SlideShare a Scribd company logo
1 of 72
Download to read offline
Architecting Security and
Governance Across a
Multi-Account Strategy
Dave Walker, Specialist Solutions
Architect, Security and Compliance
What	to	expect	from	the	session
• "Everything	Starts	with	a	Threat	Model"
• Control	Mapping
• Existing	Multi-Account	Strategies,	and	Multi-Account	Planning
• Organizations
• Baselining	Individual	Accounts
• Putting	it	Together
“Start	Here”
“Everything	starts	with	a	threat	model”
• STRIDE,	DREAD,	others
• Identify:
• Actors
• Vectors
• “Bad	stuff	that	could	happen	when	bad	people	get	creative”
• Probabilities	and	consequences	of	bad	stuff	happening
• Apply	technical	and	procedural	mitigations
• All	the	way	up	the	OSI	stack,	from	network	to	application
• Dan	Ionita's "Gazetteer	of	threat	/	risk	modelling	frameworks":	
http://eprints.eemcs.utwente.nl/23767/
“Everything	starts	with	a	threat	model”
• Constrain	scope	of	potential	threats	to	individual	accounts
• Plan	for	incident	response	and	forensics
• Protect	your	log	records	from	tampering	and	unauthorised reads
What	AWS	Means	by	"Governance"
SecurityRisk ComplianceGovernance
Attack	vectors
• Application-level	and	API-level	attacks
• “If	it	takes	input,	it	likely	has	an	in-band	attack	vector”
• “If	it	has	a	control	point,	it	likely	has	an	out-of-band	attack	vector”
• “Even	if	it	doesn’t	itself	have	a	useful	compromise,	it	might	be	a	useful	
propagation	vector”	
• A	successful	attack	=	disruption	or	corruption	of	service	output,	or	
reduction	in	responsiveness	to	future	service	calls,	or	being	a	conduit	
of	“bad	content”	to	vulnerable	consumers	of	the	service
• Consider	the	OWASP	Top	10	and	other	application-level	attacks
Control	Mapping
Why a Mapping of Security Controls?
• PCI-DSS
• standards for merchants which process credit card payments and
have strict security requirements to protect cardholder data. A point-
in-time certification.
• SOC 1-3
• designed by the “big 4” auditors as an evolution of SSAE16, SAS70
etc, and to address perceived shortcomings in ISO27001. A
continuous-assessment certification, covering process and
implementation.
• ISO 27001
• outlines the requirements for Information Security Management
Systems. A point-in-time certification, but one which requires
mature processes.
General Headings:
• Infrastructure meta-security
• Host security
• Network security
• Logging and Auditing
• Resilience
• User Access Control and Management
• Cryptography and Key Management
• Incident Response and Forensics
• “Anti-Malware”
• Separation of Duty
• Data Lifecycle Management
• Geolocation
• Anti-DDoS
“Can our current Security Functions be mapped onto AWS?”
AWS Environment Management
Logging and Auditing
Asset Management
Management Access Control
Configuration Management
Configuration
Monitoring
AWS CloudTrail
AWS Config, API
AWS IAM, Organizations
Web Console
AWS CloudFormation
AWS OpsWorks
CLI
API
SDKs
Amazon CloudWatch
“Can our current Security Functions be mapped onto AWS?”
Network
AWS to Customer Networks
Layer 2 Network Segregation
Stateless Traffic Management
IPsec VPN
Firewall/ Layer 3 Packet Filter
IDS/IPS
Managed DDoS Prevention
Internet and/or Direct Connect
Amazon VPC
Network Access Control Lists
VPC VGW, Marketplace
Security Groups
AWS CloudTrail, CloudWatch
Logs,SNS, VPC Flow Logging
Included in Amazon CloudFront
“Can our current Security Functions be mapped onto AWS?”
Encryption, Key Management
Data-In-Flight
Volume Encryption
Object Encryption
Key Management
Dedicated HSMs
Database Encryption
IPsec or TLS or your own
Amazon EBS Encryption
Amazon S3 Encryption (Server and Client Side)
AWS Key Management Service
AWS CloudHSM
TDE (RDS / Oracle EE)
Encrypted Amazon EBS (with KMS)
Encrypted Amazon Redshift
“Can our Current Security Functions be mapped onto AWS?”
Data Management
Hierarchical Storage
Deletion Protection
Versioning
Archiving
Amazon S3 Lifecycle
Amazon S3 MFA Delete
Amazon S3 Versioning
Amazon Glacier (optionally, with Vault Lock)
“Can our Current Security Functions be mapped onto AWS?”
Host / Instance Security
Traditional Controls
Instance Management
Incident Management
Asset Management
Instance Separation
Traditional Controls (mostly)
Delete-and-promote
More alternatives!
“What the API returns, is true”
PCI Level 1 Hypervisor
Dedicated Instances
“Can our Current Security Functions be mapped onto AWS?”
Logging, Analysis, Alerting
Traditional OS Sources
Database Logs
Traditional OS Sources
CloudWatch Logs
EC2 Systems Manager Inventory
RDS / Redshift Logs
Logs→metrics→alerts→actions
AWS Config
CloudWatch /
CloudWatch Logs
CloudWatch
alarms
AWS CloudTrail
Amazon EC2 OS logs
Amazon VPC
Flow Logs
Amazon SNS
email notification
HTTP/S
notification
SMS
notifications
Mobile push
notifications
API	calls	
from	most	
services
Monitoring	data	
from	AWS	
services
Custom	
metrics
Existing	Multi-Account	Strategies,	
and	Multi-Account	Planning
The	Story	So	Far
• MASCOT
