SlideShare a Scribd company logo
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Building Highly Sophisticated
Environments for Security and
Compliance on AWS
September 2018 Boyan Dimitrov
Director Platform Engineering
Sixt
@nathariel
Building Highly Sophisticated Environments for Security and Compliance on AWS
Q1 2018: Brand New Omnichannel Payment Platform
Early 2017
Redesign our payment
channels
Adapt business
processes
Communicate to
partners and third
parties
Plan & Coordinate
Teams
Early 2017
Payment
Environment
Early 2017Requirements
In Production in
8 months
Integrated to
our business
Highly
Secure
Scalable Modular PCI-DSS
Compliant
What is PCI-DSS Compliance
• Standard for cardholder data
environments composed of security
best practices and controls.
• It’s all about maintaining a secure
environment
• If you are handling credit card data –
this applies to you too!
Build and Maintain a Secure Network
1. Install and maintain a firewall configuration to protect cardholder data
2. Do not use vendor-supplied defaults for system passwords and other
security parameters
Protect Cardholder Data
3. Protect stored cardholder data
4. Encrypt transmission of cardholder data across open, public networks
Maintain a Vulnerability Management
Program
5. Use and regularly update anti-virus software or programs
6. Develop and maintain secure systems and applications
Implement Strong Access Control
Measures
7. Restrict access to cardholder data by business need to know
8. Assign a unique ID to each person with computer access
9. Restrict physical access to cardholder data
Regularly Monitor and Test Networks
10. Track and monitor all access to network resources and cardholder data
11. Regularly test security systems and processes
Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel
PCI Goals and Requirements
Early 2017Decision to be made
Build On The Cloud
Build in our DCs
Outsource to third party
Security in the Cloud is a Shared Responsibility
https://aws.amazon.com/compliance/shared-responsibility-model/
Build and Maintain a Secure Network
Protect Cardholder Data
Maintain a Vulnerability Management
Program
Implement Strong Access Control
Measures
Regularly Monitor and Test Networks
Maintain an Information Security
Policy
PCI Requirements mapped to AWS Services
VPC Security Group Amazon EC2 Cloudformation
S3 EBS CloudHSM KMSRDS Security Group ELB VPN
WAF CloudFront
Cognito Directory ServiceIAM
S3Cloudtrail
Inspector
Config
Lambda
Lambda
Lambda
Lambda
AWS services in scope by PCI-DSS compliance
of all services
are PCI-
Compliant
> 55%
47,6%
Increase from
prev. year
26
In 2016
62
In 2018
42
In 2017
Early 2017Our Decision
Build On The Cloud
Build in our DCs
Outsource to third party
Outcome
Learning 1: Bring the right people together early on
Execution Strategy: Learnings from the past
https://en.wikipedia.org/wiki/OODA_loop#/media/File:OODA.Boyd.svg
Patrick Edwin Moran
OODA in an AWS security context
Observe Orient Decide ACT
VPC
Flow Logs
Inspector Agent
CloudWatch
Insights
CloudTrail Config
More
CloudWatch
Inspector
Lambda
Shield
ShieldShieldWAF
Machine
Learning
Config
Policies
Config
Policies
CloudWatchWAF
WAF
SNS
Lambda
Lambda
More MoreMore
Guard Duty
VPC
Flow Logs
CloudWatch
Insights
CloudTrail Config
CloudWatch
Config
Policies
Protected Accounts Security Account
Trails
Logs
Observe…
Orient, Decide, Act!
CloudWatch
Logs / Events
S3
SIEM
Config
Policies
Protectedaccounts
Lambda
Trails
Logs
SNS
Security
Team
Security Account
OPS
Active
Scans
Corrective
Actions
The Controlling Core
CloudWatch
Logs / Events
S3
SIEM
Config
Policies
Protectedaccounts
Active
Scans
Lambda
SNS
Security
Team
Security Account
Corrective
Actions
OPS
Trails
Logs
Learning 2: Have a strategy
Changes had to be made on the way
ECSLambda
Learning 3: Break down large projects into small iterations
End to end automation
Engineers CodePipeline CodeBuild ECR ECS
Deployment
Approval
Code Review
Code
Minutes
Learning 4: Know and leverage the ecosystem
Learning 5: Take care of your team
Summary
1. Bring the right people together early on
2. Have a strategy
3. Break down large projects into small iterations
4. Know and leverage the ecosystem
5. Take care of your team
Thank You

