SlideShare a Scribd company logo
© 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. 
December 8, 2014 | Korea 
양승도 솔루션스 아키텍트 
re:
JOB ZERO
Job Zero 
Network Security 
Physical Security 
Platform Security 
People & Procedures
SHARED
constantly improving 
AWS Foundation Services 
Compute Storage Database Networking 
AWS Global 
Infrastructure Regions 
Availability Zones 
Edge Locations 
AWS is 
responsible for 
the security OF 
the Cloud 
GxP 
ISO 13485 
AS9100 
ISO/TS 16949
AWS Foundation Services 
Compute Storage Database Networking 
AWS Global 
Infrastructure Regions 
Availability Zones 
Edge Locations 
Client-side Data 
Encryption 
Server-side Data 
Encryption 
Network Traffic 
Protection 
Platform, Applications, Identity & Access Management 
Operating System, Network, & Firewall Configuration 
Customer applications & content 
Customers 
shared responsibility 
Customers have 
their choice of 
security 
configurations IN 
the Cloud 
AWS is 
responsible for 
the security OF 
the Cloud
FAMILIAR
familiar
VISIBILITY
VISIBILITY 
RIGHT NOW?
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Visible
You are making API calls... 
On a growing set of services around the world… 
AWS CloudTrail is continuously recording API calls… 
And delivering log files to you 
AWS CLOUDTRAIL 
Redshift 
AWS CloudFormation 
AWS Elastic Beanstalk
Use cases enabled by CloudTrail
AUDITABILITY
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Changing Recording Continuous Change 
Resource 
s 
AWS Config 
History 
Stream 
Snapshot (ex. 2014-11-05) 
AWS Config
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Integrated Support from Our Partner Ecosystem
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
CONTROL
First class security and compliance 
starts (but doesn’t end!) with encryption 
Automatic encryption with managed keys 
Bring your own keys 
Dedicated hardware security modules
Encryption & Best Practices with AWS 
Managed key encryption Key storage with AWS CloudHSM Customer-supplied key encryption DIY on Amazon EC2 Create, store, & retrieve keys securely Rotate keys regularly Securely audit access to keys Partner enablement of crypto
DIY 
AWS Marketplace Partner Solution 
AWS CloudHSM 
AWS Key Management Service 
Where are keys generated and stored 
Your network or in AWS 
Your network or in AWS 
In AWS, on an HSM that you control 
AWS 
Where keys are used 
Your network or your EC2 instance 
Your network or your EC2 instance 
AWS or your applications 
AWS services or your applications 
How to control key use 
Config files, Vendor-specific management 
Vendor-specific management 
Customer code + Safenet APIs 
Policy you define; enforced in AWS 
Responsibility for Performance/Scale 
You 
You 
You 
AWS 
Integration with AWS services? 
Limited 
Limited 
Limited 
Yes 
Pricing model 
Variable 
Per hour/per year 
Per hour 
Per key/usage
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
How AWS Services Integrate with AWS Key 
Management Service 
• Two-tiered key hierarchy using envelope 
encryption 
• Unique data key encrypt customer data 
• AWS KMS master keys encrypt data keys 
• Benefits of envelope encryption: 
• Limits risk of a compromised data key 
• Better performance for encrypting large data 
• Easier to manage a small number of master 
keys than millions of data keys 
Customer Master 
Key(s) 
Data Key 1 
Amazon 
S3 Object 
Amazon 
EBS 
Volume 
Amazon 
Redshift 
Cluster 
Data Key 2 Data Key 3 Data Key 4 
Custom 
Application 
AWS KMS
AWS Key Management Service Reference Architecture 
Application or AWS Service 
+ 
Data Key Encrypted Data Key 
Encrypted Data 
Master Key(s) in Customer’s Account 
AWS Key Management Service 
1.Application or AWS service client requests an encryption key to use to encrypt data, and passes a reference to a master key under the account. 
2.Client request is authenticated based on whether they have access to use the master key. 
3.A new data encryption key is created and a copy of it is encrypted under the master key. 
4.Both data key and encrypted data key are returned to the client. Data key is used to encrypt customer data and then deleted as soon as is practical. 
5.Encrypted data key is stored for later use and sent back to AWS KMS when the source data needs to be decrypted.
Nasdaq is a great example of security excellence in the cloud
Nasdaq Use Case Requirement 
Replace on-premises data warehouse while keeping 
equivalent schemas and data 
Only one year of capacity remaining 
4-8 billion rows of new information stored daily stock trading 
Must cost less than existing system 
Must satisfy multiple security and regulatory audits 
Must perform similarly to legacy warehouse under 
concurrent query load 
AWS’s ability to satisfy multiple security and regulatory audits was critical to Nasdaq’s migrating its data warehouse to AWS
Nasdaq Data Warehouse Implementation 
Pull data from numerous sources, validate data, and securely load into Redshift
AWS CloudTrail to monitor and audit environment 
Network isolation with Amazon VPC and AWS Direct Connect 
Encryption in flight using TLS and Amazon Redshift JDBC connections 
Encryption at rest with Amazon S3 (client-side, AES-256) with Amazon Redshift cluster encryption enabled and AWS CloudHSM 
Nasdaq Security Best Practices 
AWS CloudHSM integration was critical to Nasdaq adoption of AWS
AGILITY
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Agility 
Self-service 
Time to market 
IT 
Developers 
Control 
Visibility 
Compliance
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
Use a personalized portal to find & launch services 
IT 
Developers 
Create custom services 
and grant access to developers
Providing Developers fast provisioning 
Create and manage Portfolio 
Add custom products and services 
Grant access to developers
Achieving self-service with IT approval 
Find and launch services 
Automate provisioning 
Manage AWS resources
Creates portfolio 
Adds constraints and grant access 
1 
4 
5 
Administrator 
Portfolio 
Users 
Browse Products 
6 
Launch Products 
AWS CloudFormation template 
Creates product 
3 
Authors template 
2 
ProductX 
ProductY 
ProductZ 
7 
Deploys stacks 
Notifications 
Notifications 
8 
8
Simple Security Controls
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도
BETTER OFF IN AWS
AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도

