How To Protect Your Data From Harm
|
|
|
- Barbra Lamb
- 5 years ago
- Views:
Transcription
1 Introduction to Auditing the Use of AWS October 2015
2 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS s products or services, each of which is provided as is without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions or assurances from AWS, its affiliates, suppliers or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. Page 2 of 28
3 Contents Abstract 4 Introduction 5 Approaches for using AWS Audit Guides 6 Examiners 6 AWS Provided Evidence 6 Auditing Use of AWS Concepts 8 Identifying assets in AWS 9 AWS Account Identifiers 9 1. Governance Network Configuration and Management Asset Configuration and Management Logical Access Control Data Encryption Security Logging and Monitoring Security Incident Response Disaster Recovery Inherited Controls 23 Appendix A: References and Further Reading 25 Appendix B: Glossary of Terms 26 Appendix C: API Calls 27 Page 3 of 28
4 Abstract Security at AWS is job zero. All AWS customers benefit from a data center and network architecture built to satisfy the needs of the most security-sensitive organizations. In order to satisfy these needs, AWS compliance enables customers to understand the robust controls in place at AWS to maintain security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance responsibilities will be shared. By tying together governance-focused, auditfriendly service features with applicable compliance or audit standards, AWS Compliance enablers build on traditional programs, helping customers to establish and operate in an AWS security control environment AWS manages the underlying infrastructure, and you manage the security of anything you deploy in AWS. AWS as a modern platform allows you to formalize the design of security, as well as audit controls, through reliable, automated and verifiable technical and operational processes built into every AWS customer account. The cloud simplifies system use for administrators and those running IT, and makes your AWS environment much simpler to audit sample testing, as AWS can shift audits towards a 100% verification verses traditional sample testing. Additionally, AWS purpose-built tools can be tailored to customer requirements and scaling and audit objectives, in addition to supporting real-time verification and reporting through the use of internal tools such as AWS CloudTrail, Config and CloudWatch. These tools are built to help you maximize the protection of your services, data and applications. This means AWS customers can spend less time on routine security and audit tasks, and are able to focus more on proactive measures which can continue to enhance security and audit capabilities of the AWS customer environment. Page 4 of 28
5 Introduction As more and more customers deploy workloads into the cloud, auditors increasingly need not only to understand how the cloud works, but additionally how to leverage the power of cloud computing to their advantage when conducting audits. The AWS cloud enables auditors to shift from percentage-based sample testing toward a comprehensive real-time audit view, which enables 100% auditability of the customer environment, as well as real-time risk management. The AWS management console, along with the Command Line Interface (CLI), can produce powerful results for auditors across multiple regulatory, standards and industry authorities. This is due to AWS supporting a multitude of security configurations to establish security, compliance by design, and real-time audit capabilities through the use of: Automation - Scriptable infrastructure (e.g. Infrastructure as Code) allows you to create repeatable, reliable and secure deployment systems by leveraging programmable (API-driven) deployments of services. Scriptable Architectures Golden environments and Amazon Machine Images (AMIs) can be deployed for reliable and auditable services, and they can be constrained to ensure real-time risk management. Distribution - Capabilities provided by AWS CloudFormation give systems administrators an easy way to create a collection of related AWS resources and provision them in an orderly and predictable fashion. Verifiable- Using AWS CloudTrail, Amazon CloudWatch, AWS OpsWorks and AWS CloudHSM enables evidence gathering capability. Page 5 of 28
6 Approaches for using AWS Audit Guides Examiners When assessing organizations that use AWS services, it is critical to understand the Shared Responsibility model between AWS and the customer. The audit guide organizes the requirements into common security program controls and control areas. Each control references the applicable audit requirements. In general, AWS services should be treated similarly to on-premise infrastructure services that have been traditionally used by customers for operating services and applications. Policies and processes that apply to devices and servers should also apply when those functions are supplied by AWS. Controls pertaining solely to policy or procedure are generally entirely the responsibility of the customer. Similarly, AWS management, either via the AWS Console or Command Line API, should be treated like other privileged administrator access. See the appendix and referenced points for more information. AWS Provided Evidence Amazon Web Services Cloud Compliance enables customers to understand the robust controls in place at AWS to maintain security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance responsibilities will be shared. Each certification means that an auditor has verified that specific security controls are in place and operating as intended. You can view the applicable compliance reports by contacting your AWS account representative. For more information about the security regulations and standards with which AWS complies visit the AWS Compliance webpage. To help you meet specific government, industry, and company security standards and regulations, AWS provides certification reports that describe how the AWS Cloud infrastructure meets the requirements of an extensive list of global security standards, including: ISO 27001, SOC, the PCI Data Security Standard, FedRAMP, the Australian Signals Directorate (ASD) Information Security Manual, and the Singapore Multi-Tier Cloud Security Standard (MTCS SS 584). Page 6 of 28
7 For more information about the security regulations and standards with which AWS complies, see the AWS Compliance webpage. Page 7 of 28
8 Auditing Use of AWS Concepts The following concepts should be considered during a security audit of an organization s systems and data on AWS: Security measures that the cloud service provider (AWS) implements and operates "security of the cloud" Security measures that the customer implements and operates, related to the security of customer content and applications that make use of AWS services "security in the cloud" While AWS manages security of the cloud, security in the cloud is the responsibility of the customer. Customers retain control of what security they choose to implement to protect their own content, platform, applications, systems and networks, no differently than they would for applications in an onsite datacenter. Additional detail can be found at the AWS Security Center, at AWS Compliance, and in the publically available AWS whitepapers found at: AWS Whitepapers
9 Identifying assets in AWS A customer s AWS assets can be instances, data stores, applications, and the data itself. Auditing the use of AWS generally starts with asset identification. Assets on a public cloud infrastructure are not categorically different than inhouse environments, and in some situations can be less complex to inventory because AWS provides visibility into the assets under management. AWS Account Identifiers AWS assigns two unique IDs to each AWS account: an AWS account ID and a canonical user ID. The AWS account ID is a 12-digit number, such as , that you use to construct Amazon Resource Names (ARNs). When you refer to resources, like an IAM user or an Amazon Glacier vault, the account ID distinguishes your resources from resources in other AWS accounts. Amazon Resource Names (ARNs) and AWS Service Namespaces Amazon Resource Names (ARNs) uniquely identify AWS resources. We require an ARN when you need to specify a resource unambiguously across all of AWS, such as in IAM policies, Amazon Relational Database Service (Amazon RDS) tags, and API calls. ARN Format example: In addition to Account Identifiers, Amazon Resource Names (ARNs) and AWS Service Namespaces, each AWS service creates a unique service identifier (e.g. Amazon Elastic Compute Cloud (Amazon EC2) instance ID: i-3d68c5cb or Amazon Elastic Block Store (Amazon EBS) Volume ID vol-ecd8c122) which can be used to create an environmental asset inventory and used within work papers for scope of audit and inventory. Each certification means that an auditor has verified that specific security controls are in place and operating as intended.