• fully	role- and	identity-managed	implementation	from	ProServe
• Presented	at	Re:Invent 2016	SAC319	
(https://www.youtube.com/watch?v=pqq39mZKQXU	),	SAC320	
(https://www.youtube.com/watch?v=xjtSWd8z_bE	)
• Bertram	Dorn's	work	from	2014
• similar	structure,	but	a	number	of	differences
• https://youtu.be/CNSaJs7pWjA
• Neither	covers	Organizations	(quite	yet)
• MASCOT	has	coverage	for	KMS
What	Needs	Segregating	from	What?
• Obvious	cases	first:
• Read	access	to	Billing	and	Log	records	from	everyone,	except	Auditors	and	
Security
• ...and	even	then,	access	should	be	limited	to	appropriate	cases
• consider	evidential	weight
• Prod	from	Dev,	Test	and	Staging
• remember	Knight	Capital?
• also	"bug	ringfencing"
• Compliance	in-scope	from	out-of-scope
• auditors	need	to	see	a	hard	scope	boundary
• you	will	want	to	keep	in-scope	environments	as	small	as	possible
• use	both	AWS	Accounts	and	VPCs	for	this
• Less	obvious	cases:
• Look	at	your	own	org	chart	and	body	of	policies
• Consider	how	Separation	of	Duty	and	Need	to	Know	operate
• both	within	and	between	departments
• Within	org	charts,	policy,	compliance	scoping,	and	the	need	to	
ringfence dev	accounts	where	bugs	could	impact	API	access,	lies	the	
answers	to	"how	many:
• AWS	Organizations
• KMS	CMKs
• AWS	accounts
• ...do	I	need?"
What	Needs	Segregating	from	What?
Organizations
In	the	beginning…
Your AWS Account
You
Today
Jump
Account
Your Cloud Team
Dev Account
Prod Account
Data Science
Account
Audit Account
Cross Account
Trusts
Cross	Account
Resource	Access
You
What	do	customers	want	to	do?
Use	AWS	account	
boundaries	for	
isolation.
Centrally	manage	
policies	across	
many	accounts.
Delegate	
permissions,	but	
maintain	
guardrails.
See	combined	
view	of	all	
charges.
Introducing	AWS	Organizations
Control	AWS	service	
use	across	accounts
Policy-based	management	for	multiple	AWS	accounts.
Consolidate	billingAutomate	AWS
account	creation
Typical	Use	Cases
• Control	the	use	of	AWS	services	to	help	comply	with	
corporate	security	and	compliance	policies.
• Service	Control	Policies	(SCPs)	help	you	centrally	control	
AWS	service	use	across	multiple	AWS	accounts.
• Ensure	that	entities	in	your	accounts	can	use	only	the	
services	that	meet	your	corporate	security	and	
compliance	policy	requirements.
• Automate	the	creation	of	AWS	accounts	for	different	
resources.
• API	driven	AWS	account	creation.
• Use	APIs	to	add	the	new	account	to	a	group	and	attach	
service	control	policies.
• Use	API	response	to	trigger	additional	automation	(eg
deploy	CloudFormation template)
Typical	Use	Cases
• Create	different	groups	of	accounts	for	development	and	
production	resources.
• Organise groups	into	a	hierarchy.
• Apply	different	policies	to	each	group.
• Alternatively,	group	according	to	lines-of-business	or	
other	desired	dimensions.
Typical	Use	Cases
Key	Features
• Policy	framework	for	multiple	AWS	accounts.
• Group-based account	management.
• Account	creation	and	management	APIs.
• Consolidated	billing for	all	AWS	accounts	in	your	organization.
• Enable	Consolidated	Billing	Only or	All	Features.
How	is	Organizations	different	from	IAM?
• Create	groups	of	AWS	accounts with	AWS	Organizations.
• Use	Organizations	to	attach	SCPs to	those	groups	to	centrally	control	
AWS	service	use.
• Entities	in	the	AWS	accounts	can	only	use	the	AWS	services	allowed	
by	both the	SCP	and	the	AWS	IAM	policy	for	the	account.
How	to	get	started?
• Revisit	or	create	your	account	segmentation	strategy.
• Decide which	type	of	organization	is	right	for	you.
• Organize your	AWS	accounts	according	to	it.
• Test	&	begin	to	apply	SCPs	slowly.
• Iterate on	SCPs	to	achieve	your	desired	state.
Pricing	&	Availability
• Available	at no	additional	charge.
• Global	service.
• Accessed	through	endpoint	in	N.	Virginia	region.
Service	Control	Policies	(SCPs)
• Enables	you	to	control	which	AWS	service	APIs	are	accessible
- Define	the	list	of	APIs	that	are	allowed	– whitelisting
- Define	the	list	of	APIs	that	must	be	blocked	– blacklisting
• Cannot	be	overridden	by	local	administrator
• Resultant	permission	on	IAM	user/role	is	the	intersection	between	
the	SCP	and	assigned	IAM	permissions
• Necessary	but	not	sufficient
• IAM	policy	simulator	is	SCP	aware
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": "*",
"Resource": "*"
},
{
"Effect": "Deny",
"Action": "redshift:*",
"Resource": "*"
}
]
}
{
"Version": "2012-10-17",
"Statement": [{
"Effect": "Allow",
"Action": [
"ec2:RunInstances",
"ec2:DescribeInstances",
"ec2:DescribeImages",
"ec2:DescribeKeyPairs",
"ec2:DescribeVpcs",
"ec2:DescribeSubnets",
"ec2:DescribeSecurityGroups"
],
"Resource": "*"
} ] }
Blacklisting	example Whitelisting	example
Best	practices	– AWS	Organizations
1. Monitor	activity	in	the	master	account	using	CloudTrail
2. Do	not	manage	resources	in	the	master	account
3. Manage	your	organization	using	the	principal	of	“Least	privilege”
4. Use	OUs	to	assign	controls
