AWS Security & Compliance Day
|
|
|
- Victor Russell
- 9 years ago
- Views:
Transcription
1 AWS Security & Compliance Day LONDON 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
2 Thank you for attending AWS Security & Compliance Day On the 18 th of June, 2015 at 60 Holborn Viaduct London EC1A 2FD United Kingdom This deck contains four presentations that took place on the day As well as information for our next AWS Security and Compliance Day 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
3 Content Slide 4 Introduction: AWS Security and Compliance in the Public Sector Dob Todorov, Regional Technology Officer, Public Sector Solutions Architecture Principle Architect Security and Compliance, EMEA AWS Slide 21 Toolset for Cloud Security Principles on AWS Dave Walker, Specialised Solutions Architect Security/Compliance, AWS Slide 62 Cloud Security Guidance from CESG for G-Cloud and AWS Security Paavan Mistry, EMEA Security Assurance, AWS Rob Whitmore, WWPS Solutions Architect, AWS Slide 99 Amazon Web Services Smart Citizen Services Chis Hayman, Enterprise Account Manager, AWS
4 Introduction: AWS Security and Compliance in the Public Sector Dob Todorov Regional Technology Officer, Public Sector Solutions Architecture Principle Architect Security and Compliance, EMEA 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
5 Electric Power Generation in the 19 th Century
6 Modern Electric Power Generation & Distribution
7 IT Security in the 20 th Century
8 Modern IT Security Cloud Security
9 The Economics of Cloud Security
10 Cost of Security on Premises / Hosted Facility Technology (Physical Security, Infrastructure, Power, Networking) Processes (standards, procedures, guidelines, assurance, compliance) People (hire, upskill, compensate, train, manage) CapEx OpEx
11 Security and Business Value Security as a Feature : Qualitative measure: either secure or insecure No added end user value Objective Reality: Small or shrinking budgets Threat vectors and agents rising in number and sophistication Challenge: How do we justify the cost of security?
12 Cost of Security in the Cloud Infrastructure secure & compliant at no extra cost CapEx OpEx Technology (Physical Security, Infrastructure, Power, Networking) Processes (standards, procedures, guidelines, assurance, compliance) People (hire, upskill, compensate, train, manage)
13 Advanced Persistent Threats and Cloud
14 Infrastructure Attack (Layer 3 / 4) Examples Asymmetric attacks that use amplification & rely upon depletion of limited resources SYN Flood UDP (NTP) Amplification Flood SYN SYN/ACK Attacker Victim ACK src= dst= NTP DNS SNMP SSDP Connection Table X Reflectors (NTP servers)
15 Architecture for HTTP Flood Elastic resources cannot be depleted. users WAF web app server CloudFront Edge Location ELB Auto Scaling ELB Auto Scaling security group security group security group security group DDoS DMZ public subnet WAF / Proxy private subnet frontend servers private subnet
16 The UK Public Sector Landscape
17 Central Government
18 Local and Regional Government
19 Education and Research
20 Non-for-profit Organisations & Non-government Organisations (NPO/NGO)
21 Toolset for Cloud Security Principles on AWS Dave Walker Specialised Solutions Architect Security/Compliance Amazon Web Services UK Ltd 18 th June , Amazon Web Services, Inc. or its affiliates. All rights reserved
22 Agenda Principle 2: Key Management for Encryption at Rest Principle 3: Separation between Consumers Principle 5: Operational Security Principles 9 and 10: Secure Consumer Management, Identity and Authentication Principle 13: Audit Information Provision to Consumers
23 Principle 2: Key Management for Encryption at Rest
24 CloudHSM Tamper-Proof and Tamper-Evident Destroys its stored keys if under attack FIPS Level 2 certified Base position is to be a Keystore Can also be used to timestamp documents You can send data for encrypt / decrypt Needs to be backed-up (ideally to HSM on customer premises) Can be (and should) be combined in HA clusters Is NOT a key management system but can work with some third-party ones Communicates via: PKCS#11 JCE Some applications need a plugin
25 CloudHSM Integration with S3, EBS, EC2 S3 Integration using SafeNet KeySecure on EC2 White paper at EBS and EC2 Use SafeNet KeySecure (6.1.2 or later) on EC2, backed by CloudHSM, for key management Install SafeNet ProtectV Manager on EC2 (c1.medium / m1.medium) Install ProtectV Client on EC2 instances Use ProtectV for EBS volume encryption (ext3, ext4, swap) Supported platforms: RHEL 5.8, 6.2, 6.3 CentOS 6.2 Microsoft Windows 2008, 2012 Encrypt full EBS-backed EC2 instances, including root volumes
26 AWS Databases and CloudHSM Redshift: When using CloudHSM Redshift gets cluster key from HSM Redshift generates a database key and encrypts it with the cluster key from the CloudHSM Redshift encrypts data with the database key Redshift supports re-encryption RDS RDS / Oracle EE can use CloudHSM to store keys as per Oracle Wallet So TDE can be HSM-backed Note that in-memory database contents (once the database has been unlocked) are cleartext RAM encryption is not something AWS has today, but it has been done in other contexts
27 Principle 3: Separation between Consumers
28 Infrastructure Storage: EBS: LUN segregation S3: Bucket policy; [other things to be put here] Compute: Xen-based hypervisor separation covered as Level 1 application in PCI-DSS Dedicated Instances (optional per instance or per VPC) No other customers on the same underlying physical server
29 Infrastructure Networking: No promiscuous mode, ARP spoofing No need for VLANs; VPC network segregation cfg out-of-band at Layer 2 Bespoke network card and Layer 2 switch firmware See A Day in the Life of a Billion Packets from Re:Invent 2013: Customer-configurable filtering: NACLs (layer 3 stateless; switch ACL-like) Security Groups (Layer 3 stateful; IPFilter-like) ELB: Session-terminating, load-balancing proxy VPC Flow logs: Send VPC, subnet or ENI Layer 3 info to CloudWatch Logs plus 3 rd -party appliances from AWS Marketplace to cover IPS / IDS / WAF etc, as an adjunct to deploying layered software on EC2 instances
30 Principle 5: Operational Security
31 Infrastructure Isolation Support and Engineering Access: EC2 network environment physically isolated from AWS internal networks Support and Services access to underlying EC2 networks limited to via bastion hosts Bastion hosts: Hardened, minimised Linux with bespoke bits Access requires separate per-engineer MFA token from their usual office MFA token, and valid Trouble Ticket All actions (command and response) logged All logs shipped near-realtime over log network to AWS Security for analysis and archive Access revoked when ticket closes Service team access segregated by service Service updates heavily automated (see CodeDeploy)
32 Principles 9 and 10: Secure Consumer Management, Identity and Authentication