10 Amazon Web Services OCIE Cybersecurity Audit Guide September Governance Definition: Governance provides assurance that customer direction and intent are reflected in the security posture of the customer. This is achieved by utilizing a structured approach to implementing an information security program. For the purposes of this audit plan, it means understanding which AWS services have been purchased, what kinds of systems and information you plan to use with the AWS service, and what policies, procedures, and plans apply to these services. Major audit focus: Understand what AWS services and resources are being used and ensure your security or risk management program has taken into account the use of the public cloud environment. Audit approach: As part of this audit, determine who within your organization is an AWS account and resource owner, as well as the AWS services and resources they are using. Verify policies, plans, and procedures include cloud concepts, and that cloud is included in the scope of the customer s audit program. Governance Checklist Understand use of AWS within your organization. Approaches might include: Polling or interviewing your IT and development teams. Performing network scans, or a more in-depth penetration test. Review expense reports and/or Purchase Orders (PO s) payments related to Amazon.com or AWS to understand what services are being used. Credit card charges appear as AMAZON WEB SERVICES AWS.AMAZON.CO WA or similar. Note: Some individuals within your organization may have signed up for an AWS account under their personal accounts, as such, consider asking if this is the case when polling or interviewing your IT and development teams. Identify assets. Each AWS account has a contact address associated with it and can be used to identify account owners. It is important to understand that this address may be from a public service provider, depending on what the user specified when registering. A formal meeting can be conducted with each AWS account or asset owner to Page 10 of 28
11 understand what is being deployed on AWS, how it is managed, and how it has been integrated with your organization s security policies, procedures, and standards. Note: The AWS Account owner may be someone in the finance or procurement department, but the individual who implements the organization s use of the AWS resources may reside in the IT department. You may need to interview both. Define your AWS boundaries for review. The review should have a defined scope. Understand your organization s core business processes and their alignment with IT, in its non-cloud form as well as current or future cloud implementations. Obtain a description of the AWS services being used and/or being considered for use. After identifying the types of AWS services in use or under consideration, determine the services and business solutions to be included in the review. Obtain and review any previous audit reports with remediation plans. Identify open issues in previous audit reports and assess updates to the documents with respect to these issues. Assess policies. Assess and review your organization s security, privacy, and data classification policies to determine which policies apply to the AWS service environment. Verify if a formal policy and/or process exists around the acquisition of AWS services to determine how purchase of AWS services is authorized. Verify if your organization s change management processes and policies include consideration of AWS services Identify risks. Determine whether a risk assessment for the applicable assets has been performed. Review risks. Obtain a copy of any risk assessment reports and determine if they reflect the current environment and accurately describe the residual risk environment. Review risks documentation. After each element of your review, review risk treatment plans and timelines/milestones against your risk management policies and Page 11 of 28
12 procedures. Documentation and Inventory. Verify your AWS network is fully documented and all AWS critical systems are included in their inventory documentation, with limited access to this documentation. Review AWS Config for AWS resource inventory and configuration history of resources (Example API Call, 1). Ensure that resources are appropriately tagged and associated with application data. Review application architecture to identify data flows, planned connectivity between application components and resources that contain data. Review all connectivity between your network and the AWS Platform by reviewing the following: VPN connections where the customers on-premise Public IPs are mapped to customer gateways in any VPCs owned by the Customer. (Example API Call, 2 & 3). Direct Connect Private Connections, which may be mapped to 1 or more VPCs owned by the customer. (Example API Call, 4) Evaluate risks. Evaluate the significance of the AWS-deployed data to the organization s overall risk profile and risk tolerance. Ensure that these AWS assets are integrated into the organization s formal risk assessment program. AWS assets should be identified and have protection objectives associated with them, depending on their risk profiles. Incorporate use of AWS into risk assessment. Conduct and/or incorporate AWS service elements into your organizational risk assessment processes. Key risks could include: Identify the business risk associated with your use of AWS and identify business owners and key stakeholders. Verify that the business risks are aligned, rated, or classified within your use of AWS services and your organizational security criteria for protecting confidentiality, Page 12 of 28
13 integrity, and availability. Review previous audits related to AWS services (SOC, PCI, NIST related audits, etc.). Determine if the risks identified previously have been appropriately addressed. Evaluate the overall risk factor for performing your AWS review. Based on the risk assessment, identify changes to your audit scope. Discuss the risks with IT management, and adjust the risk assessment. IT Security Program and Policy. Verify that the customer includes AWS services in its security policies and procedures, including AWS account level best practices as highlighted within the AWS service Trusted Advisor which provides best practice and guidance across 4 topics Security, Cost, Performance and Fault Tolerance. Review your information security policies and ensure that it includes AWS services. Confirm you have has assigned an employee(s) as authority for the use and security of AWS services and there are defined roles for those noted key roles, including a Chief Information Security Officer. Note: any published cybersecurity risk management process standards you have used to model information security architecture and processes. Ensure you maintain documentation to support the audits conducted for AWS services, including its review of AWS third-party certifications. Verify internal training records include AWS security, such as Amazon IAM usage, Amazon EC2 Security Groups, and remote access to Amazon EC2 instances. Confirm a cybersecurity response policy and training for AWS services is maintained. Note: any insurance specifically related to the customers use of AWS services and any claims related to losses and expenses attributed to cybersecurity events as a result. Service Provider Oversight. Verify the contract with AWS includes a requirement to implement and maintain privacy and security safeguards for cybersecurity requirements. Page 13 of 28
14 2. Network Configuration and Management Definition: Network management in AWS is very similar to network management on-premises, except that network components such as firewalls and routers are virtual. Customers must ensure network architecture follows the security requirements of their organization, including the use of DMZs to separate public and private (untrusted and trusted) resources, the segregation of resources using subnets and routing tables, the secure configuration of DNS, whether additional transmission protection is needed in the form of a VPN, and whether to limit inbound and outbound traffic. Customers who must perform monitoring of their network can do so using host-based intrusion detection and monitoring systems. Major audit focus: Missing or inappropriately configured security controls related to external access/network security that could result in a security exposure. Audit approach: Understand the network architecture of the customer s AWS resources, and how the resources are configured to allow external access from the public Internet and the customer s private networks. Note: AWS Trusted Advisor can be leveraged to validate and verify AWS configurations settings. Network Configuration and Management Checklist Network Controls. Identify how network segmentation is applied within the AWS environment. Review AWS Security Group implementation, AWS Direct Connect and Amazon VPN configuration for proper implementation of network segmentation and ACL and firewall setting or AWS services (Example API Call, 5-8). Verify you have a procedure for granting remote, Internet or VPN access to employees for AWS Console access and remote access to Amazon EC2 networks and systems. Review the following to maintain an environment for testing and development of software and applications that is separate from its business environment: VPC isolation is in place between business environment and environments used for test and development. By reviewing VPC peering connectivity between VPCs to ensure network Page 14 of 28