More Related Content

PDF
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
PDF
Telus의 AWS활용 사례: AWS 서버리스 기반 3GPP 코어 및 BSS 구축 – 조경준 AWS 솔루션즈 아키텍트:: AWS Cloud...
PPTX
AWS Media Day-AWS Media Service를 활용한 새로운 AWS 미디어 워크플로우(Aslam Khader 최고 제품 책임자)
PDF
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
PDF
현대백화점 리테일테크랩과 AWS Prototyping 팀 개발자가 들려주는 인공 지능 무인 스토어 개발 여정 - 최권열 AWS 프로토타이핑...
PDF
[AWS Media Symposium 2019] Enhancing your Media Workflows with Amazon Machine...
PDF
이제는 말할 수 있다: KBS, beNX의 AWS 활용법 – 선영진 KBS 부장, 강진우 beNX 팀장, 강호성 beNX 엔지니어:: AW...
PDF
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...
AWS 솔루션즈 아키텍트팀이 직접 만들어본 ‘새로운 웨비나 플랫폼’ 개발 고군분투기 - 김준형, 안준필, 문종민, 유다니엘, 김형일, 권신...
Telus의 AWS활용 사례: AWS 서버리스 기반 3GPP 코어 및 BSS 구축 – 조경준 AWS 솔루션즈 아키텍트:: AWS Cloud...
AWS Media Day-AWS Media Service를 활용한 새로운 AWS 미디어 워크플로우(Aslam Khader 최고 제품 책임자)
AWS Smart Factory - 이세현, 조이정, 정현아, 김대근, 정창호, 김지선, AWS 솔루션즈 아키텍트 :: AWS Summit...
현대백화점 리테일테크랩과 AWS Prototyping 팀 개발자가 들려주는 인공 지능 무인 스토어 개발 여정 - 최권열 AWS 프로토타이핑...
[AWS Media Symposium 2019] Enhancing your Media Workflows with Amazon Machine...
이제는 말할 수 있다: KBS, beNX의 AWS 활용법 – 선영진 KBS 부장, 강진우 beNX 팀장, 강호성 beNX 엔지니어:: AW...
콘텐츠는 여전히 왕이다  - 클라우드를 통한 미디어 자산 관리와 공급망 혁신, SM Entertainment의 Digital Library...

