SlideShare una empresa de Scribd logo
1 de 33
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
CAF Detective Controls: Gain Visibility and Record Change
Balaji Palanisamy,
Senior Consultant
Professional Services
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Learning about Detective Controls
• Overview of Cloud Adoption Framework
• CAF Security Perspective
• Why Detect?
• What to Detect ?
• Aggregating audit trails
• Enforcing Detective controls
• Resources
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Overview of Cloud Adoption Framework
• Guidance for organizations adopting the cloud
– Helps coordinate different aspects of adoption
– Helps understand the how the organization will change
• 6 Perspectives
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
• Common Roles:
– CISO
– IT Security Managers
– IT Security Analysts
• 5 Core Epics
CAF Security Perspective
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
• Common Roles:
– CISO
– IT Security Managers
– IT Security Analysts
• 5 Core Epics
CAF Security Perspective
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Remaining Epics
• Resilience
• DevSecOps
• Compliance Validation
• Configuration & Vulnerability
Management
• Security Big Data
CAF Security Perspective
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Why Detect?
My	Application
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
What to Detect?
• Billing
• API Activity
• Changes to Resources
• Application Activity
• Network Activity
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Billing
• Billing Information logged daily to S3
• Also Visible in the Billing Console
• Alarms can be set to alert on thresholds and unusual
activity
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Sample Records
ItemDescription
UsageStart
Date
UsageEnd
Date
UsageQuanti
ty
Currency
Code
CostBefor
eTax
Cred
its
TaxAm
ount
TaxTy
pe
TotalCo
st
$0.000	per	GB	- regional	data	transfer	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 0.00000675 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.05	per	GB-month	of	provisioned	storage	- US	West	
(Oregon)
01.04.14	
00:00
30.04.14	
23:59
1.126.666.5
54 USD 0.56 0.0
0.0000
00 None
0.56000
0
First	1,000,000	Amazon	SNS	API	Requests	per	month	are	
free
01.04.14	
00:00
30.04.14	
23:59 10.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
First	1,000,000	Amazon	SQS	Requests	per	month	are	free
01.04.14	
00:00
30.04.14	
23:59 4153.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.00	per	GB	- EU	(Ireland)	data	transfer	from	US	West	
(Northern	California)
01.04.14	
00:00
30.04.14	
23:59 0.00003292 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.000	per	GB	- data	transfer	out	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 0.02311019 USD 0.00 0.0
0.0000
00 None
0.00000
0
First	1,000,000	Amazon	SNS	API	Requests	per	month	are	
free
01.04.14	
00:00
30.04.14	
23:59 88.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.000	per	GB	- data	transfer	out	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 3.3E-7 USD 0.00 0.0
0.0000
00 None
0.00000
0
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Introduction to AWS CloudTrail
Store/
archive
Troubleshoot
Monitor and alarm
You are
making API
calls...
On a growing
set of AWS
services around
the world..
CloudTrail is
continuously
recording
API calls
Amazon Elastic
Block Store
(Amazon EBS)
Amazon S3
bucket
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Use cases enabled by CloudTrail
• IT	and	security	administrators	can	perform	security	analysis
• IT	administrators	and	DevOps	engineers	can	attribute	changes	on	
AWS	resources	to	the	identity,	time	and	other	critical	details	of	
who	made	the	change
• DevOps	engineers	can	troubleshoot	operational	issues
• IT	auditors	can	use	log	files	as	a	compliance	aid
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Config
• Get inventory of AWS resources
• Discover new and deleted resources
• Record configuration changes continuously
• Get notified when configurations change
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Config
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Config
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
• Check configuration changes
• Periodic
• Event driven
• Rules
• Pre-built rules provided by AWS
• Custom rules using AWS Lambda
• Use dashboard for visualizing compliance and identifying offending changes
AWS Config Rules
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Supported Services
• Amazon EC2, ELB, IAM, RDS, S3 etc.
• http://docs.aws.amazon.com/config/latest/developerguide/resource
-config-reference.html
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Relationships
• Bi-directional map of
dependencies automatically
assigned
• Change to a resource propagates
to create Configuration Items for
related resources
Example:	Security	Group	sg-10dk8ej	and	
EC2	instance	i-123a3d9	are	“associated	
with”	each	other