15 isolation is in place between VPCs Subnet isolation is in place between business environment and environments used for test and development. By reviewing NACLs associated to Subnets in which Business and Test/Development environments are located to ensure network isolation is in place. Amazon EC2 instance isolation is in place between business environment and environments used for test and development. By reviewing Security Groups associated to 1 or more Instances which are associated with Business, Test or Development environments to ensure network isolation is in place between Amazon EC2 instances Review DDoS layered defense solution running which operates directly on AWS reviewing components which are leveraged as part of a DDoS solution such as: Amazon CloudFront configuration Amazon S3 configuration Amazon Route 53 ELB configuration Note: The above services do not use Customer owned Public IP addresses and offer DoS AWS inherited DoS mitigation features. Usage of Amazon EC2 for Proxy or WAF Further guidance can be found within the AWS Best Practices for DDoS Resiliency Whitepaper Malicious Code Controls. Assess the implementation and management of antimalware for Amazon EC2 instances in a similar manner as with physical systems. 3. Asset Configuration and Management Definition: AWS customers are responsible for maintaining the security of anything installed on AWS resources or connect to AWS resources. Secure management of the customer s AWS resources means knowing what resources you are using (asset inventory), securely configuring the guest OS and applications on your resources (secure configuration settings, patching, and antimalware), and controlling changes to the resources (change management). Page 15 of 28
16 Major audit focus: Manage your operating system and application security vulnerabilities to protect the security, stability, and integrity of the asset. Audit approach: Validate the OS and applications are designed, configured, patched and hardened in accordance with your policies, procedures, and standards. All OS and application management practices can be common between on-premise and AWS systems and services. Asset Configuration and Management Checklist Assess configuration management. Verify the use of your configuration management practices for all AWS system components and validate that these standards meet baseline configurations. Review the procedure for conducting a specialized wipe procedure prior to deleting the volume for compliance with established requirements. Review your Identity Access Management system (which may be used to allow authenticated access to the applications hosted on top of AWS services). Confirm penetration testing has been completed. Change Management Controls. Ensure use of AWS services follows the same change control processes as internal series. Verify AWS services are included within an internal patch management process. Review documented process for configuration and patching of Amazon EC2 instances: Amazon Machine Images (AMIs) (Example API Call, 9-10) Operating systems Applications Review API calls for in-scope services for delete calls to ensure IT assets have been properly disposed of. Page 16 of 28
17 4. Logical Access Control Definition: Logical access controls determine not only who or what can have access to a specific system resource, but also the type of actions that can be performed on the resource (read, write, etc.). As part of controlling access to AWS resources, users and processes must present credentials to confirm that they are authorized to perform specific functions or have access to specific resources. The credentials required by AWS vary depending on the type of service and the access method, and include passwords, cryptographic keys, and certificates. Access to AWS resources can be enabled through the AWS account, individual AWS Identify and Access Management (IAM) user accounts created under the AWS account, or identity federation with the customer s corporate directory (single sign-on). AWS Identity and Access Management (IAM) enables users to securely control access to AWS services and resources. Using IAM you can create and manage AWS users and groups and use permissions to allow and deny permissions to AWS resources. Major audit focus: This portion of the audit focuses on identifying how users and permissions are set up for the services in AWS. It is also important to ensure you are securely managing the credentials associated with all AWS accounts. Audit approach: Validate permissions for AWS assets are being managed in accordance with organizational policies, procedures, and processes. Note: AWS Trusted Advisor can be leveraged to validate and verify IAM Users, Groups, and Role configurations. Logical Access Control Checklist Access Management, Authentication and Authorization. Ensure there are internal policies and procedures for managing access to AWS services and Amazon EC2 instances. Ensure documentation of use and configuration of AWS access controls, examples and options outlined below: Description of how Amazon IAM is used for access management. List of controls that Amazon IAM is used to manage Resource management, Security Groups, VPN, object permissions, etc. Use of native AWS access controls, or if access is managed through Page 17 of 28
18 federated authentication, which leverages the open standard Security Assertion Markup Language (SAML) 2.0. List of AWS Accounts, Roles, Groups and Users, Policies and policy attachments to users, groups, and roles (Example API Call, 11). A description of Amazon IAM accounts and roles, and monitoring methods. A description and configuration of systems within EC2. Remote Access. Ensure there is an approval process, logging process, or controls to prevent unauthorized remote access. Note: All access to AWS and Amazon EC2 instances is remote access by definition unless Direct Connect has been configured. Review process for preventing unauthorized access, which may include: AWS CloudTrail for logging of Service level API calls. AWS CloudWatch logs to meet logging objectives. IAM Policies, S3 Bucket Policies, Security Groups for controls to prevent unauthorized access. Review connectivity between firm network and AWS: VPN Connection between VPC and firm s network. Direct Connect (cross connect and private interfaces) between firm and AWS. Defined Security Groups, Network Access Control Lists and Routing tables in order to control access between AWS and the network. Personnel Control. Ensure restriction of users to those AWS services strictly for their business function (Example API Call, 12). Review the type of access control in place as it relates to AWS services. AWS access control at an AWS level using IAM with Tagging to control management of Amazon EC2 instances (start/stop/terminate) within networks Customer Access Control using IAM (LDAP solution) to manage access to resources which exist in networks at the Operating System / Application layers Page 18 of 28
