SlideShare a Scribd company logo
Cloud Security
Security as an Enabler – Improving security in the cloud
Tom Laszewski
Global Lead Partner Solution Architects
Amazon Web Services
Old world
• ISP supplies “clean pipes” or managed
DDoS service
• CDN with value add DDoS and WAF
services
• Pure-play Internet DDoS and WAF
protection
• Expensive on-premise devices for WAF or
DDoS mitigation
• Sticky platforms that last for years
• Customer gets unfiltered Internet pipes
• Leverages Cloud provider expertise in
infrastructure and connectivity
• Ability to build scale and resilience
everywhere
• Offload functionality to the cloud provider
API that the cloud provider manages and
operates rather than customer
• Flexible, disposable platforms
Cloud
Gain access to a world-class security
team
Where would some of the world’s top security
people like to work? At scale on huge
challenges with huge rewards
Cloud providers have world-class security and
compliance teams watching your back!
Every customer benefits from the tough
scrutiny of other cloud customers
The cloud takes care of compliance
The Good News Is That You Can Get All of
This in the Cloud
Private network
Private compute
Private storage Private key
management
Governance
How is it the same
• You apply security patches; perform backups; install
anti-virus, IDS/IPS, and security incident and event
monitoring tools
• You can set up subnets in order to separate
environments that should remain isolated from one
another
• You can set up a traditional three-tier architecture in the
AWS cloud, complete with a DMZ.
How is it the same
• You can create user accounts and provide their own
unique credentials.
• You can use network monitoring and security
management tools
• You can set up a hardware VPN from your office or data
center
• Data encrypted automatically on the cloud side or you
can encrypt it on the client side before you upload it
How is it different
• Manage your resources remotely instead of
locally.
• Software-based security mechanisms instead of
hardware-based solutions
• Instead of racking and stacking, your IT support
folks will be launching and configuring
How is it different
• To create a reusable, hardened baseline image
of your virtual server, you create an machine
images
• Protect your cloud account credentials
• Security becomes a shared endeavor between
you and the cloud provider
You can
improve your security
with the cloud
Security Advantages of Cloud
• Instant visibility into your inventory
• Free security tools
• Independent regions provide data privacy
compliance
• Significant DDoS protection
Security Advantages of Cloud
• Security economies of scale
• No more duplicate data centers for disaster
recovery
• Continuous hardware replacement and upgrade
• Part (or all) of your compliance work done
Security is Job Zero
– “Based on our experience, I believe that we can be even more
secure in the AWS cloud than in our own data centers.”
-Tom Soderstrom, CTO, NASA JPL
– Nearly 60% of organizations agreed that CSPs [cloud service
providers] provide better security than their own IT organizations.
Source: IDC 2013 U.S. Cloud Security Survey,
doc #242836, September 2013
Thank you
Tom Laszewski
tomlasz@amazon.com
Amazon Web Services

More Related Content

PPTX
Migrating enterprise workloads to AWS
PPTX
CSC AWS re:Invent Enterprise DevOps session
PPTX
Accenture Oracle on AWS Jumpstart Program
PDF
The Best of Both Worlds: Implementing Hybrid IT with AWS
PPTX
App Associates : Leveraging AWS for Oracle Workloads
PDF
AWS Innovate: Best of Both Worlds: Leveraging Hybrid IT with AWS- Dhruv Singhal
PPTX
Enterprise Cloud Architecture Best Practices
PDF
AWS Innovate 2016- Planning a Phased Cloud Migration Strategy - Abhishek Mah...
Migrating enterprise workloads to AWS
CSC AWS re:Invent Enterprise DevOps session
Accenture Oracle on AWS Jumpstart Program
The Best of Both Worlds: Implementing Hybrid IT with AWS
App Associates : Leveraging AWS for Oracle Workloads
AWS Innovate: Best of Both Worlds: Leveraging Hybrid IT with AWS- Dhruv Singhal
Enterprise Cloud Architecture Best Practices
AWS Innovate 2016- Planning a Phased Cloud Migration Strategy - Abhishek Mah...

