33
Security, Privacy, & Compliance Overview Max Ramsay | Sr. Manager, Americas Security SA

Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

  • Upload
    others

  • View
    9

  • Download
    0

Embed Size (px)

Citation preview

Page 1: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Security, Privacy, & Compliance Overview

Max Ramsay | Sr. Manager, Americas Security SA

Page 2: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Customers Running Every Imaginable Use Case

2

800+ Government Agencies

3,000+ Education Institutions

10,000+ Nonprofits

Presenter
Presentation Notes
no notes
Page 3: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Vodafone built a mobile payment app

Amazon Web Services was the clear choice in terms of security.

Stefano Harak Online Senior Product Manager

PCI and DSS compliance was essential Launched in 3 months Reduced CapEx by 30% Deployed to 7 channels, including Facebook

Payments

Presenter
Presentation Notes
http://aws.amazon.com/solutions/case-studies/all/
Page 4: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Bristol-Myers Squibb moved clinical trials to AWS

Clinical trial simulations took 98% less time More efficient and iterative simulations results in fewer human trials 64% savings on clinical trial costs

We’re using fewer subjects in these trials, and needing fewer blood samples.

On-Premises Cloud

# of Simulations

# of Servers

Total Run Time (hr)

2000

2

60

2000

256

1.2

Russell Towell Senior Solutions Specialist

Presenter
Presentation Notes
http://www.youtube.com/watch?v=Vi96WrxASgo
Page 5: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Pegasystems put healthcare data on AWS

Company: Provides software for business process management, CRM, and case management Challenge: Pega tech is used cross-functionally across the healthcare industry; all data is considered PHI Results: Pega and their customers are HIPAA compliant on AWS

Presenter
Presentation Notes
http://aws.amazon.com/compliance/aws-compliance-case-study-pegasystems/ About Pegasystems Pegasystems is a software company that provides software solutions for business process management, customer relationship management, and case management decision management. The Compliance Challenge Pega had customers using their software to store and process a wide range of data including Personal Health Information and Personal Identifiable Information. They have many customers in the healthcare space and they need to treat all data as sensitive as PHI or PII. Security controls across all customers is extremely important. Accomplished AWS security controls and access to audit reports helped Pega establish a strong centralized control environment on AWS. Pega signed a BAA with AWS and successfully passed a 3rd party audit of HIPAA controls and standards. Their customers can use their services and be HIPAA compliant as well. Customer Quote: “Pega relies on AWS certifications in almost all of our sales engagements. We relied on the SOC2, FedRAMP / FISMA, PCI, and ISO certifications to help our clients understand that Amazon takes security seriously and the proper controls are in place.” -Krassi Genov, Pegasystems
Page 6: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

NASDAQ put SEC regulated data on AWS

Company: provides products and services to manage the entire life cycle of a trade Challenge: Securely storing and managing vast amounts of data with strict compliance requirements Results: NASDAQ and FinQloud customers meets stringent SEC 17a-4 requirements for financial record retention

Presenter
Presentation Notes
About NASDAQ NASDAQ OMX Group, Inc. is the inventor of the electronic exchange. The company provides products and services to manage the entire life cycle of a trade. The Compliance Challenge Among other compliance concerns, NASDAQ needed to find a way to store vast amounts of regulated data with strict security and compliance requirements. And they needed to do it on behalf of the community of broker/dealers who need to do the same. Since this hadn’t been done in the cloud before, they also needed to validate the technology with the SEC as being an acceptable way to store transaction data. Accomplished NASDAQ developed a special community cloud on AWS that alleviates a significant compliance burden for brokers storing transaction data that is much less costly than traditional hardware special built for this purpose. In addition, the SEC concurred that the technology meets SEC 17a-4 requirements for financial record retention. Customer Quote: “By using the AWS platform, FinQloud can help NASDAQ OMX’s clients significantly reduce the operational costs and complexities associated with data and infrastructure management.” -Ted Myerson, Global Head of Access Services, NASDAQ OMX
Page 7: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Cognia put credit card data on AWS

Company: Global communications platform for call centers to capture communications data Challenge: must comply with PCI DSS so their customers can process payment card data on the platform Results: PCI certified on AWS

