how to meet strict security & compliance requirements in the cloud (sec208) | aws re:invent 2013

20
© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc. How to Meet Strict Security Compliance Requirements in the Cloud JD Sherry, VP Technology & Solutions, Trend Micro Mark Nunnikhoven, Principal Engineer, Cloud & Emerging Technologies, Trend Micro November 13, 2013

Upload: amazon-web-services

Post on 10-May-2015

678 views

Category:

Technology


3 download

DESCRIPTION

(Presented by Trend Micro) In this session, you learn about the AWS shared security model, including considerations and best practices for deploying a secure and compliant application on AWS, and how to leverage the features and APIs provided by AWS. You also learn how to use best-in-class security and compliance solutions that have been optimized for enterprises deploying in AWS. Key topics covered are Amazon EC2 and Amazon EBS encryption, including several key management methodologies as well as intrusion detection and prevention, anti-malware, anti-virus, integrity monitoring, firewall, and web reputation in the cloud.

TRANSCRIPT

Page 1: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

© 2013 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent of Amazon.com, Inc.

How to Meet Strict Security Compliance

Requirements in the Cloud JD Sherry, VP Technology & Solutions, Trend Micro

Mark Nunnikhoven, Principal Engineer, Cloud & Emerging Technologies, Trend Micro

November 13, 2013

Page 2: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Enterprises & the Cloud

• Security & compliance are top priorities for

enterprises, regardless of where things are

deployed

• Many organizations recognize the benefits of

the cloud – and need to understand security

requirements

Page 3: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Enterprises & the Cloud

• Data sovereignty

• Multi-tenancy

• Compliance

76% indicated they had

compliance or data

confidentiality

requirements

Source: Trend Micro survey, May 2013

Page 4: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

4

PCI Requirements as a Reference …

February, 2013

You!

Page 5: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Shared responsibility

• Facilities

• Physical Security

• Physical Infrastructure

• Network Infrastructure

• Virtualization Infrastructure

• Operating System

• Application

• Account Management

• Security Groups

• Network Configuration

Page 6: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Deep Security Manager

Amazon EC2 instances

Deep Security

Page 7: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

What does Deep Security deliver?

Technical details

Unified management interface for multiple regions/credentials

Simplified policy management across the organization

Broad platform support

Agent provides protection on the Amazon EC2 instance

Your needs

Helps address compliance challenges

Enforces security policy within your organization

Centralized security control management

Page 8: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Customer Challenges

Flexible deployment to fit any situation

Deploy via user-data, Chef, Puppet, SSH/PowerShell, etc.

Install the agent in an AMI and activate on demand

Keeping up to date

Agent updates via Deep Security, no extra tools needed

Managing another binary

Page 9: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Demo – User-data deployment

Page 10: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Demo – Manager-initiated activation

Page 11: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Customer Challenges

Deep AWS integration

AWS cloud connector automatically polls region

Automate security actions for new instances

Full visibility of unprotected instances

Keeping up to date

Connector syncs regularly for constant awareness

Being aware of assets in AWS

Page 12: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Demo – Automated decision making

Page 13: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Deep Security Manager

Amazon EC2 instances

Deep Security + SecureCloud

SecureCloud

Page 14: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

What does SecureCloud deliver?

Technical details

Intelligent block level encrypted

Used AES-256 cipher from FIPS 140-2 certified library

Broad platform support

Agent provides protection on the Amazon EC2 instance

Your needs

Helps address compliance challenges

Enforces security policy within your organization

Full disk encryption

Page 15: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Customer Challenges

Deep AWS integration

Leverage AWS metadata for key management policies

Boot-volume encryption for Windows & Linux

Keeping up to date

Integrity check regularly validates encryption policy

Preventing unauthorized access to data

Page 16: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Demo – Advanced key release policy

Page 17: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Session Summary

Meet strict security and compliance requirements with a security

solution that is:

• Smart: Automatically apply security controls

• Simple: Manage through a single console with reporting and

alerting

• Security that fits: Embed security into your cloud architecture

Page 18: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Learn about Trend Micro at AWS re:Invent

• Join us at our booth to meet R&D experts and see in-

depth product demo

• SEC 309: Learn How Trend Micro Used AWS to Build their

Enterprise Security Offering (Deep Security as a Service) – Thursday 11 am - noon

Page 19: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

Try out Trend Micro today!

• Test Drive: aws.amazon.com/testdrive

• Free Trials: – DeepSecurity.TrendMicro.com

– Webappsecurity.trendmicro.com

– securecloud.com

Page 20: How to Meet Strict Security & Compliance Requirements in the Cloud (SEC208) | AWS re:Invent 2013

We are sincerely eager to hear

your feedback on this

presentation and on re:Invent.

Please fill out an evaluation form

when you have a chance.