33 Identity and Access Management: Authentication Console Username / passwd (enforcable complexity), optional MFA token response Signed URL (token) Multi-factor Authentication ( MFA ) Token-based authn as an adjunct to passwords RFC6238-compatible time-based one-time password Works with Gemalto tokens, software implementations If you need a different token type, look at: Federation SAML recommended for Enterprise integration Tested with OpenLDAP + Shibboleth, Active Directory Authentication happens where the user data is held so implement your own token s plug-in code on your federated on-premises directory You can pentest your own identity repo (but not ours) OAuth / OpenID available for subscriber-based authentication federation
34 Identity and Access Management: Authentication REST API Access Key (for identification), Secret Access Key (for request signing), optional MFA token response Temporary access key / secret access key + token, issued by STS) X.509 certificates (for SOAP API; deprecated)
35 2) SAML SSO SAML to AWS Management Console federation SP console Assertion Attribute SAML subject name RoleArn PrincipalArn RoleSessionName Description Required for SAML role for user entitlements role of IDP in AWS Enables user-specific auditing and access policies federation IDP X.509 certificate Bound to PrincipalArn
36 SAML to AWS (API) STS federation SP ST credentials RoleArn PrincipalArn ST credentials Assertion 1) authentication 2) authn, attributes 3) assertion federation IDP
37 Identity and Access Management: Authorisation Least Privilege Fine-grained permissions Eg EC2 instance stop, start, create, terminate; Security Group assign, rule change Permissions can be assigned by: User (where policy requires) Group (better) Role (best, where practical applicable to users and EC2 instances) Permission Grants can be constrained by: User, Group, Role (naturally!) Source IP address(es), subnet Time of day Use of MFA token Region of instances (a work in progress; works for many EC2 permissions, also applies to RDS)
38 Identity and Access Management: Subtleties Mandatory Access Control Achievable using cross-account sharing, eg: Create an S3 bucket in an account designated for Audit (Apply versioning and MFA Delete on it, naturally more on this shortly) Share it write-only with your Production account, for use by CloudTrail, Config, CloudWatch Logs The bucket policy are invisible and immutable to all users in the Production account, even root! Managed Policies For when you don t necessarily want to write the JSON policy yourself and how to give someone privilege in IAM, without allowing them to rewrite their own account profile
39 Principle 13: Audit Information Provision to Consumers
40 Detailed Billing Billing Information logged Daily in S3 Also Visible in the Billing Console Alarms can be set on Billing Info to Alert on Unexpected Activity
41 Sample Records ItemDescription $0.000 per GB - regional data transfer under the monthly global free tier $0.05 per GB-month of provisioned storage - US West (Oregon) First 1,000,000 Amazon SNS API Requests per month are free First 1,000,000 Amazon SQS Requests per month are free $0.00 per GB - EU (Ireland) data transfer from US West (Northern California) $0.000 per GB - data transfer out under the monthly global free tier First 1,000,000 Amazon SNS API Requests per month are free $0.000 per GB - data transfer out under the monthly global free tier UsageStar UsageEn UsageQua Currenc CostBef Cre tdate ddate ntity ycode oretax dits :00 23:595 USD :00 23: USD :00 23: USD :00 23: USD :00 23:592 USD :00 23: USD :00 23: USD :00 23:593.3E-7 USD TaxAm TaxT TotalCo ount ype st None None None None None None None None 00
42 AWS CloudTrail CloudTrail can help you achieve many tasks Security analysis Track changes to AWS resources, for example VPC security groups and NACLs Compliance log and understand AWS API call history Prove that you did not: Use the wrong region Use services you don t want Troubleshoot operational issues quickly identify the most recent changes to your environment
43 AWS CloudTrail logs can be delivered cross-account CloudTrail can help you achieve many tasks Accounts can send their trails to a central account Central account can then do analytics Central account can: Redistribute the trails Grant access to the trails Filter and reformat Trails (to meet privacy requirements)
44 AWS Config AWS Config is a fully managed service that provides you with an inventory of your AWS resources, lets you audit the resource configuration history and notifies you of resource configuration changes.
45 AWS Config Changing Resources Recording Continuous Change History Stream AWS Config Snapshot (ex ) 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
46 Am I safe? Properly configured resources are critical to security AWS Config enables you to continuously monitor the configurations of your resources at AWS API level, and evaluate these configurations for potential security weaknesses
47 Where is the evidence? Many compliance audits require access to the state of your systems at arbitrary times (i.e. PCI, HIPAA) A complete inventory of all resources and their configuration attributes at AWS API level is available for any point in time
48 What will this change affect? When your resources are created, updated, or deleted, these configuration changes can be streamed to Amazon SNS Relationships between resources are understood, so that you can proactively assess change impact
49 What changed? It is critical to be able to quickly answer What has changed? You can quickly identify the recent configuration changes to your resources by using the console or by building custom integrations with the regularly exported resource history files
50 What resources exist? AWS Config will discover the resources that exist in your account A complete inventory of all resources and their configuration attributes is maintained Available via console or export in JSON to Amazon S3
51 Resource A resource is an AWS object you can create, update or delete on AWS Examples include Amazon EC2 instances, Security Groups, Network ACLs, VPCs and subnets Amazon EC2 Instance, ENI... Amazon VPC VPC, Subnet... Amazon EBS Volumes AWS CloudTrail Log
52 Resources Resource Type Amazon EC2 Amazon EBS Amazon VPC AWS CloudTrail Resource EC2 Instance EC2 Elastic IP (VPC only) EC2 Security Group EC2 Network Interface EBS Volume VPCs Network ACLs Route Table Subnet VPN Connection Internet Gateway Customer Gateway VPN Gateway Trail
53 Relationships Bi-directional map of dependencies automatically assigned Change to a resource propagates to create Configuration Items for related resources
54 Relationships Resource Relationship Related Resource CustomerGateway is attached to VPN Connection Elastic IP (EIP) is attached to Network Interface is attached to Instance Instance contains Network Interface is attached to ElasticIP (EIP) is contained in Route Table is associated with Security Group is contained in Subnet is attached to Volume is contained in Virtual Private Cloud (VPC) InternetGateway is attached to Virtual Private Cloud (VPC)...