5. Test	controls	on	single	AWS	account	first
6. Only	assign	controls	to	root	of	organization	if	necessary
7. Avoid	mixing	“whitelisting”	and	“blacklisting”	SCPs	in	organization
8. Create	new	AWS	accounts	for	the	right	reasons
More	on	SCPs
• Service	Control	Policies
• ...which	look	like	IAM	policies
• (but	without	support	for	Conditions,	in	v1.0)
• Imposed	by	Master	account	on	child	accounts
• essentially	concatenate	with	per-child-account	IAM	policies
• Allows	/	Denies	access	to	specific	per-service	API	calls,	or	whole	services
• as	with	IAM	policies,	a	single	explicit	Deny	overrides	any	number	of	explicit	
Allows
• But:	they	are	also	applied	to	the	root	user	in	the	child	account
• Here's	where	we	get	into	Mandatory	Access	Control!	J
More	on	SCPs
• Also:
• you	don't	have	to	apply	an	SCP	before you	populate	your	account	with	
assets...
• this	lends	the	idea	of	"immutable	infrastructure"	to	other	services,	from	
the	point	of	view	of	the	child	accounts
• (including	Serverless)
• eg:
• S3	websites	which	can't	have	their	contents	changed
• Lambda	functions	which	are	invoke-only	"black	boxes"
• ACM	cert	/	key	pairs	which	can't	be	deleted
• Prevent	CloudTrail,	Config ever	being	turned	off
• ...
More	on	SCPs
• In	Practice:
• the	imposer	of	the	SCP	in	the	Master	account	gets	no	privilege	in	the	child	
account's	service,	as	a	function	of	this	capability
• this	makes	SCPs	a	neat	2-person	rule	mechanism,	too
Baselining	Individual	Accounts
Industry	Best	Practices	for	
Securing	AWS	Resources
CIS	Amazon	Web	Services	Foundations
Architecture	agnostic	set	of	security	configuration	
best	practices
provides	set-by-step	implementation	and	assessment	
procedures
CIS	AWS	Foundation	Automation	is	mostly	there...
Now	Add	an	Incident	Response	Baseline:
• Have	a	small	NACLed subnet	per	AZ,	per	VPC	for	isolation	of	misbehaving	
instances
• flip	their	ENIs	to	it,	as	needed
• Have	a	Forensics	role	like	the	Audit	role,	per-account
• read-only	access	to	(essentially)	everything
• Have	a	runbook	so	a	Forensic	Investigator	can	work	with	the	network	admin	
team	to:
• provision	a	forensic	workstation	AMI	onto	the	isolation	subnet
• open	a	hole	in	the	NACL	to	the	workstation	from	an	appropriate	bastion	
(or	use	Run	Command	to	remotely	operate	forensic	CLI	tools)
Potential	Further	Extensions
• EC2	Systems	Manager
• Inventory:	like	OSQuery
• State	Manager:	like	OpenSCAP
• DMZs
• Bastions
• Management	networks
AWS	Enterprise	Accelerator:	
Compliance	Architectures
Sample	Architecture	–
Security	Controls	Matrix
Cloudformation	Templates
5	x	templates
User	Guide
http://docs.aws.amazon.com/quickstart/latest/accelerator-nist/welcome.html
Putting	it	Together
Billing	Records Handled	by	Organizations	Master
ItemDescription
UsageStart
Date
UsageEnd
Date
UsageQuanti
ty
Currency
Code
CostBefo
reTax
Cred
its
TaxAm
ount
TaxTy
pe
TotalCo
st
$0.000	per	GB	- regional	data	transfer	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 0.00000675 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.05	per	GB-month	of	provisioned	storage	- US	West	
(Oregon)
01.04.14	
00:00
30.04.14	
23:59
1.126.666.5
54 USD 0.56 0.0
0.0000
00 None
0.56000
0
First	1,000,000	Amazon	SNS	API	Requests	per	month	are	
free
01.04.14	
00:00
30.04.14	
23:59 10.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
First	1,000,000	Amazon	SQS	Requests	per	month	are	free
01.04.14	
00:00
30.04.14	
23:59 4153.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.00	per	GB	- EU	(Ireland)	data	transfer	from	US	West	
(Northern	California)
01.04.14	
00:00
30.04.14	
23:59 0.00003292 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.000	per	GB	- data	transfer	out	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 0.02311019 USD 0.00 0.0
0.0000
00 None
0.00000
0
First	1,000,000	Amazon	SNS	API	Requests	per	month	are	
free
01.04.14	
00:00
30.04.14	
23:59 88.0 USD 0.00 0.0
0.0000
00 None
0.00000
0
$0.000	per	GB	- data	transfer	out	under	the	monthly	
global	free	tier
01.04.14	
00:00
30.04.14	
23:59 3.3E-7 USD 0.00 0.0
0.0000
00 None
0.00000
0
AWS	CloudTrail	logs	can	be	delivered	cross-
account
CloudTrail	can	help	achieve	many	tasks
Accounts	can	send	their	trails	to	a	central	
account
Central	account	can	then	do	analytics
Central	account	can:
‣ Redistribute	the	trails
‣ Grant	access	to	the	trails
‣ Filter	and	reformat	Trails	(to	meet	privacy	
requirements)
S3 Subtleties
• S3 write-only cross-account sharing
• Share write-only (no reading or listing of contents) from owner account
via bucket policy
• Writer accounts have IAM permissions to write
Multi-Account	Aggregation	of	Delivered	Data
Region	1
Region	2
Region	3
Common	S3	bucket
Amazon	S3	policies	should	permit	accounts	to	write	Config data
SNS	Topic:	Region	1
SNS	Topic:	Region	2
SNS	Topic:	Region	3
Common	SQS	queue
Amazon	SQS/Amazon	SNS	publish/subscribe	permissions	should	be	set
Staging	and	Masking	Logs
• We	can	mask	PII	in	CloudTrail	logs
• Bertram	Dorn has	a	Lambda	function	for	it
