
The  ‘Plus’  scheme  benefits  from  independent  
testing  and  validation  compared  to  the  
baseline  ‘Cyber  Essentials’  scheme  that  is  
self-­attested.
ISO  27018
Based on certification examination in conformity with defined
requirements in ISO/IEC17021:2011 and ISO/IEC 27006:2011,
the Information Security Management System
as defined and implemented by
headquartered in Seattle, Washington, United States of America,
certified under certification number [2013-009],
is also compliant with the requirements as stated in the standard:
EY CertifyPoint will, according to the certification agreement
dated October 23, 2014, perform surveillance audits and acknowledge the
certificate until the expiration date of this certificate or the expiration of the
related ISMS certificate with number [2013-009].
*This certificate is applicable for the assets, services and locations as described in the
scoping section on the back of this certificate, with regard to the specific requirements
for information security and protection of personally identifiable information (PII)
as stated in Statement of Applicability version 2015,01, approved on September 15, 2015.
ISO/IEC 27018:2014
Issue date of certificate: October 1, 2015
Expiration date of certificate: November 12, 2016
Amazon Web Services, Inc.*
Certificate
Certificate number: 2015-016
Certified by EY CertifyPoint since:
October 1, 2015
© Copyrights with regard to this document reside with Ernst & Young CertifyPoint B.V. headquartered at
Antonio Vivaldistraat 150, 1083 HP Amsterdam, The Netherlands. All rights reserved.
Drs. R. Toppen RA
Director EY CertifyPoint
DIGITAL COPY1/3
o Customers  control  their  content.
o Customers'  content  will  not  be  used  for  any  
unauthorized  purposes.
o Physical  media  is  destroyed  prior  to  leaving  
AWS  data  centers.
o AWS  provides  customers  the  means  to  
delete  their  content.
o AWS  doesn’t  disclose  customers'  content
AWS  Security  Tools
AWS  Trusted  Advisor
AWS  Config Rules
Amazon  Inspector
Periodic  evaluation  of  alignment  with  AWS  Best  
Practices.  Not  just  Security-­related.
Create  rules  that  govern  configuration  of  your  
AWS  resources.  Continuous  evaluation.
Security  insights  into  your  applications.
Runs  on  EC2  instances;;  on-­demand  scans
AWS  Compliance AWS:  Security  of the  cloud
Customer:  Security  in the  cloud
Cloud  Config Rules
Security  by  Design  -­ SbD
• Systematic  approach  to  
ensure  security
• Formalizes  AWS  account  design
• Automates  security  controls
• Streamlines  auditing
• Provides  control  insights  
throughout  the  IT  
management  process
AWS  
CloudTrail
AWS  
CloudHSM
AWS  IAM
AWS  KMS
AWS
Config
GoldBase -­ Scripting  your  governance  policy
Set  of  CloudFormation Templates  &  Reference  
Arhcitectures that  accelerate  compliance  with  PCI,  EU  
Personal  Data  Protection,  HIPAA,  FFIEC,  FISMA,  CJIS
Result:  Reliable  technical  implementation  of  administrative  
controls
What  is  Inspector?
• Application  security  assessment
• Selectable  built-­in  rules
• Security  findings
• Guidance  and  management
• Automatable  via  APIs
Rule  packages
• CVE  (common  vulnerabilities  and  exposures)
• Network  security  best  practices
• Authentication  best  practices
• Operating  system  security  best  practices
• Application  security  best  practices
• PCI  DSS  3.0  readiness
Why  AWS  WAF?
Application  DDoS,  Vulnerabilities,  Abuse
Good  users
Bad  guys
Web  server Database
What  is  AWS  WAF?
Application  DDoS
Good  users
Bad  guys
Web  server Database
AWS
WAF
AWS  WAF  rules:
1:  BLOCK  requests  from  bad  guys.
2:  ALLOW  requests  from  good  guys.
Types  of  conditions  in  rules:
1:  Source  IP/range
2:  String  Match
3:  SQL  Injection
S2N  – AWS  Implementation  of  TLS
• Small:    
• ~6,000  lines  of  code,  all  audited
• ~80%  less  memory  consumed
• Fast:    
• 12%  faster
• Simple:    
• Avoid  rarely  used  options/extensions
VPC  Flow  Logs
Certification  &  Education
• Security  Fundamentals  on  AWS
• free,  online  course  for  security  auditors  and  
analysts
• Security  Operations  on  AWS
• 3-­day  class  for  Security  engineers,  architects,  
analysts,  and  auditors
• AWS  Certification
• Security  is  part  of  all  AWS  exams
Rich  Security  Capabilities  in  the  Cloud
Prepare
Prevent
Detect
Respond
o AWS  Security  Solutions  Architects
o AWS  Professional  Services
o AWS  Secure  by  Design  &  Gold  Base
o AWS  Security  Best  Practices
o Partner  Professional  Services
o AWS  Training  and  Certification
o Understand  Compliance  Requirements
Prepare
o Use  IAM  – consider  MFA,  roles,  federation,  SSO
o Implement  Amazon  WAF
o Leverage  S2N  for  secure  TLS  connections
o Implement  Config Rules  to  enforce  compliance
o Implement  Amazon  Inspector  to  identify  
vulnerabilities  early  on
Prevent
o Cloud  Trail  enabled  across  all  accounts  and  services
o Consider  Config &  Config Rules  logs
o Inspector  can  be  used  as  a  detective  tool
o Trusted  Advisor  goes  beyond  just  security
o Use  CloudWatch logs
o VPC  Flow  Logs  give  insight  into  intended  and  
unintended  communication  taking  place  into  your  VPC
o Do  look  at  partner  log  management  and  security  
monitoring  solutions
Detect
o Be  Prepared:  
o Develop,  acquire  or  hire  Security  Incident  Response  
capabilities
o Test  preparedness  via  game  days
o Automated  response  and  containment  is  always  
better  than  manual  response
o AWS  supports  forensic  investigations
o Leverage  AWS  Support  for  best  results
o Talk  to  our  security  partners
Respond
Be  Secure  &  Compliant  in  
the  Cloud!

