SlideShare una empresa de Scribd logo
1 de 16
Validating the Security
         of your AWS Cloud Deployments




Page 1
Quick Company Update


 Leader in real-world security test and measurement solutions –
  created automated penetration testing category
 1000+ customers: Industry leaders and government
         –   Top 3 Telecomm Companies
         –   Top 3 Network & Communications Equipment Companies
         –   2 of 3 Top Computer Software Companies
         –   2 of 3 Top Pharmaceutical Companies
         –   6 of 7 Top Aerospace and Defense Companies
   Explosive product growth and technology innovation
     Announced this week




Page 2                                - CONFIDENTIAL -
Cloud Security


 You are responsible for your own security – just because it is
  virtualized, does not mean the bad guys will not attack it
   – Confidence in your provider
   – Securing and testing your applications and systems
 Amazon Web Services
   – A leader in secure infrastructure
   – Ideal partner for Core – shared goal of making customers more
      secure
 You must:
   – Create secure applications and deployments
   – Use the same security diligence as in your physical infrastructure
   – Test as often as possible




Page 3
Case Study


   Customer Profile
     – Cloud-based security provider
     – Built and run their entire business infrastructure in AWS
     – Security savvy, and security is a top priority


   Challenge:
     – Want to follow security best practices for their cloud deployment
              » Similar to traditional on-premise security testing
         –   Verify the security of their hosted applications & instances
         –   Institute low cost, repeatable security testing program for their AWS
             instances
         –   Miminize human/manual time and effort




Page 4                                 - CONFIDENTIAL -
Case Study


   Solution
     – Core CloudInspect, the first automated security testing solution,
       integrated with AWS

   Benefits
     – Provides easy way to make security testing part of the ongoing
       deployment and maintenance process
     – Automates security testing of instances
     – Uses real-world attack techniques, delivers NO false positives
     – Automates the test request process via IAM, thus saving human
       time/effort
     – Leverage 15 years of security testing technology and expertise


   Regular testing should become a best practice for all cloud
    deployments, with retesting after exposures are remediated
Page 5                         - CONFIDENTIAL -
https://www.corecloudinspect.com




Page 6              - CONFIDENTIAL -
How Core CloudInspect Works


One-time set-up of CloudInspect account with Core
   – Includes AWS authorization

1. Log-in
2. Select instances to test
3. Select web applications to test
4. Select reports
5. Confirm and pay
6. View progress
7. Retrieve reports




Page 7                     - CONFIDENTIAL -
How It Works:
Set-up your CloudInspect account




Page 8                  - CONFIDENTIAL -
How It Works:
Log-in and view all your AWS instances




Page 9                  - CONFIDENTIAL -
How It Works:
Pick what you want to test




Page 10                  - CONFIDENTIAL -
How It Works:
Pick the URLS to test




Page 11                 - CONFIDENTIAL -
How It Works:
Select reports




Page 12          - CONFIDENTIAL -
How It Works:
Pay for the test




Page 13            - CONFIDENTIAL -
How It Works:
View progress and retrieve reports




Page 14                  - CONFIDENTIAL -
https://www.corecloudinspect.com


           AWS Customers
           Test your first three instances each month for free*


Page 15                 - CONFIDENTIAL -
                                           * Limited offer for AWS customers in 2011
The leader in security testing introduces

      The first automated security testing service for cloud environments.