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Relationships
Resource Relationship Related	Resource
CustomerGateway is	attached	to VPN	Connection
Elastic	IP	(EIP) is	attached	to Network	Interface
is	attached	to Instance
Instance contains Network	Interface
is	attached	to ElasticIP	(EIP)
is	contained	in Route	Table
is	associated	with Security	Group
is	contained	in Subnet
is	attached	to Volume
is	contained	in Virtual	Private	Cloud	(VPC)
InternetGateway is	attached	to Virtual	Private	Cloud	(VPC)
… …. …..
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Configuration Item
All AWS API configuration attributes for a given resource at a given point in
time, captured on every configuration change.
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Component Description Contains
Metadata Information	about	this	configuration	item Version	ID,	Configuration	item	ID,	Time	when	
the	configuration	item	was	captured,	State	
ID	indicating	the	ordering	of	the	
configuration	items	of	a	resource,	MD5Hash,	
etc.
Common	Attributes Resource	attributes Resource	ID,	tags,	Resource	type.	Amazon	
Resource	Name	(ARN)
Availability	Zone,	etc.
Relationships How	the	resource	is	related	to	other	
resources	associated	with	the	account
EBS	volume vol-1234567 is	attached	to	an	
EC2	instance i-a1b2c3d4
Current	Configuration Information	returned	through	a	call	to	the	
Describe	or	List	API	of	the	resource
e.g.	for	EBS	Volume
State	of	DeleteOnTermination	flag
Type	of	volume.	For	example, gp2,	
io1, or standard
Related	Events The	AWS	CloudTrail	events	that	are	related	
to	the	current	configuration	of	the	resource
AWS	CloudTrail	event	ID
Configuration Item
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Essentially,	“Lambda	Integration	for	Config”
Apply	detailed	checks	to	the	state	of	your	configuration,	at	the	point	when	it	
changes
Raise	alerts	if	anything	is	outside	compliance	with	your	defined	policy
‣ Eg	if	there’s	unencrypted	non-root	EBS	volumes
‣ …or	eg	if	any	taggable	resources	aren’t	tagged	appropriately
We	have	a	library	of	pre-built	rules	– or	build	your	own
See	also	Re:Invent	(SEC308)	“Wrangling	Security	Events	in	the	Cloud”	
(https://www.youtube.com/watch?v=uc1Q0XCcCv4)
Feature	is	available	right	now
Introducing Config Rules
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS Config Rules
(Example—instances must be tagged with a data classification)
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
VPC Flow Logs
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Dumping out the heavy hitter IP addresses
#!/usr/bin/python3
import boto3
# Get the service resource
logs = boto3.client(’logs’)
# Get the log groups
groups = logs.describe_log_groups()
for logGroup in groups[’logGroups’] :
# Get the LogStream for each logGroup
logStreamsDesc = logs.describe_log_streams(logGroupName=logGroup[’logGroupName’])
for logStream in logStreamsDesc[’logStreams’]:
events_resp = logs.get_log_events(logGroupName=logGroup[’logGroupName’], logStreamName=logStream[’logStreamName’])
# Store each log entry by the src IP address
ip_dict = {}
for event in events_resp[’events’] :
ip = event[cd ’message’].split()[4]
if ip in ip_dict:
ip_dict[ip] = ip_dict[ip] + 1
else :
ip_dict[ip] = 1
for w in sorted(ip_dict, key=ip_dict.get, reverse=True):
print (’{0:15} {1:8d}’.format(w, ip_dict[w]))
#Early exit
exit()
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Other Audit Trails
• Amazon CloudWatch Logs
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Other Audit Trails
• Amazon CloudWatch Events
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Other Audit Trails
• AWS Service Specific Logs
– Amazon S3 Access logs
– Amazon RDS logs
– Amazon Redshift logs
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Partners
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
AWS CloudTrail logs can be delivered cross-account
• Accounts can send their trails to a
central account
• Central account can then do
analytics
• Central account can:
– Redistribute the trails
– Grant access to the trails
– Filter and reformat Trails (to meet
privacy requirements)
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Enforcing Detective Controls
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Resources
• Elasticsearch, Kibana and CloudWatch Logs integration
– Push CloudTrail to CloudWatch Logs:
http://docs.aws.amazon.com/awscloudtrail/latest/userguide/send-cloudtrail-events-to-
cloudwatch-logs.html
– Push CloudWatch Logs to Elasticsearch:
http://docs.aws.amazon.com/AmazonCloudWatch/latest/DeveloperGuide/CWL_ES_St
ream.html
– Put a Kibana front-end on it: https://aws.amazon.com/blogs/aws/cloudwatch-logs-
subscription-consumer-elasticsearch-kibana-dashboards/
•
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
Pop-up Loft
©	2016,	Amazon	Web	Services,	Inc.	or	its	Affiliates.	All	rights	reserved
aws.amazon.com/activate
Everything and Anything Startups
Need to Get Started on AWS