Viewers also liked (12)

PPTX
Oracle Solutions on AWS : May 2014
PPTX
Speeding up delivery of web content using Amazon Route 53, Elastic Load Balan...
PPTX
Cloud Migration, Application Modernization, and Security
PDF
Oracle COTS Applications on AWS
PPTX
Migrating enterprise workloads to AWS
PPTX
Data Center Migration to the AWS Cloud
PDF
Oracle on AWS 2014
PDF
Running Oracle EBS in the cloud (UKOUG APPS16 edition)
PDF
AWS Cloud Security
PPTX
Accenture 2014 AWS re:Invent Enterprise Migration Breakout Session
PPTX
Shared Security in AWS
PPT
New Enhancements + Upgrade Path to Oracle EBS R12.1.3
Oracle Solutions on AWS : May 2014
Speeding up delivery of web content using Amazon Route 53, Elastic Load Balan...
Cloud Migration, Application Modernization, and Security
Oracle COTS Applications on AWS
Migrating enterprise workloads to AWS
Data Center Migration to the AWS Cloud
Oracle on AWS 2014
Running Oracle EBS in the cloud (UKOUG APPS16 edition)
AWS Cloud Security
Accenture 2014 AWS re:Invent Enterprise Migration Breakout Session
Shared Security in AWS
New Enhancements + Upgrade Path to Oracle EBS R12.1.3
Ad

Similar to Security as an Enabler – Cloud Security (20)

PDF
Get ahead of cloud network security trends and practices in 2020
PPTX
Cloud Security.pptx
PPTX
Why the cloud is more secure than your existing systems
PPTX
Introduction to Amazon Web Services by i2k2 Networks
PPTX
Introduction to Amazon Web Services by i2k2 Networks
PDF
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
PPTX
Cloud security concern
PPTX
KEC CCS 362 KEC CCS 362 KEC CCS 362 KEC CCS 362
PDF
INFORMATION SECURITY IN CLOUD COMPUTING
PDF
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
PPT
Effectively and Securely Using the Cloud Computing Paradigm
PDF
Security and Compliance Better on AWS_John Hildebrandt
PPTX
AWS cloud computing.pptx
PPT
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
PPT
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
PPTX
What is Cloud Security, and Can I Have Some?
PDF
How to protect your IoT data on AWS
PPTX
PDF
AWS - Security & Compliance
PPTX
LIFT OFF 2017: AWS and Cloud Computing
Get ahead of cloud network security trends and practices in 2020
Cloud Security.pptx
Why the cloud is more secure than your existing systems
Introduction to Amazon Web Services by i2k2 Networks
Introduction to Amazon Web Services by i2k2 Networks
AWS Webinar CZSK 02 Bezpecnost v AWS cloudu
Cloud security concern
KEC CCS 362 KEC CCS 362 KEC CCS 362 KEC CCS 362
INFORMATION SECURITY IN CLOUD COMPUTING
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
Effectively and Securely Using the Cloud Computing Paradigm
Security and Compliance Better on AWS_John Hildebrandt
AWS cloud computing.pptx
Presentation on Effectively and Securely Using the Cloud Computing Paradigm v26
Presentation On Effectively And Securely Using The Cloud Computing Paradigm V26
What is Cloud Security, and Can I Have Some?
How to protect your IoT data on AWS
AWS - Security & Compliance
LIFT OFF 2017: AWS and Cloud Computing
Ad

More from Tom Laszewski (20)

PDF
AWS Private Equity Transformation Advisory
PDF
Organizing for faster innovation - People, process, culture, and technology
PDF
Creating an Operating Model to enable a high frequency organization
PDF
Technical Due Diligence with AWS
PDF
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
PDF
AWS Technical Due Diligence Workshop Session Two
PDF
AWS Technical Due Diligence Workshop Session One
PDF
Post transaction cloud value creation
PDF
Private Equity Technical Due Diligence Value Creation
PPTX
Cloud Enablement Engine Role Definition and Mapping
PPTX
Private Equity Value Creation Carve Outs, Divestitures and mergers
PPTX
AWS Technical Due Diligence Executive Overview
PPTX
AWS Techical Due Diligence to post transaction execution for M&A
PPTX
Hybrid Cloud on AWS: Foundational Layers and AWS Services
PPTX
Migrating thousands of workloads to AWS at enterprise scale
PPTX
Operating and Managing Hybrid Cloud on AWS
PPTX
Monolithic to Microservices Demystified
PDF
AWS Cloud Adoption Framework and Workshops
PPTX
DevOps, CI/CD, cost management, and security on AWS
PPTX
Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring
AWS Private Equity Transformation Advisory
Organizing for faster innovation - People, process, culture, and technology
Creating an Operating Model to enable a high frequency organization
Technical Due Diligence with AWS
AWS Cloud Center Excellence Quick Start Prescriptive Guidance
AWS Technical Due Diligence Workshop Session Two
AWS Technical Due Diligence Workshop Session One
Post transaction cloud value creation
Private Equity Technical Due Diligence Value Creation
Cloud Enablement Engine Role Definition and Mapping
Private Equity Value Creation Carve Outs, Divestitures and mergers
AWS Technical Due Diligence Executive Overview
AWS Techical Due Diligence to post transaction execution for M&A
Hybrid Cloud on AWS: Foundational Layers and AWS Services
Migrating thousands of workloads to AWS at enterprise scale
Operating and Managing Hybrid Cloud on AWS
Monolithic to Microservices Demystified
AWS Cloud Adoption Framework and Workshops
DevOps, CI/CD, cost management, and security on AWS
Hybrid Cloud on AWS : Provisioning, Operations, Management, and Monitoring