What's hot (15)

PDF
[Retail & CPG Day 2019] 기조연설 | AWS Digital User Engagement: Where We’ve Been,...
PDF
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
PDF
성공적인 클라우드 마이그레이션을 위한 디지털 트랜스포메이션 전략 - Gregor Hophe :: AWS 클라우드 마이그레이션 온라인
PDF
What’s new in serverless - re:Invent 2020
PDF
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
PDF
VMware on AWS를 통한 하이브리드 클라우드 구축 적용 - 홍정진, AWS Partner SA/ VMC on AWS
PDF
더욱 진화하는 AWS 네트워크 보안 - 신은수 AWS 시큐리티 스페셜리스트 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
PDF
AWS Media Day-AWS 기반의 미디어 & 엔터테인먼트 워크플로우 소개(Ben Masek 미디어 엔터테인먼트 부서 (M&E) 글로벌...
PDF
AWS Enterprise Summit - 클라우드 네이티브 신규 애플리케이션 구축하기 - 정윤진
PDF
미니세션 | 리테일 기업을 위한 AWS 블록체인 기술 접근 방향 - 박혜영, AWS 솔루션즈 아키텍트
PDF
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
PDF
AWS X-Ray를 활용한 서비스 건강검진- 한승호@에멘탈
PDF
스마트 엔지니어링: 제조사를 위한 품질 예측 시뮬레이션 및 인공지능 모델 적용 사례 소개 – 권신중 AWS 솔루션즈 아키텍트, 천준홍 두산...
PDF
AWS Media Day- AWS Media Tailor를 사용한 서버 사이드 광고 삽입으로 컨텐츠 수익화 (Mark Cousins통합 시...
PPTX
클라우드 기반 앱 현대화를 위한 5가지 체크리스트 - 윤석찬 :: AWS 현대적 애플리케이션 개발
[Retail & CPG Day 2019] 기조연설 | AWS Digital User Engagement: Where We’ve Been,...
시계열 예측 자동화를 위한 Amazon Forecast 기반 MLOps 파이프라인 구축하기 - 김주영, 이동민 AWS 솔루션즈 아키텍트 :...
성공적인 클라우드 마이그레이션을 위한 디지털 트랜스포메이션 전략 - Gregor Hophe :: AWS 클라우드 마이그레이션 온라인
What’s new in serverless - re:Invent 2020
게임을 위한 Cloud Native on AWS (김일호 솔루션즈 아키텍트, AWS) :: Gaming on AWS 2018
VMware on AWS를 통한 하이브리드 클라우드 구축 적용 - 홍정진, AWS Partner SA/ VMC on AWS
더욱 진화하는 AWS 네트워크 보안 - 신은수 AWS 시큐리티 스페셜리스트 솔루션즈 아키텍트 :: AWS Summit Seoul 2021
AWS Media Day-AWS 기반의 미디어 & 엔터테인먼트 워크플로우 소개(Ben Masek 미디어 엔터테인먼트 부서 (M&E) 글로벌...
AWS Enterprise Summit - 클라우드 네이티브 신규 애플리케이션 구축하기 - 정윤진
미니세션 | 리테일 기업을 위한 AWS 블록체인 기술 접근 방향 - 박혜영, AWS 솔루션즈 아키텍트
AWS 클라우드를 통한 교육 및 연구 혁신 - AWS Summit Seoul 2017
AWS X-Ray를 활용한 서비스 건강검진- 한승호@에멘탈
스마트 엔지니어링: 제조사를 위한 품질 예측 시뮬레이션 및 인공지능 모델 적용 사례 소개 – 권신중 AWS 솔루션즈 아키텍트, 천준홍 두산...
AWS Media Day- AWS Media Tailor를 사용한 서버 사이드 광고 삽입으로 컨텐츠 수익화 (Mark Cousins통합 시...
클라우드 기반 앱 현대화를 위한 5가지 체크리스트 - 윤석찬 :: AWS 현대적 애플리케이션 개발
Ad

