SlideShare una empresa de Scribd logo
1 de 34
Descargar para leer sin conexión
Cyber Security – Scenari e strategie
Jusef Khamlichi, Information & Cyber Security Advisor, P4I
1
Source:GlobalRisks2017WorldEconomicForum
World Economic Forum:
• i cyber attacks rappresentano una minaccia
molto probabile con un elevato impatto
Rapporto Clusit:
• un danno economico complessivo di circa 500
miliardi di dollari
• Dal 2014 al 2018: +78% di attacchi gravi
• Nel biennio 18-19 il numero degli attacchi gravi
cresce di 10 volte rispetto al precedente biennio
2
Le vittime
3
La crescita del cybercrime
4
Malware e phishing ANCORA (!?!?) la principale minaccia!
5
I rischi «pro-capite»
6
Cosa accade ai nostri device
7
Continuiamo a gestire molti “piccoli” incidenti
8
Tecniche di attacco
Il più grave attacco di sempre, 10 Miliardi US$
+104%
+88%
ExPetr/NotPetya
Phishing
Account Cracking
9
Le tecnologie contano…
10
… anche perchè noi dobbiamo lasciare delle porte aperte…
11
I costi dell’insicurezza
12
GRAZIE
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security Governance on AWS
14
Carmela Gambardella
AWS Solutions Architect – Public Sector
Giuseppe Russo
AWS Security Assurance Manager
November 2019
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
A Definition
Security governance is meant to support business objectives
by defining policies & controls to manage risk
Framework Policies Business Outcomes Manage Risks
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Strengthen your security posture
Over 50 global
compliance certifications
& accreditations
Benefit from AWS
industry leading security
teams 24/7,
365 days a year
World-class network
performance
and capabilities
Security infrastructure
built to satisfy military,
global banks, and other
high-sensitivity organizations
“Based on our experience, I believe that we can be even more
secure in the AWS Cloud than in our own data center.”
Tom Soderstrom – CTO NASA JPL
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
The shared responsibility model
CUSTOMER DATA
PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT
OPERATION SYSTEM, NETWORK & FIREWALL, CONFIGURATION
CLIENT-SIDE DATA ENCRYPTION
& DATA INTEGRITY AUTHENTICATION
SERVER-SIDE ENCRYPTION
(FILE SYSTEM AND/OR DATA)
NETWORK TRAFFIC PROTECTION
(ENCRYPTION/INTEGRITY/IDENTITY)
RESPONSIBLE
FOR
SECURITY
“IN” THE CLOUD
CUSTOMERS
RESPONSIBLE
FOR
SECURITY
“OF” THE CLOUD
SOFTWARE
HARDWARE / AWS GLOBAL INFRASTRUCTURE
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
CSA
Cloud Security
Alliance Controls
ISO 9001
Global Quality
Standard
ISO 27001
Security Management
Controls
ISO 27017
Cloud Specific
Controls
ISO 27018
Personal Data
Protection
PCI DSS Level 1
Payment Card
Standards
SOC 1
Audit Controls
Report
SOC 2
Security, Availability, &
Confidentiality Report
SOC 3
General Controls
Report
Global United States
CJIS
Criminal Justice
Information Services
DoD SRG
DoD Data
Processing
FedRAMP
Government Data
Standards
FERPA
Educational
Privacy Act
FIPS
Government Security
Standards
FISMA
Federal Information
Security Management
GxP
Quality Guidelines
and Regulations
ISO FFIEC
Financial Institutions
Regulation
HIPAA
Protected Health
Information
ITAR
International Arms
Regulations
MPAA
Protected Media
Content
NIST
National Institute of
Standards and Technology
SEC Rule 17a-4(f)
Financial Data
Standards
VPAT/Section 508
Accountability
Standards
Asia Pacific
FISC [Japan]
Financial Industry
Information Systems
IRAP [Australia]
Australian Security
Standards
K-ISMS [Korea]
Korean Information
Security
MTCS Tier 3 [Singapore]
Multi-Tier Cloud
Security Standard
My Number Act [Japan]
Personal Information
Protection
Europe
C5 [Germany]
Operational Security
Attestation
Cyber Essentials
Plus [UK]
Cyber Threat
Protection
G-Cloud [UK]
UK Government
Standards
IT-Grundschutz
[Germany]
Baseline Protection
Methodology
X P
G
Complying with virtually every regulatory agency
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
What about GDPR compliance?
All AWS services can be used in compliance with
the General Data Protection Regulation (GDPR)
«Navigating GDPR Compliance on AWS» whitepaper:
• Explains the role that AWS plays in your GDPR compliance process
• Shows how AWS can help your organization accelerate the process of aligning your compliance
programs to the GDPR by using AWS Cloud Services
https://d1.awsstatic.com/whitepapers/compliance/GDPR_Compliance_on_AWS.pdf
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Identity, directory,
and access
IAM
Manage user access and
encryption keys
Single Sign-On
Cloud single sign-on for AWS accounts
and business apps
Directory Service
Host and manage Microsoft
Active Directory
Organizations
Manage settings for multiple accounts
Resource Access Manager
Share resources across multiple accounts
Secrets Manager
Rotate, manage, and retrieve secrets
Cognito
Identity management for your apps
Detective controls
and Management
Security Hub
Centrally view and manage security alerts
and automate compliance checks
GuardDuty
Continuous threat detection & monitoring
Service Catalog
Create and use standardized products
Launch Templates
Standardize deployments
across resources
Config
Track resource inventory and changes
