Security, Compliance and Sharing of Genomic Data on the Cloud
|
|
|
- Molly Franklin
- 10 years ago
- Views:
Transcription
1 Security, Compliance and Sharing of Genomic Data on the Cloud Angel Pizarro Scientific and Research Computing Amazon Web Services 2015 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.
2 The Cancer Genome Atlas 20 Adult cancers 10,000 tumor pairs
3 Cancer Genomics Hub 50K Genomes at ~ $100/year/genome Houses genomes for all major National Cancer Institute projects (TCGA, TARGET, etc) 1.5PB (growing to 2.5PB in the next year) Serving over 1PB of data a month
4 CGHub Growth: Storage vs. Transfer >1PB / month Requester must have at least that much storage to analyze Requester must have a lot of compute Unsustainable
5 Data held in silos, unshared No one institute has enough on its own to make progress
6 Founded on June 5, 2013 Founding partners: 70+ leading healthcare, research, and disease advocacy organizations Now: more than 170 members from 40 countries Mission: to enable rapid progress in biomedicine Plan: Create and maintain the interoperability of technology platform standards for managing and sharing genomic data in clinical samples Develop guidelines and harmonizing procedures for privacy and ethics in the international regulatory context Engage stakeholders across sectors to encourage the responsible and voluntary sharing of data and of methods
7 GA4GH API promotes sharing GATTTATCTGCTCTCGTTG GAAGTACAAAATTCATTATGCAC AAAATCTGTAG
8 Advantages of Storing and Sharing in a Federated, Cloud-based Commons No single owner: Each Institute keeps data on either private or commercial cloud No one entity controls the world s genome data Globalization: Internet data exchange and containerized computation provide global transaction capability and ubiquitous availability Reduced cost: Hardware and storage disk costs reduced by bulk purchases Operational costs reduced by building datacenters in optimal locations and deploying automated systems Security: Many clouds are already proven for use with sensitive data Elasticity: In a large cloud, the cost of 1 computer for 1,000 hours is the same as the cost of 1000 computers for 1 hour (about $1.50/machine/hour). No machines sit idle.
9 Under the Hood at GA4GH We work together in an open source software development environment on the web: All groups are welcome to participate Decision making is done by protocols developed by Apache Open Source Software Foundation Leadership is determined by amount of contribution Simple Mantra: collaborate on interface, compete on implementation
10 Interoperability: One API, Many Apps Genome Browser Repository (EBI) Command-line Interface MapReduce Wrapper Repository (NCBI) Local Repository Beacons Repository (Google) New Algorithms Repository (AWS)
11 GA4GH Driver Project: Beacons to Discover Data YES Do you have any genomes with an A at position 100,735 on chromosome 3? NO I can neither confirm nor deny that request
12 rs6152 Located in the first exon of the androgen receptor AR gene located on the X chromosome, is highly indicative of the ability to develop male pattern baldness
13 Digging Deeper into the Data Repository Discovery (Public) Does the data exist? Anonymous user Query: Do you have any genomes with an A at position 100,735 on chromosome 3? Reply: Yes or No Data Context Queries (Registered) Does the data have the properties I require? Registered user Shows details of studies with data of interest to user and provides link for requesting full access Full Data Access (Controlled) Give me the full dataset Approved user (signed contract) Permits full access to genotype, phenotype and raw DNA sequence
14 GA4GH Big Data Commons Model name: which object do I want? protocol: how do I get it? content: what does it mean?
15 GA4GH Big Data Commons Model The Web is based on three interlocking standards. Web name: which object do I want? URLs are universal identifiers for web objects. protocol: how do I get it? HTTP is the standard API that any web browser can use to request information from any web server. content: what does it mean? HTML is the single most important content type on the web, connecting data like text, images, videos, and PDFs.