Recently uploaded (20)

PDF
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Modernizing your data center with Dell and AMD
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Review of recent advances in non-invasive hemoglobin estimation
PDF
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
PDF
cuic standard and advanced reporting.pdf
PPT
Teaching material agriculture food technology
PDF
Electronic commerce courselecture one. Pdf
PDF
Approach and Philosophy of On baking technology
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PPTX
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PDF
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
PPTX
Cloud computing and distributed systems.
Blue Purple Modern Animated Computer Science Presentation.pdf.pdf
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Spectral efficient network and resource selection model in 5G networks
Modernizing your data center with Dell and AMD
Dropbox Q2 2025 Financial Results & Investor Presentation
Review of recent advances in non-invasive hemoglobin estimation
Peak of Data & AI Encore- AI for Metadata and Smarter Workflows
cuic standard and advanced reporting.pdf
Teaching material agriculture food technology
Electronic commerce courselecture one. Pdf
Approach and Philosophy of On baking technology
“AI and Expert System Decision Support & Business Intelligence Systems”
Understanding_Digital_Forensics_Presentation.pptx
Detection-First SIEM: Rule Types, Dashboards, and Threat-Informed Strategy
Chapter 3 Spatial Domain Image Processing.pdf
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
GDG Cloud Iasi [PUBLIC] Florian Blaga - Unveiling the Evolution of Cybersecur...
Cloud computing and distributed systems.

Security as an Enabler – Cloud Security

  • 1. Cloud Security Security as an Enabler – Improving security in the cloud Tom Laszewski Global Lead Partner Solution Architects Amazon Web Services
  • 2. Old world • ISP supplies “clean pipes” or managed DDoS service • CDN with value add DDoS and WAF services • Pure-play Internet DDoS and WAF protection • Expensive on-premise devices for WAF or DDoS mitigation • Sticky platforms that last for years • Customer gets unfiltered Internet pipes • Leverages Cloud provider expertise in infrastructure and connectivity • Ability to build scale and resilience everywhere • Offload functionality to the cloud provider API that the cloud provider manages and operates rather than customer • Flexible, disposable platforms Cloud
  • 3. Gain access to a world-class security team Where would some of the world’s top security people like to work? At scale on huge challenges with huge rewards Cloud providers have world-class security and compliance teams watching your back! Every customer benefits from the tough scrutiny of other cloud customers
  • 4. The cloud takes care of compliance
  • 5. The Good News Is That You Can Get All of This in the Cloud Private network Private compute Private storage Private key management Governance
  • 6. How is it the same • You apply security patches; perform backups; install anti-virus, IDS/IPS, and security incident and event monitoring tools • You can set up subnets in order to separate environments that should remain isolated from one another • You can set up a traditional three-tier architecture in the AWS cloud, complete with a DMZ.
  • 7. How is it the same • You can create user accounts and provide their own unique credentials. • You can use network monitoring and security management tools • You can set up a hardware VPN from your office or data center • Data encrypted automatically on the cloud side or you can encrypt it on the client side before you upload it
  • 8. How is it different • Manage your resources remotely instead of locally. • Software-based security mechanisms instead of hardware-based solutions • Instead of racking and stacking, your IT support folks will be launching and configuring
  • 9. How is it different • To create a reusable, hardened baseline image of your virtual server, you create an machine images • Protect your cloud account credentials • Security becomes a shared endeavor between you and the cloud provider
  • 10. You can improve your security with the cloud
  • 11. Security Advantages of Cloud • Instant visibility into your inventory • Free security tools • Independent regions provide data privacy compliance • Significant DDoS protection
  • 12. Security Advantages of Cloud • Security economies of scale • No more duplicate data centers for disaster recovery • Continuous hardware replacement and upgrade • Part (or all) of your compliance work done
  • 13. Security is Job Zero – “Based on our experience, I believe that we can be even more secure in the AWS cloud than in our own data centers.” -Tom Soderstrom, CTO, NASA JPL – Nearly 60% of organizations agreed that CSPs [cloud service providers] provide better security than their own IT organizations. Source: IDC 2013 U.S. Cloud Security Survey, doc #242836, September 2013