55 Configuration Item All AWS API configuration attributes for a given resource at a given point in time, captured on every configuration change
56 Configuration Item Component Description Contains Metadata Information about this configuration item Version ID, Configuration item ID, Time when the configuration item was captured, State ID indicating the ordering of the configuration items of a resource, MD5Hash, etc. Common Attributes Resource attributes Resource ID, tags, Resource type. Amazon Resource Name (ARN) Availability Zone, etc. Relationships Current Configuration Related Events How the resource is related to other resources associated with the account Information returned through a call to the Describe or List API of the resource The AWS CloudTrail events that are related to the current configuration of the resource EBS volume vol is attached to an EC2 instance i- a1b2c3d4 e.g. for EBS Volume State of DeleteOnTermination flag Type of volume. For example, gp2, io1, or standard AWS CloudTrail event ID
57 Configuration Stream Stream of CIs for all changes in an account Contains configuration attributes that changed Available in console and Amazon SNS for programmatic processing
58 Configuration Snapshot Collection of CIs for all resources at given point-in-time , 11:30pm Generated on demand, can be exported to Amazon S , 2:30pm
59 Configuration History Collection of CIs for a given resource over a period of time Available through console and delivered to Amazon S3 for programmatic processing
60 Monitoring: Get consistent visibility of logs Full visibility of your AWS environment CloudTrail will record access to API calls and save logs in your S3 buckets, no matter how those API calls were made Who did what and when and from where (IP address) CloudTrail support for many AWS services and growing - includes EC2, EBS, VPC, RDS, IAM and RedShift Easily Aggregate all instance log information CloudWatch Logs agent scrapes files from EC2 instances and sends them to S3 Also enables alerting with SNS on strings of interest, just like regular CloudWatch CloudWatch Logs used as delivery mechanism for Flow Logging Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic and SumoLogic
61 Toolset for Cloud Security Principles on AWS Dave Walker Specialised Solutions Architect Security/Compliance Amazon Web Services UK Ltd 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
62 Cloud Security Guidance from CESG for G-Cloud and AWS Security Paavan Mistry EMEA Security Assurance Rob Whitmore WWPS Solutions Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
63 Background and context Change from GPMS to GSCP Publication of Cloud Security Principles Buyer ownership of risks associated with OFFICIAL workloads Shift from central accreditation model for IL2/IL3 Assessments Informed Risk
64 Security is the foundation Familiar security model Validated by security experts Collaboration on Enhancements Every Customer Benefits Physical Security Network Security Platform Security People & Procedures
65 Customers Security & compliance is a shared responsibility Customer applications & content Platform, Applications, Identity & Access Management Operating System, Network, & Firewall Configuration Client-side Data Encryption AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Server-side Data Encryption Availability Zones Regions Network Traffic Protection Edge Locations Customers have their choice of security configurations IN the Cloud AWS is responsible for the security OF the Cloud
66 Principle 1 Data in transit protection Description: Consumer data transiting networks should be adequately protected against tampering (integrity) and eavesdropping (confidentiality). This should be achieved via a combination of: network protection (denying your attacker access to intercept data) encryption (denying your attacker the ability to read data) Implementation Objectives: Consumers should be sufficiently confident that: Data in transit is protected between the consumer s end user device and the service Data in transit is protected internally within the service Data in transit is protected between the service and other services (e.g. where APIs are exposed)
67 Principle 1 Data in transit protection API protection TLS protected API endpoints (server authentication) Control plane, resource management Customer network protection VPC (optionally accessible only via VPN) TLS at the instance layer API call signing Overlay networking AWS services encryption S3, RDS, DynamoDB, EMR, ELB
68 Principle 2 Asset protection and resilience Description: Consumer data, and the assets storing or processing it, should be protected against physical tampering, loss, damage or seizure. The aspects to consider comprise: Physical location and legal jurisdiction Data centre security Data at rest protection Data sanitisation Equipment disposal Physical resilience and availability
69 Principle 2 Asset protection and resilience Physical location Physical resilience and availability AZ Transit AZ AZ AZ AZ Transit
70 Principle 2 Asset protection and resilience Data Centre Security Significant experience in building, operating and securing data centres at scale Strict access controls Security staff, video surveillance and intrusion detection systems Multi-factor authentication to data centre floors Data at rest A range of encryption options
71 Principle 2 Asset protection and resilience Data sanitisation Wiping prior to use mandatory (EBS) Supplement with your own techniques to meet specific standards RDS database instances marked for deletion are deleted by an automated sweeper
72 Principle 2 Asset protection and resilience Equipment disposal Techniques per DoD M ( National Industrial Security Program Operating Manual )
73 Principle 3 Separation between consumers Description: Separation between different consumers of the service prevents one malicious or compromised consumer from affecting the service or data of another. Some of the important characteristics which affect the strength and implementation of the separation controls are: the service model (e.g. IaaS, PaaS, SaaS) of the cloud service the deployment model (e.g. public, private or community cloud) of the cloud service the level of assurance available in the implementation of separation controls Implementation Objectives: Consumers should: understand the types of consumer they share the service or platform with have confidence that the service provides sufficient separation of their data and service from other consumers of the service have confidence that their management of the service is kept separate from other consumers (covered separately as part of Principle 9).