16 GA4GH Big Data Commons Model The Global Alliance APIs define equivalents Web Global Alliance APIs name: which object do I want? URLs are universal identifiers for web objects. The GA4GH APIs define content digests that uniquely identify genomic and other objects. protocol: how do I get it? HTTP is the standard API that any web browser can use to request information from any web server. The GA4GH APIs define methods for requesting data. For example, a genome browser can use the searchreads method to request genomic reads, and get back a SearchReadsResponse, whether it's talking to a genome server at NCBI, EBI, or Google. content: what does it mean? HTML is the single most important content type on the web, connecting data like text, images, videos, and PDFs. The GA4GH APIs define logical schemas for every object, such as ReadGroup and Variant.
17 Data Content Digests as Identifiers Cryptographic 1-way hash function used Data dependent, not format dependent Unique to a data set Unforgeable and verifiable Privacy preserving Decentralized A file and database with same data encoded within have the same digest.
18 Methodologies for Data Content Digests Hashing allows o decentralized generation, privacy-preserving digests, unforgeable, unique A digest is computed on data itself, not storage format o serves as a distributed Rosetta Stone between repositories, formats, and accessions o unique to each specific version of data, used to establish provenance At a base level digests are computed on coarse-grained, immutable data objects (if data are changed, a new digest is created) Digests are composeable to create hierarchies for larger and larger sets of objects without needing to create additional copies of base level objects
19 Example Digest: SAM/BAM Record level digests File or data set digest At a dataset level, an order independent digest of each read & alignment would identify the dataset.
20 Putting it All Together Compute Environment The compute environments support running arbitrary analysis or processing pipelines. The only requirement for pipeline developers is that they use the GA4GH API to access data, so code running in any compute environment can work with data hosted in any data environment. GA4GH Data Environment Data repositories are responsible for: o storing data, using whatever internal representation they deem appropriate o managing globally unique data content digests, so that anyone anywhere can unambiguously refer to a particular data object (e.g. all the reads from a given sample ) o keeping track of authorization: single access control list for who is allowed to see what data All data is exposed to the outside world via the GA4GH API. o users of the data don't care about the internals; they just have to know how to call the API. Compute environment arbitrary pipeline GA4GH API Server source of truth data 1) curate data (reads,calls, ) 2) globally unique IDs/digests 3) authz (who may see what) GA4GH data environment
21 Security and Compliance Shared responsibility Emphasis on encryption Authentication and authorization at the data object level
22 GA4GH Working Groups Genome Data Working Group (co-led by David Haussler and Richard Durbin) Clinical Data Working Group (co-led by Charles Sawyers and Kathryn North) Security Working Group (co-led by Paul Flicek and Dixie Baker) Regulatory and Ethics Working Group (co-led by Bartha Knoppers, Kazuto Kato and Partha Majumder)
23 GA4GH Driving Projects Currently active: 1. Beacon Project: (Steve Sherry, Marc Fiume) public querying of simple top level information about genetic variants 1. Genomic Matchmaker: (Heidi Rehm, Anthony Philippakis) expert sharing of rare genetic variants 1. BRCA Challenge: (Gunnar Rätsch) aggregation of research and clinical data to assess pathogenicity and penetrance of all variants in BRCA1 and 2
24 Ultimate Goal patient Assess clinical outcomes Select patient treatment Learning System Compare treatment effectiveness Implement new evidence for treatment prioritization
25 Amazon Web Services
26 Enterprise Applications Virtual Desktops Database s Relational Platform Services Infrastructure Analytics App Services Deployment & Management Hadoop Queuing Containers Real-time Orchestration Dev/ops Tools App Streaming No SQL Data Warehouse Data Workflows Caching Foundation Services Collaboration and Sharing Identity Sync Resource Templates Transcoding Search Compute Storage (VMs, Auto-scaling and Load Balancing) (Object, Block and Archive) Regions Mobile Services Availability Zones Mobile Analytics Usage Tracking Monitoring and Logs Security & Access Control Notifications Networking CDN and Points of Presence
27 Global Footprint Everyday, AWS adds enough new server capacity to support Amazon.com when it was a $7 billion global enterprise. Over 1 million active customers across 190 countries 800+ government agencies 3,000+ educational institutions 11 regions 28 availability zones 52 edge locations
28 AWS Regions and Availability Zones US East (VA) Availability Zone A Availability Zone B Availability Zone C Customer Decides Where Applications and Data Reside Note: Conceptual drawing only. The number of Availability Zones may vary.