19 Network Access control using AWS Security Groups (SGs), Network Access Control Lists (NACLs), Routing Tables, VPN Connections, VPC Peering to control network access to resources within customer owned VPCs. 5. Data Encryption Definition: Data stored in AWS is secure by default; only AWS owners have access to the AWS resources they create. However, customers who have sensitive data may require additional protection by encrypting the data when it is stored on AWS. Only the Amazon S3 service currently provides an automated, serverside encryption function in addition to allowing customers to encrypt on the customer side before the data is stored. For other AWS data storage options, the customer must perform encryption of the data. Major audit focus: Data at rest should be encrypted in the same way as onpremise data is protected. Also, many security policies consider the Internet an insecure communications medium and would require the encryption of data in transit. Improper protection of data could create a security exposure. Audit approach: Understand where the data resides, and validate the methods used to protect the data at rest and in transit (also referred to as data in flight ). Note: AWS Trusted Advisor can be leveraged to validate and verify permissions and access to data assets. Data Encryption Checklist Encryption Controls. Ensure there are appropriate controls in place to protect confidential information in transport while using AWS services. Review methods for connection to AWS Console, management API, S3, RDS and Amazon EC2 VPN for enforcement of encryption. Review internal policies and procedures for key management including AWS services and Amazon EC2 instances. Review encryption methods used, if any, to protect PINs at rest AWS offers a number of key management services such as KMS, CloudHSM and Server Side Page 19 of 28
20 Encryption for S3 which could be used to assist with data at rest encryption (Example API Call, 13-15). 6. Security Logging and Monitoring Definition: Audit logs record a variety of events occurring within your information systems and networks. Audit logs are used to identify activity that may impact the security of those systems, whether in real-time or after the fact, so the proper configuration and protection of the logs is important. Major audit focus: Systems must be logged and monitored, just as they are for on-premise systems. If AWS systems are not included in the overall company security plan, critical systems may be omitted from scope for monitoring efforts. Audit approach: Validate that audit logging is being performed on the guest OS and critical applications installed on Amazon EC2 instances and that implementation is in alignment with your policies and procedures, especially as it relates to the storage, protection, and analysis of the logs. Security Logging and Monitoring Checklist: Logging Assessment Trails and Monitoring. Review logging and monitoring policies and procedures for adequacy, retention, defined thresholds and secure maintenance, specifically for detecting unauthorized activity for AWS services. Review logging and monitoring policies and procedures and ensure the inclusion of AWS services, including Amazon EC2 instances for security related events. Verify that logging mechanisms are configured to send logs to a centralized server, and ensure that for Amazon EC2 instances the proper type and format of logs are retained in a similar manner as with physical systems. For customers using AWS CloudWatch, review the process and record of the use of network monitoring. Ensure analytics of events are utilized to improve defensive measures and policies. Review AWS IAM Credential report for unauthorized users, AWS Config and resource tagging for unauthorized devices (Example API Call, 16). Page 20 of 28
21 Confirm aggregation and correlation of event data from multiple sources using AWS services such as: VPC Flow logs to identify accepted/rejected network packets entering VPC. AWS CloudTrail to identify authenticated and unauthenticated API calls to AWS services ELB Logging Load balancer logging. AWS CloudFront Logging Logging of CDN distributions. Intrusion Detection and Response. Review host-based IDS on Amazon EC2 instances in a similar manner as with physical systems. Review AWS provided evidence on where information on intrusion detection processes can be reviewed. 7. Security Incident Response Definition: Under a Shared Responsibility Model, security events may by monitored by the interaction of both AWS and the AWS customer. AWS detects and responds to events impacting the hypervisor and the underlying infrastructure. Customers manage events from the guest operating system up through the application. You should understand incident response responsibilities and adapt existing security monitoring/alerting/audit tools and processes for their AWS resources. Major audit focus: Security events should be monitored regardless of where the assets reside. The auditor can assess consistency of deploying incident management controls across all environments, and validate full coverage through testing. Audit approach: Assess existence and operational effectiveness of the incident management controls for systems in the AWS environment. Security Incident Response Checklist: Incident Reporting. Ensure the incident response plan and policy for cybersecurity incidents includes AWS services and addresses controls that mitigate cybersecurity Page 21 of 28
22 incidents and aid recovery. Ensure leveraging of existing incident monitoring tools, as well as AWS available tools to monitor the use of AWS services. Verify that the Incident Response Plan undergoes a periodic review and changes related to AWS are made as needed. Note if the Incident Response Plan has notification procedures and how the customer addresses responsibility for losses associated with attacks or impacting instructions. 8. Disaster Recovery Definition: AWS provides a highly available infrastructure that allows customers to architect resilient applications and quickly respond to major incidents or disaster scenarios. However, customers must ensure that they configure systems that require high availability or quick recovery times to take advantage of the multiple Regions and Availability Zones that AWS offers. Major audit focus: An unidentified single point of failure and/or inadequate planning to address disaster recovery scenarios could result in a significant impact. While AWS provides service level agreements (SLAs) at the individual instance/service level, these should not be confused with a customer s business continuity (BC) and disaster recovery (DR) objectives, such as Recovery Time Objective (RTO) Recovery Point Objective (RPO). The BC/DR parameters are associated with solution design. A more resilient design often utilizes multiple components in different AWS availability zones and involve data replication. Audit approach: Understand the DR and determine the fault-tolerant architecture employed for critical assets. Note: AWS Trusted Advisor can be leveraged to validate and verify some aspects of the customer s resiliency capabilities. Page 22 of 28
23 Disaster Recovery Checklist: Business Continuity Plan (BCP). Ensure there is a comprehensive BCP, for AWS services utilized, that addresses mitigation of the effects of a cybersecurity incident and/or recover from such an incident. Within the Plan, ensure that AWS is included in the emergency preparedness and crisis management elements, senior manager oversight responsibilities, and the testing plan. Backup and Storage Controls. Review the customer s periodic test of their backup system for AWS services (Example API Call, 17-18). 1. Review inventory of data backed up to AWS services as off-site backup. 9. Inherited Controls Definition: Amazon has many years of experience in designing, constructing, and operating large-scale datacenters. This experience has been applied to the AWS platform and infrastructure. AWS datacenters are housed in nondescript facilities. Physical access is strictly controlled both at the perimeter and at building ingress points by professional security staff utilizing video surveillance, intrusion detection systems, and other electronic means. Authorized staff must pass two-factor authentication a minimum of two times to access datacenter floors. All visitors and contractors are required to present identification and are signed in and continually escorted by authorized staff. AWS only provides datacenter access and information to employees and contractors who have a legitimate business need for such privileges. When an employee no longer has a business need for these privileges, his or her access is immediately revoked, even if he or she continues to be an employee of Amazon or Amazon Web Services. All physical access to datacenters by AWS employees is logged and audited routinely. Major audit focus: The purpose of this audit section is to demonstrate appropriate due diligence in selecting service providers. Page 23 of 28