Más contenido relacionado

La actualidad más candente

La actualidad más candente (20)

AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Enabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy LawsEnabling Compliance with EU Privacy Laws
Enabling Compliance with EU Privacy Laws
 
Closing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day BrusselsClosing Remarks - AWSome Day Brussels
Closing Remarks - AWSome Day Brussels
 
AWS Well-Architected Review
AWS Well-Architected ReviewAWS Well-Architected Review
AWS Well-Architected Review
 
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First StandardAWS Enterprise Summit London 2015 | Creating a Cloud First Standard
AWS Enterprise Summit London 2015 | Creating a Cloud First Standard
 
Security Architectures on AWS
Security Architectures on AWSSecurity Architectures on AWS
Security Architectures on AWS
 
Intro to AWS: Security
Intro to AWS: SecurityIntro to AWS: Security
Intro to AWS: Security
 
Closing
Closing Closing
Closing
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOpsAutomating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Security and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John HildebrandtSecurity and Compliance Better on AWS_John Hildebrandt
Security and Compliance Better on AWS_John Hildebrandt
 
Aws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon ElishaAws-What You Need to Know_Simon Elisha
Aws-What You Need to Know_Simon Elisha
 
Security Innovations in the Cloud
Security Innovations in the CloudSecurity Innovations in the Cloud
Security Innovations in the Cloud
 
Building Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast SessionBuilding Your Practice on AWS: An APN Breakfast Session
Building Your Practice on AWS: An APN Breakfast Session
 
Mobile Software in AWS Marketplace
Mobile Software in AWS MarketplaceMobile Software in AWS Marketplace
Mobile Software in AWS Marketplace
 
AWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting CertifiedAWS Certification Paths And Tips for Getting Certified
AWS Certification Paths And Tips for Getting Certified
 
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
AWS Cloud Computing Tutorial | Migrating on Premise VM to AWS Cloud | AWS Tra...
 
Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017Automating Compliance for Financial Institutions - AWS Summit SG 2017
Automating Compliance for Financial Institutions - AWS Summit SG 2017
 
re:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loftre:Invent Recap: Security Week at the SF Loft
re:Invent Recap: Security Week at the SF Loft
 
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security DesignsAWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
AWS FSI Symposium 2017 NYC - 9 Cloud Enabled Security Designs
 

Destacado

Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Andrea Rossetti
 
Andrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del softwareAndrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del software
Andrea Rossetti
 
Conte taurons
Conte tauronsConte taurons
Conte taurons
marblocs
 
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in AziendaLuigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
Andrea Rossetti
 
Le leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva AvvedutoLe leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva Avveduto
Andrea Rossetti
 

Destacado (20)

MEDINS Multimedia Labs
MEDINS Multimedia LabsMEDINS Multimedia Labs
MEDINS Multimedia Labs
 
TLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs forTLL Sicily: Building Partnerships for Territorial Living Labs for
TLL Sicily: Building Partnerships for Territorial Living Labs for
 
The Trotternish Landslides
The Trotternish LandslidesThe Trotternish Landslides
The Trotternish Landslides
 
Van gogh
Van goghVan gogh
Van gogh
 
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
Keep Cloud Transformation on Track: Nine Best Practices to Avoid or Break Thr...
 
Leveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global EnvironmentLeveraging On-Demand Compensation Management In A Global Environment
Leveraging On-Demand Compensation Management In A Global Environment
 
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
Stefano Ricci, PRIVACY E SERVIZI DELLA SOCIETA' DELL'INFORMAZIONE (2)
 
Finding Simple - Seat Map Design for Everyone UX Australia 2014
Finding Simple - Seat Map Design for Everyone  UX Australia 2014Finding Simple - Seat Map Design for Everyone  UX Australia 2014
Finding Simple - Seat Map Design for Everyone UX Australia 2014
 
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
Alternative Design Workflows in a Post-PSD Era - WordCamp KC 2014
 
Vergani, RGW 2011 2
Vergani, RGW 2011 2Vergani, RGW 2011 2
Vergani, RGW 2011 2
 
Andrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del softwareAndrea Cavalloni, La tutela del software
Andrea Cavalloni, La tutela del software
 
Conte taurons
Conte tauronsConte taurons
Conte taurons
 
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in AziendaLuigi vannutelli, La dinamica dei Contratti ICT in Azienda
Luigi vannutelli, La dinamica dei Contratti ICT in Azienda
 
Le leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva AvvedutoLe leggi della Second Life: Sveva Avveduto
Le leggi della Second Life: Sveva Avveduto
 
ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由ケーズデンキの販管費比率が低い本当の理由
ケーズデンキの販管費比率が低い本当の理由
 
Het voordeel van de twijfel
Het voordeel van de twijfelHet voordeel van de twijfel
Het voordeel van de twijfel
 
Test statsvisualmethod
Test statsvisualmethodTest statsvisualmethod
Test statsvisualmethod
 
Who we are
Who we areWho we are
Who we are
 
Disaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWSDisaster Recovery of on-premises IT infrastructure with AWS
Disaster Recovery of on-premises IT infrastructure with AWS
 
Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS
 

Similar a AWS Enterprise Summit London 2015 | Security in the Cloud

Similar a AWS Enterprise Summit London 2015 | Security in the Cloud (20)

Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel AvivSecurity & Compliance in the cloud - Pop-up Loft Tel Aviv
Security & Compliance in the cloud - Pop-up Loft Tel Aviv
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
What's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security RoadshowWhat's (nearly) new | AWS Security Roadshow
What's (nearly) new | AWS Security Roadshow
 
Security Day What's (nearly) New
Security Day What's (nearly) NewSecurity Day What's (nearly) New
Security Day What's (nearly) New
 
What's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow DublinWhat's (nearly) new | AWS Security Roadshow Dublin
What's (nearly) new | AWS Security Roadshow Dublin
 
AWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security ModelAWS Webcast - Understanding the AWS Security Model
AWS Webcast - Understanding the AWS Security Model
 
Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101Security and Compliance – Most Commonly Asked Questions - Technical 101
Security and Compliance – Most Commonly Asked Questions - Technical 101
 
Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3Blue Chip Tek Connect and Protect Presentation #3
Blue Chip Tek Connect and Protect Presentation #3
 
Compliance with AWS
Compliance with AWSCompliance with AWS
Compliance with AWS
 
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
Security & Compliance in AWS
Security & Compliance in AWSSecurity & Compliance in AWS
Security & Compliance in AWS
 
AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”AWS Security Overview and “What’s New”
AWS Security Overview and “What’s New”
 
How to Achieve PCI DSS Compliance on AWS
 How to Achieve PCI DSS Compliance on AWS How to Achieve PCI DSS Compliance on AWS
How to Achieve PCI DSS Compliance on AWS
 
AWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & ComplianceAWS Innovate Ottawa: Security & Compliance
AWS Innovate Ottawa: Security & Compliance
 
1. aws security and compliance wwps pre-day sao paolo - markry
1. aws security and compliance   wwps pre-day sao paolo - markry1. aws security and compliance   wwps pre-day sao paolo - markry
1. aws security and compliance wwps pre-day sao paolo - markry
 
Cloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWSCloud Security, Risk and Compliance on AWS
Cloud Security, Risk and Compliance on AWS
 