29 Enterprise Applications Virtual Desktops Database s Relational Platform Services Infrastructure Analytics App Services Deployment & Management Hadoop Queuing Containers Real-time Orchestration Dev/ops Tools App Streaming No SQL Data Warehouse Data Workflows Caching Foundation Services Collaboration and Sharing Identity Sync Resource Templates Transcoding Search Compute Storage (VMs, Auto-scaling and Load Balancing) (Object, Block and Archive) Regions Mobile Services Availability Zones Mobile Analytics Usage Tracking Monitoring and Logs Security & Access Control Notifications Networking CDN and Points of Presence
30 Full stack sequence analysis platform Storage Compute Sequence data Upstream analysis Databases Variants Expression Phenotypes Analytics Data mining
31 1+ Million Cancer Genome Data Warehouse
32 Security is a Shared Responsibility
33 Customer Shared responsibility model Customer Data Platform, Applications, Identity & Access Management SOC 1/SSAE 16/ISAE 3402 SOC 2 ISO 27001/ 2 Certification Payment Card Industry (PCI) Data Security Standard (DSS) NIST Compliant Controls DoD Compliant Controls FedRAMP HIPAA and ITAR Compliant Operating System, Network & Firewall Configuration Server-side Encryption (File System and/or Data) Client-side Data Encryption & Data Integrity Authentication Amazon Customers implement their own set of controls Multiple customers with FISMA Low and Moderate ATOs Network Traffic Protection (Encryption/Integrity/Identity) Foundation Services Compute Storage AWS Global Infrastructure Database Networking Availability Zones Edge Locations Regions
34 Shared responsibility model Customer/Partner Facilities Network configuration Physical security Security groups Compute infrastructure Storage infrastructure Network infrastructure + OS firewalls Operating systems Applications Virtualization layer (EC2) Proper service configuration Hardened service endpoints Auth & acct management Rich IAM capabilities Authorization policies = Re-focus your security professionals on a subset of the problem Take advantage of high levels of uniformity and automation First global public cloud provider to achieve certification for security & quality management system
35 NIH dbgap security best practices Physical security Data center access and remote administrator access Electronic security User account security (for example, passwords) Use of Access Control Lists (ACLs) Secure networking Encryption of data in transit and at rest OS and software patching Data access security Authorization of access to data Tracking copies; cleaning up after use
36 Enterprise Applications Virtual Desktops Database s Relational Platform Services Infrastructure Analytics App Services Deployment & Management Hadoop Queuing Containers Real-time Orchestration Dev/ops Tools App Streaming No SQL Data Warehouse Data Workflows Caching Foundation Services Collaboration and Sharing Identity Sync Resource Templates Transcoding Search Compute Storage (VMs, Auto-scaling and Load Balancing) (Object, Block and Archive) Regions Mobile Services Availability Zones Mobile Analytics Usage Tracking Monitoring and Logs Security & Access Control Notifications Networking CDN and Points of Presence
37 Amazon Virtual Private Cloud (VPC) Internet Create secure network configurations for working with sensitive data Internet GW Service ( ) EC2 EC SN /24 (Private) SN /24 (DMZ) VPC /16 AZ A Virtual Gateway AZ B AWS region VPC network isolation
38 AWS Identity and Access Management (IAM) Create and manage users in the AWS services Identity federation with Active Directory Control passwords, access keys, and multi-factor authentication (MFA) devices Root Account Roles Groups Administrators Developers Applications Jim Shandra Reporting Alyson Xiao Console Susan Tomcat Hardware or software (OAuth) Fine-grained permissions Very familiar security model Users, groups, permissions Integrated into the following: AWS Management Console AWS API access IAM resource-based policies Amazon S3, Amazon SQS, Amazon SNS Anand Multi-factor authentication AWS system entitlements
39 Segregate duties between roles with IAM AWS account owner (master) You get to choose who can do what in your AWS environment and from where Network & security Researcher Operations EMR Internet GW Service (EIP) (EIP) M Manage and operate S VPC Virtual Gateway A B US EAST
