Amazon Web Services Security & Compliance Overview

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

B. Ramamurthy 4/17/ Overview of EC2 Components (fig. 2.1) 10..* /17/20152.
Amazon Web Services Justin DeBrabant CIS Advanced Systems - Fall 2013.
The Total Cost of (Non) Ownership of Storage In The Cloud Jinesh Varia Technology Evangelist.
© 2010 VMware Inc. All rights reserved Amazon Web Services.
System Center 2012 R2 Overview
Notes: Update as of 1/13/2010. Vulnerabilities are included for SQL Server 2000, SQL Server 2005, SQL Server Oracle (8i, 9i, 9iR2, 10g, 10gR2,11g),
Using ArcGIS for Server in the Amazon Cloud
Gartner Magic Quadrant
“It’s going to take a month to get a proof of concept going.” “I know VMM, but don’t know how it works with SPF and the Portal” “I know Azure, but.
Notes: Update as of 12/31/2010 inclusive. Chart counts NIST CVE – Reported Software Flaws by “published” date, utilizing the NIST NVD. SQL Server.
Pre-adoption concern 60% cited concerns around data security as a barrier to adoption 45% concerned that the cloud would result in a lack of data control.
Demi Albuz SENIOR PRODUCT MARKETING MANAGER Samim Erdogan PRINCIPAL ENGINEERING MANAGER Thomas Willingham TECHNICAL PRODUCT MANAGER.
AWS Region US-WEST (N. California) EU-WEST (Ireland) EU-Central (Frankfurt) EU-WEST (Ireland) EU-Central (Frankfurt) ASIA PAC (Tokyo) ASIA PAC (Singapore)
Cloud Computing using AWS C. Edward Chow. Advanced Internet & Web Systems chow2 Outline of the Talk Introduction to Cloud Computing AWS EC2 EC2 API A.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Cloud Computing! Aber sicher ?!? Ralf Schnell Customer Solutions Architect Principal Cloud Strategist
Let's build a media sharing website # 1 Hosting.
Almost 4 decades of Advanced Analytics & DM expertise.
© 2015 ForeScout Technologies, Page 2 Source: Identity Theft Resource Center Annual number of data breaches Breaches reported Average annual cost of security.
Alessandro Cardoso Microsoft MVP | Readify National Manager |
Bizfss File Sync and Sharing Solution, Built on Microsoft Azure, Allows Businesses to Sync, Share, Back Up Using Their Own Cloud Storage MICROSOFT AZURE.
Securely Synchronize and Share Enterprise Files across Desktops, Web, and Mobile with EasiShare on the Powerful Microsoft Azure Cloud Platform MICROSOFT.
Cloud Computing is a Nebulous Subject Or how I learned to love VDF on Amazon.
Be Microsoft’s first and best customer Enabling world-class and predictable customer, client, and partner experience Protecting Microsoft’s physical and.
Launch Amazon Instance. Amazon EC2 Amazon Elastic Compute Cloud (Amazon EC2) provides resizable computing capacity in the Amazon Web Services (AWS) cloud.
Amazon Web Services 101 ©2014, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Agenda  Microsoft Directory Synchronization Tool  Active Directory Federation Server  ADFS Proxy  Hybrid Features – LAB.
Availability for the modern datacenter. The Era of the “Always-On Business” ™
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
Alfresco on Azure Shah Rahman Founder and CEO, CloudlyIO.
Riverbed Confidential. Riverbed – RVBD 22,000+ Customers $1 BILLION Revenue Market Leader * Performance Management * WAN Optimization * Cloud Storage.
© 2015 MetricStream, Inc. All Rights Reserved. AWS server provisioning © 2015 MetricStream, Inc. All Rights Reserved. By, Srikanth K & Rohit.
INTRODUCTION TO AMAZON WEB SERVICES (EC2). AMAZON WEB SERVICES  Services  Storage (Glacier, S3)  Compute (Elastic Compute Cloud, EC2)  Databases (Redshift,
1 ©2010 Hewlett-Packard Development Company, L.P. The information contained herein is subject to change without notice SIMPLIFY command of the data center.
Gartner Magic Quadrants
Deploying Docker Datacenter on AWS © 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved.
Protect your data Enable your users Desktop Virtualization Information protection Mobile device & application management Identity and Access Management.
Copyright © 2015 Centrify Corporation. All Rights Reserved. 1 Securing Enterprise Identities Against Cyberthreats Brian Krause Manager of North America.
Architecting Enterprise Workloads on AWS Mike Pfeiffer.
Azure.
Calgary Oracle User Group
ABC Company Positioned as a Magic Quadrant Leader
Implementing and Managing Azure Multi-factor Authentication
BUILD BIG DATA ENTERPRISE SOLUTIONS FASTER ON AZURE HDINSIGHT
Reduce Risk Across Hybrid IT
Market Growth Context – Where would you bet your company’s future?
Stop Those Prying Eyes Getting to Your Data
Enterprise Security in Practice
Axway MailGate Unifies “Safe-for-Work” Solutions to Keep Your Enterprise as Secure as Possible in the Azure Cloud and/or Any Hybrid Environment MICROSOFT.
Introduction to Amazon Web Services Overview of AWS Services
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Cloud Security.
Design and Implement Cloud Data Platform Solutions
Reduce Risk Across Hybrid IT
Azure.
AWS: EC2, S3 and Other Services
Data Security for Microsoft Azure
Goals Introduce the Windows Server 2003 family of operating systems
{ Security Technologies}
Power BI and SharePoint – the road ahead
Enabling the hybrid cloud with remote access appliances
Cloud Security AWS as an example.
Cloud Security AWS as an example.
*AZs available across US, Europe and Asia
Designing IIS Security (IIS – Internet Information Service)
Microsoft Virtual Academy
IoT Security and Privacy
Presentation transcript:

Amazon Web Services Security & Compliance Overview Attila Lengyel Enterprise Account Manager Dob Todorov Principal Security & Compliance Architect EMEA

undifferentiated heavy lifting

utility computing

Deployment & Administration AWS Global Infrastructure AWS provides broad and deep services to support any cloud workload Deployment & Administration Application Services This is a simple view of the set of services that we offer. At the core is the compute, storage and data services that are the heart of our offering. We then surround these offerings with a range of supporting components like management tools, networking services and application services. All these capabilities are hosted within our global data center footprint that allows you to consume services without having to build out your own facilities or procure hardware equipment. Compute Storage Database Networking AWS Global Infrastructure

Hundreds of Thousands of Customers in 190 Countries…

Every Imaginable Use Case Free steak campaign Facebook page Mars exploration ops Consumer social app Ticket pricing optimization SAP & Sharepoint Securities Trading Data Archiving Gene sequencing Marketing web site Interactive TV apps Financial markets analytics R&D data analysis Consumer social app Big data analytics Web site & media sharing Disaster recovery Media streaming Web and mobile apps Streaming webcasts Facebook app Consumer social app

“AWS is the overwhelming market share leader, with more than five times the compute capacity in use than the aggregate total of the other fourteen providers.” AWS has been named a leader in the Gartner MQ for Cloud IaaS third year in a row. Not only that Gartner notes that AWS is the overwhelming market share leader, with more than five times the compute capacity in use than the aggregate total of the other fourteen providers Gartner “Magic Quadrant for Cloud Infrastructure as a Service,” Lydia Leong, Douglas Toombs, Bob Gill, Gregor Petri, Tiny Haynes, August 19, 2013. This Magic Quadrant graphic was published by Gartner, Inc. as part of a larger research note and should be evaluated in the context of the entire report.. The Gartner report is available upon request from Steven Armstrong (asteven@amazon.com). Gartner does not endorse any vendor, product or service depicted in its research publications, and does not advise technology users to select only those vendors with the highest ratings. Gartner research publications consist of the opinions of Gartner's research organization and should not be construed as statements of fact. Gartner disclaims all warranties, expressed or implied, with respect to this research, including any warranties of merchantability or fitness for a particular purpose.

Notable Financial Services Stories

Dutch National Bank (regulator)

(Northern California) GovCloud (US ITAR Region) US West (Northern California) US West (Oregon) US East (Northern Virginia) South America (Sao Paulo) EU (Ireland) Asia Pacific (Singapore) Asia Pacific (Tokyo) Asia Pacific (Sydney) AWS Regions AWS Edge Locations

(Northern California) EU West (Dublin) US East (Virginia) Asia Pacific (Tokyo) Asia Pacific (Australia) A B C A B C A B C A B A B A B A B A B US West (Northern California) US West (Oregon) South America (Sao Paolo) Asia Pacific (Singapore)

Personal Data Protection in Europe EC Directive 95/46/EC: Personal Data Protection Use Amazon Web Services Dublin Region Safe Harbour EU Compliant Safe Harbour Switzerland Compliant

The Shared Responsibility Model in the Cloud Customer Data Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System and/or Data) Network Traffic Protection (Encryption/Integrity/Identity) Optional -- Opaque Data: 0s and 1s (in flight/at rest) Foundation Services Compute Storage Database Networking AWS Global Infrastructure Availability Zones Edge Locations Regions

The Shared Responsibility Model in the Cloud Security IN the Cloud Customer Data Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Client-side Data Encryption & Data Integrity Authentication Server-side Encryption (File System and/or Data) Network Traffic Protection (Encryption/Integrity/Identity) Optional -- Opaque Data: 0s and 1s (in flight/at rest) Security OF the Cloud Foundation Services Compute Storage Database Networking AWS Global Infrastructure Availability Zones Edge Locations Regions

Customer-managed Controls on Amazon EC2 Data Applications Platforms Security IN the Cloud Operating Systems OS-level Firewalls/IDS/IPS Systems/Deep Security Network Security Security OF the Cloud Security Groups & Network Access Control Lists Encryption of data in Flight Industry Standard Protocols: IPSec, SSL, SSH Encryption of Data at Rest OS-level: Encrypted File System, Bitlocker, dm-crypt, Secure Cloud

