aws summit tel aviv - security keynote
TRANSCRIPT
![Page 1: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/1.jpg)
AWS Summit 2013 Tel Aviv Oct 16 – Tel Aviv, Israel
Carlos Conde
Sr. Mgr. Solutions Architecture
AWS CLOUD SECURITY
![Page 2: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/2.jpg)
SECURITY IS UNIVERSAL
![Page 3: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/3.jpg)
EVERY CUSTOMER HAS ACCESS
TO THE SAME SECURITY
CAPABILITIES CHOOSE WHAT’S RIGHT FOR YOUR BUSINESS
![Page 4: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/4.jpg)
AWS GOV CLOUD
ITAR COMPLIANT
![Page 5: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/5.jpg)
SECURITY IS VISIBLE
![Page 6: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/6.jpg)
CAN YOU MAP YOUR NETWORK?
WHAT IS IN YOUR ENVIRONMENT
RIGHT NOW?
![Page 7: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/7.jpg)
![Page 8: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/8.jpg)
![Page 9: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/9.jpg)
AWS API + CLOUDFORMER ENVIRONMENT ARCHITECTURE DEFINITION
AND CHANGE DETECTION
![Page 10: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/10.jpg)
SECURITY IS TRANSPARENT
![Page 11: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/11.jpg)
SOC 1 SOC 2 SOC 3 PCI DSS L1 ISO 27001
ITAR FIPS FedRAMP HIPAA
![Page 12: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/12.jpg)
SECURITY IS FAMILIAR
![Page 13: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/13.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 14: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/14.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 15: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/15.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 16: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/16.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 17: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/17.jpg)
LEAST PRIVILEGE PRINCIPLE CONFINE ROLES ONLY TO THE MATERIAL
REQUIRED TO DO A SPECIFIC WORK
![Page 18: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/18.jpg)
USE AWS IAM IDENTITY & ACCESS MANAGEMENT
![Page 19: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/19.jpg)
CONTROL WHO CAN DO WHAT IN
YOUR AWS ACCOUNT
![Page 20: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/20.jpg)
![Page 21: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/21.jpg)
![Page 22: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/22.jpg)
![Page 23: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/23.jpg)
IAM USERS & ROLES
![Page 24: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/24.jpg)
ACCESS TO
SERVICE APIs
![Page 25: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/25.jpg)
NO PASSWORDS
![Page 26: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/26.jpg)
USE SEPARATE SETS OF
CREDENTIALS
![Page 27: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/27.jpg)
ROTATE YOUR AWS SECURITY
CREDENTIALS
![Page 28: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/28.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 29: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/29.jpg)
YOUR DATA IS YOUR
MOST IMPORTANT ASSET IF YOUR DATA IS NOT SECURE, YOU’RE NOT SECURE
![Page 30: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/30.jpg)
![Page 31: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/31.jpg)
…
![Page 32: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/32.jpg)
MFA DELETE PROTECTION
![Page 33: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/33.jpg)
![Page 34: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/34.jpg)
ENCRYPT YOUR DATA
AMAZON S3 SSE DATA AT REST
AWS CLOUDHSM
![Page 35: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/35.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 36: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/36.jpg)
NEED TO KNOW
+
CCTV, GUARDS, MAN TRAPS,
FENCES, ETC…
![Page 37: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/37.jpg)
…
![Page 38: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/38.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 39: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/39.jpg)
CHANGES IN PRODUCTION
HAVE TO BE AUTHORIZED
![Page 40: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/40.jpg)
DEV & TEST ENVIRONMENT
AWS ACCOUNT A
PRODUCTION ENVIRONMENT
AWS ACCOUNT B
![Page 41: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/41.jpg)
DEPLOYMENT PROCESS
HAS TO BE CONSTRAINED
![Page 42: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/42.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 43: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/43.jpg)
CONTINUOUS DELIVERY MODEL
![Page 44: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/44.jpg)
CONTINUOUS DEPLOYMENT
SESSION 13:30 START-UP TRACK
![Page 45: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/45.jpg)
REDUNDANCY & INTEGRITY
CHECKS
![Page 46: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/46.jpg)
USE MULTIPLE AZs AMAZON S3
AMAZON DYNAMODB
AMAZON RDS MULTI-AZ
AMAZON EBS SNAPSHOTS
![Page 47: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/47.jpg)
SOC CONTROL OBJECTIVES
1. SECURITY ORGANIZATION
2. AMAZON USER ACCESS
3. LOGICAL SECURITY
4. SECURE DATA HANDLING
5. PHYSICAL SECURITY AND ENV. SAFEGUARDS
6. CHANGE MANAGEMENT
7. DATA INTEGRITY, AVAILABILITY AND REDUNDANCY
8. INCIDENT HANDLING
![Page 48: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/48.jpg)
“GAME DAYS” INSERT ARTIFICIAL SECURITY INCIDENTS.