More Related Content

PPTX
Complex architectures for authentication and authorization on AWS
PDF
Complex architectures for authentication and authorization on AWS
PDF
Microservice architecture-api-gateway-considerations
PDF
Gravitee.io
PPTX
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
PDF
Demystifying Service Mesh
PDF
Service mesh in Microservice World to Manage end to end service communications
PDF
Layer 7 Observability and Centralized Configuration with Consul Service Mesh
Complex architectures for authentication and authorization on AWS
Complex architectures for authentication and authorization on AWS
Microservice architecture-api-gateway-considerations
Gravitee.io
AzureConf 2014 - Azure hybrid connections (Sam Vanhoutte)
Demystifying Service Mesh
Service mesh in Microservice World to Manage end to end service communications
Layer 7 Observability and Centralized Configuration with Consul Service Mesh

What's hot (20)

PDF
Microservice Architecture
PDF
An overview of the Eventuate Platform
PPTX
OAuth and OpenID Connect for PSD2 and Third-Party Access
PPTX
Microservices and the Cloud-Based Future of Integration
PPTX
Introduction to Hybrid Connections
PPTX
The Internet of things for integration people - UKCSUG - public version
PDF
Microservices - Hitchhiker's guide to cloud native applications
PPTX
Building a Reliable Cloud Bank in Java | Starling Bank | QCon 2018
PPTX
Architecting Microservices in .Net
PPTX
Service mesh in action with onap
PDF
[WSO2Con EU 2018] Identity APIs is the New Black
PPTX
API World: The service-mesh landscape
PDF
AWS Api Gateway by Łukasz Marchewka Scalacc
PDF
Microservices
PDF
Api Management with Service Mesh
PDF
Overview of the Eventuate Tram Customers and Orders application
PDF
Developing applications with a microservice architecture (svcc)
PDF
The Role of IAM in Microservices
PPTX
apidays LIVE Jakarta - REST the events: REST APIs for Event-Driven Architectu...
PPTX
Istio a service mesh
Microservice Architecture
An overview of the Eventuate Platform
OAuth and OpenID Connect for PSD2 and Third-Party Access
Microservices and the Cloud-Based Future of Integration
Introduction to Hybrid Connections
The Internet of things for integration people - UKCSUG - public version
Microservices - Hitchhiker's guide to cloud native applications
Building a Reliable Cloud Bank in Java | Starling Bank | QCon 2018
Architecting Microservices in .Net
Service mesh in action with onap
[WSO2Con EU 2018] Identity APIs is the New Black
API World: The service-mesh landscape
AWS Api Gateway by Łukasz Marchewka Scalacc
Microservices
Api Management with Service Mesh
Overview of the Eventuate Tram Customers and Orders application
Developing applications with a microservice architecture (svcc)
The Role of IAM in Microservices
apidays LIVE Jakarta - REST the events: REST APIs for Event-Driven Architectu...
Istio a service mesh
Ad

Similar to Building Highly Sophisticated Environments for Security and Compliance on AWS (20)