• Fully automated security testing for AWS clients
• SaaS-delivered penetration testing for AWS hosted instances:
    • Cloud-based machine instances
    • Cloud-based web applications
• Identification of security exposures in hosted systems and applications
• Verification and validation of cloud deployed applications and systems
• Integrated and automated back-end test authorization and payment w/ AWS


              On-demand security testing service for the Cloud

                   https://www.corecloudinspect.com
  Page 16                           - CONFIDENTIAL -

Más contenido relacionado

La actualidad más candente

AWS Security Fundamentals August 2016
AWS Security Fundamentals August 2016AWS Security Fundamentals August 2016
AWS Security Fundamentals August 2016
Kevin Mitchell
 
PHPNW14 - Getting Started With AWS
PHPNW14 - Getting Started With AWSPHPNW14 - Getting Started With AWS
PHPNW14 - Getting Started With AWS
benwaine
 
AWS Summit 2011: Customer Presentation - NYTimes
AWS Summit 2011: Customer Presentation - NYTimesAWS Summit 2011: Customer Presentation - NYTimes
AWS Summit 2011: Customer Presentation - NYTimes
Amazon Web Services
 
AWS Toolkit for Visual Studio - Version 1
AWS Toolkit for Visual Studio - Version 1AWS Toolkit for Visual Studio - Version 1
AWS Toolkit for Visual Studio - Version 1
Adron Hall
 

La actualidad más candente (20)

AWS Security Fundamentals August 2016
AWS Security Fundamentals August 2016AWS Security Fundamentals August 2016
AWS Security Fundamentals August 2016
 
The Journey from Monolith to Microservices: a Guided Adventure
The Journey from Monolith to Microservices: a Guided AdventureThe Journey from Monolith to Microservices: a Guided Adventure
The Journey from Monolith to Microservices: a Guided Adventure
 
Microsoft Azure Automation
Microsoft Azure AutomationMicrosoft Azure Automation
Microsoft Azure Automation
 
Sitecore on AWS
Sitecore on AWSSitecore on AWS
Sitecore on AWS
 
Introduction to DevOps on AWS
Introduction to DevOps on AWSIntroduction to DevOps on AWS
Introduction to DevOps on AWS
 
AWS CodeDeploy
AWS CodeDeployAWS CodeDeploy
AWS CodeDeploy
 
PHPNW14 - Getting Started With AWS
PHPNW14 - Getting Started With AWSPHPNW14 - Getting Started With AWS
PHPNW14 - Getting Started With AWS
 
Using ssm at scale at atlassian
 Using ssm at scale at atlassian Using ssm at scale at atlassian
Using ssm at scale at atlassian
 
AWS Summit 2011: Customer Presentation - NYTimes
AWS Summit 2011: Customer Presentation - NYTimesAWS Summit 2011: Customer Presentation - NYTimes
AWS Summit 2011: Customer Presentation - NYTimes
 
AWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation SecurityAWS Summit Singapore - Next Generation Security
AWS Summit Singapore - Next Generation Security
 
Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017Evident io Continuous Compliance - Mar 2017
Evident io Continuous Compliance - Mar 2017
 
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
Developing a Rugged Dev Ops Approach to Cloud Security (Updated)
 
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
AWS Summit Singapore Webinar Edition | Building Tomorrow’s Financial Services...
 
Accelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWSAccelerating DevOps Pipelines with AWS
Accelerating DevOps Pipelines with AWS
 
DevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver FasterDevOps on AWS - Building Systems to Deliver Faster
DevOps on AWS - Building Systems to Deliver Faster
 
Cloud Computing Webinar
Cloud Computing WebinarCloud Computing Webinar
Cloud Computing Webinar
 
AWS re:Invent 2016: DevOps on AWS: Advanced Continuous Delivery Techniques (D...
AWS re:Invent 2016: DevOps on AWS: Advanced Continuous Delivery Techniques (D...AWS re:Invent 2016: DevOps on AWS: Advanced Continuous Delivery Techniques (D...
AWS re:Invent 2016: DevOps on AWS: Advanced Continuous Delivery Techniques (D...
 
