SlideShare una empresa de Scribd logo
1 de 28
Descargar para leer sin conexión
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Establishing AWS as a trusted partner
Chris Pennisi
FSI Compliance Specialist
AWS
G R C 3 2 5
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
What does it mean to become a trusted partner?
• Becoming a trusted partner is not a feeling; it is a “calculation”
• If it is a calculation, then what do customers look for?
• But, before we go into that, it is important to recognize that customers are
looking for transparency and consistency at all stages of interaction
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
The five stages of assessing AWS
How do we work with you?
Do you have what I need to run critical workloads?
Can we be secure on AWS?
How can we be sure that others do not access our data?
Can you help us build?
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Understanding the shared responsibility model
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Can I choose where I place my data? And control it?
21 Regions
66 Availability Zones
158 Edge Locations
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Region & number of AZs Announced Regions
Bahrain, Cape Town, Jakarta, and Milan
What about resilience?
AWS Availability Zone (AZ)AWS Region
A Region is a physical location in
the world where we have multiple
AZs
AZs consist of one or more discrete
data centers, each with redundant
power, networking, and connectivity,
and housed in separate facilities
Transit
Transit AZ
AZ
AZ
AZ
Data center Data center
Data center
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
What services does AWS provide?
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
What happens if AWS does not have the service that we
need?
48 82
160 280
516
722
1017
1430
1,957
2009 2011 2012 2013 2014 2015 2016 2017 2018
#Servicesandfeaturesreleased
AWS has been continually expanding its services to
support virtually any cloud workload, and it now has
more than 165 services across a range of functional areas
AWS service development is customer-driven
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
What is the AWS view of security?
• Security is job zero!
• “Keep humans away from the data.” —Steve Schmidt, AWS CISO
Security enhancements from
1M+ customer experiences
AWS industry-leading
security teams: 24/7,
365 days a year
Security infrastructure
built to satisfy the military,
global banks, and other high-
sensitivity organizations
Over 50 global
compliance certifications
and accreditations
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Do you comply with global standards & regulations?
Certifications & attestations Laws, regulations, and privacy Alignments & frameworks
Cloud Computing Compliance Controls Catalogue (C5) 🇩🇪 ✓ CISPE 🇪🇺 ✓ CIS (Center for Internet Security) 🌐 ✓
Cyber Essentials Plus 🇬🇧 ✓ EU Model Clauses 🇪🇺 ✓ CJIS (US FBI) 🇺🇸 ✓
DoD SRG 🇺🇸 ✓ FERPA 🇺🇸 ✓ CSA (Cloud Security Alliance) 🌐 ✓
FedRAMP 🇺🇸 ✓ GLBA 🇺🇸 ✓ Esquema Nacional de Seguridad 🇪🇸 ✓
FIPS 🇺🇸 ✓ HIPAA 🇺🇸 ✓ EU-US Privacy Shield 🇪🇺 ✓
IRAP 🇦🇺 ✓ HITECH 🌐 ✓ FISC 🇯🇵 ✓
ISO 9001 🌐 ✓ IRS 1075 🇺🇸 ✓ FISMA 🇺🇸 ✓
ISO 27001 🌐 ✓ ITAR 🇺🇸 ✓ G-Cloud 🇬🇧 ✓
ISO 27017 🌐 ✓ My Number Act 🇯🇵 ✓ GxP (US FDA CFR 21 Part 11) 🇺🇸 ✓
ISO 27018 🌐 ✓ Data Protection Act – 1988 🇬🇧 ✓ ICREA 🌐 ✓
MLPS Level 3 🇨🇳 ✓ VPAT/Section 508 🇺🇸 ✓ IT Grundschutz 🇩🇪 ✓
MTCS 🇸🇬 ✓ Data Protection Directive 🇪🇺 ✓ MITA 3.0 (US Medicaid) 🇺🇸 ✓
PCI DSS Level 1 💳 ✓ Privacy Act [Australia] 🇦🇺 ✓ MPAA 🇺🇸 ✓
SEC Rule 17-a-4(f) 🇺🇸 ✓ Privacy Act [New Zealand] 🇳🇿 ✓ NIST 🇺🇸 ✓
SOC 1, SOC 2, SOC 3 🌐 ✓ PDPA - 2010 [Malaysia] 🇲🇾 ✓ Uptime Institute Tiers 🌐 ✓
PDPA - 2012 [Singapore] 🇸🇬 ✓ Cloud Security Principles 🇬🇧 ✓
🌐 = industry or global standard PIPEDA [Canada] 🇨🇦 ✓
Agencia Española de Protección de Datos 🇪🇸 ✓
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
What core frameworks and standards do you meet?
CSA
Cloud Security
Alliance controls
Annual
ISO 9001
Global quality
standard
Annual
ISO 27001
Security management controls
Annual
ISO 27017
Cloud-specific
controls
Annual
ISO 27018
Personal data
protection
annual
PCI DSS Level 1
Payment card standards
Annual
SOC 1
Audit controls report
Biannual
SOC 2
Security, availability, &
confidentiality report
Biannual
SOC 3
General controls
report
Annual
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Identity
Detective
control
Infrastructure
security
Incident
response
Data
protection
AWS Security Hub
Centrally view and manage security alerts and
automate compliance checks
AWS Control Tower
Automates the setup and governance of a secure,
compliant multi-account AWS environment
New services, now available
in preview
AWS Identity & Access
Management (IAM)
AWS Single Sign-On
AWS Directory Service
Amazon Cognito
AWS Organizations