74 Principle 3 Separation between consumers Defence in depth Host OS, Instance OS, Firewalls, signed API calls Packet sniffing by other tenants Prevents instances running in promiscuous mode receiving traffic for other instances No access to raw disk Proprietary virtualisation layer (automatic erasing prior to use) Encryption options (traditional filesystem options or AWS managed) Dedicated instances (single tenancy option)
75 Principle 4 Governance framework Description: The service provider should have a security governance framework that coordinates and directs their overall approach to the management of the service and information within it. When procuring a cloud service, ensure that the supplier has a suitable security governance framework in place. Regardless of any technical controls deployed by the supplier, controls will be fundamentally undermined if operating outside an effective risk management and governance regime. A clearly identified, and named, board representative (or a person with the direct delegated authority) who is responsible for the security of the cloud service. A documented framework for security governance, with policies governing key aspects of information security relating to the service. Security and information security as part of the service provider s financial and operational risk reporting mechanisms. Processes to identify and ensure compliance with applicable legal and regulatory requirements relating to the service. Implementation Objectives: The consumer should have sufficient confidence that the governance framework and processes in place for the service are appropriate for their intended use of it.
76 Build everything on a constantly improving security baseline GxP ISO AS9100 ISO/TS AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Availability Zones Regions Edge Locations AWS is responsible for the security OF the Cloud
77 Principle 5 Operational security Description: The service provider should have processes and procedures in place to ensure the operational security of the service. The service will need to be operated and managed securely in order to impede, detect or prevent attacks against it. The aspects to consider comprise: Configuration and change management - ensuring that changes to the system do not unexpectedly alter security properties and have been properly tested and authorised Vulnerability management - ensuring that security issues in constituent components are identified and mitigated Protective monitoring - taking measures to detect attacks and unauthorised activity on the service Incident management - ensuring the service can respond to incidents and recover a secure available service Implementation Objectives: Good operational security should not require complex, bureaucratic, time consuming or expensive processes. In conjunction with good development practices (see Principle 7) it is possible to combine agile and responsive development with appropriate security controls.
78 Principle 5 Operational security Systematic approach to managing change Review: peer reviews of the technical aspects of a change Test: formal testing (including TLA+) Approved: appropriate oversight Phased deployments AZ and Region Closely monitored
79 Principle 5 Operational security Vulnerability management Continual testing regime Regular independent assessment Documented approach to customer pen tests Protective Monitoring Extensive measuring of key operational and security metrics Amazon incident response team Incident management Formal, documented incident response policy and programme Activation and notification, Recovery, Reconstitution phases
80 Principle 6 Personnel security Description: Service provider staff should be subject to personnel security screening and security education for their role. Personnel within a cloud service provider with access to consumer data and systems need to be trustworthy. Service providers need to make clear how they screen and manage personnel within any privileged roles. Personnel in those roles should understand their responsibilities and receive regular security training. More thorough screening, supported by adequate training, reduces the likelihood of accidental or malicious compromise of consumer data by service provider personnel. Implementation Objectives: Consumers should be content with the level of security screening conducted on service provider staff with access to their information or with ability to affect their service.
81 Principle 6 Personnel security Background checks criminal background checks as permitted by applicable law pre-employment screening practices for employees commensurate with the employee s position and level of access to AWS facilities Policy all personnel supporting AWS systems and devices sign a nondisclosure agreement Acceptable use policy Code of conduct and ethics Ongoing Information Security Training Periodic compliance audits
82 Principle 7 Secure development Description: Services should be designed and developed to identify and mitigate threats to their security. Services which are not designed securely may be vulnerable to security issues which could compromise consumer data, cause loss of service or enable other malicious activity. Implementation Objectives: Consumers should be sufficiently confident that: New and evolving threats are reviewed and the service improved in line with them. Development is carried out in line with industry good practice regarding secure design, coding, testing and deployment. Configuration management processes are in place to ensure the integrity of the solution through development, testing and deployment.
83 Principle 7 Secure development Secure software development best practices Formal code review by AWS Security Threat modeling and risk assessment Static code analysis tools are run as a part of the standard build process Recurring penetration testing Security risk assessment reviews begin during the design phase and the engagement lasts through launch to ongoing operations
84 Principle 8 Supply chain security Description: The service provider should ensure that its supply chain satisfactorily supports all of the security principles that the service claims to implement. Cloud services often rely upon third party products and services. Those third parties can have an impact on the overall security of the services. If this principle is not implemented then it is possible that supply chain compromise can undermine the security of the service and affect the implementation of other security principles. Implementation Objectives: The consumer understands and accepts: How their information is shared with, or accessible by, third party suppliers and their supply chains. How the service provider s procurement processes place security requirements on third party suppliers and delivery partners. How the service provider manages security risks from third party suppliers and delivery partners. How the service provider manages the conformance of their suppliers with security requirements. How the service provider verifies that hardware and software used in the service is genuine and has not been tampered with.
85 Principle 8 Supply chain security Asset tracking AWS hardware assets are assigned an owner and tracked and monitored by AWS personnel with proprietary inventory management tools Personnel requirements All persons working with AWS information must at a minimum, meet the screening process for pre-employment background checks and sign a Non-Disclosure Agreement (NDA)
86 Principle 9 Secure consumer management Description: Consumers should be provided with the tools required to help them securely manage their service. Management interfaces and procedures are a vital security barrier in preventing unauthorised people accessing and altering consumers resources, applications and data. The aspects to consider comprise: Authentication of consumers to management interfaces and within support channels Separation and access control within management interfaces
87 Principle 9 Secure consumer management IAM (Identity and Access Management) Granular control to AWS resources Least privilege role based access Delegated API access
88 Principle 10 Identity and authentication Description: Consumer and service provider access to all service interfaces should be constrained to authenticated and authorised individuals. All cloud services will have some requirement to identify and authenticate users wishing to access service interfaces. Weak authentication or access control may allow unauthorised changes to a consumer s service, theft or modification of data, or denial of service. It is also important that authentication occurs over secure channels. Use of insecure channels such as , HTTP or telephone can be more vulnerable to interception or social engineering attacks. Implementation Objectives: Consumers should have sufficient confidence that identity and authentication controls ensure users are authorised to access specific interfaces.
