security, risk, compliance & controls

24
© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. [email protected] June 16, 2016 • Enterprise Summit • Hong Kong Security, Risk, Compliance & Controls Brian Wagner, AWS Security Consultant

Upload: amazon-web-services

Post on 09-Jan-2017

154 views

Category:

Technology


0 download

TRANSCRIPT

Page 1: Security, Risk, Compliance & Controls

© 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved.

[email protected]

June 16, 2016 • Enterprise Summit • Hong Kong

Security, Risk, Compliance & Controls

Brian Wagner, AWS Security Consultant

Page 2: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Page 3: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 4: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 5: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 6: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 7: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 8: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 9: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 10: Security, Risk, Compliance & Controls

Amazon S3 secure, durable, highly-scalable cloud storage

Page 11: Security, Risk, Compliance & Controls

Amazon S3

Access Control Durable Logging

Page 12: Security, Risk, Compliance & Controls

AWS Key Management Service create and control the encryption keys used to encrypt your data

Page 13: Security, Risk, Compliance & Controls

AWS Key Management Service

Built-in Auditing Compliance Access Control

Page 14: Security, Risk, Compliance & Controls

AWS Key Management Service

Your application or AWS service

+ Data key Encrypted data key

Encrypted data

Master keys in customer’s account

KMS

Page 15: Security, Risk, Compliance & Controls

AWS CloudTrail records AWS API calls for your account and delivers log files

Page 16: Security, Risk, Compliance & Controls

AWS CloudTrail

Notifications Integration Integrity

Page 17: Security, Risk, Compliance & Controls

AWS CloudTrail

CloudTrail can help you achieve many tasks   Security analysis   Track changes to AWS resources   Compliance – log and understand AWS API

call history   Prove that you did not:

  Use the wrong region   Use services you don’t want

  Troubleshoot operational issues – quickly identify the most recent changes to your environment

Page 18: Security, Risk, Compliance & Controls

AWS Config records AWS API calls for your account and delivers log files

Page 19: Security, Risk, Compliance & Controls

AWS Config

Governance Dashboard Customizable Continuous

Page 20: Security, Risk, Compliance & Controls

Continuous Change Recording Changing Resources

AWS Config History

Stream

Snapshot (ex. 2014-11-05) AWS Config

Page 21: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

Page 22: Security, Risk, Compliance & Controls

Data Protection Principle 4

“All practicable steps shall be taken to ensure that personal data held by a data user are protected against unauthorized or accidental access, processing, erasure, loss or use”

“All practical and reasonable protection measures to be taken, given circumstances (kind of data, physical location, transmission of data)”

Access Control Durability Logging Encryption

IAM S3 CloudTrail KMS

Page 23: Security, Risk, Compliance & Controls

Real-time Compliance

IAM S3 CloudTrail KMS

Config

Page 24: Security, Risk, Compliance & Controls

Brian Wagner, AWS Security Consultant