CloudTrail
Track user activity and API usage
CloudWatch
Monitor resources and applications
Inspector
Analyze application security
Artifact
Self-service for AWS’ compliance reports
Data
protection
Key Management Service
Manage creation and control of encryption
keys
Certificate Manager
Provision, manage, and deploy
SSL/TSL certificates
ACM Private CA
Private certificate authority
CloudHSM
Hardware-based key storage
Macie
Discover, classify, and protect data
Server-side Encryption
Flexible data encryption options
Encrypted Boot & EBS volumes
Networking and
infrastructure
Virtual Private Cloud
Isolated cloud resources
VPC Flow Logs
Elastic Load Balancing
Secure network and application
load balancing
Web Application Firewall
Filter malicious web traffic
Shield
DDoS protection
Firewall Manager
Manage WAF rules across accounts
PrivateLink
Securely access services hosted on AWS
Best security building blocks in the cloud
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Security as Code
21
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
DevOps: AWS Code Tools and Services
22
AWS
CodeBuild
+ Third
Party
Source Build Test Deploy Monitor
AWS CodeCommit AWS CodeBuild AWS CodeDeploy
AWS CodePipeline
AWS CodeStar
Amazon CloudWatch
AWS CloudTrail
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS DevOps Portfolio - Security as Code
Software development and
continuous delivery toolchain
Infrastructure as Code
Security as Code
Monitoring and Logging
AWS CodeStar
AWS CodeCommit
AWS CodeBuild
AWS CodeDeploy
AWS CodePipeline
AWS CloudFormation
AWS OpsWorks
AWS Config
Amazon CloudWatch
AWS CloudTrail
AWS X-Ray
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Threat Detection: Log Data Inputs
Monitor apps using log
data, store & access log
files
Amazon
CloudWatch
Logs
Track user activity
and API usage
AWS CloudTrail
IP traffic to/from
network
interfaces in a
VPC
VPC Flow Logs
Log of DNS
queries in a VPC
when using the
VPC DNS resolver
DNS Logs
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Threat Detection: Machine Learning
25
Intelligent threat detection
and continuous monitoring
to protect your AWS
accounts and workloads
Machine learning-powered
security service to discover,
classify & protect sensitive
data
Amazon GuardDuty Amazon Macie
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Threat Detection: Introducing AWS Security Hub
• Comprehensive view of your security state within AWS.
• Aggregates security findings and alerts generated by other AWS security services.
• Analyze security trends and identify the highest priority security issues
AWS Security Hub
Security
findings
providers
Findings
Insights
AWS Security
Partners
Amazon Inspector Amazon GuardDuty Amazon Macie
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Threat Remediation: Automation
27
AWS Lambda
Run code for virtually
any kind of application
or backend service –
zero administration
AWS Systems
Manager
Automate patching and proactively
mitigate threats at the instance
level
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Taking Action with Security Hub
AWS
Security
Hub
Amazon
CloudWatch
Events
Amazon GuardDuty
Amazon Inspector
Amazon Macie
Partner Solutions
!
Target options
Partner Solutions
AWS Services
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
“Taking Action”
AWS
Security Hub
Amazon
CloudWatch
Events
Partners forwarding findings into AWS Security Hub
Amazon
GuardDuty
Amazon
Inspector
Amazon
Macie
AWS Security Services Forwarding
findings into AWS Security Hub
Partner integrations
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Scenario
AWS
Security
Hub
Amazon
CloudWatch
Events
Amazon GuardDuty
Amazon Inspector
Amazon Macie
Partner Solutions
!
Target option
AWS
Lambda Amazon Simple
Notification Service
Operation
Team
📃 Findings
Sec Team
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
AWS Foundational and Layered Security Services
Protect Detect Respond
Automate
Investigate
RecoverIdentify
AWS Systems
Manager
AWS Config
AWS
Lambda
Amazon
CloudWatch
Amazon
Inspector
Amazon
Macie
Amazon
GuardDuty
AWS
Security Hub
AWS IoT
Device
Defender
KMSIAM
AWS
Single
Sign-On
Snapshot Archive
AWS
CloudTrail
Amazon
CloudWatch
Amazon
VPC
AWS
WAF
AWS Shield AWS Secrets
Manager
AWS
Firewall
Manager
AWS
Organizations
Personal Health
Dashboard
Amazon
Route 53
AWS
Direct
Connect
AWS Transit
Gateway
Amazon
VPC
PrivateLink
AWS Step
Functions
Amazon
Cloud
Directory
AWS
CloudHSM
AWS
Certificate
Manager
AWS
Control
Tower
AWS Service
Catalog
AWS Well-
Architected
Tool
AWS
Trusted
Advisor
Resource
Access
manager
AWS
Directory
Service
Amazon
Cognito
Amazon S3
Glacier
AWS
Security Hub
AWS Systems
Manager AWS CloudFormation
AWS
OpsWorks
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
© 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved.
Web Resources
AWS Cloud Security
https://aws.amazon.com/security/
AWS Security Fundamentals
https://aws.amazon.com/training/course-
descriptions/security-fundamentals/
GDPR Center
https://aws.amazon.com/it/compliance/gdpr-
center/
AWS for Public Sector
https://aws.amazon.com/it/government-
education/italy-digital-future/
© 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved.
lla
hitect – Public Sector
n.it
bblico

