AWS Region US-WEST (N. California) EU-WEST (Ireland) EU-Central (Frankfurt) EU-WEST (Ireland) EU-Central (Frankfurt) ASIA PAC (Tokyo) ASIA PAC (Singapore)

Slides:



Advertisements
Similar presentations
Creating HIPAA-Compliant Medical Data Applications with Amazon Web Services Presented by, Tulika Srivastava Purdue University.
Advertisements

Thanks to Microsoft Azure’s Scalability, BA Minds Delivers a Cost-Effective CRM Solution to Small and Medium-Sized Enterprises in Latin America MICROSOFT.
BalaBit Shell Control Box
B. Ramamurthy 4/17/ Overview of EC2 Components (fig. 2.1) 10..* /17/20152.
Amazon Web Services Security & Compliance Overview
Steve Jordan Director. Industry Solutions 05/05/14 Managing Chaos: Data Movement in 2014.
Using ArcGIS for Server in the Amazon Cloud
Preventing Good People From Doing Bad Things Best Practices for Cloud Security Brian Anderson Chief Marketing Officer & Author of “Preventing Good People.
Marihebert Leal. Alteryx is the fastest analytics plataform that is purpose- built to empower data analysts & their productivity. It blend complex data,
Unified Logs and Reporting for Hybrid Centralized Management
MyCloudIT Removes the Complexity of Moving Cloud Customers’ Entire IT Infrastructures to Microsoft Azure – Including the Desktop MICROSOFT AZURE ISV: MYCLOUDIT.
Mobility Without Vulnerability: Secure and Enable Your Mobile Users, Apps, and Devices David Clapp – Intuitive.
The Future for BRC Global Standard Food Safety David Brackston Senior Technical Service Manager BRC.
Automated Backup, Recovery, Inventory and Management for Security and Networking Devices.
No one questions that Microsoft can write great software. Customers want to know if we can be innovative, scalable, reliable in the cloud. (1996) 450M+
Opensource for Cloud Deployments – Risk – Reward – Reality
© 2011 IBM Corporation Smarter Software for a Smarter Planet The Capabilities of IBM Software Borislav Borissov SWG Manager, IBM.
Cloud Computing Kwangyun Cho v=8AXk25TUSRQ.
1 November 2008 David Hall Sales Manager – New Business Data Centre Hosting for the M-Business.
Adra Match BALANCER: Balance Sheet Reconciliation Software Powered by the Microsoft Azure Cloud MICROSOFT AZURE ISV PROFILE: ADRA MATCH Adra Match develops.
With the Help of the Microsoft Azure Platform, Awingu’s Web-Based Workspace Aggregator Enables Concrete and Easy Mobility Scenarios MICROSOFT AZURE ISV.
Maximize Return on Engagement via Scalable Omni-Channel Online Services in the Cloud COMPANY PROFILE: XOMNI, INC. Founded in 2011 and headquartered in.
CSI Software Offers Fully Integrated, Single-Source Enterprise Software for Membership-Based Facilities COMPANY PROFILE: CSI SOFTWARE CSI Software was.
Alert Logic Security and Compliance Solutions for vCloud Air High-level Overview.
Ali Pabrai, CISSP, CSCS ecfirst, chairman & ceo Preparing for a HIPAA Security Audit.
Empowering people-centric IT Unified device management Access and information protection Desktop Virtualization Hybrid Identity.
The Cloud: Risks, Rewards and Realities Global customer base, major footprint in Fortune 500 Global presence with dual headquarters in the US & offices.
Alert Logic Provides a Fully Managed Security and Compliance Solution Based in the Cloud, Powered by the Robust Microsoft Azure Platform MICROSOFT AZURE.
1 1 Securing (Accountability for) Cloud Content Peter McGoff – SVP and General Counsel.
Built on Azure, Moodle Helps Educators Create Proprietary Private Web Sites Filled with Dynamic Courses that Extend Learning Anytime, Anywhere MICROSOFT.
Lesson 19-E-Commerce Security Needs. Overview Understand e-commerce services. Understand the importance of availability. Implement client-side security.