(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise(SEC303) Architecting for End-To-End Security in the Enterprise
(SEC303) Architecting for End-To-End Security in the Enterprise
 
Simplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing ZoneSimplify & Standardise your migration to AWS with a Migration Landing Zone
Simplify & Standardise your migration to AWS with a Migration Landing Zone
 

Más de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Safe Software
 

Último (20)

Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024Manulife - Insurer Transformation Award 2024
Manulife - Insurer Transformation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu SubbuApidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
Apidays Singapore 2024 - Modernizing Securities Finance by Madhu Subbu
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
Strategies for Unlocking Knowledge Management in Microsoft 365 in the Copilot...
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 
Corporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptxCorporate and higher education May webinar.pptx
Corporate and higher education May webinar.pptx
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 

AWS Enterprise Summit London 2015 | Security in the Cloud

  • 1. ©  2015,  Amazon  Web  Services,  Inc.  or  its  Affiliates.  All  rights  reserved. Dob  Todorov Regional  Technology  Officer,  Public  Sector  and  Principal   Architect  Security  &  Compliance  EMEA Security  in  the  Cloud  
  • 2. 21st Century  IT  Security Cloud   Security
  • 3. “Based  on  our  experience,  I  believe  that  we   can  be  even  more  secure  in  the  AWS  cloud   than  in  our  own  data  centers” Tom  Soderstrom – CTO  NASA  JPL
  • 4. Cost  of  Security  on  Premises  /  Hosted  Facility CapEx OpEx Technology (Physical Security,   Infrastructure,  Power,   Networking) £££££ £££ Processes (standards,  procedures,   guidelines,  assurance,   compliance) £££ ££ People (hire,  upskill, compensate,   train,  manage) ££ ££££
  • 5. Security  and  Business  Value Security  as  a  “Feature”: • Qualitative  measure:  either  secure  or   insecure • No  added  end  user  value Objective  Reality: • Small  or  shrinking  budgets • Threat  vectors  and  agents  rising  in   number  and  sophistication Challenge: How  do  we  justify  the  cost  of  security?
  • 6. Cost  of  Security  in  the  Cloud CapEx OpEx Technology (Physical Security,   Infrastructure,  Power,   Networking) -­ -­ Processes (standards,  procedures,   guidelines,  assurance,   compliance) -­ -­ People (hire,  upskill, compensate,   train,  manage) -­ -­ Infrastructure  secure  &  compliant  at   no  extra  cost
  • 7. Cloud  Security  Principles  Compliance o Issued  1  Apr  2014  by  the  CESG o They  replace  the  Business  Impact  Levels  model  (BIL:  IL1-­IL5+) o Distributed  certification  model o Risk-­based  approach:  suitability  for  purpose o New  protective  marking  mechanisms o AWS  Whitepaper  Available
  • 8. Cyber  Essentials  Plus  Compliance  in  Dublin Cyber  Essentials  Plus  is  a  UK  Government-­ backed,  industry-­supported  certification   scheme  that  helps  organisations demonstrate   security  against  common  cyber  attacks. The  ‘Plus’  scheme  benefits  from  independent   testing  and  validation  compared  to  the   baseline  ‘Cyber  Essentials’  scheme  that  is   self-­attested.
  • 9. ISO  27018 Based on certification examination in conformity with defined requirements in ISO/IEC17021:2011 and ISO/IEC 27006:2011, the Information Security Management System as defined and implemented by headquartered in Seattle, Washington, United States of America, certified under certification number [2013-009], is also compliant with the requirements as stated in the standard: EY CertifyPoint will, according to the certification agreement dated October 23, 2014, perform surveillance audits and acknowledge the certificate until the expiration date of this certificate or the expiration of the related ISMS certificate with number [2013-009]. *This certificate is applicable for the assets, services and locations as described in the scoping section on the back of this certificate, with regard to the specific requirements for information security and protection of personally identifiable information (PII) as stated in Statement of Applicability version 2015,01, approved on September 15, 2015. ISO/IEC 27018:2014 Issue date of certificate: October 1, 2015 Expiration date of certificate: November 12, 2016 Amazon Web Services, Inc.* Certificate Certificate number: 2015-016 Certified by EY CertifyPoint since: October 1, 2015 © Copyrights with regard to this document reside with Ernst & Young CertifyPoint B.V. headquartered at Antonio Vivaldistraat 150, 1083 HP Amsterdam, The Netherlands. All rights reserved. Drs. R. Toppen RA Director EY CertifyPoint DIGITAL COPY1/3 o Customers  control  their  content. o Customers'  content  will  not  be  used  for  any   unauthorized  purposes. o Physical  media  is  destroyed  prior  to  leaving   AWS  data  centers. o AWS  provides  customers  the  means  to   delete  their  content. o AWS  doesn’t  disclose  customers'  content