Más contenido relacionado

La actualidad más candente

Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
Amazon Web Services
 
AWS雲端自動化合規檢核與資安警訊通報管理
AWS雲端自動化合規檢核與資安警訊通報管理AWS雲端自動化合規檢核與資安警訊通報管理
AWS雲端自動化合規檢核與資安警訊通報管理
Amazon Web Services
 
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
Amazon Web Services
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Amazon Web Services
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
Amazon Web Services
 

La actualidad más candente (20)

AWS Security Deep Dive
AWS Security Deep DiveAWS Security Deep Dive
AWS Security Deep Dive
 
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019Transforming Enterprise IT - Virtual Transformation Day Feb 2019
Transforming Enterprise IT - Virtual Transformation Day Feb 2019
 
Protect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced AttacksProtect your applications from DDoS/BOT & Advanced Attacks
Protect your applications from DDoS/BOT & Advanced Attacks
 
AWS雲端自動化合規檢核與資安警訊通報管理
AWS雲端自動化合規檢核與資安警訊通報管理AWS雲端自動化合規檢核與資安警訊通報管理
AWS雲端自動化合規檢核與資安警訊通報管理
 
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
如何應用 AWS AIoT 幫助醫療產業面對 Covid-19
 
AWS 資料數據與 IoT
AWS 資料數據與 IoTAWS 資料數據與 IoT
AWS 資料數據與 IoT
 
Best Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network AttackBest Practices to Mitigate from the Emerging Vectors of Network Attack
Best Practices to Mitigate from the Emerging Vectors of Network Attack
 
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019 Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
Using analytics to set access controls in AWS - SDD204 - AWS re:Inforce 2019
 
Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018
Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018
Transforming your Business Ops Team for Cloud - AWS Summit Sydney 2018
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
去中心化身分識別-Decentralized-Identifiers-如何改變著未來的網路型態?
去中心化身分識別-Decentralized-Identifiers-如何改變著未來的網路型態?去中心化身分識別-Decentralized-Identifiers-如何改變著未來的網路型態?
去中心化身分識別-Decentralized-Identifiers-如何改變著未來的網路型態?
 