Combining Cloud Power with Mobile Technology, Fielding Systems Is Delivering the Digital Oilfield to Modern Oil and Gas Production Companies COMPANY PROFILE:
== Enovatio Delivers a Scalable Project Management Solution Minus Large Upfront Infrastructure Costs, Thanks to the Powerful Microsoft Azure Platform MICROSOFT.
Datalayer Notebook Allows Data Scientists to Play with Big Data, Build Innovative Models, and Share Results Easily on Microsoft Azure MICROSOFT AZURE ISV.
Alliance Key Manager for Windows Azure Puts Encryption Key Management and Data Breach Security at Your Fingertips COMPANY PROFILE: TOWNSEND SECURITY Townsend.
User and Device Management
Flight is a SaaS Solution that Accelerates the Secure Transfer of Large Files and Data Sets Into and Out of Microsoft Azure Blob Storage MICROSOFT AZURE.
CLOUD COMPUTING WITH AWS AN INTRODUCTION
Avantida is Helping Ocean Carriers to Optimize Their Empty Shipping Container Flows, Based on the Highly Scalable Microsoft Azure Platform MICROSOFT AZURE.
Microsoft Azure and ServiceNow: Extending IT Best Practices to the Microsoft Cloud to Give Enterprises Total Control of Their Infrastructure MICROSOFT.
Why EMS? What benefit does EMS provide O365 customers Manage Mobile Productivity Increase IT ProductivitySimplify app delivery and deployment LOB Apps.
Illinois Health Network The 14th Global Grid Forum Chicago, Illinois June 27, 2005.
ProcessFrame QMS Is a Quality Management System that Supports ISO 9001:2015 Standard and Runs on the Microsoft Azure Cloud Platform MICROSOFT AZURE ISV.
Citrix ShareFile. Instant file access from any device Sharing and collaboration—with anyone Easy & Familiar (love Dropbox) USERS DEMAND Security Control.
#SummitNow Alfresco Deployments on AWS Cost-Effective, Scalable & Secure Michael Waldrop Director, Solutions Engineering .
© 2016 Catalyze, Inc. Go-To-Market Services HIPAA Compliance in the Cloud: Catalyze Provides Microsoft Azure Customers with a HITRUST Certified Platform-as-a-Service.
Discover How You Can Increase Collaboration with External Partners While Reducing Your Cost in Managing an Extranet from the Azure Cloud MICROSOFT AZURE.
DreamFactory for Microsoft Azure Is an Open Source REST API Platform That Enables Mobilization of Data in Minutes across Frameworks and Storage Methods.
Azure in Education Improve your services and reduce your overhead at the same time.
AWS Simple Icons v AWS Simple Icons: Usage Guidelines
Understanding The Cloud
100% Exam Passing Guarantee & Money Back Assurance
Barracuda Networks Creates Next-Generation Security Solutions That Enable Customers to Accelerate Their Adoption of Microsoft Azure MICROSOFT AZURE APP.
Hybrid Management and Security
Introduction to Amazon Web Services Overview of AWS Services
SMS+ on Microsoft Azure Provides Enhanced and Secure Text Messaging, with Audit Trail, Scalability, End-to-End Encryption, and Special Certifications MICROSOFT.
Power BI Security Best Practices
Cloud Security.
AWS. Introduction AWS launched in 2006 from the internal infrastructure that Amazon.com built to handle its online retail operations. AWS was one of the.
Let’s get Started with Your AWS Account
BOMGAR REMOTE SUPPORT Karl Lankford
Take Control of Insurance Product Management: Build, Test, and Launch Any Product Globally 10x Faster, 10x More Cheaply with INSTANDA on Azure Partner.
DeFacto Planning on the Powerful Microsoft Azure Platform Puts the Power of Intelligent and Timely Planning at Any Business Manager’s Fingertips Partner.
Data Security for Microsoft Azure
AWS Boulder - Denver Meetup – January 2017
Dell Data Protection | Rapid Recovery: Simple, Quick, Configurable, and Affordable Cloud-Based Backup, Retention, and Archiving Powered by Microsoft Azure.
Automating Security in the Cloud
AWS Cloud Computing Masaki.
Amazon Web Services.
Presentation transcript:

AWS Region US-WEST (N. California) EU-WEST (Ireland) EU-Central (Frankfurt) EU-WEST (Ireland) EU-Central (Frankfurt) ASIA PAC (Tokyo) ASIA PAC (Singapore) US-WEST (Oregon) SOUTH AMERICA (Sao Paulo) US-EAST (Virginia) GOV CLOUD ASIA PAC (Sydney) China (Beijing)

Regions: –Dublin (EU-West) – 3 x Availability Zones Launched in 2007 –Frankfurt (EU-Central) – 2 x Availability Zones Edge Locations: –Amsterdam, The Netherlands (2), Dublin, Ireland, Frankfurt, Germany (3), London, England (3), Madrid, Spain, Marseille, France, Milan, Italy, Paris, France (2), Stockholm, Sweden, and Warsaw, Poland Direct Connect POPs: –Dublin, London, Frankfurt

AWS Global Infrastructure Your Applications AWS Global Infrastructure Regions Availability Zones Edge Locations Foundation Services Application Services Deployment & Management ComputeStorageNetworkingDatabases Content DeliveryApplications Distributed Computing Libraries & SDK’s EC2 S3EBSGlacier Storage Gateway VPC Direct Connect ELBRoute53RDSElastiCacheDynamoRedShift CloudFrontSESSNSSQS Elastic Transcoder CloudSearchSWFEMR CloudWatch Monitoring BeanStalkOpsWorks Cloud Formation DataPipe Deployment & Automation IAMFederation Identity & Access Management Console Billing Web Interface Human Interaction Mechanical Turk AWS Global Infrastructure Enterprise Applications Workspaces Zocalo Virtual Desktop Document Collaboration

Pace of Innovation: Security vs. All

AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network & Firewall Configuration Customer content Customers Customers are responsible for their security and compliance IN the Cloud AWS is responsible for the security OF the Cloud

AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Platform & Applications Management Customer content Customers Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity AWS IAM Customer IAM Operating System, Network & Firewall Configuration Server-Side Encryption Fire System and/or Data

AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Optional – Opaque data: 1’s and 0’s (in transit/at rest) Firewall Configuration Platform & Applications Management Operating System, Network Configuration Customer content Customers Managed by Client-Side Data encryption & Data Integrity Authentication Network Traffic Protection Encryption / Integrity / Identity AWS IAM Customer IAM

AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Platform & Applications Management Operating System, Network & Firewall Configuration Customer content Customers Managed by Optional – Opaque Data: 1’s and 0’s (in flight / at rest) Network Traffic Protection by the Platform Protection of Data at Rest Network Traffic Protection by the Platform Protection of Data at in Transit Client-Side Data Encryption & Data Integrity Authentication AWS IAM

Identity Access Management (IAM) With AWS IAM you get to control who can do what in your AWS environment and from where Root in AWS is the same as Root in Windows/Linux Password Policies IAM Credentials Reports Manage Access Keys Fine grained control of users, groups, roles, and permissions to resources Integrate with your existing corporate directory using SAML 2.0 and single sign-on AWS account owner Network management Security management Server management Storage management

Fully managed service which provides: An Inventory of your AWS resources Lets you audit the resource configuration history Notifies you of resource configuration changes

Security Analysis: Am I safe? Config allows you to continuously monitor and evaluate configuration of workloads Audit Compliance: Where is the evidence? Complete inventory of all resources and their configuration any point in time Change Management: What will this change affect? All resource changes (create,update,delete) streamed to SNS Troubleshooting: What has changed? Identify changes in resource to resource relationships

You are making API calls... On a growing set of services around the world… AWS CloudTrail is continuously recording API calls… And delivering log files to you AWS CLOUDTRAIL Redshift AWS CloudFormation AWS Elastic Beanstalk

AWS CloudTrail

Whitepaper:

Singapore MTCS

On AWS Start on base of accredited services Functionally necessary – high watermark of requirements Audits done by third party experts Accountable to everyone Continuous monitoring Compliance approach based on all workload scenarios Security innovation drives broad compliance On-prem Start with bare concrete Functionally optional –(you can build a secure system without it) Audits done by an in-house team Accountable to yourself Typically check once a year Workload-specific compliance checks Must keep pace and invest in security innovation Accreditation & Compliance: on-prem vs on AWS

AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Your own accreditation Your own certifications Your own external audits Customer scope and effort is reduced Better results through focused efforts Built on AWS consistent baseline controls Customers

Facilities Physical security Compute infrastructure Storage infrastructure Network infrastructure Virtualization layer (EC2) Hardened service endpoints Fine-grained IAM capability += AWS partner solutions Your secure AWS solutions These local and global AWS partners provide wide range solutions from intrusion detection, data encryption, user management etc via SaaS and EC2 based Virtual Appliance

Company: UK-based global communications platform for call centers to capture communications data Challenge: must comply with PCI DSS so their customers can process payment card data on the platform Results: PCI certified on AWS; also SOC 1 Type 2 audited, ISO certified

Company: France-based insurance and healthcare coverage company, responsible for secure use and storage of confidential customer information Challenge: move critical IT to AWS and comply with the Solvency II Directive (EU insurance regulation) Results: Moved to AWS, realized cloud benefits (financial, security, scalability, availability, resiliency) and remain fully compliant with Solvency II and other compliance requirements. They are moving their other environments onto AWS.