MEASURE SPEED OF DETECTION AND EXECUTION.
![Page 49: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/49.jpg)
GAME DAYS !! INSERT ARTIFICIAL SECURITY INCIDENTS.
MEASURE SPEED OF DETECTION AND EXECUTION.
![Page 50: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/50.jpg)
![Page 51: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/51.jpg)
SECURITY IS AUDITABLE
![Page 52: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/52.jpg)
![Page 53: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/53.jpg)
VULNERABILITY / PENETRATION
TESTING
![Page 54: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/54.jpg)
VULNERABILITY / PENETRATION
TESTING
![Page 55: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/55.jpg)
LOGS
OBTAINED, RETAINED, ANALYZED
![Page 56: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/56.jpg)
OBTAIN, RETAIN, ANALYSE
YOUR LOGS
![Page 57: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/57.jpg)
![Page 58: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/58.jpg)
![Page 59: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/59.jpg)
PROTECT YOUR LOGS WITH IAM
ARCHIVE YOUR LOGS
![Page 60: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/60.jpg)
![Page 61: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/61.jpg)
![Page 62: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/62.jpg)
TRUSTED ADVISOR
![Page 63: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/63.jpg)
![Page 64: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/64.jpg)
![Page 65: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/65.jpg)
![Page 66: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/66.jpg)
SECURITY IS SHARED
![Page 67: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/67.jpg)
NETWORK SECURITY:
DDOS
![Page 68: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/68.jpg)
NETWORK SECURITY:
SSL
![Page 69: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/69.jpg)
NETWORK SECURITY:
SPOOFING
![Page 70: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/70.jpg)
NETWORK SECURITY:
PORT SCANNING
![Page 71: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/71.jpg)
AMAZON EC2 SECURITY:
HOST OS SSH KEYED LOGINS VIA BASTION HOST
ALL ACCESSES LOGGED AND AUDITED
![Page 72: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/72.jpg)
AMAZON EC2 SECURITY:
GUEST OS CUSTOMER CONTROLLED AT ROOT LEVEL
AWS ADMINS CANNOT LOG IN
CUSTOMER-GENERATED KEYPAIRS
![Page 73: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/73.jpg)
“If you need to SSH into your
instance, your deployment process
is broken.”
![Page 74: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/74.jpg)
AMAZON EC2 SECURITY:
STATEFUL & STATELESS FIREWALL MANDATORY INBOUND
DEFAULT DENY MODE
![Page 75: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/75.jpg)
![Page 76: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/76.jpg)
![Page 77: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/77.jpg)
![Page 78: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/78.jpg)
![Page 79: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/79.jpg)
![Page 80: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/80.jpg)
SECURITY IS
UNIVERSAL
VISIBLE
TRANSPARENT
FAMILIAR
AUDITABLE
SHARED
![Page 81: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/81.jpg)
AWS.AMAZON.COM / SECURITY
![Page 82: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/82.jpg)
![Page 83: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/83.jpg)
AWS SECURITY WHITEPAPERS
RISK & COMPLIANCE
AUDITING SECURITY CHECKLIST
SECURITY PROCESSES
SECURITY BEST PRACTICES
![Page 84: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/84.jpg)
AWS MARKETPLACE
SECURITY SOLUTIONS
![Page 85: AWS Summit Tel Aviv - Security Keynote](https://reader033.vdocuments.mx/reader033/viewer/2022052904/557cf518d8b42a98158b4805/html5/thumbnails/85.jpg)