AWS and Cloud Foundations
AWS and Cloud FoundationsAWS and Cloud Foundations
AWS and Cloud Foundations
 
Education : Digital transformation & AWS Foundations
Education : Digital transformation & AWS FoundationsEducation : Digital transformation & AWS Foundations
Education : Digital transformation & AWS Foundations
 
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...Building a security knowledge management platform for AWS - FND224 - AWS re:I...
Building a security knowledge management platform for AWS - FND224 - AWS re:I...
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Open Data on AWS
Open Data on AWSOpen Data on AWS
Open Data on AWS
 
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
 Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
Big Data Meets AI - Driving Insights and Adding Intelligence to Your Solutions
 
AWS Serverless per startup: come innovare senza preoccuparsi dei server
AWS Serverless per startup: come innovare senza preoccuparsi dei serverAWS Serverless per startup: come innovare senza preoccuparsi dei server
AWS Serverless per startup: come innovare senza preoccuparsi dei server
 
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019 It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
It’s in my backlog: The truth behind DevSecOps - FND217 - AWS re:Inforce 2019
 
Implementing Governance as Code
Implementing Governance as CodeImplementing Governance as Code
Implementing Governance as Code
 

Similar a Cybersecurity: scenario e strategie.

Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation Security
Amazon Web Services
 

Similar a Cybersecurity: scenario e strategie. (20)

AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in awsAWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
AWS Technical Day Riyadh Nov 2019 - Scaling threat detection and response in aws
 
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
Accelerated Threat Detection: Alert Logic and AWS - DEM02-R - AWS re:Inforce ...
 
Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...Continuous security monitoring and threat detection with AWS services - SEC20...
Continuous security monitoring and threat detection with AWS services - SEC20...
 
Introduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF LoftIntroduction to AWS Security: Security Week at the SF Loft
Introduction to AWS Security: Security Week at the SF Loft
 
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
Find all the threats - AWS threat detection and remediation - SEC202 - Atlant...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ... How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
How to Leverage Traffic Analysis to Navigate through Cloudy Skies - DEM03-R ...
 
Secure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on SecuritySecure & Automate AWS Deployments with Next-Generation on Security
Secure & Automate AWS Deployments with Next-Generation on Security
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS Threat Detection and Mitigation at Scale on AWS
Threat Detection and Mitigation at Scale on AWS
 
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
Find all the threats: AWS threat detection and mitigation - SEC302 - Santa Cl...
 
Proteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWSProteggere applicazioni e dati nel cloud AWS
Proteggere applicazioni e dati nel cloud AWS
 
Secure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation SecuritySecure and Automate AWS Deployments with Next Generation Security
Secure and Automate AWS Deployments with Next Generation Security
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS SummitThreat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
Threat Detection and Mitigation at Scale on AWS - SID301 - Atlanta AWS Summit
 
AWS - Security & Compliance
AWS - Security & ComplianceAWS - Security & Compliance
AWS - Security & Compliance
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 

Más de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 
Come costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWSCome costruire un'architettura Serverless nel Cloud AWS
Come costruire un'architettura Serverless nel Cloud AWS
 

Cybersecurity: scenario e strategie.