• Originally	intended	as	a	proposal	to	address	considerations	in	upcoming	German	privacy	
law
• Can	be	generalised to	other	consistent	AWS	log	formats
Staging	and	Masking	Logs
• Extend	it	to	mask	relevant	fields	in:
• CloudWatch logs
• ELB,	CloudFront,	Amazon	VPC	flow	log,	etc.	records
• ...all	of	which	use	CloudWatch Logs
• If	we	use	CloudWatch Events,	we	can	use	a	Lambda	function	to	land	
our	logs	in	a	local	S3	bucket,	then	use	a	cross-account	Lambda	function	
to	mask-and-forward
• Config records	can	be	forwarded	as-is
Staging	and	Masking	Logs
• Flow	Logs	etc
• in	CW	Logs
Local masking
Lambda
Local S3 bucket Cross-acct
Lambda
Consolidated
logs bucket
Log	Analytics
• Splunk,	SumoLogic,	other	AWS	Marketplace	products
• ElasticSearch and	Kibana
• https://aws.amazon.com/blogs/security/how-to-optimize-and-visualize-
your-security-groups/
• Athena
• "Run	SQL	against	S3"
• QuickSight
• Intended	for	Business	Intelligence,	but	bendable	to	purpose...	?
On-premise
bucket
AWS Account: Bill
Aggregation
IdP server
Organization member
account
Organization non-member
account
API Endpoints
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
On-premise
bucket
AWS Account: Bill
Aggregation
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
API Endpoints
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
On-premise
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
API Endpoints
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Log
aggregation
On-premise
bucket
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
API Endpoints
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
API Endpoints
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS
Organizations
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS KMS
AWS
Organizations
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS IAM
AWS Account: Resources
AWS KMS
AWS
Organizations
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS IAM
AWS Account: ResourcesAWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS Account:
Audit
(Internal)
AWS IAM
AWS Account: ResourcesAWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Amazon
QuickSight
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS Account:
Audit
(Internal)
AWS IAM
AWS Account: Resources
AWS Account:
Audit
(External)
AWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Amazon
Athena
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Amazon
QuickSight
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS Account:
Audit
(Internal)
AWS IAM
AWS Account: Resources
AWS Account:
Audit
(External)
AWS Account:
Regulator
AWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Amazon
Athena
Amazon
Redshift*
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Amazon
QuickSight
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS IAM
IdP server
AWS Account:
Audit
(Internal)
AWS IAM
AWS Account: Resources
AWS Account:
Audit
(External)
AWS Account:
Regulator
AWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Amazon
Athena
Amazon
Redshift*
AWS Account:
Incident
Response
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
AWS Account: Log
aggregation and
anonymisation
AWS Account:
Anonymised
Bills
Amazon
QuickSight
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
AWS Account: Resources
AWS IAM
role
AWS Account: Log
aggregation and
anonymisation
On-premise
AWS
Lambda
role
bucketbucket
AWS Account:
Anonymised
Logs
AWS
Lambda
role
bucket
AWS Account: Bill
Aggregation and
Anonymisation
bucket
AWS Account:
Anonymised
Bills
AWS IAM
IdP server
AWS Account:
Audit
(Internal)
AWS IAM
AWS Account: Resources
AWS Account:
Audit
(External)
AWS Account:
Regulator
AWS IAM
AWS KMS
AWS
Organizations
LDAP
AWS Account: Shared
Svcs
AWS
CloudHSM
Amazon
Athena
Amazon
QuickSight
Amazon
Redshift*
bucket
AWS Account:
Forensic Repo
AWS Account:
Incident
Response
bucket
AWS Account:
Forensic
Working Repo
Read-only, read-all flow
API and IAM call flow
Logging traffic flow
Billing traffic flow
Organization member
account
Organization non-member
account
AWS Account: IAM
Federation
API Endpoints
AWS KMS
Internal
DNS
Scanning
tools
AWS Account: Security Team
AWS IAM
Scanning
tools
Forensics
tools
Compliance Enablers: https://aws.amazon.com/compliance/compliance-enablers/
Risk & Compliance Whitepaper: https://aws.amazon.com/whitepapers/overview-of-risk-and-compliance/
Compliance Centre Website: https://aws.amazon.com/compliance
Security Centre: https://aws.amazon.com/security
Security Blog: https://blogs.aws.amazon.com/security/
Well-Architected Framework: https://aws.amazon.com/blogs/aws/are-you-well-architected/
AWS Audit Training: awsaudittraining@amazon.com
Helpful	Resources
The Shared Security Model in Detail: https://youtu.be/RwUSPklR24M
IAM Recommended Practices: https://youtu.be/R-PyVnhxx-U
Encryption on AWS: https://youtu.be/DXqDStJ4epE
Securing Serverless Architectures: https://www.youtube.com/watch?v=8mpTpOXmws8
Helpful	Videos
Thank you!