40 Data encryption in transit and at rest Amazon S3 HTTPS AES-256 server-side encryption AWS or customer managed keys Each object gets its own key Amazon EBS End-to-end secure network traffic Whole volume encryption AWS or customer managed keys Encrypted incremental snapshots Minimal performance overhead (utilizes Intel AES-NI)
41 Use Amazon CloudTrail to track access to APIs and IAM Records API calls, no matter how those API calls were made (console, SDK, CLI) Who did what and when and from what IP address Logs saved to Amazon S3 Includes EC2, Amazon EBS, VPC, Amazon RDS, IAM, AWS STS, and Amazon RedShift Be notified of log file delivery by using the Amazon Simple Notification Service (SNS) Aggregate log information across services into a single S3 bucket Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic, and SumoLogic
42 AWS Config AWS Config is a fully managed service that provides you with an inventory of your AWS resources, lets you audit the resource configuration history and notifies you of resource configuration changes Changing Resources Recording Continuous Change History Stream AWS Config Snapshot (ex )
43 NIH dbgap security best practices Physical security AWS Cloud Data center access and remote administrator access Electronic security User account security (for example, passwords) Use of Access Control Lists (ACLs) Secure networking Encryption of data in transit and at rest OS and software patching IAM Virtual Private Cloud Data access security Authorization of access to data Tracking copies; cleaning up after use Amazon Amazon S3 EBS CloudTrail + Config
44 HIPAA: Protected Health Information on the Cloud
45 HIPAA Security and Compliance on AWS We sign Business Associates Agreements As do other cloud providers All data (including PHI) is under the complete control of customer Encrypt data Lock down resources and applications Monitor anything and everything
46 Thank you! Architecting for Genomic Data Security and Compliance in AWS Creating Healthcare Data Applications to Promote HIPAA and HITECH Compliance
Using ArcGIS for Server in the Amazon Cloud
Federal GIS Conference February 9 10, 2015 Washington, DC Using ArcGIS for Server in the Amazon Cloud Bonnie Stayer, Esri Amy Ramsdell, Blue Raster Session Outline AWS Overview ArcGIS in AWS Cloud Builder
Introduction to AWS in Higher Ed
Introduction to AWS in Higher Ed Lori Clithero [email protected] 206.227.5054 University of Washington Cloud Day 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. 2 Cloud democratizes
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II
AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud
SECURITY IS JOB ZERO. Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs
SECURITY IS JOB ZERO Security The Forefront For Any Online Business Bill Murray Director AWS Security Programs Security is Job Zero Physical Security Network Security Platform Security People & Procedures
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
CLOUD COMPUTING WITH AWS An INTRODUCTION. John Hildebrandt Solutions Architect ANZ
CLOUD COMPUTING WITH AWS An INTRODUCTION John Hildebrandt Solutions Architect ANZ AGENDA Todays Agenda Background and Value proposition of AWS Global infrastructure and the Sydney Region AWS services Drupal
Security Essentials & Best Practices
Security Essentials & Best Practices Overview Overview of the AWS cloud security concepts such as the AWS security center, Shared Responsibility Model, and Identity and Access Management. 1 AWS Security
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
Amazon Web Services. 2015 Annual ALGIM Conference. Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand
Amazon Web Services 2015 Annual ALGIM Conference Tim Dacombe-Bird Regional Sales Manager Amazon Web Services New Zealand 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Who
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
IAN MASSINGHAM. Technical Evangelist Amazon Web Services
IAN MASSINGHAM Technical Evangelist Amazon Web Services From 2014: Cloud computing has become the new normal Deploying new applications to the cloud by default Migrating existing applications as quickly
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Amazon Web Services. Lawrence Berkeley LabTech Conference 9/10/15. Jamie Baker Federal Scientific Account Manager AWS WWPS bakjames@amazon.