PPTX
Security: Enabling the Journey to the Cloud
PDF
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
PDF
Get ahead of cloud network security trends and practices in 2020
PDF
AWS - Security & Compliance
PPTX
ShareResponsibilityModel.pptx
PPTX
Running GxP Compliant SAP Workloads on AWS
PDF
Ensuring PCI DSS Compliance in the Cloud
PPTX
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
PPTX
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
PDF
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
DOCX
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
PDF
Biznet GIO National Seminar on Digital Forensics
PDF
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
PPTX
Accelerated Saa S Exec Briefing V2
PDF
AWS User Group November
PDF
AWS November meetup Slides
PPTX
Welcome to the Multi-cloud world
PDF
Cloud services and it security
PDF
Richard Knight: Real world stories from the frontline of enterprise Cloud
PPTX
Key Capibilities.pptx
Security: Enabling the Journey to the Cloud
AWS Summit Singapore 2019 | Banking in the Cloud: 10 Lessons Learned
Get ahead of cloud network security trends and practices in 2020
AWS - Security & Compliance
ShareResponsibilityModel.pptx
Running GxP Compliant SAP Workloads on AWS
Ensuring PCI DSS Compliance in the Cloud
2018 re:Invent - Safeguard the Integrity of Your Code for Fast and Secure Dep...
Unlock Innovation with AWS Generative AI: Transform Your Business with Scalab...
Security for Cloud Computing: 10 Steps to Ensure Success V3.0
Securing SaaS: Your Roadmap to PCI DSS v4.0 Compliance
Biznet GIO National Seminar on Digital Forensics
GEN AI EDM -Generative AI: Beyond Chatbots, Shaping the Future
Accelerated Saa S Exec Briefing V2
AWS User Group November
AWS November meetup Slides
Welcome to the Multi-cloud world
Cloud services and it security
Richard Knight: Real world stories from the frontline of enterprise Cloud
Key Capibilities.pptx
Ad

More from Boyan Dimitrov (9)

PDF
Observability foundations in dynamically evolving architectures
PDF
Anatomy of the modern application stack
PPTX
Microservices: next-steps
PPTX
Moving to microservices – a technology and organisation transformational journey
PPTX
Patterns for building resilient and scalable microservices platform on AWS
PDF
Microservices and elastic resource pools with Amazon EC2 Container Service
PDF
Monitoring microservices platform
PPTX
Scaling micro-services Architecture on AWS
PPTX
Scaling from 1 to 10 million users - Hailo
Observability foundations in dynamically evolving architectures
Anatomy of the modern application stack
Microservices: next-steps
Moving to microservices – a technology and organisation transformational journey
Patterns for building resilient and scalable microservices platform on AWS
Microservices and elastic resource pools with Amazon EC2 Container Service
Monitoring microservices platform
Scaling micro-services Architecture on AWS
Scaling from 1 to 10 million users - Hailo

Recently uploaded (20)

PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPTX
A Presentation on Artificial Intelligence
PDF
Encapsulation theory and applications.pdf
PDF
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PPT
Teaching material agriculture food technology
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Big Data Technologies - Introduction.pptx
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
Modernizing your data center with Dell and AMD
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
cuic standard and advanced reporting.pdf
PPTX
Cloud computing and distributed systems.
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
A Presentation on Artificial Intelligence
Encapsulation theory and applications.pdf
Architecting across the Boundaries of two Complex Domains - Healthcare & Tech...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Teaching material agriculture food technology
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
The Rise and Fall of 3GPP – Time for a Sabbatical?
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Big Data Technologies - Introduction.pptx
Spectral efficient network and resource selection model in 5G networks
Dropbox Q2 2025 Financial Results & Investor Presentation
Advanced methodologies resolving dimensionality complications for autism neur...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Modernizing your data center with Dell and AMD
20250228 LYD VKU AI Blended-Learning.pptx
“AI and Expert System Decision Support & Business Intelligence Systems”
Mobile App Security Testing_ A Comprehensive Guide.pdf
cuic standard and advanced reporting.pdf
Cloud computing and distributed systems.