89 Principle 10 Identity and authentication Multiple options for account access IAM Key management and rotation Temporary security credentials Multi-Factor Authentication Federation Host Operating System access Rigorous access control Purpose-built Bastion hosts for the management plane Guest Operating System access Retain control and freedom of choice (supported with best practices)
90 Principle 11 External interface protection Description: All external or less trusted interfaces of the service should be identified and have appropriate protections to defend against attacks through them. If an interface is exposed to consumers or outsiders and it is not sufficiently robust, then it could be subverted by attackers in order to gain access to the service or data within it. If the interfaces exposed include private interfaces (such as management interfaces) then the impact may be more significant. Consumers can use different models to connect to cloud services which expose their enterprise systems to varying levels of risk. Implementation Objectives: The consumer understands how to safely connect to the service whilst minimising risk to the consumer s systems. The consumer understands what physical and logical interfaces their information is available from. The consumer has sufficient confidence that protections are in place to control access to their data. The consumer has sufficient confidence that the service can determine the identity of connecting users and services to an appropriate level for the data or function being accessed.
91 Principle 11 External interface protection Secure network architecture Firewalls and boundary protection devices (rulesets and ACL s) Approved by Amazon Information Security Polices automatically pushed Wide variety of automated monitoring systems Documentation maintained for incident handling Post mortems (Cause of Error COE) Secure Access Points to AWS API interfaces HTTPS redundant connections Choice of VPN options for VPC connectivity AWS provide Virtual Private Gateway Marketplace appliances
92 Principle 12 Secure service administration Description: The methods used by the service provider s administrators to manage the operational service should be designed to mitigate any risk of exploitation that could undermine the security of the service. The security of a cloud service is closely tied to the security of the service provider s administration systems. Access to service administration systems gives an attacker high levels of privilege and the ability to affect the security of the service. Therefore the design, implementation and management of administration systems should reflect their higher value to an attacker. A service administration network is a specialised form of enterprise network. There are a wide range of options for how this can be designed, delivered, managed and secured. It is expected that standard enterprise good practice be followed in the design and operation of these systems, but at a level reflecting their higher value. Implementation Objectives: Consumers have sufficient confidence that the technical approach the service provider uses to manage the service does not put their data or service at risk.
93 Principle 12 Secure service administration User access procedures Adds, modifications, deletions Password complexity and policies Least privilege principle Periodic review Automatic revocation Management plane controls Purpose built administration hosts (bastion hosts) MFA access Access logged and audited Revoked if no business need
94 Principle 13 Audit information provision to consumers Description: Consumers should be provided with the audit records they need to monitor access to their service and the data held within it. The type of audit information available to consumers will have a direct impact on their ability to detect and respond to inappropriate or malicious usage of their service or data within reasonable timescales. Implementation Objectives: Consumers are: Aware of the audit information that will be provided to them, how and when it will be made available to them, the format of the data, and the retention period associated with it. Confident that the audit information available will allow them to meet their needs for investigating misuse or incidents.
95 Principle 13 Audit information provision to consumers Services controlled via API s CloudTrail History of API calls (AWS Management Console, AWS SDKs, command line tools, and higher-level AWS services) Enables security analysis, resource change tracking, and compliance auditing Logs provided to customers through S3 buckets Full control over onward sharing
96 Principle 14 Secure use of the service by the consumer Description: Consumers have certain responsibilities when using a cloud service in order for their use of it to remain secure, and for their data to be adequately protected. The security of cloud services and the data held within them can be undermined by poor use of the service by consumers. The extent of the responsibility on the consumer for secure use of the service will vary depending on the deployment models of the cloud service, specific features of an individual service and the scenario in which the consumers intend to the use the service. Implementation Objectives: The consumer understands any service configuration options available to them and the security implications of choices they make. The consumer understands the security requirements on their processes, uses, and infrastructure related to the use of the service. The consumer can educate those administrating and using the service in how to use it safely and securely.
97 Principle 14 Secure use of the service by the consumer Support and communications Service Health Dashboard Account teams Acceptable Use Policies Best Practices Security Centre Training and Certification Premium Support Trusted Advisor
98 More information Contact your account team AWS Security Centre - AWS Compliance Centre - AWS Whitepapers -
99 Amazon Web Services Smart Citizen Services Chris Hayman Enterprise Account Manager 18 th June , Amazon Web Services, Inc. or its affiliates. All rights reserved
100 About How did Amazon Amazon Web Services Deep experience in building and operating global web scale systems get into cloud computing?