Web Services Lawrence Berkeley LabTech Conference 9/10/15 Jamie Baker Federal Scientific Account Manager AWS WWPS [email protected] 2015, Web Services, Inc. or its Affiliates. All rights reserved. AWS
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
LONDON. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
LONDON 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Best Practices for Building Partner Managed Services on AWS Kelly Hartman, Global Segment Leader, MSPs Kyle Lichtenberg, Solutions
Background on Elastic Compute Cloud (EC2) AMI s to choose from including servers hosted on different Linux distros
David Moses January 2014 Paper on Cloud Computing I Background on Tools and Technologies in Amazon Web Services (AWS) In this paper I will highlight the technologies from the AWS cloud which enable you
Expand Your Infrastructure with the Elastic Cloud. Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager
Expand Your Infrastructure with the Elastic Cloud Mark Ryland Chief Solutions Architect Jenn Steele Product Marketing Manager Today we re going to talk about The Cloud Scenarios Questions You Probably
Service Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security For the Period April 1, 2013 March 31, 2014 Ernst & Young LLP Suite 1600 560 Mission Street San Francisco,
DLT Solutions and Amazon Web Services
DLT Solutions and Amazon Web Services For a seamless, cost-effective migration to the cloud PREMIER CONSULTING PARTNER DLT Solutions 2411 Dulles Corner Park, Suite 800 Herndon, VA 20171 Duane Thorpe Phone:
Service Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 September 30, 2015 Ernst & Young LLP Suite 1600 560 Mission
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Introduction to Amazon Web Services! Leo Zhadanovsky! @leozh [email protected]! Senior Solutions Architect
Introduction to Amazon Web Services! Leo Zhadanovsky! @leozh [email protected]! Senior Solutions Architect AWS HISTORY About How didamazon Amazon Web Services! Deep experience in building and operating global
Running Oracle Applications on AWS
Running Oracle Applications on AWS Bharath Terala Sr. Principal Consultant Apps Associates LLC June 09, 2014 Copyright 2014. Apps Associates LLC. 1 Agenda About the Presenter About Apps Associates LLC
Amazon Web Services. For Government, Education, and Nonprofit Organizations. Jakob Huhn. [email protected]. Partner Manager Benelux, Public Sector
Amazon Web Services For Government, Education, and Nonprofit Organizations Jakob Huhn Partner Manager Benelux, Public Sector [email protected] 2015, Amazon Web Services, Inc. or its Affiliates. All rights
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
Thing Big: How to Scale Your Own Internet of Things. Walter'Pernstecher'-'[email protected]' Dr.'Markus'Schmidberger'-'schmidbe@amazon.
Thing Big: How to Scale Your Own Internet of Things Walter'Pernstecher'-'[email protected]' Dr.'Markus'Schmidberger'-'[email protected]' Internet of Things is the network of physical objects or "things"
How To Use Aws.Com
Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA
CLOUD COMPUTING FOR THE ENTERPRISE AND GLOBAL COMPANIES Steve Midgley Head of AWS EMEA AWS Introduction Why are enterprises choosing AWS? What are enterprises using AWS for? How are enterprise getting
Servers. Servers. NAT Public Subnet: 172.30.128.0/20. Internet Gateway. VPC Gateway VPC: 172.30.0.0/16
.0 Why Use the Cloud? REFERENCE MODEL Cloud Development April 0 Traditionally, deployments require applications to be bound to a particular infrastructure. This results in low utilization, diminished efficiency,
Every Silver Lining Has a Vault in the Cloud
Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance
Razvoj Java aplikacija u Amazon AWS Cloud: Praktična demonstracija
Razvoj Java aplikacija u Amazon AWS Cloud: Praktična demonstracija Robert Dukarić University of Ljubljana Faculty of Computer and Information Science Laboratory for information systems integration Competence
Logentries Insights: The State of Log Management & Analytics for AWS
Logentries Insights: The State of Log Management & Analytics for AWS Trevor Parsons Ph.D Co-founder & Chief Scientist Logentries 1 1. Introduction The Log Management industry was traditionally driven by