Building Highly Sophisticated Environments for Security and Compliance on AWS

  • 1. © 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Building Highly Sophisticated Environments for Security and Compliance on AWS September 2018 Boyan Dimitrov Director Platform Engineering Sixt @nathariel
  • 3. Q1 2018: Brand New Omnichannel Payment Platform
  • 4. Early 2017 Redesign our payment channels Adapt business processes Communicate to partners and third parties Plan & Coordinate Teams Early 2017 Payment Environment
  • 5. Early 2017Requirements In Production in 8 months Integrated to our business Highly Secure Scalable Modular PCI-DSS Compliant
  • 6. What is PCI-DSS Compliance • Standard for cardholder data environments composed of security best practices and controls. • It’s all about maintaining a secure environment • If you are handling credit card data – this applies to you too!
  • 7. Build and Maintain a Secure Network 1. Install and maintain a firewall configuration to protect cardholder data 2. Do not use vendor-supplied defaults for system passwords and other security parameters Protect Cardholder Data 3. Protect stored cardholder data 4. Encrypt transmission of cardholder data across open, public networks Maintain a Vulnerability Management Program 5. Use and regularly update anti-virus software or programs 6. Develop and maintain secure systems and applications Implement Strong Access Control Measures 7. Restrict access to cardholder data by business need to know 8. Assign a unique ID to each person with computer access 9. Restrict physical access to cardholder data Regularly Monitor and Test Networks 10. Track and monitor all access to network resources and cardholder data 11. Regularly test security systems and processes Maintain an Information Security Policy 12. Maintain a policy that addresses information security for all personnel PCI Goals and Requirements
  • 8. Early 2017Decision to be made Build On The Cloud Build in our DCs Outsource to third party
  • 9. Security in the Cloud is a Shared Responsibility https://aws.amazon.com/compliance/shared-responsibility-model/
  • 10. Build and Maintain a Secure Network Protect Cardholder Data Maintain a Vulnerability Management Program Implement Strong Access Control Measures Regularly Monitor and Test Networks Maintain an Information Security Policy PCI Requirements mapped to AWS Services VPC Security Group Amazon EC2 Cloudformation S3 EBS CloudHSM KMSRDS Security Group ELB VPN WAF CloudFront Cognito Directory ServiceIAM S3Cloudtrail Inspector Config Lambda Lambda Lambda Lambda
  • 11. AWS services in scope by PCI-DSS compliance of all services are PCI- Compliant > 55% 47,6% Increase from prev. year 26 In 2016 62 In 2018 42 In 2017
  • 12. Early 2017Our Decision Build On The Cloud Build in our DCs Outsource to third party
  • 13. Outcome Learning 1: Bring the right people together early on
  • 14. Execution Strategy: Learnings from the past https://en.wikipedia.org/wiki/OODA_loop#/media/File:OODA.Boyd.svg Patrick Edwin Moran
  • 15. OODA in an AWS security context Observe Orient Decide ACT VPC Flow Logs Inspector Agent CloudWatch Insights CloudTrail Config More CloudWatch Inspector Lambda Shield ShieldShieldWAF Machine Learning Config Policies Config Policies CloudWatchWAF WAF SNS Lambda Lambda More MoreMore Guard Duty
  • 17. Orient, Decide, Act! CloudWatch Logs / Events S3 SIEM Config Policies Protectedaccounts Lambda Trails Logs SNS Security Team Security Account OPS Active Scans Corrective Actions
  • 18. The Controlling Core CloudWatch Logs / Events S3 SIEM Config Policies Protectedaccounts Active Scans Lambda SNS Security Team Security Account Corrective Actions OPS Trails Logs
  • 19. Learning 2: Have a strategy
  • 20. Changes had to be made on the way ECSLambda
  • 21. Learning 3: Break down large projects into small iterations
  • 22. End to end automation Engineers CodePipeline CodeBuild ECR ECS Deployment Approval Code Review Code Minutes
  • 23. Learning 4: Know and leverage the ecosystem
  • 24. Learning 5: Take care of your team
  • 25. Summary 1. Bring the right people together early on 2. Have a strategy 3. Break down large projects into small iterations 4. Know and leverage the ecosystem 5. Take care of your team

Editor's Notes

  • #7: Payment Card Industry Data Security Standard