  • 10. AWS  Security  Tools AWS  Trusted  Advisor AWS  Config Rules Amazon  Inspector Periodic  evaluation  of  alignment  with  AWS  Best   Practices.  Not  just  Security-­related. Create  rules  that  govern  configuration  of  your   AWS  resources.  Continuous  evaluation. Security  insights  into  your  applications. Runs  on  EC2  instances;;  on-­demand  scans AWS  Compliance AWS:  Security  of the  cloud Customer:  Security  in the  cloud
  • 11.
  • 13. Security  by  Design  -­ SbD • Systematic  approach  to   ensure  security • Formalizes  AWS  account  design • Automates  security  controls • Streamlines  auditing • Provides  control  insights   throughout  the  IT   management  process AWS   CloudTrail AWS   CloudHSM AWS  IAM AWS  KMS AWS Config
  • 14. GoldBase -­ Scripting  your  governance  policy Set  of  CloudFormation Templates  &  Reference   Arhcitectures that  accelerate  compliance  with  PCI,  EU   Personal  Data  Protection,  HIPAA,  FFIEC,  FISMA,  CJIS Result:  Reliable  technical  implementation  of  administrative   controls
  • 15. What  is  Inspector? • Application  security  assessment • Selectable  built-­in  rules • Security  findings • Guidance  and  management • Automatable  via  APIs
  • 16. Rule  packages • CVE  (common  vulnerabilities  and  exposures) • Network  security  best  practices • Authentication  best  practices • Operating  system  security  best  practices • Application  security  best  practices • PCI  DSS  3.0  readiness
  • 17. Why  AWS  WAF? Application  DDoS,  Vulnerabilities,  Abuse Good  users Bad  guys Web  server Database
  • 18. What  is  AWS  WAF? Application  DDoS Good  users Bad  guys Web  server Database AWS WAF AWS  WAF  rules: 1:  BLOCK  requests  from  bad  guys. 2:  ALLOW  requests  from  good  guys. Types  of  conditions  in  rules: 1:  Source  IP/range 2:  String  Match 3:  SQL  Injection
  • 19. S2N  – AWS  Implementation  of  TLS • Small:     • ~6,000  lines  of  code,  all  audited • ~80%  less  memory  consumed • Fast:     • 12%  faster • Simple:     • Avoid  rarely  used  options/extensions
  • 21. Certification  &  Education • Security  Fundamentals  on  AWS • free,  online  course  for  security  auditors  and   analysts • Security  Operations  on  AWS • 3-­day  class  for  Security  engineers,  architects,   analysts,  and  auditors • AWS  Certification • Security  is  part  of  all  AWS  exams
  • 22. Rich  Security  Capabilities  in  the  Cloud Prepare Prevent Detect Respond
  • 23. o AWS  Security  Solutions  Architects o AWS  Professional  Services o AWS  Secure  by  Design  &  Gold  Base o AWS  Security  Best  Practices o Partner  Professional  Services o AWS  Training  and  Certification o Understand  Compliance  Requirements Prepare
  • 24. o Use  IAM  – consider  MFA,  roles,  federation,  SSO o Implement  Amazon  WAF o Leverage  S2N  for  secure  TLS  connections o Implement  Config Rules  to  enforce  compliance o Implement  Amazon  Inspector  to  identify   vulnerabilities  early  on Prevent
  • 25. o Cloud  Trail  enabled  across  all  accounts  and  services o Consider  Config &  Config Rules  logs o Inspector  can  be  used  as  a  detective  tool o Trusted  Advisor  goes  beyond  just  security o Use  CloudWatch logs o VPC  Flow  Logs  give  insight  into  intended  and   unintended  communication  taking  place  into  your  VPC o Do  look  at  partner  log  management  and  security   monitoring  solutions Detect
  • 26. o Be  Prepared:   o Develop,  acquire  or  hire  Security  Incident  Response   capabilities o Test  preparedness  via  game  days o Automated  response  and  containment  is  always   better  than  manual  response o AWS  supports  forensic  investigations o Leverage  AWS  Support  for  best  results o Talk  to  our  security  partners Respond
  • 27.
  • 28. Be  Secure  &  Compliant  in   the  Cloud!