Chapter 9 PUBLIC CLOUD LABORATORY. Sucha Smanchat, PhD. Faculty of Information Technology. King Mongkut s University of Technology North Bangkok
CLOUD COMPUTING PRACTICE 82 Chapter 9 PUBLIC CLOUD LABORATORY Hand on laboratory based on AWS Sucha Smanchat, PhD Faculty of Information Technology King Mongkut s University of Technology North Bangkok
With Eversync s cloud data tiering, the customer can tier data protection as follows:
APPLICATION NOTE: CLOUD DATA TIERING Eversync has developed a hybrid model for cloud-based data protection in which all of the elements of data protection are tiered between an on-premise appliance (software
Cloud Computing with Amazon Web Services and the DevOps Methodology. www.cloudreach.com
Cloud Computing with Amazon Web Services and the DevOps Methodology Who am I? Max Manders @maxmanders Systems Developer at Cloudreach @cloudreach Director / Co-Founder of Whisky Web @whiskyweb Who are
Securing Amazon It s a Jungle Out There
ANALYST BRIEF Securing Amazon It s a Jungle Out There PART 1 CONTROLS AND OPTIONS OFFERED BY AMAZON Author Rob Ayoub Overview Infrastructure as a service (IaaS) is a foundational component of modern cloud
Extending your Enterprise IT with Amazon Virtual Private Cloud. Oyvind Roti Principal Solutions Architect, AWS
Extending your Enterprise IT with Amazon Virtual Private Cloud Oyvind Roti Principal Solutions Architect, AWS Three Things Some AWS Concepts Let s build a Virtual Private Cloud together Three New Services
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud
Migration Scenario: Migrating Backend Processing Pipeline to the AWS Cloud Use case Figure 1: Company C Architecture (Before Migration) Company C is an automobile insurance claim processing company with
How To Create A Walkme.Com Walkthrus.Com Website And Help With Your Website Or App On A Pc Or Mac Or Ipad (For Pc) Or Mac (For Mac) Or Ipa (For Ipa) Or Pc
WALKME SOLUTION ARCHITECTURAL WHITE PAPER WHAT IS WALKME FOR SALESFORCE? WalkMe enables Salesforce to build and overlay interactive Walk-Thrus that intuitively guide users to self-task successfully with
Amazon WorkDocs. Administration Guide Version 1.0
Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not
Primex Wireless OneVue Architecture Statement
Primex Wireless OneVue Architecture Statement Secure, cloud-based workflow, alert, and notification platform built on top of Amazon Web Services (AWS) 2015 Primex Wireless, Inc. The Primex logo is a registered
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2016 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks
Assignment # 1 (Cloud Computing Security)
Assignment # 1 (Cloud Computing Security) Group Members: Abdullah Abid Zeeshan Qaiser M. Umar Hayat Table of Contents Windows Azure Introduction... 4 Windows Azure Services... 4 1. Compute... 4 a) Virtual
Agenda. - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples
Amazon Web Services Agenda - Introduction to Amazon s Cloud - How ArcGIS users adopt Amazon s Cloud - Why ArcGIS users adopt Amazon s Cloud - Examples How did Amazon Get into Cloud Computing? On-Premise
VMware vcloud Air Security TECHNICAL WHITE PAPER
TECHNICAL WHITE PAPER The Shared Security Model for vcloud Air The end-to-end security of VMware vcloud Air (the Service ) is shared between VMware and the customer. VMware provides security for the aspects
FileCloud Security FAQ
is currently used by many large organizations including banks, health care organizations, educational institutions and government agencies. Thousands of organizations rely on File- Cloud for their file
Amazon Web Services: Risk and Compliance January 2013
Amazon Web Services: Risk and Compliance January 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 59 This document intends to provide information to assist
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Getting Started with AWS. Hosting a Static Website
Getting Started with AWS Hosting a Static Website Getting Started with AWS: Hosting a Static Website Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
Encrypting Data at Rest
Encrypting Data at Rest Ken Beer Ryan Holland November 2014 Contents Contents Abstract Introduction The Key to Encryption: Who Controls the Keys? Model A: You control the encryption method and the entire
PATCH MANAGER what does it do?