101 Service Breadth & Depth Support Professional Services Partner Ecosystem Training & Certification Solutions Architects Account Management Security & Pricing Reports Technical & Business Support Virtual Desktop Sharing & Collaboration Business Enterprise Applications Analytics App Services Developer Tools & Operations Mobile Services Hadoop Queuing & Notifications Transcoding Deployment Resource Templates Identity Real-time Streaming Data Workflow DevOps Containers Sync Data Warehouse Data Pipelines App Streaming Search Application Lifecycle Management Event-driven Computing Mobile Analytics Push Notifications Platform Services Identity Management Access Control Resource & Usage Auditing Key Management & Storage Monitoring & Logs Administration & Security Compute (VMs, Auto-scaling & Load Balancing) Storage (Object, Block and Archival) CDN Databases (Relational, NoSQL, Caching) Networking (VPC, DX, DNS) Core Services Regions Availability Zones Points of Presence Infrastructure
102 AWS History of Innovation AWS has been continually expanding its services to support virtually any cloud workload, and it now has more than 40 services. Amazon Simple DB Elastic Load Balancing Auto Scaling Amazon VPC Amazon RDS Amazon SES AWS Elastic Beanstalk AWS CloudFormation Amazon Elasticache AWS Direct Connect AWS GovCloud Amazon Elastic Transcoder AWS OpsWorks Amazon CloudHSM Amazon AppStream Amazon CloudTrail Amazon WorkSpaces Amazon Kinesis Amazon WorkMail Amazon S3 Amazon SQS Amazon EC2 Amazon EBS Amazon CloudFront Amazon SNS Amazon IAM Amazon Route 53 In the last five years, AWS launched 1,203 new features and/or services for a total of 1,339 since inception in AWS Storage Gateway Amazon DynamoDB Amazon CloudSearch Amazon SWF Amazon Glacier Amazon Redshift AWS Data Pipeline Amazon ECS Amazon Lambda Amazon Config AWS CodeDeploy Amazon RDS for Aurora AWS KMS Amazon Cognito Amazon WorkDocs AWS Directory Service Amazon Mobile Analytics Mar 31, 2015
103 Global Footprint Everyday, AWS adds enough new server capacity to support Amazon.com when it was a $7 billion global enterprise. Over 1 million active customers across 190 countries 900+ government agencies 3,400+ educational institutions 11 regions 28 availability zones 53 edge locations Region Edge Location
104 Architected for Gov t Security Requirements Certifications and accreditations for workloads that matter AWS CloudTrail and AWS Config - Call logging and configuration management for governance & compliance Log, review, alarm on all user actions Browse and query database of current and previous state of cloud resources
105 Security is a Shared Responsibility Customers Refocus on Systems and Apps Security experts are a scarce resource! Refocus your security professional on a subset of the problem Customers Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure Virtualization layer (EC2) Hardened service endpoints Rich IAM capabilities Network configuration Security groups + = OS firewalls Operating systems Application security Proper service configuration AuthN & acct management Authorization policies More secure and compliant systems than any single entity could achieve on its own
106 Smart Citizen Services There is no better way to improve the lives of billions of people around the world than to improve the way cities work Michael Bloomberg former mayor of New York Goldsmith, S. and Crawford, S. The responsive city: Engaging communities through data-smart governance. Hoboken, New Jersey: John Wiley and Sons, 2014
107 The Interconnected City
108 Four AWS Services that enable Smart Citizen Services
109 Interconnected Smart Grids
110 AWS Lambda AWS Lambda is a compute service that runs your code in response to events such as image uploads, in-app activity, website clicks, or outputs from connected devices.
111 Mobile Services for Citizen Engagement
112 Authenticate users Amazon Cognito (Identity Broker) Store and share media Amazon S3 Transfer Manager Authorize access AWS Identity and Access Management Synchronize data Amazon Cognito (Sync) Analyze User Behavior Amazon Mobile Analytics Run Business Logic AWS Lambda Your Mobile App AWS Mobile SDK Deliver media Amazon CloudFront (Device Detection) Send push notifications Amazon SNS Mobile Push Store shared data Amazon DynamoDB (Object Mapper) Stream real-time data Amazon Kinesis (Recorder)
113 Statistical Predictions
114 Introducing Amazon Machine Learning Easy to use, managed machine learning service built for developers Robust, powerful machine learning technology based on Amazon s internal systems Create models using your data already stored in the AWS cloud Deploy models to production in seconds
115 Machine learning and smart applications Machine learning is the technology that automatically finds patterns in your data and uses them to make predictions for new data points as they become available. Your data + machine learning = smart applications
116 Managing the Data Deluge
117 Amazon Redshift Amazon Redshift is a fast, fully managed, petabyte-scale data warehouse solution that makes it simple and costeffective to efficiently analyze all your data using your existing business intelligence tools
118 Thank you for attending! We look forward to seeing you at our next AWS Security & Compliance Day on the 22nd of October 2015 at 60 Holborn Viaduct London EC1A 2FD United Kingdom Register here 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
AWS Security & Compliance Day
AWS Security & Compliance Day LONDON 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Thank you for attending AWS Security & Compliance Day On the 18 th of June, 2015 at 60 Holborn
How To Use Aws.Com
Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda
Introduction to AWS in Higher Ed
Introduction to AWS in Higher Ed Lori Clithero [email protected] 206.227.5054 University of Washington Cloud Day 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2 Cloud democratizes
Amazon Web Services. 2015 Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand
Amazon Web Services 2015 Annual ALGIM Conference Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Who
Thing Big: How to Scale Your Own Internet of Things. Walter'Pernstecher'-'[email protected]' Dr.'Markus'Schmidberger'-'schmidbe@amazon.
Thing Big: How to Scale Your Own Internet of Things Walter'Pernstecher'-'[email protected]' Dr.'Markus'Schmidberger'-'[email protected]' Internet of Things is the network of physical objects or "things"
AIST Data Symposium. Ed Lenta. Managing Director, ANZ Amazon Web Services
AIST Data Symposium Ed Lenta Managing Director, ANZ Amazon Web Services Why are companies adopting cloud computing and AWS so quickly? #1: Agility The primary reason businesses are moving so quickly to
Security Essentials & Best Practices
Security Essentials & Best Practices Overview Overview of the AWS cloud security concepts such as the AWS security center, Shared Responsibility Model, and Identity and Access Management. 1 AWS Security
Service Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 September 30, 2015 Ernst & Young LLP Suite 1600 560 Mission
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
SECURITY IS JOB ZERO. Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs
SECURITY IS JOB ZERO Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs Security is Job Zero Physical Security Network Security Platform Security People & Procedures
Introduction to Amazon Web Services! Leo Zhadanovsky! @leozh [email protected]! Senior Solutions Architect
Introduction to Amazon Web Services! Leo Zhadanovsky! @leozh [email protected]! Senior Solutions Architect AWS HISTORY About How didamazon Amazon Web Services! Deep experience in building and operating global
LONDON. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
LONDON 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Best Practices for Building Partner Managed Services on AWS Kelly Hartman, Global Segment Leader, MSPs Kyle Lichtenberg, Solutions
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Service Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security For the Period April 1, 2013 March 31, 2014 Ernst & Young LLP Suite 1600 560 Mission Street San Francisco,
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
DLT Solutions and Amazon Web Services
DLT Solutions and Amazon Web Services For a seamless, cost-effective migration to the cloud PREMIER CONSULTING PARTNER DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Duane Thorpe Phone:
Amazon Web Services. Lawrence Berkeley LabTech Conference 9/10/15. Jamie Baker Federal Scientific Account Manager AWS WWPS bakjames@amazon.