AWS Toolkit for Visual Studio - Version 1
AWS Toolkit for Visual Studio - Version 1AWS Toolkit for Visual Studio - Version 1
AWS Toolkit for Visual Studio - Version 1
 
Leveraging elastic web scale computing with AWS
 Leveraging elastic web scale computing with AWS Leveraging elastic web scale computing with AWS
Leveraging elastic web scale computing with AWS
 
AWS Summit Auckland - Moving MS .NET Applications One Container at a Time
AWS Summit Auckland - Moving MS .NET Applications One Container at a TimeAWS Summit Auckland - Moving MS .NET Applications One Container at a Time
AWS Summit Auckland - Moving MS .NET Applications One Container at a Time
 

Destacado

AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
Amazon Web Services
 
AWS Public Sector Symposium 2014 Canberra | Keynote
AWS Public Sector Symposium 2014 Canberra | KeynoteAWS Public Sector Symposium 2014 Canberra | Keynote
AWS Public Sector Symposium 2014 Canberra | Keynote
Amazon Web Services
 
Building Web Applications on AWS - AWS Summit 2012 - NYC
Building Web Applications on AWS - AWS Summit 2012 - NYCBuilding Web Applications on AWS - AWS Summit 2012 - NYC
Building Web Applications on AWS - AWS Summit 2012 - NYC
Amazon Web Services
 
Boundaryless Enterprises and Cloud - Raj Bala
Boundaryless Enterprises and Cloud - Raj BalaBoundaryless Enterprises and Cloud - Raj Bala
Boundaryless Enterprises and Cloud - Raj Bala
Amazon Web Services
 
AWS Summit 2011: Data Storage Solutions in the AWS Cloud
AWS Summit 2011: Data Storage Solutions in the AWS CloudAWS Summit 2011: Data Storage Solutions in the AWS Cloud
AWS Summit 2011: Data Storage Solutions in the AWS Cloud
Amazon Web Services
 
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
Amazon Web Services
 

Destacado (8)

AWS Public Sector Symposium 2014 Canberra | Continuous Integration and Deploy...
AWS Public Sector Symposium 2014 Canberra | Continuous Integration and Deploy...AWS Public Sector Symposium 2014 Canberra | Continuous Integration and Deploy...
AWS Public Sector Symposium 2014 Canberra | Continuous Integration and Deploy...
 
AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
AWS Customer Presentation: What's Up Interactive : Disaster Recovery - AWS Su...
 
AWS Public Sector Symposium 2014 Canberra | Keynote
AWS Public Sector Symposium 2014 Canberra | KeynoteAWS Public Sector Symposium 2014 Canberra | Keynote
AWS Public Sector Symposium 2014 Canberra | Keynote
 
Building Web Applications on AWS - AWS Summit 2012 - NYC
Building Web Applications on AWS - AWS Summit 2012 - NYCBuilding Web Applications on AWS - AWS Summit 2012 - NYC
Building Web Applications on AWS - AWS Summit 2012 - NYC
 
Boundaryless Enterprises and Cloud - Raj Bala
Boundaryless Enterprises and Cloud - Raj BalaBoundaryless Enterprises and Cloud - Raj Bala
Boundaryless Enterprises and Cloud - Raj Bala
 
Keynote from Werner Vogels
Keynote from Werner VogelsKeynote from Werner Vogels
Keynote from Werner Vogels
 
AWS Summit 2011: Data Storage Solutions in the AWS Cloud
AWS Summit 2011: Data Storage Solutions in the AWS CloudAWS Summit 2011: Data Storage Solutions in the AWS Cloud
AWS Summit 2011: Data Storage Solutions in the AWS Cloud
 
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
Indian Case Studies: How AWS Customers Have Successfully Built and Migrated a...
 

Similar a AWS Summit 2011 : Validating the Security of your AWS Cloud Deployments

AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
AlienVault
 
Examview cloud security summary
Examview cloud security summaryExamview cloud security summary
Examview cloud security summary
William McIntosh
 

Similar a AWS Summit 2011 : Validating the Security of your AWS Cloud Deployments (20)

Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
Automating Compliance Defense in the Cloud - Toronto FSI Symposium - October ...
 
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
AWS re:Invent 2016: Scaling Security Resources for Your First 10 Million Cust...
 