More Related Content

What's hot

Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon Web Services
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Amazon Web Services Korea
 
AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations Amazon Web Services
 
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...Amazon Web Services
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignAmazon Web Services
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksAmazon Web Services
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...Amazon Web Services Korea
 

What's hot (20)

Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
Amazon GuardDuty: Intelligent Threat Detection and Continuous Monitoring to P...
 
Fundamentals of AWS Security
Fundamentals of AWS SecurityFundamentals of AWS Security
Fundamentals of AWS Security
 
Introduction to AWS Security
Introduction to AWS SecurityIntroduction to AWS Security
Introduction to AWS Security
 
AWS WAF
AWS WAFAWS WAF
AWS WAF
 
AWS WAF - A Web App Firewall
AWS WAF - A Web App FirewallAWS WAF - A Web App Firewall
AWS WAF - A Web App Firewall
 
AWS Security Best Practices
AWS Security Best PracticesAWS Security Best Practices
AWS Security Best Practices
 
Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트Security on AWS :: 이경수 솔루션즈아키텍트
Security on AWS :: 이경수 솔루션즈아키텍트
 
Auto Scaling on AWS
Auto Scaling on AWSAuto Scaling on AWS
Auto Scaling on AWS
 
AWS Security Fundamentals
AWS Security FundamentalsAWS Security Fundamentals
AWS Security Fundamentals
 
AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations AWS Global Infrastructure Foundations
AWS Global Infrastructure Foundations
 
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...
Enterprise Governance: Build Your AWS Landing Zone (ENT351-R1) - AWS re:Inven...
 
Deep Dive on AWS Lambda
Deep Dive on AWS LambdaDeep Dive on AWS Lambda
Deep Dive on AWS Lambda
 
AWS Security Hub
AWS Security HubAWS Security Hub
AWS Security Hub
 
Deep Dive - AWS Security by Design
Deep Dive - AWS Security by DesignDeep Dive - AWS Security by Design
Deep Dive - AWS Security by Design
 
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech TalksDeep Dive on Amazon GuardDuty - AWS Online Tech Talks
Deep Dive on Amazon GuardDuty - AWS Online Tech Talks
 
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
AWS 기반 클라우드 아키텍처 모범사례 - 삼성전자 개발자 포털/개발자 워크스페이스 - 정영준 솔루션즈 아키텍트, AWS / 유현성 수석,...
 
AWS Security By Design
AWS Security By DesignAWS Security By Design
AWS Security By Design
 
GuardDuty Hands-on Lab
GuardDuty Hands-on LabGuardDuty Hands-on Lab
GuardDuty Hands-on Lab
 
AWS for Backup and Recovery
AWS for Backup and RecoveryAWS for Backup and Recovery
AWS for Backup and Recovery
 
AWS Deployment Best Practices
AWS Deployment Best PracticesAWS Deployment Best Practices
AWS Deployment Best Practices
 

Viewers also liked

소셜 코딩 GitHub & branch & branch strategy
소셜 코딩 GitHub & branch & branch strategy소셜 코딩 GitHub & branch & branch strategy
소셜 코딩 GitHub & branch & branch strategyKenu, GwangNam Heo
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big dataRaul Chong
 
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...Lucidworks
 
And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?Tomica Kaniski
 
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...Caserta
 
Conociendo los servicios adicionales en big data
Conociendo los servicios adicionales en big dataConociendo los servicios adicionales en big data
Conociendo los servicios adicionales en big dataSpanishPASSVC
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld
 
AI = SE , giip system manage automation with A.I
AI = SE , giip system manage automation with A.IAI = SE , giip system manage automation with A.I
AI = SE , giip system manage automation with A.ILowy Shin
 
codeless/serverless develop
codeless/serverless develop codeless/serverless develop
codeless/serverless develop Tomoyuki Obi
 
How To: De Raspberry Pi als downloadmachine
How To: De Raspberry Pi als downloadmachineHow To: De Raspberry Pi als downloadmachine
How To: De Raspberry Pi als downloadmachineIDG Nederland
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSAmazon Web Services
 
The Biggest Lies That Digital Marketers Tell Themselves - 3XE Digital
The Biggest Lies That Digital Marketers Tell Themselves - 3XE DigitalThe Biggest Lies That Digital Marketers Tell Themselves - 3XE Digital
The Biggest Lies That Digital Marketers Tell Themselves - 3XE DigitalEduardas Gricius
 
