aws enterprise summit london 2013 - stephen schmidt - aws

16
Security of your data in AWS Stephen Schmidt VP Security Engineering & Chief Information Security Officer

Upload: amazon-web-services

Post on 25-May-2015

929 views

Category:

Technology


2 download

TRANSCRIPT

Page 1: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Security of your data in AWS

Stephen Schmidt

VP Security Engineering & Chief Information Security Officer

Page 2: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• Universal

• Visible

• Auditable

• Transparent

• Shared

• Familiar

Cloud Security is:

Page 3: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Every customer has access to the same security capabilities, and gets to choose what’s right for their business.

– Governments

– Financial Sector

– Pharmaceuticals

– Entertainment

– Start-Ups

– Social Media

– Home Users

– Retail

Universal Cloud Security

Page 4: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

AWS allows the customer to see their ENTIRE

infrastructure at the click of a mouse

Visible Cloud Security

This

Or

This?

Page 5: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• How does a customer know AWS is right for their business? – 3rd Party Audits

• Independent auditors

• Artifacts – Plans, Policies and Procedures

• Logs – Obtained

– Retained

– Analyzed

Auditable Cloud Security

Page 6: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Choose the audit/certification that’s right for them: – ISO-27001

– SOC-1, SOC-2, SOC-3

– FedRAMP

– PCI

Transparent Cloud Security

Page 7: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Control Objective 1: Security Organization

– Who we are

– Proper control & access within the organization

Control Objective 2: Amazon User Access

– How we vet our staff

– Minimization of access

Security & Compliance Control Objectives

Page 8: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Control Objective 3: Logical Security

– Our staff start with no systems access

– Need-based access grants

– Rigorous systems separation

– Systems access grants regularly re-evaluated &

automatically revoked

Security & Compliance Control Objectives

Page 9: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Control Objective 4: Secure Data Handling – Storage media destroyed before being permitted outside our

datacenters

– Media destruction consistent with US Dept. of Defense Directive

5220.22

Control Objective 5: Physical Security and

Environmental Safeguards – Keeping our facilities safe

– Maintaining the physical operating parameters of our datacenters

Security & Compliance Control Objectives

Page 10: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Control Objective 6: Change Management – Continuous Operation

Control Objective 7: Data Integrity, Availability and

Redundancy – Ensuring your data remains safe, intact & available

Control Objective 8: Incident Handling – Processes & procedures for mitigating and managing potential issues

Security & Compliance Control Objectives

Page 11: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• Let AWS do the heavy lifting

• This is what we do – and we do it all the time

• The customer can focus on their business and not be distracted by

the muck

AWS Shared Responsibility Model

Page 12: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• Large non-descript facilities

• Robust perimeter controls

• 2 factor authentication for entry

• Controlled, need-based access for AWS

employees

• All access is logged and reviewed

Physical Security

Page 13: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

Physical Security

Asia Pacific (Sydney)

Page 14: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• DDoS attacks defended at the border

• Man in the Middle attacks

• SSL endpoints

• IP Spoofing prohibited

• Port scanning prohibited

• Packet Sniffing prevented

Network Security

Page 15: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• AWS offers several data protection mechanisms including access control, encryption, etc.

• AWS data encryption solutions allow customers to: – Encrypt and decrypt sensitive data inside or outside AWS

– Decide which data to encrypt

• AWS CloudHSM complements existing AWS data protection and encryption solutions

• With AWS CloudHSM customers can: – Encrypt data inside AWS

– Store keys in AWS within a Hardware Security Module

– Decide how to encrypt data – the AWS CloudHSM implements cryptographic functions and key storage for customer applications

– Use third party validated hardware for key storage

– AWS CloudHSMs are designed to meet Common Criteria EAL4+ and FIPS 140-2 standards)

AWS Data Protection Solutions

Page 16: AWS Enterprise Summit London 2013 - Stephen Schmidt - AWS

• http://aws.amazon.com/security/ – Security Whitepaper

– Risk and Compliance Whitepaper

– Regularly Updated

– Feedback is welcome

• http://blogs.aws.amazon.com/security

AWS Security Center