Data Protection at Rest and in Flight Application-level Encryption Applications Platform-level Encryption Platforms Operating Systems OS-level Firewalls/IDS/IPS Systems/Deep Security Network Security Security Groups & Network Access Control Lists Encryption of data in Flight Network Traffic Encryption Industry Standard Protocols: IPSec, SSL, SSH Encryption of Data at Rest OS-level: Encrypted File System, Bitlocker, dm-crypt, Secure Cloud Volume-level Encryption

AWS Certifications & Accreditations ISO 27001 Security IN the Cloud SOC 1 (SSAE 16 & ISAE 3402) Type II Audit SOC 2 SOC 3 Audit (new in 2013) Security OF the Cloud Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider

Q&A

User Identification, Authentication and Authorisation in the Cloud Enterprise Applications Active Directory/ LDAP Corporate Systems AD/LDAP Users EC2 DynamoDB Amazon Identity & Access Management S3 IAM Users

User Identification, Authentication and Authorisation in the Cloud Enterprise Applications Corporate Systems Active Directory/ LDAP AD/LDAP Users EC2 DynamoDB Access Token for Federated Access Amazon Identity & Access Management S3

User Identification, Authentication and Authorisation in the Cloud Enterprise Applications Shibboleth Corporate Systems AD/LDAP Users EC2 DynamoDB Access Token for Federated Access Amazon Identity & Access Management S3

SLAs, RTOs/RPOs CBA Business Processes Defined by Business RTO RPO System Design System SLAs Managed by AWS EC2 SLA S3 SLA CloudFront SLA RDS SLA

Physical Security Amazon has been building large-scale data centers for many years Important attributes: Non-descript facilities Robust perimeter controls Strictly controlled physical access 2 or more levels of two-factor auth Controlled, need-based access All access is logged and reviewed Separation of Duties employees with physical access don’t have logical privileges Maps to an Availability Zone ISO 27001 Payment Card Industry Data Security Standard (PCI DSS) Level 1 Service Provider

Storage Device Decommissioning All storage devices go through this process Uses techniques from DoD 5220.22-M (“National Industrial Security Program Operating Manual”) NIST 800-88 (“Guidelines for Media Sanitization”) Ultimately degaussed physically destroyed

AWS CloudHSM Dedicated access to HSM appliances managed & monitored by AWS, but you control the keys Increase performance for applications that use HSMs for key storage or encryption Comply with stringent regulatory and contractual requirements for key protection AWS CloudHSM EC2 Instance AWS CloudHSM

Security of Data at Rest Server side encryption (AES-256) – per object keys managed by AWS Client-side asymmetric encryption – integrated within APIs Client-side encryption: Amazon stores 0s and 1s EC2 + EBS Enable partition/disk level encryption Windows: use EFS (local certificates/centralised X.509) Linux: use cryptsetup/dm-crypt/others RDS MySQL Use SQL native encryption (server side) Client side encryption RDS Oracle Client-side encryption

Security of Data in Flight AWS APIs are Web services SOAP over HTTPS REST over HTTPS User and data authentication through request signatures User access to Web Console Admin access to Servers Use SSH with asymmetric keys, or X.509 certificates Use RDP + MPPE or SSL protection Secure Application-level Protocols

Network Traffic Flow Security Security Groups Inbound traffic must be explicitly specified by protocol, port, and security group VPC adds outbound filters VPC also adds Network Access Control Lists (ACLs): inbound and outbound stateless filters OS Firewall (e.g., iptables) may be implemented completely user controlled security layer granular access control of discrete hosts logging network events Inbound & Outbound Traffic Amazon Security Groups OS Firewall Encrypted File System Encrypted Swap File

Amazon EC2 Instance Isolation Physical Interfaces Customer 1 Hypervisor Customer 2 Customer n … Virtual Interfaces Firewall Security Groups

Multi-tier Security Approach Example Web Tier Application Tier Database Tier Ports 80 and 443 only open to the Internet Engineering staff have ssh access to the App Tier, which acts as Bastion Amazon EC2 Security Group Firewall Sync with on-premises database All other Internet ports blocked by default

Amazon VPC Network Security Controls

Layered Defence

AWS Multi-Factor Authentication Helps prevent anyone with unauthorized knowledge of your e-mail address and password from impersonating you Additional protection for account information Works with Master Account IAM Users Integrated into AWS Management Console Key pages on the AWS Portal S3 (Secure Delete)

Available Programmatically via AWS Support APIs AWS Trusted Advisor Available Programmatically via AWS Support APIs

Manage and Monitor Your Environments from Anywhere

Security & Compliance Resources Answers to many security & privacy questions Security Whitepaper Risk and Compliance Whitepaper Security Best Practices Whitepaper AWS Auditing Checklist Security Blog Security bulletins Penetration Testing http://aws.amazon.com/security/ http://aws.amazon.com/compliance/