AWS Secrets Manager
AWS Resource Access
Manager
AWS Security Hub
Amazon GuardDuty
AWS Config
AWS CloudTrail
Amazon
CloudWatch
VPC flow logs
AWS Systems Manager
AWS Shield
AWS WAF – Web
application firewall
AWS Firewall Manager
Amazon Inspector
Amazon Virtual Private
Cloud (Amazon VPC)
AWS Key Management
Service (KMS)
AWS CloudHSM
AWS Certificate Manager
Amazon Macie
Server-side encryption
AWS Config rules
AWS Lambda
What services can we use to be secure?
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How can we encrypt our data?
AWS KMS High standardsUbiquitous
AWS encryption services are integrated into dozens of our services and
meet the strictest industry requirements
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How does AWS manage information requests?
Notification EncryptionValid requests
Amazon does not disclose customer information unless we’re required
to do so to comply with a legally valid and binding order
Where we need to act publicly to protect customers, we do
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How does AWS manage administrative access?
Process controlsTechnology
controls
AWS strictly controls our infrequent administrative access to services
This process has executive oversight within AWS and is validated by independent third parties
Automation
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How does AWS secure the hypervisor?
Experience
AWS has over a decade of experience securing our virtualization technology
We provide a deep level of isolation within the cloud
Customization &
innovation
Isolation
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How can you help us build?
Best practice document
Enablers to help customers
understand and use AWS services
to build workloads
Training & certification
Tailored technical, security,
compliance, and business training to
accelerate cloud adoption
Professional Services
Specialists with industry and technology
experience that customers engage to define
and implement a migration or compliance
program
AWS Partner Competency
Global program comprising technology and
consulting companies that can help customers
shift critical workloads to the cloud and
comply with industry regulations, where
necessary
In-house industry expertise
Resources include former regulators, compliance
officers, information security experts, governance and
audit professionals, traders, and technology specialists
with industry experience
Industry affiliations
Relationships with leading industry associations, as
well as a program of AWS-led industry events
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
How do we assess our workloads?
Review
process
Consistent Technology
portfolio
Security Reliability
Performance
efficiency
Cost
optimization
Operations
5 pillars
of review
Application
to your
portfolio
24 < 7
The AWS Well-Architected review
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Can you help us with operational support?
Technical account
manager (TAM)
Designated technical point of contact
for all necessary AWS expertise
Support
concierge
Dedicated team of enterprise account specialists
to help with billing and account subjects
SMEs
Cloud support engineers, solutions architects,
and product teams are available for guidance
Trusted
advisor (TA)
Online resource to help you reduce cost, increase
performance, and improve security
by optimizing your AWS environment
Personal
health
dashboard
(PHD)
Delivers alerts and remediation
guidance when AWS experiences
events that may impact your
environment
Support
API
Programmatic access to AWS Support
Center features to create, manage, and
close your support cases and
operationally manage your TA check
requests and status
Infrastructure event
management (IEM)
Focused planning and support for
business-critical events
(e.g., launches or migrations)
Well-Architected
review
Detailed review of your architecture
guidance on how
to best design your systems
Architecture
support
Consultative reviews of your
application architecture and how to
align it with AWS
Operations
support
Consultative reviews of your cloud operations
and advice for optimizationTraining
Credits for online, self-paced labs
provided through an AWS training
provider
Abuse
team
Assists you when AWS resources are impacted
by things such as spam, port scanning, distributed
denial of service attacks (DDoS), or malware
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
The five stages of assessing AWS
Understand the shared responsibility model
Review the AWS infrastructure & service portfolio
Review the AWS security attestation & security services
Understand how we manage data security
Leverage the AWS portfolio of services & tools
Thank you!
© 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
Chris Pennisi
pennisic@amazon.com