Similar to AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도 (6)

PPTX
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
PDF
The AWS Shared Responsibility Model in Practice
PDF
Protecting your data in AWS
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
PDF
Security and Compliance Better on AWS_John Hildebrandt
PDF
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
CSS 17: NYC - The AWS Shared Responsibility Model in Practice
The AWS Shared Responsibility Model in Practice
Protecting your data in AWS
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Security and Compliance Better on AWS_John Hildebrandt
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
Ad

More from Amazon Web Services Korea (20)

PDF
[D3T1S01] Gen AI를 위한 Amazon Aurora 활용 사례 방법
PDF
[D3T1S06] Neptune Analytics with Vector Similarity Search
PDF
[D3T1S03] Amazon DynamoDB design puzzlers
PDF
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
PDF
[D3T1S07] AWS S3 - 클라우드 환경에서 데이터베이스 보호하기
PDF
[D3T1S05] Aurora 혼합 구성 아키텍처를 사용하여 예상치 못한 트래픽 급증 대응하기
PDF
[D3T1S02] Aurora Limitless Database Introduction
PDF
[D3T2S01] Amazon Aurora MySQL 메이저 버전 업그레이드 및 Amazon B/G Deployments 실습
PDF
[D3T2S03] Data&AI Roadshow 2024 - Amazon DocumentDB 실습
PDF
AWS Modern Infra with Storage Roadshow 2023 - Day 2
PDF
AWS Modern Infra with Storage Roadshow 2023 - Day 1
PDF
사례로 알아보는 Database Migration Service : 데이터베이스 및 데이터 이관, 통합, 분리, 분석의 도구 - 발표자: ...
PDF
Amazon DocumentDB - Architecture 및 Best Practice (Level 200) - 발표자: 장동훈, Sr. ...
PDF
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
PDF
Internal Architecture of Amazon Aurora (Level 400) - 발표자: 정달영, APAC RDS Speci...
PDF
[Keynote] 슬기로운 AWS 데이터베이스 선택하기 - 발표자: 강민석, Korea Database SA Manager, WWSO, A...
PDF
Demystify Streaming on AWS - 발표자: 이종혁, Sr Analytics Specialist, WWSO, AWS :::...
PDF
Amazon EMR - Enhancements on Cost/Performance, Serverless - 발표자: 김기영, Sr Anal...
PDF
Amazon OpenSearch - Use Cases, Security/Observability, Serverless and Enhance...
PDF
Enabling Agility with Data Governance - 발표자: 김성연, Analytics Specialist, WWSO,...
[D3T1S01] Gen AI를 위한 Amazon Aurora 활용 사례 방법
[D3T1S06] Neptune Analytics with Vector Similarity Search
[D3T1S03] Amazon DynamoDB design puzzlers
[D3T1S04] Aurora PostgreSQL performance monitoring and troubleshooting by use...
[D3T1S07] AWS S3 - 클라우드 환경에서 데이터베이스 보호하기
[D3T1S05] Aurora 혼합 구성 아키텍처를 사용하여 예상치 못한 트래픽 급증 대응하기
[D3T1S02] Aurora Limitless Database Introduction
[D3T2S01] Amazon Aurora MySQL 메이저 버전 업그레이드 및 Amazon B/G Deployments 실습
[D3T2S03] Data&AI Roadshow 2024 - Amazon DocumentDB 실습
AWS Modern Infra with Storage Roadshow 2023 - Day 2
AWS Modern Infra with Storage Roadshow 2023 - Day 1
사례로 알아보는 Database Migration Service : 데이터베이스 및 데이터 이관, 통합, 분리, 분석의 도구 - 발표자: ...
Amazon DocumentDB - Architecture 및 Best Practice (Level 200) - 발표자: 장동훈, Sr. ...
Amazon Elasticache - Fully managed, Redis & Memcached Compatible Service (Lev...
Internal Architecture of Amazon Aurora (Level 400) - 발표자: 정달영, APAC RDS Speci...
[Keynote] 슬기로운 AWS 데이터베이스 선택하기 - 발표자: 강민석, Korea Database SA Manager, WWSO, A...
Demystify Streaming on AWS - 발표자: 이종혁, Sr Analytics Specialist, WWSO, AWS :::...
Amazon EMR - Enhancements on Cost/Performance, Serverless - 발표자: 김기영, Sr Anal...
Amazon OpenSearch - Use Cases, Security/Observability, Serverless and Enhance...
Enabling Agility with Data Governance - 발표자: 김성연, Analytics Specialist, WWSO,...