Finding HMAS Sydney Chapter 9 - Search for Sydney
Finding HMAS Sydney Chapter 9 - Search for SydneyFinding HMAS Sydney Chapter 9 - Search for Sydney
Finding HMAS Sydney Chapter 9 - Search for SydneyElk Software Group
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & ComplianceAmazon Web Services
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewMarco Amado
 
SQL saturday 623 TLV - SQL AZURE
SQL saturday 623 TLV - SQL AZURESQL saturday 623 TLV - SQL AZURE
SQL saturday 623 TLV - SQL AZUREPini Krisher
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werkenOkke Jan Douma
 

Viewers also liked (20)

소셜 코딩 GitHub & branch & branch strategy
소셜 코딩 GitHub & branch & branch strategy소셜 코딩 GitHub & branch & branch strategy
소셜 코딩 GitHub & branch & branch strategy
 
02 a holistic approach to big data
02 a holistic approach to big data02 a holistic approach to big data
02 a holistic approach to big data
 
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...
Understand the Breadth and Depth of Solr via the Admin UI: Presented by Upaya...
 
And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?And the new System Center is here... what's actually new?
And the new System Center is here... what's actually new?
 
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...
Integrating the CDO Role Into Your Organization; Managing the Disruption (MIT...
 
Conociendo los servicios adicionales en big data
Conociendo los servicios adicionales en big dataConociendo los servicios adicionales en big data
Conociendo los servicios adicionales en big data
 
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
VMworld 2015: Take Virtualization to the Next Level vSphere with Operations M...
 
AI = SE , giip system manage automation with A.I
AI = SE , giip system manage automation with A.IAI = SE , giip system manage automation with A.I
AI = SE , giip system manage automation with A.I
 
codeless/serverless develop
codeless/serverless develop codeless/serverless develop
codeless/serverless develop
 
How To: De Raspberry Pi als downloadmachine
How To: De Raspberry Pi als downloadmachineHow To: De Raspberry Pi als downloadmachine
How To: De Raspberry Pi als downloadmachine
 
C++ Coroutines
C++ CoroutinesC++ Coroutines
C++ Coroutines
 
Workshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWSWorkshop 2: Building a streaming data platform on AWS
Workshop 2: Building a streaming data platform on AWS
 
The Biggest Lies That Digital Marketers Tell Themselves - 3XE Digital
The Biggest Lies That Digital Marketers Tell Themselves - 3XE DigitalThe Biggest Lies That Digital Marketers Tell Themselves - 3XE Digital
The Biggest Lies That Digital Marketers Tell Themselves - 3XE Digital
 
Finding HMAS Sydney Chapter 9 - Search for Sydney
Finding HMAS Sydney Chapter 9 - Search for SydneyFinding HMAS Sydney Chapter 9 - Search for Sydney
Finding HMAS Sydney Chapter 9 - Search for Sydney
 
PaaS for Dummies
PaaS for DummiesPaaS for Dummies
PaaS for Dummies
 
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
(SEC320) Leveraging the Power of AWS to Automate Security & Compliance
 
Lifehacking met Evernote
Lifehacking met EvernoteLifehacking met Evernote
Lifehacking met Evernote
 
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overviewHigh Availability Architecture for Legacy Stuff - a 10.000 feet overview
High Availability Architecture for Legacy Stuff - a 10.000 feet overview
 
SQL saturday 623 TLV - SQL AZURE
SQL saturday 623 TLV - SQL AZURESQL saturday 623 TLV - SQL AZURE
SQL saturday 623 TLV - SQL AZURE
 
Projectmanagement en systemisch werken
Projectmanagement en systemisch werkenProjectmanagement en systemisch werken
Projectmanagement en systemisch werken
 

Similar to Architecting Security and Governance Across Multi Accounts

선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...Amazon Web Services Korea
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Amazon Web Services
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudAmazon Web Services
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial ServicesAmazon Web Services
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Autodesk
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 Amazon Web Services
 
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Amazon Web Services
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Kristana Kane
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessToni de la Fuente
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...Amazon Web Services
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Tom Laszewski
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Amazon Web Services
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggTrish McGinity, CCSK
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Amazon Web Services
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersAmazon Web Services
 

Similar to Architecting Security and Governance Across Multi Accounts (20)

선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
선도 금융사들의 aws security 활용 방안 소개 :: Eugene Yu :: AWS Finance...
 
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...Security Architecture recommendations for your new AWS operation - Pop-up Lof...
Security Architecture recommendations for your new AWS operation - Pop-up Lof...
 
Sicurezza e Compliance nel Cloud
Sicurezza e Compliance nel CloudSicurezza e Compliance nel Cloud
Sicurezza e Compliance nel Cloud
 
Protecting Your Data in AWS
Protecting Your Data in AWSProtecting Your Data in AWS
Protecting Your Data in AWS
 
AWS Security Checklist
AWS Security ChecklistAWS Security Checklist
AWS Security Checklist
 
AWS Security for Financial Services
AWS Security for Financial ServicesAWS Security for Financial Services
AWS Security for Financial Services
 
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
Forge - DevCon 2016: Developing & Deploying Secure, Scalable Applications on ...
 