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
Delivering infrastructure, security, and operations as code - DEM06 - Santa C...
 
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
2020 09-30 overcoming the challenges of managing a hybrid environment - aws a...
 
Getting Started with Amazon WorkSpaces
 Getting Started with Amazon WorkSpaces Getting Started with Amazon WorkSpaces
Getting Started with Amazon WorkSpaces
 
Getting started with amazon workspaces - Toronto
Getting started with amazon workspaces - TorontoGetting started with amazon workspaces - Toronto
Getting started with amazon workspaces - Toronto
 
Getting Started with AWS Security
Getting Started with AWS SecurityGetting Started with AWS Security
Getting Started with AWS Security
 
AWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & ResponseAWS Security Best Practices for Effective Threat Detection & Response
AWS Security Best Practices for Effective Threat Detection & Response
 
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
AWS Summit 2013 | Singapore - Security & Compliance and Integrated Security w...
 
Top 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practicesTop 10 AWS Security and Compliance best practices
Top 10 AWS Security and Compliance best practices
 
Best Practices for Security at Scale
Best Practices for Security at ScaleBest Practices for Security at Scale
Best Practices for Security at Scale
 
DEVNET-1120 Intercloud Fabric - AWS and Azure Account Setup and Utilization
DEVNET-1120	Intercloud Fabric - AWS and Azure Account Setup and UtilizationDEVNET-1120	Intercloud Fabric - AWS and Azure Account Setup and Utilization
DEVNET-1120 Intercloud Fabric - AWS and Azure Account Setup and Utilization
 
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...Delivering infrastructure, security, and operations as code with AWS - DEM10-...
Delivering infrastructure, security, and operations as code with AWS - DEM10-...
 
Automate the Provisioning of Secure Developer Environments on AWS PPT
 Automate the Provisioning of Secure Developer Environments on AWS PPT Automate the Provisioning of Secure Developer Environments on AWS PPT
Automate the Provisioning of Secure Developer Environments on AWS PPT
 
AWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program OverviewAWS Shared Responsibility Model & Compliance Program Overview
AWS Shared Responsibility Model & Compliance Program Overview
 
Barracuda, AWS & Securosis: Application Security for the Cloud
Barracuda, AWS & Securosis:  Application Security for the CloudBarracuda, AWS & Securosis:  Application Security for the Cloud
Barracuda, AWS & Securosis: Application Security for the Cloud
 
Examview cloud security summary
Examview cloud security summaryExamview cloud security summary
Examview cloud security summary
 
Toward Full Stack Security
Toward Full Stack SecurityToward Full Stack Security
Toward Full Stack Security
 
New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024New ThousandEyes Product Features and Release Highlights: March 2024
New ThousandEyes Product Features and Release Highlights: March 2024
 
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
AWS Security – Keynote Address (SEC101) | AWS re:Invent 2013
 

Más de Amazon Web Services

Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
Amazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
Amazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
Amazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
Amazon Web Services
 

Más de Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Último

Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
panagenda
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
WSO2
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
?#DUbAI#??##{{(☎️+971_581248768%)**%*]'#abortion pills for sale in dubai@
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Victor Rentea
 

Último (20)

ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..Understanding the FAA Part 107 License ..
Understanding the FAA Part 107 License ..
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
Apidays New York 2024 - The Good, the Bad and the Governed by David O'Neill, ...
 
Artificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : UncertaintyArtificial Intelligence Chap.5 : Uncertainty
Artificial Intelligence Chap.5 : Uncertainty
 
Platformless Horizons for Digital Adaptability
Platformless Horizons for Digital AdaptabilityPlatformless Horizons for Digital Adaptability
Platformless Horizons for Digital Adaptability
 
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWEREMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
EMPOWERMENT TECHNOLOGY GRADE 11 QUARTER 2 REVIEWER
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
Apidays New York 2024 - Accelerating FinTech Innovation by Vasa Krishnan, Fin...
 