24 Audit approach: Understand how you can request and evaluate third-party attestations and certifications in order to gain reasonable assurance of the design and operating effectiveness of control objectives and controls. Inherited Controls Checklist Physical Security & Environmental Controls. Review the AWS provided evidence for details on where information on intrusion detection processes can be reviewed that are managed by AWS for physical security controls. Conclusion There are many third-party tools that can assist you with your assessment. Since AWS customers have full control of their operating systems, network settings, and traffic routing, a majority of tools used in-house can be used to assess and audit the assets in AWS. A useful tool provided by AWS is the AWS Trusted Advisor tool. AWS Trusted Advisor draws upon best practices learned from AWS aggregated operational history of serving hundreds of thousands of AWS customers. The AWS Trusted Advisor performs several fundamental checks of your AWS environment and makes recommendations when opportunities exist to save money, improve system performance, or close security gaps. This tool may be leveraged to perform some of the audit checklist items to enhance and support your organizations auditing and assessment processes. Page 24 of 28
25 Appendix A: References and Further Reading 1. Amazon Web Services: Overview of Security Processes - r.pdf 2. Amazon Web Services Risk and Compliance Whitepaper Whitepaper.pdf 3. AWS OCIE Cybersecurity Workbook Using Amazon Web Services for Disaster Recovery Identity federation sample application for an Active Directory use case Single Sign-on with Windows ADFS to Amazon EC2.NET Applications - &x=20&y=25&fromsearch=1&searchpath=all&searchquery=identity%20federati on 7. Authenticating Users of AWS Mobile Applications with a Token Vending Machine g=searchquery&fromsearch=1&searchquery=token%20vending%20machine 8. Client-Side Data Encryption with the AWS SDK for Java and Amazon S AWS Command Line Interface Amazon Web Services Acceptable Use Policy - Page 25 of 28
26 Appendix B: Glossary of Terms Authentication: Authentication is the process of determining whether someone or something is, in fact, who or what it is declared to be. Availability Zone: Amazon EC2 locations are composed of regions and Availability Zones. Availability Zones are distinct locations that are engineered to be insulated from failures in other Availability Zones and provide inexpensive, low latency network connectivity to other Availability Zones in the same region. EC2: Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides resizable compute capacity in the cloud. It is designed to make webscale cloud computing easier for developers. Hypervisor: A hypervisor, also called Virtual Machine Monitor (VMM), is software/hardware platform virtualization software that allows multiple operating systems to run on a host computer concurrently. IAM: AWS Identity and Access Management (IAM) enables a customer to create multiple Users and manage the permissions for each of these Users within their AWS Account. Object: The fundamental entities stored in Amazon S3. Objects consist of object data and metadata. The data portion is opaque to Amazon S3. The metadata is a set of name-value pairs that describe the object. These include some default metadata such as the date last modified and standard HTTP metadata such as Content-Type. The developer can also specify custom metadata at the time the Object is stored. Service: Software or computing ability provided across a network (e.g., EC2, S3, VPC, etc.). Page 26 of 28
27 Appendix C: API Calls The AWS Command Line Interface is a unified tool to manage your AWS services List all resources with tags - aws ec2 describe-tags 2. List all Customer Gateways on the customers AWS account: - aws ec2 describe-customer-gateways output table 3. List all VPN connections on the customers AWS account - aws ec2 describe-vpn-connections 4. List all Customer Direct Connect connections - aws directconnect describe-connections - aws directconnect describe-interconnects - aws directconnect describe-connections-on-interconnect - aws directconnect describe-virtual-interfaces 5. List all Customer Gateways on the customers AWS account: - aws ec2 describe-customer-gateways output table 6. List all VPN connections on the customers AWS account - aws ec2 describe-vpn-connections 7. List all Customer Direct Connect connections - aws directconnect describe-connections - aws directconnect describe-interconnects - aws directconnect describe-connections-on-interconnect - aws directconnect describe-virtual-interfaces 8. Alternatively use Security Group focused CLI: - aws ec2 describe-security-groups 9. List AMI currently owned/registered by the customer - aws ec2 describe-images owners self 10. List all Instances launched with a specific AMI - aws ec2-describe-instances --filters Name=image-id,Values=XXXXX (where XXXX = image-id value e.g. ami-12345a12 Page 27 of 28
28 11. List IAM Roles/Groups/Users - aws iam list-roles - aws iam list-groups - aws iam list-users 12. List Policies assigned to Groups/Roles/Users: - aws iam list-attached-role-policies --role-name XXXX - aws iam list-attached-group-policies --group-name XXXX - aws iam list-attached-user-policies --user-name XXXX where XXXX is a resource name within the Customers AWS Account 13. List KMS Keys - aws kms list-aliases 14. List Key Rotation Policy - aws kms get-key-rotation-status key-id XXX (where XXX = key-id In AWS account 15. List EBS Volumes encrypted with KMS Keys - aws ec2 describe-volumes "Name=encrypted,Values=true" - targeted e.g. us-east-1) 16. Credential Report - aws iam generate-credential-report - aws iam get-credential-report 17. Create Snapshot/Backup of EBS volume - aws ec2 create-snapshot --volume-id XXXXXXX - (where XXXXXX = ID of volume within the AWS Account) 18. Confirm Snapshot/Backup completed - aws ec2 describe-snapshots --filters Name=volume-id,Values=XXXXXX) Page 28 of 28
Application Security Best Practices. Matt Tavis Principal Solutions Architect
Application Security Best Practices Matt Tavis Principal Solutions Architect Application Security Best Practices is a Complex topic! Design scalable and fault tolerant applications See Architecting for
Simone Brunozzi, AWS Technology Evangelist, APAC. Fortress in the Cloud
Simone Brunozzi, AWS Technology Evangelist, APAC Fortress in the Cloud AWS Cloud Security Model Overview Certifications & Accreditations Sarbanes-Oxley (SOX) compliance ISO 27001 Certification PCI DSS
AWS Security. Security is Job Zero! CJ Moses Deputy Chief Information Security Officer. AWS Gov Cloud Summit II
AWS Security CJ Moses Deputy Chief Information Security Officer Security is Job Zero! Overview Security Resources Certifications Physical Security Network security Geo-diversity and Fault Tolerance GovCloud
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
solution brief PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP AWS AND PCI DSS COMPLIANCE To ensure an end-to-end secure computing environment, Amazon Web Services (AWS) employs a shared security responsibility
Famly ApS: Overview of Security Processes
Famly ApS: Overview of Security Processes October 2015 Please consult http://famly.co for the latest version of this paper Page 1 of 10 Table of Contents 1. INTRODUCTION TO SECURITY AT FAMLY... 3 2. PHYSICAL
KeyLock Solutions Security and Privacy Protection Practices
KeyLock Solutions Overview KeyLock Solutions hosts its infrastructure at Heroku. Heroku is a cloud application platform used by organizations of all sizes to deploy and operate applications throughout
Security Essentials & Best Practices
Security Essentials & Best Practices Overview Overview of the AWS cloud security concepts such as the AWS security center, Shared Responsibility Model, and Identity and Access Management. 1 AWS Security
Microsoft s Compliance Framework for Online Services
Microsoft s Compliance Framework for Online Services Online Services Security and Compliance Executive summary Contents Executive summary 1 The changing landscape for online services compliance 4 How Microsoft
Amazon Web Services: Risk and Compliance January 2011
Amazon Web Services: Risk and Compliance January 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 This document intends to provide information to assist AWS customers
319 MANAGED HOSTING TECHNICAL DETAILS
319 MANAGED HOSTING TECHNICAL DETAILS 319 NetWorks www.319networks.com Table of Contents Architecture... 4 319 Platform... 5 319 Applications... 5 319 Network Stack... 5 319 Cloud Hosting Technical Details...