Más contenido relacionado

La actualidad más candente

Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...Amazon Web Services
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...Amazon Web Services
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019 Amazon Web Services
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Amazon Web Services
 
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Amazon Web Services
 
An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...Amazon Web Services
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...Amazon Web Services
 
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...Amazon Web Services
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...Amazon Web Services
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 Amazon Web Services
 
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Amazon Web Services
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...Amazon Web Services
 
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...Amazon Web Services
 
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Amazon Web Services
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Amazon Web Services
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 Amazon Web Services
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWSAmazon Web Services
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Amazon Web Services
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...Amazon Web Services
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSAmazon Web Services
 

La actualidad más candente (20)

Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
Don’t be a haven for attackers: Mitigate misconfigurations with AWS Service C...
 
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
How to secure your Active Directory deployment on AWS - FND306-R - AWS re:Inf...
 
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019  Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
Your first compliance-as-code - GRC305-R - AWS re:Inforce 2019
 
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
Pop the hood: Using AWS resources to attest to security of the cloud - GRC310...
 
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...Using AWS Control Tower to govern multi-account AWS environments at scale - G...
Using AWS Control Tower to govern multi-account AWS environments at scale - G...
 
An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...An open-source adventure in the cloud, containers, and incident response - SE...
An open-source adventure in the cloud, containers, and incident response - SE...
 
Building a well-engaged and secure AWS account access management - FND207-R ...
 Building a well-engaged and secure AWS account access management - FND207-R ... Building a well-engaged and secure AWS account access management - FND207-R ...
Building a well-engaged and secure AWS account access management - FND207-R ...
 
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
Compliance automation: Set it up fast, then code it your way - GRC330-R - AWS...
 
New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...New ways to automate compliance verification on AWS using provable security -...
New ways to automate compliance verification on AWS using provable security -...
 
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019 The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
The fundamentals of AWS cloud security - FND209-R - AWS re:Inforce 2019
 
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
Secure Your Data with Recommended Best Practices Enabled by AWS Security and ...
 
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
How FINRA achieves DevOps agility while securing its AWS environments - GRC33...
 
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...
Cross-account encryption with AWS KMS and Slack Enterprise Key Management - S...
 
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
Build a PCI SAQ A-EP-compliant serverless service to manage credit card payme...
 
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019 Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
Cloud auditing workshop - GRC323 - AWS re:Inforce 2019
 
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019 DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
DevSecOps: Integrating security into pipelines - SDD310 - AWS re:Inforce 2019
 
Scaling threat detection and response on AWS
Scaling threat detection and response on AWSScaling threat detection and response on AWS
Scaling threat detection and response on AWS
 
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019 Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
Security best practices the well-architected way - SDD318 - AWS re:Inforce 2019
 
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
How GoDaddy protects ecommerce and domains with AWS KMS and encryption - SDD4...
 
Costruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWSCostruire Architetture Ibride con AWS
Costruire Architetture Ibride con AWS
 

Similar a Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019

Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureAmazon Web Services
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceAmazon Web Services
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Amazon Web Services
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudAmazon Web Services
 
APN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAPN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAmazon Web Services
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloudAmazon Web Services
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the CloudAmazon Web Services
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...Martin Klie
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 Amazon Web Services
 
Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...Amazon Web Services
 
AWS PROTECTED - Why This Matters to Australia.
AWS PROTECTED - Why This Matters to Australia.AWS PROTECTED - Why This Matters to Australia.
AWS PROTECTED - Why This Matters to Australia.Amazon Web Services
 
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...Amazon Web Services Korea
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftAmazon Web Services
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert LogicAmazon Web Services
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationAmazon Web Services
 

Similar a Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019 (20)

Generational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To InsureGenerational shiftsRedefining Customer Experience And The Way To Insure
Generational shiftsRedefining Customer Experience And The Way To Insure
 
Sicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practiceSicurezza in AWS automazione e best practice
Sicurezza in AWS automazione e best practice
 
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
Executive Security Simulation Workshop (WPS206) - AWS re:Invent 2018
 
Elevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloudElevate_your_security_with_the_cloud
Elevate_your_security_with_the_cloud
 
Welcome To Day One
Welcome To Day OneWelcome To Day One
Welcome To Day One
 
APN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SAAPN_Live_20190722_Introduction_to_SA
APN_Live_20190722_Introduction_to_SA
 
Elevate your security with the cloud
Elevate your security with the cloudElevate your security with the cloud
Elevate your security with the cloud
 
Security & Compliance in the Cloud
Security & Compliance in the CloudSecurity & Compliance in the Cloud
Security & Compliance in the Cloud
 
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
 
Managing Security on AWS
Managing Security on AWSManaging Security on AWS
Managing Security on AWS
 
Security in the cloud
Security in the cloudSecurity in the cloud
Security in the cloud
 
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019 AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
AWS Executive Security Simulation - FND201-R - AWS re:Inforce 2019
 
Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...Building transformational business value through broad organizational engagem...
Building transformational business value through broad organizational engagem...
 
AWS PROTECTED - Why This Matters to Australia.
AWS PROTECTED - Why This Matters to Australia.AWS PROTECTED - Why This Matters to Australia.
AWS PROTECTED - Why This Matters to Australia.
 
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
엔터프라이즈의 효과적인 클라우드 도입을 위한 전략 및 적용 사례-신규진 프로페셔널 서비스 리드, AWS/고병률 데이터베이스 아키텍트, 삼성...
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS Cloud Security Fundamentals
AWS Cloud Security FundamentalsAWS Cloud Security Fundamentals
AWS Cloud Security Fundamentals
 
NIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up LoftNIST Compliance, AWS Federal Pop-Up Loft
NIST Compliance, AWS Federal Pop-Up Loft
 
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
How Rent-A-Center Stays Secure and Compliant on AWS with Alert Logic
 
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud MigrationMigrate, Modernize, and Manage: Best Practices for a Cloud Migration
Migrate, Modernize, and Manage: Best Practices for a Cloud Migration
 

Más de Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Establishing AWS as a trusted partner - GRC325 - AWS re:Inforce 2019