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
Apidays New York 2024 - Passkeys: Developing APIs to enable passwordless auth...
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
WSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering DevelopersWSO2's API Vision: Unifying Control, Empowering Developers
WSO2's API Vision: Unifying Control, Empowering Developers
 
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024Finding Java's Hidden Performance Traps @ DevoxxUK 2024
Finding Java's Hidden Performance Traps @ DevoxxUK 2024
 

AWS Summit 2011 : Validating the Security of your AWS Cloud Deployments

  • 1. Validating the Security of your AWS Cloud Deployments Page 1
  • 2. Quick Company Update  Leader in real-world security test and measurement solutions – created automated penetration testing category  1000+ customers: Industry leaders and government – Top 3 Telecomm Companies – Top 3 Network & Communications Equipment Companies – 2 of 3 Top Computer Software Companies – 2 of 3 Top Pharmaceutical Companies – 6 of 7 Top Aerospace and Defense Companies  Explosive product growth and technology innovation Announced this week Page 2 - CONFIDENTIAL -
  • 3. Cloud Security  You are responsible for your own security – just because it is virtualized, does not mean the bad guys will not attack it – Confidence in your provider – Securing and testing your applications and systems  Amazon Web Services – A leader in secure infrastructure – Ideal partner for Core – shared goal of making customers more secure  You must: – Create secure applications and deployments – Use the same security diligence as in your physical infrastructure – Test as often as possible Page 3
  • 4. Case Study  Customer Profile – Cloud-based security provider – Built and run their entire business infrastructure in AWS – Security savvy, and security is a top priority  Challenge: – Want to follow security best practices for their cloud deployment » Similar to traditional on-premise security testing – Verify the security of their hosted applications & instances – Institute low cost, repeatable security testing program for their AWS instances – Miminize human/manual time and effort Page 4 - CONFIDENTIAL -
  • 5. Case Study  Solution – Core CloudInspect, the first automated security testing solution, integrated with AWS  Benefits – Provides easy way to make security testing part of the ongoing deployment and maintenance process – Automates security testing of instances – Uses real-world attack techniques, delivers NO false positives – Automates the test request process via IAM, thus saving human time/effort – Leverage 15 years of security testing technology and expertise  Regular testing should become a best practice for all cloud deployments, with retesting after exposures are remediated Page 5 - CONFIDENTIAL -
  • 7. How Core CloudInspect Works One-time set-up of CloudInspect account with Core – Includes AWS authorization 1. Log-in 2. Select instances to test 3. Select web applications to test 4. Select reports 5. Confirm and pay 6. View progress 7. Retrieve reports Page 7 - CONFIDENTIAL -
  • 8. How It Works: Set-up your CloudInspect account Page 8 - CONFIDENTIAL -
  • 9. How It Works: Log-in and view all your AWS instances Page 9 - CONFIDENTIAL -
  • 10. How It Works: Pick what you want to test Page 10 - CONFIDENTIAL -
  • 11. How It Works: Pick the URLS to test Page 11 - CONFIDENTIAL -
  • 12. How It Works: Select reports Page 12 - CONFIDENTIAL -
  • 13. How It Works: Pay for the test Page 13 - CONFIDENTIAL -
  • 14. How It Works: View progress and retrieve reports Page 14 - CONFIDENTIAL -
  • 15. https://www.corecloudinspect.com AWS Customers Test your first three instances each month for free* Page 15 - CONFIDENTIAL - * Limited offer for AWS customers in 2011
  • 16. The leader in security testing introduces The first automated security testing service for cloud environments. • Fully automated security testing for AWS clients • SaaS-delivered penetration testing for AWS hosted instances: • Cloud-based machine instances • Cloud-based web applications • Identification of security exposures in hosted systems and applications • Verification and validation of cloud deployed applications and systems • Integrated and automated back-end test authorization and payment w/ AWS On-demand security testing service for the Cloud https://www.corecloudinspect.com Page 16 - CONFIDENTIAL -