  • 1. Cyber Security – Scenari e strategie Jusef Khamlichi, Information & Cyber Security Advisor, P4I
  • 2. 1 Source:GlobalRisks2017WorldEconomicForum World Economic Forum: • i cyber attacks rappresentano una minaccia molto probabile con un elevato impatto Rapporto Clusit: • un danno economico complessivo di circa 500 miliardi di dollari • Dal 2014 al 2018: +78% di attacchi gravi • Nel biennio 18-19 il numero degli attacchi gravi cresce di 10 volte rispetto al precedente biennio
  • 4. 3 La crescita del cybercrime
  • 5. 4 Malware e phishing ANCORA (!?!?) la principale minaccia!
  • 7. 6 Cosa accade ai nostri device
  • 8. 7 Continuiamo a gestire molti “piccoli” incidenti
  • 9. 8 Tecniche di attacco Il più grave attacco di sempre, 10 Miliardi US$ +104% +88% ExPetr/NotPetya Phishing Account Cracking
  • 11. 10 … anche perchè noi dobbiamo lasciare delle porte aperte…
  • 13. 12
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security Governance on AWS 14 Carmela Gambardella AWS Solutions Architect – Public Sector Giuseppe Russo AWS Security Assurance Manager November 2019
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. A Definition Security governance is meant to support business objectives by defining policies & controls to manage risk Framework Policies Business Outcomes Manage Risks
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Strengthen your security posture Over 50 global compliance certifications & accreditations Benefit from AWS industry leading security teams 24/7, 365 days a year World-class network performance and capabilities Security infrastructure built to satisfy military, global banks, and other high-sensitivity organizations “Based on our experience, I believe that we can be even more secure in the AWS Cloud than in our own data center.” Tom Soderstrom – CTO NASA JPL
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. The shared responsibility model CUSTOMER DATA PLATFORM, APPLICATIONS, IDENTITY & ACCESS MANAGEMENT OPERATION SYSTEM, NETWORK & FIREWALL, CONFIGURATION CLIENT-SIDE DATA ENCRYPTION & DATA INTEGRITY AUTHENTICATION SERVER-SIDE ENCRYPTION (FILE SYSTEM AND/OR DATA) NETWORK TRAFFIC PROTECTION (ENCRYPTION/INTEGRITY/IDENTITY) RESPONSIBLE FOR SECURITY “IN” THE CLOUD CUSTOMERS RESPONSIBLE FOR SECURITY “OF” THE CLOUD SOFTWARE HARDWARE / AWS GLOBAL INFRASTRUCTURE
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. CSA Cloud Security Alliance Controls ISO 9001 Global Quality Standard ISO 27001 Security Management Controls ISO 27017 Cloud Specific Controls ISO 27018 Personal Data Protection PCI DSS Level 1 Payment Card Standards SOC 1 Audit Controls Report SOC 2 Security, Availability, & Confidentiality Report SOC 3 General Controls Report Global United States CJIS Criminal Justice Information Services DoD SRG DoD Data Processing FedRAMP Government Data Standards FERPA Educational Privacy Act FIPS Government Security Standards FISMA Federal Information Security Management GxP Quality Guidelines and Regulations ISO FFIEC Financial Institutions Regulation HIPAA Protected Health Information ITAR International Arms Regulations MPAA Protected Media Content NIST National Institute of Standards and Technology SEC Rule 17a-4(f) Financial Data Standards VPAT/Section 508 Accountability Standards Asia Pacific FISC [Japan] Financial Industry Information Systems IRAP [Australia] Australian Security Standards K-ISMS [Korea] Korean Information Security MTCS Tier 3 [Singapore] Multi-Tier Cloud Security Standard My Number Act [Japan] Personal Information Protection Europe C5 [Germany] Operational Security Attestation Cyber Essentials Plus [UK] Cyber Threat Protection G-Cloud [UK] UK Government Standards IT-Grundschutz [Germany] Baseline Protection Methodology X P G Complying with virtually every regulatory agency
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. What about GDPR compliance? All AWS services can be used in compliance with the General Data Protection Regulation (GDPR) «Navigating GDPR Compliance on AWS» whitepaper: • Explains the role that AWS plays in your GDPR compliance process • Shows how AWS can help your organization accelerate the process of aligning your compliance programs to the GDPR by using AWS Cloud Services https://d1.awsstatic.com/whitepapers/compliance/GDPR_Compliance_on_AWS.pdf
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Identity, directory, and access IAM Manage user access and encryption keys Single Sign-On Cloud single sign-on for AWS accounts and business apps Directory Service Host and manage Microsoft Active Directory Organizations Manage settings for multiple accounts Resource Access Manager Share resources across multiple accounts Secrets Manager Rotate, manage, and retrieve secrets Cognito Identity management for your apps Detective controls and Management Security Hub Centrally view and manage security alerts and automate compliance checks GuardDuty Continuous threat detection & monitoring Service Catalog Create and use standardized products Launch Templates Standardize deployments across resources Config Track resource inventory and changes CloudTrail Track user activity and API usage CloudWatch Monitor resources and applications Inspector