PATCH MANAGER what does it do? PATCH MANAGER SAAS maps all your physical assets and physical infrastructure such as network and power cabling, racks, servers, switches, UPS and generators. It provides
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Amazon Web Services: Risk and Compliance July 2015
Amazon Web Services: Risk and Compliance July 2015 (Consult http://aws.amazon.com/compliance/aws-whitepapers/ for the latest version of this paper) Page 1 of 128 This document is intended to provide information
White Paper: NCBI Database of Genotypes and Phenotypes (dbgap) Security Best Practices Compliance Overview for the New DNAnexus Platform
White Paper: NCBI Database of Genotypes and Phenotypes (dbgap) Security Best Practices Compliance Overview for the New DNAnexus Platform April 18, 2013 Overview This White Paper summarizes how the new
Scalable Architecture on Amazon AWS Cloud
Scalable Architecture on Amazon AWS Cloud Kalpak Shah Founder & CEO, Clogeny Technologies [email protected] 1 * http://www.rightscale.com/products/cloud-computing-uses/scalable-website.php 2 Architect
Cloud Models and Platforms
Cloud Models and Platforms Dr. Sanjay P. Ahuja, Ph.D. 2010-14 FIS Distinguished Professor of Computer Science School of Computing, UNF A Working Definition of Cloud Computing Cloud computing is a model
ArcGIS 10.3 Server on Amazon Web Services
ArcGIS 10.3 Server on Amazon Web Services Copyright 1995-2015 Esri. All rights reserved. Table of Contents Introduction What is ArcGIS Server on Amazon Web Services?............................... 5 Quick
Learning Management Redefined. Acadox Infrastructure & Architecture
Learning Management Redefined Acadox Infrastructure & Architecture w w w. a c a d o x. c o m Outline Overview Application Servers Databases Storage Network Content Delivery Network (CDN) & Caching Queuing
Cloud Security Overview
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Security Overview Murat Kantarcioglu Outline Current cloud security techniques Amazon Web services Microsoft Azure Cloud Security Challengers
BMC s Security Strategy for ITSM in the SaaS Environment
BMC s Security Strategy for ITSM in the SaaS Environment TABLE OF CONTENTS Introduction... 3 Data Security... 4 Secure Backup... 6 Administrative Access... 6 Patching Processes... 6 Security Certifications...
MICROSTRATEGY ON AWS
MICROSTRATEGY ON AWS Presented by: MicroStrategy World 2015 Tuesday, January 27th 3:30 4:30 PM Track 8 Session 3 WWW.IOLAP.COM 1 INTRODUCTIONS iolap Data Warehousing and Business Intelligence consultancy
Hadoop & Spark Using Amazon EMR
Hadoop & Spark Using Amazon EMR Michael Hanisch, AWS Solutions Architecture 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda Why did we build Amazon EMR? What is Amazon EMR?
Table of Contents. FME Cloud Architecture Overview. Secure Operations. Application Security. Shared Responsibility.
FME Cloud Security Table of Contents FME Cloud Architecture Overview Secure Operations I. Backup II. Data Governance and Privacy III. Destruction of Data IV. Incident Reporting V. Development VI. Customer
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
Logz.io See the logz that matter
See the logz that matter How Logz.io Secures Customer Log Data White Paper A certain amount of confidence is needed when relying on third party vendors to manage and handle your online data and log files
Cloud Security Framework (CSF): Gap Analysis & Roadmap
Cloud Security Framework (CSF): Gap Analysis & Roadmap Contributors: Suren Karavettil, Bhumip Khasnabish Ning So, Gene Golovinsky, Meng Yu & Wei Yinxing Please send comments & suggestions to Suren Karavettil
McAfee Public Cloud Server Security Suite
Installation Guide McAfee Public Cloud Server Security Suite For use with McAfee epolicy Orchestrator COPYRIGHT Copyright 2015 McAfee, Inc., 2821 Mission College Boulevard, Santa Clara, CA 95054, 1.888.847.8766,
APIs The Next Hacker Target Or a Business and Security Opportunity?