U.S. Securities and Exchange Commission s Office of Compliance Inspections and Examinations (OCIE)
Amazon Web Services SEC (OCIE) Workbook May 2015 U.S. Securities and Exchange Commission s Office of Compliance Inspections and Examinations (OCIE) CYBERSECURITY INITIATIVE Workbook Page 1 of 28 Amazon
Managing Your Microsoft Windows Server Fleet with AWS Directory Service. May 2015
Managing Your Microsoft Windows Server Fleet with AWS Directory Service May 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational
Supplier Information Security Addendum for GE Restricted Data
Supplier Information Security Addendum for GE Restricted Data This Supplier Information Security Addendum lists the security controls that GE Suppliers are required to adopt when accessing, processing,
Using AWS in the context of Australian Privacy Considerations October 2015
Using AWS in the context of Australian Privacy Considerations October 2015 (Please consult https://aws.amazon.com/compliance/aws-whitepapers/for the latest version of this paper) Page 1 of 13 Overview
Building Energy Security Framework
Building Energy Security Framework Philosophy, Design, and Implementation Building Energy manages multiple subsets of customer data. Customers have strict requirements for regulatory compliance, privacy
PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP
SOLUTION BRIEF PCI COMPLIANCE ON AWS: HOW TREND MICRO CAN HELP The benefits of cloud computing are clear and compelling: no upfront investment, low ongoing costs, flexible capacity and fast application
Cloud models and compliance requirements which is right for you?
Cloud models and compliance requirements which is right for you? Bill Franklin, Director, Coalfire Stephanie Tayengco, VP of Technical Operations, Logicworks March 17, 2015 Speaker Introduction Bill Franklin,
Autodesk PLM 360 Security Whitepaper
Autodesk PLM 360 Autodesk PLM 360 Security Whitepaper May 1, 2015 trust.autodesk.com Contents Introduction... 1 Document Purpose... 1 Cloud Operations... 1 High Availability... 1 Physical Infrastructure
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including:
IT Best Practices Audit TCS offers a wide range of IT Best Practices Audit content covering 15 subjects and over 2200 topics, including: 1. IT Cost Containment 84 topics 2. Cloud Computing Readiness 225
AWS alignment with the Australian Signals Directorate (ASD) Cloud Computing Security Considerations
AWS alignment with the Australian Signals Directorate (ASD) Cloud Computing Security Considerations The Cloud Computing Security Considerations was created to assist agencies in performing a risk assessment
Security and Data Protection for Online Document Management Software
Security and Data Protection for Online Document Management Software Overview As organizations transition documents and company information to Software as a Service (SaaS) applications that are no longer
THE BLUENOSE SECURITY FRAMEWORK
THE BLUENOSE SECURITY FRAMEWORK Bluenose Analytics, Inc. All rights reserved TABLE OF CONTENTS Bluenose Analytics, Inc. Security Whitepaper ISO 27001/27002 / 1 The Four Pillars of Our Security Program
Alfresco Enterprise on AWS: Reference Architecture
Alfresco Enterprise on AWS: Reference Architecture October 2013 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 13 Abstract Amazon Web Services (AWS)
FIREWALL CHECKLIST. Pre Audit Checklist. 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review.
1. Obtain previous workpapers/audit reports. FIREWALL CHECKLIST Pre Audit Checklist 2. Obtain the Internet Policy, Standards, and Procedures relevant to the firewall review. 3. Obtain current network diagrams
Central Agency for Information Technology
Central Agency for Information Technology Kuwait National IT Governance Framework Information Security Agenda 1 Manage security policy 2 Information security management system procedure Agenda 3 Manage
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1
How does IBM deliver cloud security? An IBM paper covering SmartCloud Services 1 2 How does IBM deliver cloud security? Contents 2 Introduction 3 Cloud governance 3 Security governance, risk management
Every Silver Lining Has a Vault in the Cloud
Irvin Hayes Jr. Autodesk, Inc. PL6015-P Don t worry about acquiring hardware and additional personnel in order to manage your Vault software installation. Learn how to spin up a hosted server instance
March 2012 www.tufin.com
SecureTrack Supporting Compliance with PCI DSS 2.0 March 2012 www.tufin.com Table of Contents Introduction... 3 The Importance of Network Security Operations... 3 Supporting PCI DSS with Automated Solutions...
Opsview in the Cloud. Monitoring with Amazon Web Services. Opsview Technical Overview
Opsview in the Cloud Monitoring with Amazon Web Services Opsview Technical Overview Page 2 Opsview In The Cloud: Monitoring with Amazon Web Services Contents Opsview in The Cloud... 3 Considerations...
How To Manage Security On A Networked Computer System
Unified Security Reduce the Cost of Compliance Introduction In an effort to achieve a consistent and reliable security program, many organizations have adopted the standard as a key compliance strategy
Deploy Remote Desktop Gateway on the AWS Cloud
Deploy Remote Desktop Gateway on the AWS Cloud Mike Pfeiffer April 2014 Last updated: May 2015 (revisions) Table of Contents Abstract... 3 Before You Get Started... 3 Three Ways to Use this Guide... 4
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT
HIPAA CRITICAL AREAS TECHNICAL SECURITY FOCUS FOR CLOUD DEPLOYMENT A Review List This paper was put together with Security in mind, ISO, and HIPAA, for guidance as you move into a cloud deployment Dr.
Larry Wilson Version 1.0 November, 2013. University Cyber-security Program Critical Asset Mapping
Larry Wilson Version 1.0 November, 2013 University Cyber-security Program Critical Asset Mapping Part 3 - Cyber-Security Controls Mapping Cyber-security Controls mapped to Critical Asset Groups CSC Control
Infor CloudSuite. Defense-in-depth. Table of Contents. Technical Paper Plain talk about Infor CloudSuite security
Technical Paper Plain talk about security When it comes to Cloud deployment, security is top of mind for all concerned. The Infor CloudSuite team uses best-practice protocols and a thorough, continuous
PCI Requirements Coverage Summary Table
StillSecure PCI Complete Managed PCI Compliance Solution PCI Requirements Coverage Summary Table January 2013 Table of Contents Introduction... 2 Coverage assumptions for PCI Complete deployments... 2
NERC CIP VERSION 5 COMPLIANCE
BACKGROUND The North American Electric Reliability Corporation (NERC) Critical Infrastructure Protection (CIP) Reliability Standards define a comprehensive set of requirements that are the basis for maintaining
Data Management Policies. Sage ERP Online
Sage ERP Online Sage ERP Online Table of Contents 1.0 Server Backup and Restore Policy... 3 1.1 Objectives... 3 1.2 Scope... 3 1.3 Responsibilities... 3 1.4 Policy... 4 1.5 Policy Violation... 5 1.6 Communication...
Payment Card Industry Data Security Standard
Symantec Managed Security Services support for IT compliance Solution Overview: Symantec Managed Services Overviewview The (PCI DSS) was developed to facilitate the broad adoption of consistent data security
WE RUN SEVERAL ON AWS BECAUSE WE CRITICAL APPLICATIONS CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY.
WE RUN SEVERAL CRITICAL APPLICATIONS ON AWS BECAUSE WE CAN SCALE AND USE THE INFRASTRUCTURE EFFICIENTLY. - Murari Gopalan Director, Technology Expedia Expedia, a leading online travel company for leisure
Anypoint Platform Cloud Security and Compliance. Whitepaper
Anypoint Platform Cloud Security and Compliance Whitepaper 1 Overview Security is a top concern when evaluating cloud services, whether it be physical, network, infrastructure, platform or data security.