Web Services Lawrence Berkeley LabTech Conference 9/10/15 Jamie Baker Federal Scientific Account Manager AWS WWPS [email protected] 2015, Web Services, Inc. or its Affiliates. All rights reserved. AWS
Razvoj Java aplikacija u Amazon AWS Cloud: Praktična demonstracija
Razvoj Java aplikacija u Amazon AWS Cloud: Praktična demonstracija Robert Dukarić University of Ljubljana Faculty of Computer and Information Science Laboratory for information systems integration Competence
PATCH MANAGER what does it do?
PATCH MANAGER what does it do? PATCH MANAGER SAAS maps all your physical assets and physical infrastructure such as network and power cabling, racks, servers, switches, UPS and generators. It provides
AWS Directory Service. Simple AD Administration Guide Version 1.0
AWS Directory Service Simple AD Administration Guide AWS Directory Service: Simple AD Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's
Using ArcGIS for Server in the Amazon Cloud
Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS
Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Cloud Computing with Amazon Web Services and the DevOps Methodology. www.cloudreach.com
Cloud Computing with Amazon Web Services and the DevOps Methodology Who am I? Max Manders @maxmanders Systems Developer at Cloudreach @cloudreach Director / Co-Founder of Whisky Web @whiskyweb Who are
AWS IaaS Services. Methods Digital GCloud Service Definition
Methods Digital GCloud Service Definition HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL Midlands Office: Pure Offices, Lake
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
CLOUD COMPUTING WITH AWS An INTRODUCTION. John Hildebrandt Solutions Architect ANZ
CLOUD COMPUTING WITH AWS An INTRODUCTION John Hildebrandt Solutions Architect ANZ AGENDA Todays Agenda Background and Value proposition of AWS Global infrastructure and the Sydney Region AWS services Drupal
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
AWS Key Management Service. Developer Guide
AWS Key Management Service Developer Guide AWS Key Management Service: Developer Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks
Primex Wireless OneVue Architecture Statement
Primex Wireless OneVue Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2015 Primex Wireless, Inc. The Primex logo is a registered
IAN MASSINGHAM. Technical Evangelist Amazon Web Services
IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II
AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud
UTILIZING CLOUDCHECKR FOR SECURITY
UTILIZING CLOUDCHECKR FOR SECURITY A guide to security in your AWS Environment Abstract This document outlines steps to properly secure your AWS environment using CloudCheckr. We cover CloudCheckr use
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros
David Moses January 2014 Paper on Cloud Computing I Background on Tools and Technologies in Amazon Web Services (AWS) In this paper I will highlight the technologies from the AWS cloud which enable you
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
Logentries Insights: The State of Log Management & Analytics for AWS
Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by
Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager
Expand Your Infrastructure with the Elastic Cloud Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager Today we re going to talk about The Cloud Scenarios Questions You Probably
www.boost ur skills.com
www.boost ur skills.com AWS CLOUD COMPUTING WORKSHOP Write us at [email protected] BOOSTURSKILLS No 1736 1st Amrutha College Road Kasavanhalli,Off Sarjapur Road,Bangalore-35 1) Introduction &
Encrypting Data at Rest
Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
Running Oracle Applications on AWS
Running Oracle Applications on AWS Bharath Terala Sr. Principal Consultant Apps Associates LLC June 09, 2014 Copyright 2014. Apps Associates LLC. 1 Agenda About the Presenter About Apps Associates LLC
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
EEDC. Scalability Study of web apps in AWS. Execution Environments for Distributed Computing
EEDC Execution Environments for Distributed Computing 34330 Master in Computer Architecture, Networks and Systems - CANS Scalability Study of web apps in AWS Sergio Mendoza [email protected]
Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
TECHNOLOGY WHITE PAPER Jan 2016
TECHNOLOGY WHITE PAPER Jan 2016 Technology Stack C# PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache CloudWatch Paypal Overview
Media Shuttle s Defense-in- Depth Security Strategy
Media Shuttle s Defense-in- Depth Security Strategy Introduction When you are in the midst of the creative flow and tedious editorial process of a big project, the security of your files as they pass among
Microservices on AWS
Microservices on AWS AWS Summit Berlin 2016 Matthias Jung, Solutions Architect Julien Simon, Evangelist April, 12 th, 2016 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda
Simple Storage Service (S3)
Simple Storage Service (S3) Amazon S3 is storage for the Internet. It is designed to make web-scale computing easier for developers. Amazon S3 provides a simple web services interface that can be used
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV. Nadav Elkabets Presale Consultant
Securing sensitive data at Rest ProtectFile, ProtectDb and ProtectV Nadav Elkabets Presale Consultant Protecting Your Data Encrypt Your Data 1 ProtectFile StorageSecure ProtectDB ProtectV Databases File
AWS Security Best Practices
AWS Security Best Practices Dob Todorov Yinal Ozkan November 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 56 Table of Contents Abstract... 4 Overview...
Last time. Today. IaaS Providers. Amazon Web Services, overview
Last time General overview, motivation, expected outcomes, other formalities, etc. Please register for course Online (if possible), or talk to CS secretaries Cloud computing introduction General concepts
How To Protect Your Data From Harm
Introduction to Auditing the Use of AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents
Amazon WorkDocs. Administration Guide Version 1.0
Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
Amazon Web Services: Overview of Security Processes August 2015
Amazon Web Services: Overview of Security Processes August 2015 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) Page 1 of 75 Table of Contents Introduction... 5 Shared
Last time. Today. IaaS Providers. Amazon Web Services, overview
Last time General overview, motivation, expected outcomes, other formalities, etc. Please register for course Online (if possible), or talk to CS secretaries Course evaluation forgotten Please assign one
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Enterprise IT in the Cloud How to accelerate your business and be an IT hero
Excel London Enterprise IT in the Cloud How to accelerate your business and be an IT hero Stephen Orban, Head of Enterprise Strategy, AWS @stephenorban 2015, Amazon Web Services, Inc. or its affiliates.
