Cloud Security AWS as an example.

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Cloud computing is used to describe a variety of computing concepts that involve a large number of computers connected through a real-time communication.
Ivan Pleština Amazon Simple Storage Service (S3) Amazon Elastic Block Storage (EBS) Amazon Elastic Compute Cloud (EC2)
Firewalls By Tahaei Fall What is a firewall? a choke point of control and monitoring interconnects networks with differing trust imposes restrictions.
1 NETE4631 Cloud deployment models and migration Lecture Notes #4.
An Approach to Secure Cloud Computing Architectures By Y. Serge Joseph FAU security Group February 24th, 2011.
1 Objectives Configure Network Access Services in Windows Server 2008 RADIUS 1.
Cloud Computing (101).
Payment Card Industry (PCI) Data Security Standard
Chapter 6 Configuring, Monitoring & Troubleshooting IPsec
1 Intrusion Detection Systems. 2 Intrusion Detection Intrusion is any use or attempted use of a system that exceeds authentication limits Intrusions are.
© 2007 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.1 ISP Responsibility Working at a Small-to-Medium Business or ISP – Chapter 8.
Cloud Computing using AWS C. Edward Chow. Advanced Internet & Web Systems chow2 Outline of the Talk Introduction to Cloud Computing AWS EC2 EC2 API A.
A Brief Overview by Aditya Dutt March 18 th ’ Aditya Inc.
1 Objectives Windows Firewalls with Advanced Security Bit-Lock Update and maintain your clients using Windows Server Update Service Microsoft Baseline.
Lecture 15 – Amazon Network as a Service. Recall IaaS Server as a Service Storage as a Service Network as a Service.
1 Infrastructure Hardening. 2 Objectives Why hardening infrastructure is important? Hardening Operating Systems, Network and Applications.
Cloud computing is the use of computing resources (hardware and software) that are delivered as a service over the Internet. Cloud is the metaphor for.
CLOUD COMPUTING  IT is a service provider which provides information.  IT allows the employees to work remotely  IT is a on demand network access.
Microsoft Internet Security and Acceleration (ISA) Server 2004 is an advanced packet checking and application-layer firewall, virtual private network.
Objectives Configure routing in Windows Server 2008 Configure Routing and Remote Access Services in Windows Server 2008 Network Address Translation 1.
Windows 7 Firewall.
Cloud Computing & Amazon Web Services – EC2 Arpita Patel Software Engineer.
Plan  Introduction  What is Cloud Computing?  Why is it called ‘’Cloud Computing’’?  Characteristics of Cloud Computing  Advantages of Cloud Computing.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco PublicITE I Chapter 6 1 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
CCNA4 v3 Module 6 v3 CCNA 4 Module 6 JEOPARDY K. Martin.
Computer Security Risks for Control Systems at CERN Denise Heagerty, CERN Computer Security Officer, 12 Feb 2003.
Security fundamentals Topic 10 Securing the network perimeter.
Module 10: Windows Firewall and Caching Fundamentals.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
© 2006 Cisco Systems, Inc. All rights reserved.Cisco Public 1 Version 4.0 Filtering Traffic Using Access Control Lists Introducing Routing and Switching.
What's a Firewall? A security system that acts as a protective boundary between a network and the outside world Isolates computer from the internet using.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Chapter 11 – Cloud Application Development. Contents Motivation. Connecting clients to instances through firewalls. Cloud Computing: Theory and Practice.
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
Alfresco on Azure Shah Rahman Founder and CEO, CloudlyIO.
SEMINAR ON.  OVERVIEW -  What is Cloud Computing???  Amazon Elastic Cloud Computing (Amazon EC2)  Amazon EC2 Core Concept  How to use Amazon EC2.
25/09/ Firewall, IDS & IPS basics. Summary Firewalls Intrusion detection system Intrusion prevention system.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Clouding with Microsoft Azure
Security fundamentals
Unit 3 Virtualization.
CompTIA Security+ Study Guide (SY0-401)
Chapter 6: Securing the Cloud
Avenues International Inc.
Contents Software components All users in one location:
Top 5 Open Source Firewall Software for Linux User
Working at a Small-to-Medium Business or ISP – Chapter 8
Amazon Network as a Service
Securing the Network Perimeter with ISA 2004
AWS COURSE DEMO BY PROFESSIONAL-GURU. Amazon History Ladder & Offering.
Welcome To : Group 1 VC Presentation
CompTIA Security+ Study Guide (SY0-401)
6.6 Firewalls Packet Filter (=filtering router)
Cloud Computing.
Managing Clouds with VMM
Firewalls Purpose of a Firewall Characteristic of a firewall
AWS Boulder - Denver Meetup – January 2017
Cloud Computing BY: Udit Jain.
Firewalls Routers, Switches, Hubs VPNs
Cloud Computing: Concepts
Amazon AWS Certified Solutions Architect Professional solutions-architect-professional-practice-test.html.
Amazon Web Services.
Cloud Security AWS as an example.
Designing IIS Security (IIS – Internet Information Service)
SQL Server on Amazon Web Services
SQL Server on Amazon Web Services
Cloud Computing for Wireless Networks
Presentation transcript:

Cloud Security AWS as an example

Cloud Security Security of the Cloud Security in the Cloud Implemented by the cloud service provider. (i.e. Them: AWS, IBM, Microsoft Security in the Cloud Implemented and operated by the customer (i.e. You) Related to security of customer content Applications that make of use of the cloud providers services.

Cloud Security – AWS vs. You Of the Cloud vs. in the Cloud

You Decide Which ports are open (Firewall) Which IP address may access your resources What patches are applied to the Operating System Do you have encryption enabled Account access User Access lists

They Decide Global Security of the cloud Hardware Data centers Networks Anti virus software

AWS Compliance

IaaS Infrastructure as a service EC2, VPC, S3 security are all controlled by you. Elastic Compute Cloud (EC2) Servers (small and big based on need) Virtual Private Cloud (VPC) You join Amazon’s private cloud and run services networked. Simple Storage Service (S3) Upload and share files.

Storage Decommission Blocks unauthorized users to see customer data. When storage is taken back from a customer, it must go though the data scrubber called the hypervisor before is can be used by another customer.

On the Network AWS protects against Denial of service Security groups, access control lists Man in the middle IP spoofing Host based firewall infrastructure. Will not accepts if IP address is not it’s own Port scanning Packet sniffing

Security ELB (Elastic load balancing) Security groups with inbound and outbound security restrictions. EC2 Firewall is configures by default in a Deny All but… mode You can used https encryption and encrypted tunnel access around VPN’s

Databases and non-Internet facing You can use subnets to place databases and non-internet facing subnets to avoid direct internet access to servers.

AWS firewall

Amazon CloudWatch You can used CloudWatch to track logs and metrics and alert you via email and text messages Basic monitoring (free) Polls every 5 minutes 5GB for ingestion 5GB storage Detailed monitoring Polls every minute Cost more money

AWS CloudWatch dashboard

UEBA-User & entity behavior analytics Examples) A user is doing an unusual amount of salesforce downloads A userid logging in from different places in the world at the same time.