SMS. Cloud Computing. Systems Management Specialists. Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales
SMS Systems Management Specialists Cloud Computing Grupo SMS www.grupo-sms.com 949.223.9240 option 3 for sales Cloud Computing The SMS Model: Cloud computing is a model for enabling ubiquitous, convenient,
Information Security Risk Assessment Checklist. A High-Level Tool to Assist USG Institutions with Risk Analysis
Information Security Risk Assessment Checklist A High-Level Tool to Assist USG Institutions with Risk Analysis Updated Oct 2008 Introduction Information security is an important issue for the University
Security Issues in Cloud Computing
Security Issues in Computing CSCI 454/554 Computing w Definition based on NIST: A model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources
White Paper How Noah Mobile uses Microsoft Azure Core Services
NoahMobile Documentation White Paper How Noah Mobile uses Microsoft Azure Core Services The Noah Mobile Cloud service is built for the Microsoft Azure platform. The solutions that are part of the Noah
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE
DESIGNATED CONTRACT MARKET OPERATIONAL CAPABILITY TECHNOLOGY QUESTIONNAIRE Please provide all relevant documents responsive to the information requests listed within each area below. In addition to the
Securing Privileges in the Cloud. A Clear View of Challenges, Solutions and Business Benefits
A Clear View of Challenges, Solutions and Business Benefits Introduction Cloud environments are widely adopted because of the powerful, flexible infrastructure and efficient use of resources they provide
DoD-Compliant Implementations in the AWS Cloud
DoD-Compliant Implementations in the AWS Cloud Reference Architectures Paul Bockelman Andrew McDermott April 2015 Contents Contents 2 Abstract 3 Introduction 3 Getting Started 4 Shared Responsibilities
twilio cloud communications SECURITY ARCHITECTURE
twilio cloud communications SECURITY ARCHITECTURE July 2014 twilio.com Security is a lingering concern for many businesses that want to take advantage of the flexibility and ease of cloud services. Businesses
TASK -040. TDSP Web Portal Project Cyber Security Standards Best Practices
Page 1 of 10 TSK- 040 Determine what PCI, NERC CIP cyber security standards are, which are applicable, and what requirements are around them. Find out what TRE thinks about the NERC CIP cyber security
Achieving PCI-Compliance through Cyberoam
White paper Achieving PCI-Compliance through Cyberoam The Payment Card Industry (PCI) Data Security Standard (DSS) aims to assure cardholders that their card details are safe and secure when their debit
Service Organization Controls 3 Report
Service Organization Controls 3 Report Report on the Amazon Web Services System Relevant to Security and Availability For the Period April 1, 2015 September 30, 2015 Ernst & Young LLP Suite 1600 560 Mission
Securing the Microsoft Platform on Amazon Web Services
Securing the Microsoft Platform on Amazon Web Services Tom Stickle August 2012 (Please consult http://aws.amazon.com/whitepapers/ for the latest version of this paper) Page 1 of 22 Abstract Deploying Microsoft
T2 IaaSand PCI Compliance. Robert Zigweid, IOActive
T2 IaaSand PCI Compliance Robert Zigweid, IOActive Introduction Robert M. Zigweid Principal Compliance Consultant at IOActive, Inc. PCI QSA, PCI PA-QSA QSA for Amazon Web Services 2 Creating a PCI Compliant
Smartronix Inc. Cloud Assured Services Commercial Price List
Smartronix Inc. Assured Services Commercial Price List Smartronix, Inc. 12120 Sunset Hills Road Suite #600, Reston, VA 20190 703-435-3322 [email protected] www.smartronix.com Table of Contents
Kenna Platform Security. A technical overview of the comprehensive security measures Kenna uses to protect your data
Kenna Platform Security A technical overview of the comprehensive security measures Kenna uses to protect your data V2.0, JULY 2015 Multiple Layers of Protection Overview Password Salted-Hash Thank you
Security from a customer s perspective. Halogen s approach to security
September 18, 2015 Security from a customer s perspective Using a cloud-based talent management program can deliver tremendous benefits to your organization, including aligning your workforce, improving
Security Overview. BlackBerry Corporate Infrastructure
Security Overview BlackBerry Corporate Infrastructure Published: 2015-04-23 SWD-20150423095908892 Contents Introduction... 5 History... 6 BlackBerry policies...7 Security organizations...8 Corporate Security
Pega as a Service. Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect
1 Pega as a Service Kim Singletary, Dir. Product Marketing Cloud Matt Yanchyshyn, Sr. Mgr., AWS Solutions Architect This information is not a commitment, promise or legal obligation to deliver any material,
Cloud S ecurity Security Processes & Practices Jinesh Varia
Cloud Security Processes & Practices Jinesh Varia Overview Certifications Physical Security Backups EC2 Security S3 Security SimpleDB Security SQS Security Best Practices AWS Security White Paper Available
Dooblo SurveyToGo: Security Overview
Dooblo SurveyToGo: Security Overview May, 2012 Written by: Dooblo Page 1 of 10 1 Table of Contents 1 INTRODUCTION... 3 1.1 OVERVIEW... 3 1.2 PURPOSE... 3 2 PHYSICAL DATA CENTER SECURITY... 4 2.1 OVERVIEW...
CyberSource Payment Security. with PCI DSS Tokenization Guidelines
CyberSource Payment Security Compliance The PCI Security Standards Council has published guidelines on tokenization, providing all merchants who store, process, or transmit cardholder data with guidance
IBM Cloud Security Draft for Discussion September 12, 2011. 2011 IBM Corporation
IBM Cloud Security Draft for Discussion September 12, 2011 IBM Point of View: Cloud can be made secure for business As with most new technology paradigms, security concerns surrounding cloud computing
Addressing Cloud Computing Security Considerations
Addressing Cloud Computing Security Considerations with Microsoft Office 365 Protect more Contents 2 Introduction 3 Key Security Considerations 4 Office 365 Service Stack 5 ISO Certifications for the Microsoft
Amazon Web Services: Overview of Security Processes May 2011
Amazon Web Services: Overview of Security Processes May 2011 (Please consult http://aws.amazon.com/security for the latest version of this paper) 1 Amazon Web Services (AWS) delivers a scalable cloud computing
Best Practices for PCI DSS V3.0 Network Security Compliance
Best Practices for PCI DSS V3.0 Network Security Compliance January 2015 www.tufin.com Table of Contents Preparing for PCI DSS V3.0 Audit... 3 Protecting Cardholder Data with PCI DSS... 3 Complying with
Amazon Web Services: Risk and Compliance January 2013
Amazon Web Services: Risk and Compliance January 2013 (Please consult http://aws.amazon.com/security for the latest version of this paper) Page 1 of 59 This document intends to provide information to assist
Automate PCI Compliance Monitoring, Investigation & Reporting
Automate PCI Compliance Monitoring, Investigation & Reporting Reducing Business Risk Standards and compliance are all about implementing procedures and technologies that reduce business risk and efficiently
Security Overview Enterprise-Class Secure Mobile File Sharing
Security Overview Enterprise-Class Secure Mobile File Sharing Accellion, Inc. 1 Overview 3 End to End Security 4 File Sharing Security Features 5 Storage 7 Encryption 8 Audit Trail 9 Accellion Public Cloud
ITIL Asset and Configuration. Management in the Cloud
ITIL Asset and Configuration Management in the Cloud An AWS Cloud Adoption Framework Addendum September 2015 A Joint Whitepaper with Minjar Cloud Solutions 2015, Amazon Web Services, Inc. or its affiliates.