Recently uploaded (20)

PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Cloud computing and distributed systems.
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Encapsulation theory and applications.pdf
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
MYSQL Presentation for SQL database connectivity
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PPTX
A Presentation on Artificial Intelligence
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Building Integrated photovoltaic BIPV_UPV.pdf
Dropbox Q2 2025 Financial Results & Investor Presentation
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
20250228 LYD VKU AI Blended-Learning.pptx
NewMind AI Weekly Chronicles - August'25 Week I
Mobile App Security Testing_ A Comprehensive Guide.pdf
Cloud computing and distributed systems.
Review of recent advances in non-invasive hemoglobin estimation
Advanced methodologies resolving dimensionality complications for autism neur...
Encapsulation theory and applications.pdf
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
MYSQL Presentation for SQL database connectivity
Understanding_Digital_Forensics_Presentation.pptx
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
Chapter 3 Spatial Domain Image Processing.pdf
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Digital-Transformation-Roadmap-for-Companies.pptx
A Presentation on Artificial Intelligence
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...

AWS re:Invent re:Cap - 종단간 보안을 위한 클라우드 아키텍처 구축 - 양승도

  • 1. © 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. December 8, 2014 | Korea 양승도 솔루션스 아키텍트 re:
  • 3. Job Zero Network Security Physical Security Platform Security People & Procedures
  • 5. constantly improving AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations AWS is responsible for the security OF the Cloud GxP ISO 13485 AS9100 ISO/TS 16949
  • 6. AWS Foundation Services Compute Storage Database Networking AWS Global Infrastructure Regions Availability Zones Edge Locations Client-side Data Encryption Server-side Data Encryption Network Traffic Protection Platform, Applications, Identity & Access Management Operating System, Network, & Firewall Configuration Customer applications & content Customers shared responsibility Customers have their choice of security configurations IN the Cloud AWS is responsible for the security OF the Cloud
  • 14. You are making API calls... On a growing set of services around the world… AWS CloudTrail is continuously recording API calls… And delivering log files to you AWS CLOUDTRAIL Redshift AWS CloudFormation AWS Elastic Beanstalk
  • 15. Use cases enabled by CloudTrail
  • 22. Changing Recording Continuous Change Resource s AWS Config History Stream Snapshot (ex. 2014-11-05) AWS Config
  • 24. Integrated Support from Our Partner Ecosystem
  • 30. First class security and compliance starts (but doesn’t end!) with encryption Automatic encryption with managed keys Bring your own keys Dedicated hardware security modules
  • 31. Encryption & Best Practices with AWS Managed key encryption Key storage with AWS CloudHSM Customer-supplied key encryption DIY on Amazon EC2 Create, store, & retrieve keys securely Rotate keys regularly Securely audit access to keys Partner enablement of crypto