  • 1. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Establishing AWS as a trusted partner Chris Pennisi FSI Compliance Specialist AWS G R C 3 2 5
  • 2. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. What does it mean to become a trusted partner? • Becoming a trusted partner is not a feeling; it is a “calculation” • If it is a calculation, then what do customers look for? • But, before we go into that, it is important to recognize that customers are looking for transparency and consistency at all stages of interaction
  • 3. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 4. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. The five stages of assessing AWS How do we work with you? Do you have what I need to run critical workloads? Can we be secure on AWS? How can we be sure that others do not access our data? Can you help us build?
  • 5. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 6. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Understanding the shared responsibility model
  • 7. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 8. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Can I choose where I place my data? And control it? 21 Regions 66 Availability Zones 158 Edge Locations
  • 9. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Region & number of AZs Announced Regions Bahrain, Cape Town, Jakarta, and Milan What about resilience? AWS Availability Zone (AZ)AWS Region A Region is a physical location in the world where we have multiple AZs AZs consist of one or more discrete data centers, each with redundant power, networking, and connectivity, and housed in separate facilities Transit Transit AZ AZ AZ AZ Data center Data center Data center
  • 10. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. What services does AWS provide?
  • 11. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. What happens if AWS does not have the service that we need? 48 82 160 280 516 722 1017 1430 1,957 2009 2011 2012 2013 2014 2015 2016 2017 2018 #Servicesandfeaturesreleased AWS has been continually expanding its services to support virtually any cloud workload, and it now has more than 165 services across a range of functional areas AWS service development is customer-driven
  • 12. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 13. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. What is the AWS view of security? • Security is job zero! • “Keep humans away from the data.” —Steve Schmidt, AWS CISO Security enhancements from 1M+ customer experiences AWS industry-leading security teams: 24/7, 365 days a year Security infrastructure built to satisfy the military, global banks, and other high- sensitivity organizations Over 50 global compliance certifications and accreditations
  • 14. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Do you comply with global standards & regulations? Certifications & attestations Laws, regulations, and privacy Alignments & frameworks Cloud Computing Compliance Controls Catalogue (C5) 🇩🇪 ✓ CISPE 🇪🇺 ✓ CIS (Center for Internet Security) 🌐 ✓ Cyber Essentials Plus 🇬🇧 ✓ EU Model Clauses 🇪🇺 ✓ CJIS (US FBI) 🇺🇸 ✓ DoD SRG 🇺🇸 ✓ FERPA 🇺🇸 ✓ CSA (Cloud Security Alliance) 🌐 ✓ FedRAMP 🇺🇸 ✓ GLBA 🇺🇸 ✓ Esquema Nacional de Seguridad 🇪🇸 ✓ FIPS 🇺🇸 ✓ HIPAA 🇺🇸 ✓ EU-US Privacy Shield 🇪🇺 ✓ IRAP 🇦🇺 ✓ HITECH 🌐 ✓ FISC 🇯🇵 ✓ ISO 9001 🌐 ✓ IRS 1075 🇺🇸 ✓ FISMA 🇺🇸 ✓ ISO 27001 🌐 ✓ ITAR 🇺🇸 ✓ G-Cloud 🇬🇧 ✓ ISO 27017 🌐 ✓ My Number Act 🇯🇵 ✓ GxP (US FDA CFR 21 Part 11) 🇺🇸 ✓ ISO 27018 🌐 ✓ Data Protection Act – 1988 🇬🇧 ✓ ICREA 🌐 ✓ MLPS Level 3 🇨🇳 ✓ VPAT/Section 508 🇺🇸 ✓ IT Grundschutz 🇩🇪 ✓ MTCS 🇸🇬 ✓ Data Protection Directive 🇪🇺 ✓ MITA 3.0 (US Medicaid) 🇺🇸 ✓ PCI DSS Level 1 💳 ✓ Privacy Act [Australia] 🇦🇺 ✓ MPAA 🇺🇸 ✓ SEC Rule 17-a-4(f) 🇺🇸 ✓ Privacy Act [New Zealand] 🇳🇿 ✓ NIST 🇺🇸 ✓ SOC 1, SOC 2, SOC 3 🌐 ✓ PDPA - 2010 [Malaysia] 🇲🇾 ✓ Uptime Institute Tiers 🌐 ✓ PDPA - 2012 [Singapore] 🇸🇬 ✓ Cloud Security Principles 🇬🇧 ✓ 🌐 = industry or global standard PIPEDA [Canada] 🇨🇦 ✓ Agencia Española de Protección de Datos 🇪🇸 ✓
  • 15. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. What core frameworks and standards do you meet? CSA Cloud Security Alliance controls Annual ISO 9001 Global quality standard Annual ISO 27001 Security management controls Annual ISO 27017 Cloud-specific controls Annual ISO 27018 Personal data protection annual PCI DSS Level 1 Payment card standards Annual SOC 1 Audit controls report Biannual SOC 2 Security, availability, & confidentiality report Biannual SOC 3 General controls report Annual
  • 16. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Identity Detective control Infrastructure security Incident response Data protection AWS Security Hub Centrally view and manage security alerts and automate compliance checks AWS Control Tower Automates the setup and governance of a secure, compliant multi-account AWS environment New services, now available in preview AWS Identity & Access Management (IAM) AWS Single Sign-On AWS Directory Service Amazon Cognito AWS Organizations AWS Secrets Manager AWS Resource Access Manager AWS Security Hub Amazon GuardDuty AWS Config AWS CloudTrail Amazon CloudWatch VPC flow logs AWS Systems Manager AWS Shield AWS WAF – Web application firewall AWS Firewall Manager Amazon Inspector Amazon Virtual Private Cloud (Amazon VPC) AWS Key Management Service (KMS) AWS CloudHSM AWS Certificate Manager Amazon Macie Server-side encryption AWS Config rules AWS Lambda What services can we use to be secure?