01 aws track 1
01 aws track 101 aws track 1
01 aws track 1
 
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017 AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
AWS Security Enabiling Fintech Pace Security AWS Summit SG 2017
 
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
Gestire la sicurezza nel Cloud: come iniziare ad implementare un processo Dev...
 
Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps Automating Security in Cloud Workloads with DevSecOps
Automating Security in Cloud Workloads with DevSecOps
 
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics ReadinessAlabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
Alabama CyberNow 2018: Cloud Hardening and Digital Forensics Readiness
 
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
AWS re:Invent 2016: Life Without SSH: Immutable Infrastructure in Production ...
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security Cloud Migration, Application Modernization, and Security
Cloud Migration, Application Modernization, and Security
 
Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017Security Best Practices - Transformation Day Public Sector London 2017
Security Best Practices - Transformation Day Public Sector London 2017
 
Practical AWS Security - Scott Hogg
Practical AWS Security - Scott HoggPractical AWS Security - Scott Hogg
Practical AWS Security - Scott Hogg
 
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
Architecting for End-to-End Security in the Enterprise (ARC308) | AWS re:Inve...
 
Cloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for PartnersCloud Migration, Application Modernization and Security for Partners
Cloud Migration, Application Modernization and Security for Partners
 
Security & Compliance
Security & Compliance Security & Compliance
Security & Compliance
 

More from Amazon Web Services

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Amazon Web Services
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Amazon Web Services
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateAmazon Web Services
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSAmazon Web Services
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Amazon Web Services
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Amazon Web Services
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...Amazon Web Services
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsAmazon Web Services
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareAmazon Web Services
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSAmazon Web Services
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAmazon Web Services
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareAmazon Web Services
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWSAmazon Web Services
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckAmazon Web Services
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without serversAmazon Web Services
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...Amazon Web Services
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceAmazon Web Services
 

More from Amazon Web Services (20)

Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
Come costruire servizi di Forecasting sfruttando algoritmi di ML e deep learn...
 
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
Big Data per le Startup: come creare applicazioni Big Data in modalità Server...
 
Esegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS FargateEsegui pod serverless con Amazon EKS e AWS Fargate
Esegui pod serverless con Amazon EKS e AWS Fargate
 
Costruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWSCostruire Applicazioni Moderne con AWS
Costruire Applicazioni Moderne con AWS
 
Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot Come spendere fino al 90% in meno con i container e le istanze spot
Come spendere fino al 90% in meno con i container e le istanze spot
 
Open banking as a service
Open banking as a serviceOpen banking as a service
Open banking as a service
 
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
Rendi unica l’offerta della tua startup sul mercato con i servizi Machine Lea...
 
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...OpsWorks Configuration Management: automatizza la gestione e i deployment del...
OpsWorks Configuration Management: automatizza la gestione e i deployment del...
 
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows WorkloadsMicrosoft Active Directory su AWS per supportare i tuoi Windows Workloads
Microsoft Active Directory su AWS per supportare i tuoi Windows Workloads
 
Computer Vision con AWS
Computer Vision con AWSComputer Vision con AWS
Computer Vision con AWS
 
Database Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatareDatabase Oracle e VMware Cloud on AWS i miti da sfatare
Database Oracle e VMware Cloud on AWS i miti da sfatare
 
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJSCrea la tua prima serverless ledger-based app con QLDB e NodeJS
Crea la tua prima serverless ledger-based app con QLDB e NodeJS
 
API moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e webAPI moderne real-time per applicazioni mobili e web
API moderne real-time per applicazioni mobili e web
 
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatareDatabase Oracle e VMware Cloud™ on AWS: i miti da sfatare
Database Oracle e VMware Cloud™ on AWS: i miti da sfatare
 
Tools for building your MVP on AWS
Tools for building your MVP on AWSTools for building your MVP on AWS
Tools for building your MVP on AWS
 
How to Build a Winning Pitch Deck
How to Build a Winning Pitch DeckHow to Build a Winning Pitch Deck
How to Build a Winning Pitch Deck
 
Building a web application without servers
Building a web application without serversBuilding a web application without servers
Building a web application without servers
 
Fundraising Essentials
Fundraising EssentialsFundraising Essentials
Fundraising Essentials
 
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
AWS_HK_StartupDay_Building Interactive websites while automating for efficien...
 
Introduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container ServiceIntroduzione a Amazon Elastic Container Service
Introduzione a Amazon Elastic Container Service
 

Recently uploaded

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon investment
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizharallensay1
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified Binance Account
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxCynthia Clay
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...ssuserf63bd7
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1kcpayne
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon investment
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareWorkforce Group
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAITim Wilson
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwaitdaisycvs
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Timegargpaaro
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingNauman Safdar
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentationuneakwhite
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with CultureSeta Wicaksana
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030tarushabhavsar
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannaBusinessPlans
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Centuryrwgiffor
 

Recently uploaded (20)

Falcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business PotentialFalcon Invoice Discounting: Unlock Your Business Potential
Falcon Invoice Discounting: Unlock Your Business Potential
 
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al MizharAl Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
Al Mizhar Dubai Escorts +971561403006 Escorts Service In Al Mizhar
 
Buy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From SeosmmearthBuy Verified TransferWise Accounts From Seosmmearth
Buy Verified TransferWise Accounts From Seosmmearth
 
Putting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptxPutting the SPARK into Virtual Training.pptx
Putting the SPARK into Virtual Training.pptx
 
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
!~+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUD...
 