Analyze application security Artifact Self-service for AWS’ compliance reports Data protection Key Management Service Manage creation and control of encryption keys Certificate Manager Provision, manage, and deploy SSL/TSL certificates ACM Private CA Private certificate authority CloudHSM Hardware-based key storage Macie Discover, classify, and protect data Server-side Encryption Flexible data encryption options Encrypted Boot & EBS volumes Networking and infrastructure Virtual Private Cloud Isolated cloud resources VPC Flow Logs Elastic Load Balancing Secure network and application load balancing Web Application Firewall Filter malicious web traffic Shield DDoS protection Firewall Manager Manage WAF rules across accounts PrivateLink Securely access services hosted on AWS Best security building blocks in the cloud
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. Security as Code 21
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. DevOps: AWS Code Tools and Services 22 AWS CodeBuild + Third Party Source Build Test Deploy Monitor AWS CodeCommit AWS CodeBuild AWS CodeDeploy AWS CodePipeline AWS CodeStar Amazon CloudWatch AWS CloudTrail
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS DevOps Portfolio - Security as Code Software development and continuous delivery toolchain Infrastructure as Code Security as Code Monitoring and Logging AWS CodeStar AWS CodeCommit AWS CodeBuild AWS CodeDeploy AWS CodePipeline AWS CloudFormation AWS OpsWorks AWS Config Amazon CloudWatch AWS CloudTrail AWS X-Ray
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Threat Detection: Log Data Inputs Monitor apps using log data, store & access log files Amazon CloudWatch Logs Track user activity and API usage AWS CloudTrail IP traffic to/from network interfaces in a VPC VPC Flow Logs Log of DNS queries in a VPC when using the VPC DNS resolver DNS Logs
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Threat Detection: Machine Learning 25 Intelligent threat detection and continuous monitoring to protect your AWS accounts and workloads Machine learning-powered security service to discover, classify & protect sensitive data Amazon GuardDuty Amazon Macie
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Threat Detection: Introducing AWS Security Hub • Comprehensive view of your security state within AWS. • Aggregates security findings and alerts generated by other AWS security services. • Analyze security trends and identify the highest priority security issues AWS Security Hub Security findings providers Findings Insights AWS Security Partners Amazon Inspector Amazon GuardDuty Amazon Macie
  • 28. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Threat Remediation: Automation 27 AWS Lambda Run code for virtually any kind of application or backend service – zero administration AWS Systems Manager Automate patching and proactively mitigate threats at the instance level
  • 29. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Taking Action with Security Hub AWS Security Hub Amazon CloudWatch Events Amazon GuardDuty Amazon Inspector Amazon Macie Partner Solutions ! Target options Partner Solutions AWS Services
  • 30. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. “Taking Action” AWS Security Hub Amazon CloudWatch Events Partners forwarding findings into AWS Security Hub Amazon GuardDuty Amazon Inspector Amazon Macie AWS Security Services Forwarding findings into AWS Security Hub Partner integrations
  • 31. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Scenario AWS Security Hub Amazon CloudWatch Events Amazon GuardDuty Amazon Inspector Amazon Macie Partner Solutions ! Target option AWS Lambda Amazon Simple Notification Service Operation Team 📃 Findings Sec Team
  • 32. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. AWS Foundational and Layered Security Services Protect Detect Respond Automate Investigate RecoverIdentify AWS Systems Manager AWS Config AWS Lambda Amazon CloudWatch Amazon Inspector Amazon Macie Amazon GuardDuty AWS Security Hub AWS IoT Device Defender KMSIAM AWS Single Sign-On Snapshot Archive AWS CloudTrail Amazon CloudWatch Amazon VPC AWS WAF AWS Shield AWS Secrets Manager AWS Firewall Manager AWS Organizations Personal Health Dashboard Amazon Route 53 AWS Direct Connect AWS Transit Gateway Amazon VPC PrivateLink AWS Step Functions Amazon Cloud Directory AWS CloudHSM AWS Certificate Manager AWS Control Tower AWS Service Catalog AWS Well- Architected Tool AWS Trusted Advisor Resource Access manager AWS Directory Service Amazon Cognito Amazon S3 Glacier AWS Security Hub AWS Systems Manager AWS CloudFormation AWS OpsWorks
  • 33. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. © 2019, Amazon Web Services, Inc. or Its Affiliates. All rights reserved. Web Resources AWS Cloud Security https://aws.amazon.com/security/ AWS Security Fundamentals https://aws.amazon.com/training/course- descriptions/security-fundamentals/ GDPR Center https://aws.amazon.com/it/compliance/gdpr- center/ AWS for Public Sector https://aws.amazon.com/it/government- education/italy-digital-future/
  • 34. © 2019, Amazon Web Services, Inc. or its affiliates. All rights reserved. lla hitect – Public Sector n.it bblico