Más contenido relacionado

La actualidad más candente

Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Amazon Web Services
 

La actualidad más candente (20)

Application Resiliency
Application ResiliencyApplication Resiliency
Application Resiliency
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
Cloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack MitigationCloud Native DDoS Attack Mitigation
Cloud Native DDoS Attack Mitigation
 
Hands on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3Hands on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
Hands on Setup and Overview of AWS Console, AWS CLI, AWS SDK, Boto 3
 
Best Practices on AWS - IL Webinar August 2017
Best Practices on AWS - IL Webinar August 2017Best Practices on AWS - IL Webinar August 2017
Best Practices on AWS - IL Webinar August 2017
 
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...How to Use Positive and Negative Security Models and Virtual Patching Techniq...
How to Use Positive and Negative Security Models and Virtual Patching Techniq...
 
Securing Your AWS Infrastructure with Edge Services
Securing Your AWS Infrastructure with Edge ServicesSecuring Your AWS Infrastructure with Edge Services
Securing Your AWS Infrastructure with Edge Services
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually MatterStop Wasting Your Time: Focus on Security Practices that Actually Matter
Stop Wasting Your Time: Focus on Security Practices that Actually Matter
 
Cloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack MitigationCloud-Native DDoS Attack Mitigation
Cloud-Native DDoS Attack Mitigation
 
Data Protection in Transit and at Rest
Data Protection in Transit and at RestData Protection in Transit and at Rest
Data Protection in Transit and at Rest
 
Incident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat ResponseIncident Response: Preparing and Simulating Threat Response
Incident Response: Preparing and Simulating Threat Response
 
Identity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS SecurityIdentity and Access Management: The First Step in AWS Security
Identity and Access Management: The First Step in AWS Security
 
The Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information SecurityThe Future of Securing Access Controls in Information Security
The Future of Securing Access Controls in Information Security
 
Identify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS SecurityIdentify and Access Management: The First Step in AWS Security
Identify and Access Management: The First Step in AWS Security
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 Introduction to the Security Perspective of the Cloud Adoption Framework (CAF) Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record Change
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Detective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record ChangeDetective Controls: Gain Visibility and Record Change
Detective Controls: Gain Visibility and Record Change
 

Similar a Detective Controls: Gain Visibility and Record Change

AWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
AWSome Day 2016 - Module 5: AWS Elasticity and Management ToolsAWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
AWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
Amazon Web Services
 

Similar a Detective Controls: Gain Visibility and Record Change (20)

Towards Full Stack Security
Towards Full Stack Security Towards Full Stack Security
Towards Full Stack Security
 
Automating Operations Workload
Automating Operations WorkloadAutomating Operations Workload
Automating Operations Workload
 
A Tale of Two Pizzas: Accelerating Software Delivery with AWS Developer Tools
A Tale of Two Pizzas: Accelerating Software Delivery with AWS Developer ToolsA Tale of Two Pizzas: Accelerating Software Delivery with AWS Developer Tools
A Tale of Two Pizzas: Accelerating Software Delivery with AWS Developer Tools
 
How Amazon.com Uses AWS Management Tools - DEV340 - re:Invent 2017
How Amazon.com Uses AWS Management Tools - DEV340 - re:Invent 2017How Amazon.com Uses AWS Management Tools - DEV340 - re:Invent 2017
How Amazon.com Uses AWS Management Tools - DEV340 - re:Invent 2017
 
The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in PracticeThe AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in PracticeCSS17: Dallas - The AWS Shared Responsibility Model in Practice
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
 
Going Serverless at AWS Startup Day Bangalore
Going Serverless at AWS Startup Day Bangalore Going Serverless at AWS Startup Day Bangalore
Going Serverless at AWS Startup Day Bangalore
 
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
Enabling Governance, Compliance, and Operational and Risk Auditing with AWS M...
 
Achieving Continuous Compliance using AWS Config - AWS Public Sector Summit S...
Achieving Continuous Compliance using AWS Config - AWS Public Sector Summit S...Achieving Continuous Compliance using AWS Config - AWS Public Sector Summit S...
Achieving Continuous Compliance using AWS Config - AWS Public Sector Summit S...
 
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
Introduction to the Security Perspective of the Cloud Adoption Framework (CAF)
 
Deep Dive on IoT at AWS
Deep Dive on IoT at AWSDeep Dive on IoT at AWS
Deep Dive on IoT at AWS
 
Deep Dive on the IoT at AWS
Deep Dive on the IoT at AWSDeep Dive on the IoT at AWS
Deep Dive on the IoT at AWS
 
AWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
AWSome Day 2016 - Module 5: AWS Elasticity and Management ToolsAWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
AWSome Day 2016 - Module 5: AWS Elasticity and Management Tools
 
Introduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption FrameworkIntroduction to the Security Perspective of the Cloud Adoption Framework
Introduction to the Security Perspective of the Cloud Adoption Framework
 
AWS Shared Security Model in Practice
AWS Shared Security Model in PracticeAWS Shared Security Model in Practice
AWS Shared Security Model in Practice
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
Using AWS Management Tools to Enable Governance, Compliance, Operational, and...
 
Cloud Migration: A How-To Guide
Cloud Migration: A How-To GuideCloud Migration: A How-To Guide
Cloud Migration: A How-To Guide
 
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)
AWS re:Invent 2016: Identifying Your Migration Options: the 6 Rs (ENT311)
 
Debugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-RayDebugging Modern Applications: Introduction to AWS X-Ray
Debugging Modern Applications: Introduction to AWS X-Ray
 

Más de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Detective Controls: Gain Visibility and Record Change