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
Horngren’s Cost Accounting A Managerial Emphasis, Canadian 9th edition soluti...
 
Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1Katrina Personal Brand Project and portfolio 1
Katrina Personal Brand Project and portfolio 1
 
HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024HomeRoots Pitch Deck | Investor Insights | April 2024
HomeRoots Pitch Deck | Investor Insights | April 2024
 
Falcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business GrowthFalcon Invoice Discounting: Empowering Your Business Growth
Falcon Invoice Discounting: Empowering Your Business Growth
 
Cracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' SlideshareCracking the 'Career Pathing' Slideshare
Cracking the 'Career Pathing' Slideshare
 
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAIGetting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
Getting Real with AI - Columbus DAW - May 2024 - Nick Woo from AlignAI
 
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai KuwaitThe Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
The Abortion pills for sale in Qatar@Doha [+27737758557] []Deira Dubai Kuwait
 
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All TimeCall 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
Call 7737669865 Vadodara Call Girls Service at your Door Step Available All Time
 
Mckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for ViewingMckinsey foundation level Handbook for Viewing
Mckinsey foundation level Handbook for Viewing
 
Uneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration PresentationUneak White's Personal Brand Exploration Presentation
Uneak White's Personal Brand Exploration Presentation
 
Organizational Transformation Lead with Culture
Organizational Transformation Lead with CultureOrganizational Transformation Lead with Culture
Organizational Transformation Lead with Culture
 
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030Over the Top (OTT) Market Size & Growth Outlook 2024-2030
Over the Top (OTT) Market Size & Growth Outlook 2024-2030
 
Cannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 UpdatedCannabis Legalization World Map: 2024 Updated
Cannabis Legalization World Map: 2024 Updated
 
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabiunwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
unwanted pregnancy Kit [+918133066128] Abortion Pills IN Dubai UAE Abudhabi
 
Famous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st CenturyFamous Olympic Siblings from the 21st Century
Famous Olympic Siblings from the 21st Century
 

Architecting Security and Governance Across Multi Accounts

Editor's Notes

  1. The 3 standards everyone asks me about, outside of industry-specific ones PCI *is* industry-specific to a large degree, but if you need SOC, it's also good to have as SOC doesn't cover everything. For exampole, PCI has most detailed treatment of how AWS works with you and your investigators in the event of forensics work being needed. PCI and ISO are assessed point-in-time, SOC is assessed over a period. Be sure to look into the details, and get the standards for the details you need.
  2. These are the 12 top-level subject areas I get asked about, and where I'd start on a mapping.
  3. The start of a mapping, at AWS level. As well as CloudWatch for monitoring hypervisor-visible load - so, CPU and network I/O, you also have CloudWatch Logs which can give you info on memory and storage capacity.
  4. Direct Connect gives you known routing to your DX partner and on to us - also consistent performance. VPC, see "A Day in the Life of a Billion Packets" Most interesting here, is IDS / IPS and Managed DDoS - as it happens we released a new reference architecture whitepaper on this last Friday. There's a bit more later on host- or network-based IDS / IPS.
  5. Post-LogJam, we've supplanted service suites which included SSL to ones which are TLS only in ELB ELB encryption is transparent when using KMS. KMS makes key management, including rotation, easy. CloudHSM can integrate with Safenet KeySecure for S3 encryption and key management, and ProtectV for encryption of EBS volumes, including root volumes of EBS-backed instances. CloudHSM is the option to go for when you need hard asurance that AWS can't get access to your keys. Redshift can talk directly to CLoudHSM, as can Oracle EE deployed on top of RDS.
  6. Lifecycle Management = hierarchical management, and Glacier vault contents aren't modifiable in-place once written. Actually get one more step on this – EBS gets snapshotted to S3. Deletion protection and versioning on S3 gives you something close to an append-only filesystem - great for logs and other data where you want to have measures in place to preserve evidence or other important data which shouldn't be modifiable.
  7. Trad controls on-instance still work - except TPM, but some of this can be worked around. Asset management - "No virtual desks to hide your virtual servers under". No way of provisioning something other than via the API, so the feedback loop is closed - API returns truth.
  8. Trad controls on-instance still work - except TPM, but some of this can be worked around. Asset management - "No virtual desks to hide your virtual servers under". No way of provisioning something other than via the API, so the feedback loop is closed - API returns truth.
  9. This leads into a program called GoldBase Talk about Launch Constraints – Leveraging an IAM Role to perform Launch for User Talk about Template Constraints – limiting VPCs, Instance Types etc
  10. aka "how to manage your logging buckets, continued". If you share your versioned, MFA-delete bucket write-only across accounts from a dedicated Audit acct to Production, Staging, etc, then the policy on the bucket and the contents are both invisible and immutable to the account it's being shared with, even its root user - and having spent about half my working life in a multilevel, cross-domain, modified Bell-LaPadula world, this amounts to Mandatory Access Control. You can also set SELinux up in properly constrained Enforcing Mode on EC2 - you could set up user-data at instance launch time to call a script to generate keys and then go into Enforcing mode, if you need to simulate TPM functionality. There may be better ways of doing this, as CloudHSM can be called from Java as well as PKCS#11 - get creative!