  • 17. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 18. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How can we encrypt our data? AWS KMS High standardsUbiquitous AWS encryption services are integrated into dozens of our services and meet the strictest industry requirements
  • 19. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How does AWS manage information requests? Notification EncryptionValid requests Amazon does not disclose customer information unless we’re required to do so to comply with a legally valid and binding order Where we need to act publicly to protect customers, we do
  • 20. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How does AWS manage administrative access? Process controlsTechnology controls AWS strictly controls our infrequent administrative access to services This process has executive oversight within AWS and is validated by independent third parties Automation
  • 21. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How does AWS secure the hypervisor? Experience AWS has over a decade of experience securing our virtualization technology We provide a deep level of isolation within the cloud Customization & innovation Isolation
  • 22. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 23. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How can you help us build? Best practice document Enablers to help customers understand and use AWS services to build workloads Training & certification Tailored technical, security, compliance, and business training to accelerate cloud adoption Professional Services Specialists with industry and technology experience that customers engage to define and implement a migration or compliance program AWS Partner Competency Global program comprising technology and consulting companies that can help customers shift critical workloads to the cloud and comply with industry regulations, where necessary In-house industry expertise Resources include former regulators, compliance officers, information security experts, governance and audit professionals, traders, and technology specialists with industry experience Industry affiliations Relationships with leading industry associations, as well as a program of AWS-led industry events
  • 24. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. How do we assess our workloads? Review process Consistent Technology portfolio Security Reliability Performance efficiency Cost optimization Operations 5 pillars of review Application to your portfolio 24 < 7 The AWS Well-Architected review
  • 25. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Can you help us with operational support? Technical account manager (TAM) Designated technical point of contact for all necessary AWS expertise Support concierge Dedicated team of enterprise account specialists to help with billing and account subjects SMEs Cloud support engineers, solutions architects, and product teams are available for guidance Trusted advisor (TA) Online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment Personal health dashboard (PHD) Delivers alerts and remediation guidance when AWS experiences events that may impact your environment Support API Programmatic access to AWS Support Center features to create, manage, and close your support cases and operationally manage your TA check requests and status Infrastructure event management (IEM) Focused planning and support for business-critical events (e.g., launches or migrations) Well-Architected review Detailed review of your architecture guidance on how to best design your systems Architecture support Consultative reviews of your application architecture and how to align it with AWS Operations support Consultative reviews of your cloud operations and advice for optimizationTraining Credits for online, self-paced labs provided through an AWS training provider Abuse team Assists you when AWS resources are impacted by things such as spam, port scanning, distributed denial of service attacks (DDoS), or malware
  • 26. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved.
  • 27. © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. The five stages of assessing AWS Understand the shared responsibility model Review the AWS infrastructure & service portfolio Review the AWS security attestation & security services Understand how we manage data security Leverage the AWS portfolio of services & tools
  • 28. Thank you! © 2019, Amazon Web Services, Inc. or its affiliates.All rights reserved. Chris Pennisi pennisic@amazon.com