Presenter
Presentation Notes
http://aws.amazon.com/compliance/aws-compliance-case-study-cognia/ About Cognia Cognia provides a global communications platform for call center organizations to capture communications data The Compliance Challenge They were challenged with PCI compliance. Some of their customers need to process payment card data on their platform. This forced their entire platform to be PCI DSS compliant. Under a traditional model, this would not be possible or would be extremely difficult and costly. Accomplished Cognia’s QSA used the AWS PCI Compliance Package to achieve PCI certification on AWS. This was done in a way that minimized cost and burden of PCI compliance for both Cognia and their customers. Customer Quote: “Cognia was looking not just for a cloud computing environment, but a complete ecosystem of services, tools and features. After evaluating the existing cloud service providers it was clear that only AWS offered the flexibility and range of tools to facilitate building the highly scalable and powerful platform that we required.” -Ian Hook, Chief Operating Officer, Cognia Pega, NASDAQ, and Cognia aren’t the only ones creating compliant solutions and processing regulated data on AWS. There are others such as Ideomed, PaymentSpring, Bristol-Myers Squibb, NASA JPL, Generativa, Gemalto, and Shine Technologies who are processing and storing regulated and/or sensitive information in AWS. You can see all these great examples on our case study web site. I’ll give you a link to those later.
Page 8: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Platform Services

Caching

Relational

No SQL

Hadoop

Real-time

Data Workflows

Data Warehouse

Queuing

Orchestration

App Streaming

Transcoding

Email

Search

Containers

Dev/ops Tools

Resource Templates

Usage Tracking

Monitoring and Logs

Identity

Sync

Mobile Analytics

Notifications

Foundation Services

Compute (VMs, Auto-scaling and Load Balancing)

Storage (Object, Block and Archive)

Security & Access Control Networking

Infrastructure Regions CDN and Points of Presence Availability Zones

Enterprise Applications Virtual

Desktops Collaboration and Sharing

Databases

Analytics App Services Deployment & Management Mobile Services

AWS Covers the Depth and Breadth of Needs

Page 9: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

2007 2008 2009 2010 2011 2012 2013 2014

9 24

48 61

82

159

280 300+

There is no compression algorithm for experience

AWS Rapid Pace of Innovation

Since inception AWS has: • Released 896 new services and features • Introduced over 35 major new services • Announced 44 price reductions

Page 10: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Security & compliance requirements from every industry

Security Infrastructure

Page 11: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Expert Audits: Transparency, Accuracy

SME

SME

SME

SME

SME

Presenter
Presentation Notes
Expert Audits - The best solution is to validate CSP security is to get accredited experts to do it for you. This is using a very sharp tool for a very specific job. CSP auditors understand cloud in general, they understand where AWS plays in the cloud landscape, they understand risk, and they understand the customer use cases in depth. They interpret the traditional standards for you, applying them to AWS in a way that makes sense. They can do a much better job than most audit functions at companies with limited experience in doing this specifically. Multiple certifications and reports offered by AWS provides the ability for you to triangulate on risk and controls if there isn't a report that meets your exact needs. With one report or certification, it's a good data point, but with multiple (overlapping but subtly different controls, different audit types and periods, different points in time), you can get the visibility you need.
Page 12: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Layers of security controls in AWS

Cross-service Controls

Service-specific Controls

Managed by AWS

Managed by Customer

Security of the Cloud

Security in the Cloud

Cloud Service Provider Controls

Optimized Network/OS/App Controls

Request reports at: aws.amazon.com/compliance/#contact

Page 13: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

2007 2008 2009 2010 2011 2012 2013 2014

13/48 16/61

23/82

51/159

71/280 75/300+

New Security Service Launches and Feature Updates

Rapid pace of security innovation & customer driven improvements

Page 14: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Build everything on a constantly improving security baseline

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability Zones

Edge Locations

AWS is responsible for the security OF

the Cloud

Page 15: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability Zones

Edge Locations

Client-side Data Encryption

Server-side Data Encryption

Network Traffic Protection

Platform, Applications, Identity & Access Management

Operating System, Network & Firewall Configuration

Customer applications & content

Cust

omer

s Security & compliance is a shared responsibility

Customers are responsible for

their security IN the Cloud

AWS is responsible for the security OF

the Cloud

Page 16: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

• AWS makes no secondary use of customer content • Manage your privacy objectives any way that you want • Keep data in your format and move it, or delete it, at any time

you choose • No automatic replication of data outside of your chosen AWS

Region • Customers can encrypt their content any way they choose

You always have full ownership and control

Page 17: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

AWS Region

US-WEST (N. California) EU-WEST (Ireland)

ASIA PAC (Tokyo)

ASIA PAC (Singapore)

US-WEST (Oregon)

SOUTH AMERICA (Sao Paulo)

US-EAST (Virginia)

GOV CLOUD

ASIA PAC (Sydney)

You decide where to put your content and applications

China (Beijing)

Page 18: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Every network has fine-grained security built-in A

vaila

bilit

y Zo

ne A

Ava

ilabi

lity

Zone

B

You control your VPC address range • Your own private, isolated

section of the AWS cloud • Every VPC has a private IP

address space you define • Create your own subnets and

control all internal and external connectivity

AWS network security • AWS network will prevent

spoofing and other common layer 2 attacks

• Every compute instance gets multiple security groups - stateful firewalls

• Every subnet gets network access control lists (NACL)