APIs The Next Hacker Target Or a Business and Security Opportunity? SESSION ID: SEC-T07 Tim Mather VP, CISO Cadence Design Systems @mather_tim Why Should You Care About APIs? Amazon Web Services EC2 alone
AWS CodePipeline. User Guide API Version 2015-07-09
AWS CodePipeline User Guide AWS CodePipeline: User Guide Copyright 2015 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in connection
PRIVACY, SECURITY AND THE VOLLY SERVICE
PRIVACY, SECURITY AND THE VOLLY SERVICE Delight Delivered by EXECUTIVE SUMMARY The Volly secure digital delivery service from Pitney Bowes is a closed, secure, end-to-end system that consolidates and delivers
Cloud Essentials for Architects using OpenStack
Cloud Essentials for Architects using OpenStack Course Overview Start Date 18th December 2014 Duration 2 Days Location Dublin Course Code SS906 Programme Overview Cloud Computing is gaining increasing
MIGRATIONWIZ SECURITY OVERVIEW
MIGRATIONWIZ SECURITY OVERVIEW Table of Contents Introduction... 2 Shared Security Approach... 2 Customer Best Practices... 2 Application Security... 4 Database Level Security... 4 Network Security...
Amazon Cloud Storage Options
Amazon Cloud Storage Options Table of Contents 1. Overview of AWS Storage Options 02 2. Why you should use the AWS Storage 02 3. How to get Data into the AWS.03 4. Types of AWS Storage Options.03 5. Object
Using ArcGIS for Server in the Amazon Cloud
Using ArcGIS for Server in the Amazon Cloud Randall Williams, Esri Subrat Bora, Esri Esri UC 2014 Technical Workshop Agenda What is ArcGIS for Server on Amazon Web Services Sounds good! How much does it
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
AWS IaaS Services. Methods Digital GCloud Service Definition
Methods Digital GCloud Service Definition HEAD OFFICE: 125 Shaftesbury Avenue, London WC2H 8AD Scottish Office: Exchange Place 2, 5 Semple Street, Edinburgh, EH3 8BL Midlands Office: Pure Offices, Lake
Outlook. Corporate Research and Technologies, Munich, Germany. 20 th May 2010
Computing Architecture Computing Introduction Computing Architecture Software Architecture for Outlook Corporate Research and Technologies, Munich, Germany Gerald Kaefer * 4 th Generation Datacenter IEEE
How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway
Whitepaper How to setup NovaBACKUP DataCenter to backup data to Amazon S3 using Amazon s AWS Storage Gateway Contents What is Amazon S3?... 3 What is the AWS Storage Gateway?... 4 How to setup Amazon Storage
Why should you look at your logs? Why ELK (Elasticsearch, Logstash, and Kibana)?
Authors Introduction This guide is designed to help developers, DevOps engineers, and operations teams that run and manage applications on top of AWS to effectively analyze their log data to get visibility
This paper introduces the security policies, practices, and procedures at Smartsheet.
SMARTSHEET SECURITY Abstract This paper introduces the security policies, practices, and procedures at Smartsheet. Readers will gain an understanding of the Smartsheet operating environment and application
Cloud Computing Trends
UT DALLAS Erik Jonsson School of Engineering & Computer Science Cloud Computing Trends What is cloud computing? Cloud computing refers to the apps and services delivered over the internet. Software delivered
Architecture Overview
Qubell Adaptive Platform-as-a-Service, Enterprise Edition Architecture Overview 4600 Bohannon Drive, Menlo Park, CA 94025 T 888 855-8940 http://qubell.com Introduction Introduction Qubell Adaptive Platform-as-a-Service
Automating Cloud Security Control and Compliance Enforcement for PCI DSS 3.0
WHITE PAPER Automating Cloud Security Control and Compliance Enforcement for 3.0 How Enables Security and Compliance with the PCI Data Security Standard in a Private Cloud EXECUTIVE SUMMARY All merchants,
TECHNOLOGY WHITE PAPER Jun 2012
TECHNOLOGY WHITE PAPER Jun 2012 Technology Stack C# Windows Server 2008 PHP Amazon Web Services (AWS) Route 53 Elastic Load Balancing (ELB) Elastic Compute Cloud (EC2) Amazon RDS Amazon S3 Elasticache