Editor's Notes

  • #2: Top three things to cover/focus/mantras of session: How does AWS make security easier and is better … dispelling myths Like what you have today How does it impact ‘managing human resources better’/save cost
  • #6: the good news is that you can get all of this in the cloud with AWS
  • #7: Most of the security tools and techniques that you’re already familiar with can be used in the cloud. If you use Amazon EC2 instances, you keep your guest OS and applications updated with the latest security patches; perform backups of your data; and install anti-virus, intrusion detection, and security incident and event monitoring (SIEM) tools. You can set up subnets in order to separate environments that should remain isolated from one another—for example to separate your dev/test environment from your production environment—and then configure network ACLs to control how traffic is routed between them. You can set up a traditional three-tier architecture in the AWS cloud, complete with a DMZ. You can allow your front-end web servers, proxy servers, or even load balancers to take the brunt of the unvetted traffic, protecting your backend apps and databases from unauthorized access.
  • #8: If you have multiple users—like developers, testers, or administrators—you can create user accounts for each of them and provide them with their own unique credentials for accessing your AWS resources. You can even require them to use multi-factor authentication. You can use network monitoring and security management tools to collect and analyze logs and network traffic information for your resources. You can set up a hardware VPN from your office or data center to your cloud resources to add an additional layer of transmission protection. If you would like to encrypt your data or objects when they’re stored in the cloud, you can have it encrypted automatically on the cloud side or you can encrypt it on the client side before you upload it.
  • #9: You and your administrators/developers manage your resources remotely instead of locally. You use software-based security mechanisms instead of hardware-based solutions. Instead of racking and stacking, your IT support folks will be launching and configuring.
  • #10: To create a reusable, hardened baseline image of your virtual server (EC2 instance), you create an Amazon Machine Image (AMI), which is a template that includes your OS, libraries, applications, configurations, etc. You can then save that baseline image and have it automatically loaded on every new instance you launch. You must protect your AWS Account credentials carefully since they control access to all of the cloud resources and data under your account. We recommend creating IAM user accounts (each with their own unique credentials) under the AWS Account and then using the IAM credentials instead of the AWS Account credentials. Security becomes a shared endeavor between you and AWS. To read more about this division of labor, see our Sharing the Security Responsibilities page. For your security compliance requirements, you can request a copy of the applicable certification report (ISO, PCI, FedRAMP, etc.) for the underlying AWS infrastructure.
  • #12: Instant visibility into your inventory The first step in securing your assets is knowing what they are. With AWS, you never have to guess what your IT inventory is again. With tools like AWS Config and resource tagging, you can always see exactly what cloud assets you’re using at any moment. You can easily label each asset for tracking purposes. Free security tools Many of our security features and services are free, like individual firewalls (security groups) for your EC2 instances, security logging with CloudTrail, private subnets with VPC, user access control with IAM, and automatic encryption of your archived data in Glacier. For a more comprehensive list, see our AWS Security Features page. Independent regions provide data privacy compliance With our data centers located in so many geographical regions across the world, you can choose the area that meets your data privacy requirements. AWS never moves your data out of the region you put it in. Significant DDoS protection Our size and scale can help you be DDoS resilient. The AWS infrastructure is equipped to handle extremely large amounts of traffic; and when you use AWS services like ELB, Auto Scaling, CloudWatch, and CloudFront, you can architect a highly available system that can help you weather DDoS attacks.
  • #13: Security economies of scale The smallest AWS customers reap the same security benefits as the largest when they’re in our cloud. AWS has a large, dedicated security team and a variety of systems and tools that continuously monitor and protect the underlying cloud infrastructure. No more duplicate data centers for disaster recovery When you use AWS features like Auto Scaling and Elastic Load Balancing, you can ensure that your production systems remain online and traffic is always routed to healthy instances. You can continuously replicate your data and have it ready to bring online if your primary nodes fail, only paying for the nodes when you actually use them. Continuous hardware replacement and upgrade We’re always improving our infrastructure. We replace end-of-life hardware with the latest processors that not only improve performance and speed, but also include the latest secure platform technology, like the Intel AES-NI encryption instruction set, which significantly speeds up the execution of the AES algorithm. Part of your compliance work done Because AWS has already received several certifications for its infrastructure, part of your compliance work has already been done. You only have to certify the applications and architectures you create on AWS. For a list of the certifications that AWS has received, see our AWS Compliance webpage.