Page 19: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

You can create multi-tier architectures

VPC A - 10.0.0.0/16

Ava

ilabi

lity

Zone

A

10.0.1.0/24

10.0.2.0/24

10.0.3.0/24

EC2

10.0.5.0/24

Jump host

10.0.4.0/24

EC2 App Log

EC2 Web

Load balancing

Page 20: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Connect privately to your existing datacenters

VPC A - 10.0.0.0/16

Ava

ilabi

lity

Zone

A

10.0.1.0/24

10.0.2.0/24

EC2

10.0.3.0/24

EC2

10.0.4.0/24

EC2 App

EC2 Web EC2 Web EC2 EC2 Web

Use Internet VPNs or use AWS Direct

Connect

Your premises

Load balancing

Page 21: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Create flexible multi-VPC hybrid environments

Your organization

Project Teams Marketing

Business Units Reporting

Digital / Websites

Dev and Test

Redshift EMR

Analytics

Internal Enterprise

Apps

Amazon S3

Amazon Glacier

Storage/Backup

Page 22: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Encrypt your Elastic Block Store volumes any way you like

• AWS native EBS encryption for free with a mouse-click

• Encrypt yourself using free utilities, plus Trend Micro,

SafeNet and other partners for high-assurance key

management solutions

Amazon S3 offers either server or client-side encryption

• Manage your own keys or let AWS do it for you

Redshift has one-click disk encryption as standard

• Encrypt your data analytics

• You can supply your own keys

RDS supports transparent data encryption (TDE)

• Easily encrypt sensitive database tables

You can encrypt your sensitive information

DBA

Page 23: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

You can enforce consistent security on your hosts

EC2

AMI catalogue Running instance Your instance

Hardening

Audit and logging

Vulnerability management

Malware and HIPS

Whitelisting and integrity

User administration

Operating system

You control the configuration of your EC2 compute instances and can configure and harden operating environments to your own specs

Use host-based protection software • Apply best-practice top 5 mitigation strategies Think about how you will manage administrative users • Restrict access as much as you require Build out the rest of your standard security environment • Connect to your existing services, e.g. SIEM,

monitoring, patching

Page 24: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Control access and segregate duties everywhere

With AWS IAM you get to control who can do what in your AWS environment and from where Fine-grained control of your AWS cloud with multi-factor authentication Integrate with your existing corporate directory using SAML 2.0 and single sign-on

AWS account owner

Network management

Security management

Server management

Storage management

Page 25: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Full visibility of your AWS environment • CloudTrail will record access to API calls and save logs in

your S3 buckets, no matter how those API calls were made

Who did what and when and from where (IP address) • Support for many AWS services and growing - includes

EC2, EBS, VPC, RDS, IAM and RedShift • Easily Aggregate all log information Out of the box integration with log analysis tools from AWS partners including Splunk, AlertLogic and SumoLogic

Get consistent visibility of logs that you can monitor

Page 26: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

AWS Trusted Advisor

Over 1.7 Million recommendations More than $300M in estimated cost savings 37 checks in 4 categories Now with Free Tier

Page 27: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Cost optimizing

• RI recommendation • Low utilized instances • Low utilized EBS

volumes

Page 28: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Security

• Open ports • Unrestricted access • IAM use • Logging

Page 29: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Fault Tolerance

• EBS snapshots • Multi-AZ • VPN tunnel • Auto scaling setting

Page 30: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Performance

• Service limit • High utilized EC2

Instance • EBS PIOPS • Security rules

Page 31: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Accreditation & Compliance: on-prem and on AWS

On-prem

• Start with bare concrete

• Functionally optional (you can build a secure system without it)

• Audits done by an in-house team

• Accountable to yourself

• Typically check once a year

• Workload-specific compliance checks

• Must keep pace and invest in security innovation

On AWS

• Start on base of accredited services

• Functionally necessary – high watermark of requirements

• Audits done by third party experts

• Accountable to everyone

• Continuous monitoring

• Compliance approach based on all workload scenarios

• Security innovation drives broad compliance

Page 32: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

AWS Foundation Services

Compute Storage Database Networking

AWS Global Infrastructure

Regions

Availability Zones

Edge Locations

Your own accreditation

Meet Your Security & Compliance Objectives

Your own certifications

Your own external audits

Customer scope and effort is reduced

Better results

through focused efforts

Built on AWS

consistent baseline controls

Page 33: Security, Privacy, & Compliance Overviewfiles.meetup.com/.../AWS-SecurityPrivacyCompliance... · Services . Compute (VMs, Auto-scaling and Load Balancing) Storage (Object, Block and

Thank You!

aws.amazon.com/security aws.amazon.com/compliance Max Ramsay - [email protected]