  • 32. DIY AWS Marketplace Partner Solution AWS CloudHSM AWS Key Management Service Where are keys generated and stored Your network or in AWS Your network or in AWS In AWS, on an HSM that you control AWS Where keys are used Your network or your EC2 instance Your network or your EC2 instance AWS or your applications AWS services or your applications How to control key use Config files, Vendor-specific management Vendor-specific management Customer code + Safenet APIs Policy you define; enforced in AWS Responsibility for Performance/Scale You You You AWS Integration with AWS services? Limited Limited Limited Yes Pricing model Variable Per hour/per year Per hour Per key/usage
  • 41. How AWS Services Integrate with AWS Key Management Service • Two-tiered key hierarchy using envelope encryption • Unique data key encrypt customer data • AWS KMS master keys encrypt data keys • Benefits of envelope encryption: • Limits risk of a compromised data key • Better performance for encrypting large data • Easier to manage a small number of master keys than millions of data keys Customer Master Key(s) Data Key 1 Amazon S3 Object Amazon EBS Volume Amazon Redshift Cluster Data Key 2 Data Key 3 Data Key 4 Custom Application AWS KMS
  • 42. AWS Key Management Service Reference Architecture Application or AWS Service + Data Key Encrypted Data Key Encrypted Data Master Key(s) in Customer’s Account AWS Key Management Service 1.Application or AWS service client requests an encryption key to use to encrypt data, and passes a reference to a master key under the account. 2.Client request is authenticated based on whether they have access to use the master key. 3.A new data encryption key is created and a copy of it is encrypted under the master key. 4.Both data key and encrypted data key are returned to the client. Data key is used to encrypt customer data and then deleted as soon as is practical. 5.Encrypted data key is stored for later use and sent back to AWS KMS when the source data needs to be decrypted.
  • 43. Nasdaq is a great example of security excellence in the cloud
  • 44. Nasdaq Use Case Requirement Replace on-premises data warehouse while keeping equivalent schemas and data Only one year of capacity remaining 4-8 billion rows of new information stored daily stock trading Must cost less than existing system Must satisfy multiple security and regulatory audits Must perform similarly to legacy warehouse under concurrent query load AWS’s ability to satisfy multiple security and regulatory audits was critical to Nasdaq’s migrating its data warehouse to AWS
  • 45. Nasdaq Data Warehouse Implementation Pull data from numerous sources, validate data, and securely load into Redshift
  • 46. AWS CloudTrail to monitor and audit environment Network isolation with Amazon VPC and AWS Direct Connect Encryption in flight using TLS and Amazon Redshift JDBC connections Encryption at rest with Amazon S3 (client-side, AES-256) with Amazon Redshift cluster encryption enabled and AWS CloudHSM Nasdaq Security Best Practices AWS CloudHSM integration was critical to Nasdaq adoption of AWS
  • 50. Agility Self-service Time to market IT Developers Control Visibility Compliance
  • 52. Use a personalized portal to find & launch services IT Developers Create custom services and grant access to developers
  • 53. Providing Developers fast provisioning Create and manage Portfolio Add custom products and services Grant access to developers
  • 54. Achieving self-service with IT approval Find and launch services Automate provisioning Manage AWS resources
  • 55. Creates portfolio Adds constraints and grant access 1 4 5 Administrator Portfolio Users Browse Products 6 Launch Products AWS CloudFormation template Creates product 3 Authors template 2 ProductX ProductY ProductZ 7 Deploys stacks Notifications Notifications 8 8