CS 356 Lecture 25 and 26 Operating System Security. Spring 2013
CS 356 Lecture 25 and 26 Operating System Security Spring 2013 Review Chapter 1: Basic Concepts and Terminology Chapter 2: Basic Cryptographic Tools Chapter 3 User Authentication Chapter 4 Access Control
GoodData Corporation Security White Paper
GoodData Corporation Security White Paper May 2016 Executive Overview The GoodData Analytics Distribution Platform is designed to help Enterprises and Independent Software Vendors (ISVs) securely share
Host Hardening. Presented by. Douglas Couch & Nathan Heck Security Analysts for ITaP 1
Host Hardening Presented by Douglas Couch & Nathan Heck Security Analysts for ITaP 1 Background National Institute of Standards and Technology Draft Guide to General Server Security SP800-123 Server A
Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment
White Paper Data Collection and Analysis: Get End-to-End Security with Cisco Connected Analytics for Network Deployment Cisco Connected Analytics for Network Deployment (CAND) is Cisco hosted, subscription-based
Alcatel-Lucent Services
SOLUTION DESCRIPTION Alcatel-Lucent Services Security Introduction Security is a sophisticated business and technical challenge, and it plays an important role in the success of any network, service or
Guideline on Auditing and Log Management
CMSGu2012-05 Mauritian Computer Emergency Response Team CERT-MU SECURITY GUIDELINE 2011-02 Enhancing Cyber Security in Mauritius Guideline on Auditing and Log Management National Computer Board Mauritius
Security Controls What Works. Southside Virginia Community College: Security Awareness
Security Controls What Works Southside Virginia Community College: Security Awareness Session Overview Identification of Information Security Drivers Identification of Regulations and Acts Introduction
Cloud Security Through Threat Modeling. Robert M. Zigweid Director of Services for IOActive
Cloud Security Through Threat Modeling Robert M. Zigweid Director of Services for IOActive 1 Key Points Introduction Threat Model Primer Assessing Threats Mitigating Threats Sample Threat Model Exercise
Live Guide System Architecture and Security TECHNICAL ARTICLE
Live Guide System Architecture and Security TECHNICAL ARTICLE Contents 1. Introduction... 2 2. Hosting Environment... 2 2.1. Standards - Compliancy... 3 2.2. Business Continuity Management... 3 2.3. Network
PCI Compliance for Cloud Applications
What Is It? The Payment Card Industry Data Security Standard (PCIDSS), in particular v3.0, aims to reduce credit card fraud by minimizing the risks associated with the transmission, processing, and storage
Accellion Security FAQ
A N A C C E L L I O N W H I T E P A P E R Accellion Security FAQ Accellion, Inc. Tel +1 650 485-4300 1804 Embarcadero Road Fax +1 650 485-4308 Suite 200 www.accellion.com Palo Alto, CA 94303 [email protected]
Securing SaaS Applications: A Cloud Security Perspective for Application Providers
P a g e 2 Securing SaaS Applications: A Cloud Security Perspective for Application Providers Software as a Service [SaaS] is rapidly emerging as the dominant delivery model for meeting the needs of enterprise
NETWORK ACCESS CONTROL AND CLOUD SECURITY. Tran Song Dat Phuc SeoulTech 2015
NETWORK ACCESS CONTROL AND CLOUD SECURITY Tran Song Dat Phuc SeoulTech 2015 Table of Contents Network Access Control (NAC) Network Access Enforcement Methods Extensible Authentication Protocol IEEE 802.1X
Amazon Web Services Primer. William Strickland COP 6938 Fall 2012 University of Central Florida
Amazon Web Services Primer William Strickland COP 6938 Fall 2012 University of Central Florida AWS Overview Amazon Web Services (AWS) is a collection of varying remote computing provided by Amazon.com.
Preparing an RFI for. This RFI has been updated to reflect the new requirements in Version 3.0 of the PCI DSS, which took effect January 2015.
Preparing an RFI for Protecting cardholder data is a critical and mandatory requirement for all organizations that process, store or transmit information on credit or debit cards. Requirements and guidelines
http://media.amazonwebservices.com/pdf/aws_security_whitepaper.pdf http://media.amazonwebservices.com/pdf/aws_security_whitepaper.
1. Cloud Costs Questions a. Are there any better ways for us to predict / manage our transfer costs than what we discussed in the meeting today? [DSB] There is currently no methodology with AWS to purchase
ProtectV. Securing Sensitive Data in Virtual and Cloud Environments. Executive Summary
VISIBILITY DATA GOVERNANCE SYSTEM OS PARTITION UNIFIED MANAGEMENT CENTRAL AUDIT POINT ACCESS MONITORING ENCRYPTION STORAGE VOLUME POLICY ENFORCEMENT ProtectV SECURITY SNAPSHOT (backup) DATA PROTECTION
SANS Top 20 Critical Controls for Effective Cyber Defense
WHITEPAPER SANS Top 20 Critical Controls for Cyber Defense SANS Top 20 Critical Controls for Effective Cyber Defense JANUARY 2014 SANS Top 20 Critical Controls for Effective Cyber Defense Summary In a
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES
pingidentity.com EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES Best practices for identity federation in AWS Table of Contents Executive Overview 3 Introduction: Identity and Access Management in Amazon
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS
SOC on Amazon Web Services (AWS) What You Need To Know Understanding the regulatory roadmap for SOC on AWS Jeff Cook November 2015 Summary Service Organization Control (SOC) reports (formerly SAS 70 or
Financial Services Grid Computing on Amazon Web Services January 2013 Ian Meyers
Financial Services Grid Computing on Amazon Web Services January 2013 Ian Meyers (Please consult http://aws.amazon.com/whitepapers for the latest version of this paper) Page 1 of 15 Contents Abstract...
SAQ D Compliance. Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP
SAQ D Compliance Scott St. Aubin Senior Security Consultant QSA, CISM, CISSP Ground Rules WARNING: Potential Death by PowerPoint Interaction Get clarification Share your institution s questions, challenges,
Security Whitepaper: ivvy Products
Security Whitepaper: ivvy Products Security Whitepaper ivvy Products Table of Contents Introduction Overview Security Policies Internal Protocol and Employee Education Physical and Environmental Security