Amazon Web Services: Overview of Security Processes August 2015
Amazon Web Services: Overview of Security Processes August 2015 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) Page 1 of 75 Table of Contents Introduction... 5 Shared
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Security, Compliance and Sharing of Genomic Data on the Cloud
Security, Compliance and Sharing of Genomic Data on the Cloud Angel Pizarro Scientific and Research Computing Amazon Web Services [email protected] 2015 Amazon.com, Inc. and its affiliates. All rights reserved.
Threat Modeling Cloud Applications
Threat Modeling Cloud Applications What You Don t Know Will Hurt You Scott Matsumoto Principal Consultant [email protected] Software Confidence. Achieved. www.cigital.com [email protected] +1.703.404.9293
AWS Benefits, Regions & Across. Paul Yung Head of Territory Development HK, Macau & TW [email protected]
AWS Benefits, Regions & Across Paul Yung Head of Territory Development HK, Macau & TW [email protected] Consumer Business Seller Business IT Infrastructure Business What is Cloud Computing? An analogy:
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
A Comparison of Clouds: Amazon Web Services, Windows Azure, Google Cloud Platform, VMWare and Others (Fall 2012)
1. Computation Amazon Web Services Amazon Elastic Compute Cloud (Amazon EC2) provides basic computation service in AWS. It presents a virtual computing environment and enables resizable compute capacity.
Overview and Deployment Guide. Sophos UTM on AWS
Overview and Deployment Guide Sophos UTM on AWS Overview and Deployment Guide Document date: November 2014 1 Sophos UTM and AWS Contents 1 Amazon Web Services... 4 1.1 AMI (Amazon Machine Image)... 4 1.2
Innovative Geschäftsmodelle Ermöglicht durch die AWS Cloud
Innovative Geschäftsmodelle Ermöglicht durch die AWS Cloud Rolf Kersten Business Development Manager Amazon Web Services Germany GmbH 2. Juli 2014 2014 Software AG. All rights reserved. Sechs Dinge, die
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
Data Protection: From PKI to Virtualization & Cloud
Data Protection: From PKI to Virtualization & Cloud Raymond Yeung CISSP, CISA Senior Regional Director, HK/TW, ASEAN & A/NZ SafeNet Inc. Agenda What is PKI? And Value? Traditional PKI Usage Cloud Security
How To Manage An Orgsync Database On An Amazon Cloud 2 Instance
A Most Simple Cloud Is Amazon RDS for Oracle Right for You? Jeremiah Wilton, Principal Consultant June, 2014 Jeremiah Wilton [email protected] @oradebug Working with Oracle since 1994 (v.5) Amazon s first
Amazon WorkSpaces. Administration Guide Version 1.0
Amazon WorkSpaces Administration Guide Amazon WorkSpaces: Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Amazon Web Services: Overview of Security Processes May 2011
Amazon Web Services: Overview of Security Processes May 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 Amazon Web Services (AWS) delivers a scalable cloud computing
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
WE RUN SEVERAL ON AWS BECAUSE WE CRITICAL APPLICATIONS CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY.
WE RUN SEVERAL CRITICAL APPLICATIONS ON AWS BECAUSE WE CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY. - Murari Gopalan Director, Technology Expedia Expedia, a leading online travel company for leisure
Cloud Security Case Study Amazon Web Services. Ugo Piazzalunga Technical Manager, IT Security [email protected]
Cloud Security Case Study Amazon Web Services Ugo Piazzalunga Technical Manager, IT Security [email protected] Agenda 1. Amazon Web Services challenge 2. Virtual Instances and Virtual Storage
FMCS SECURE HOSTING GUIDE
FMCS SECURE HOSTING GUIDE October 2015 SHG-MNL-v3.0 CONTENTS INTRODUCTION...4 HOSTING SERVICES...4 Corporate Secure Hosting... 4 Hosting Partner... 4 Hosting Location... 4 Physical Security... 4 Risk and
Introduction to DevOps on AWS
Introduction to DevOps on AWS David Chapman December 2014 Contents Contents Abstract Introduction Agile Evolution to DevOps Infrastructure as Code AWS CloudFormation AWS AMI Continuous Deployment AWS CodeDeploy
Financial Services Grid Computing on Amazon Web Services January 2013 Ian Meyers
Financial Services Grid Computing on Amazon Web Services January 2013 Ian Meyers (Please consult http://aws.amazon.com/whitepapers for the latest version of this paper) Page 1 of 15 Contents Abstract...
A Decision Maker s Guide to Securing an IT Infrastructure
A Decision Maker s Guide to Securing an IT Infrastructure A Rackspace White Paper Spring 2010 Summary With so many malicious attacks taking place now, securing an IT infrastructure is vital. The purpose
PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS
PCI on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for PCI on AWS David Clevenger November 2015 Summary Payment Card Industry (PCI) is an accreditation body that
IBM Cognos TM1 on Cloud Solution scalability with rapid time to value
IBM Solution scalability with rapid time to value Cloud-based deployment for full performance management functionality Highlights Reduced IT overhead and increased utilization rates with less hardware.
Smartronix Inc. Cloud Assured Services Commercial Price List
Smartronix Inc. Assured Services Commercial Price List Smartronix, Inc. 12120 Sunset Hills Road Suite #600, Reston, VA 20190 703-435-3322 [email protected] www.smartronix.com Table of Contents
Hadoop & Spark Using Amazon EMR
Hadoop & Spark Using Amazon EMR Michael Hanisch, AWS Solutions Architecture 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Why did we build Amazon EMR? What is Amazon EMR?
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Amazon Web Services: Overview of Security Processes June 2014
Amazon Web Services: Overview of Security Processes June 2014 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) Page 1 of 68 Table of Contents Shared Responsibility
Vodafone Total Managed Mobility
Vodafone Total Managed Mobility More productivity, less complexity Vodafone Power to you What s inside? What you get see how your business benefits 4 In detail find out how it all works 5 Service lifecycle
