Leveraging the Security of AWS's Own APIs for Your App. Brian Wagner Solutions Architect Serverless Web Day June 23, 2016
|
|
- Gabriel Lloyd
- 5 years ago
- Views:
Transcription
1 Leveraging the Security of AWS's Own APIs for Your App Brian Wagner Solutions Architect Serverless Web Day June 23, 2016
2 AWS API Requests
3 Access Key and Secret Key (access key and secret key have been modified for the purpose of this presentation)
4 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh
5 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh
6 Access Key and Secret Key [default] aws_access_key_id = AKIAIGQIO52K3ASNZCDA aws_secret_access_key = hackrohczd1yzkaa1rwc1sr3boc0covwmzjpskdh
7 WHY
8 Signing AWS API Requests >_
9 Why Requests Are Signed Verify the identity of the requestor Protect data in transit Protect against potential replay attacks
10 Verify the identity of the requestor unique
11 Protect data in transit GET HTTP/1.1 Authorization: AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/ /us-east- 1/iam/aws4_request, SignedHeaders=content-type;host;x-amz-date, Signature=5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7 content-type: application/x-www-form-urlencoded; charset=utf-8 host: iam.amazonaws.com x-amz-date: T123600Z
12 Protect data in transit GET HTTP/1.1 Authorization: AWS4-HMAC-SHA256 Credential=AKIDEXAMPLE/ /us-east- 1/iam/aws4_request, SignedHeaders=content-type;host;x-amz-date, Signature=5d672d79c15b13162d9279b0855cfba6789a8edb4c82c400e06b5924a6f2b5d7 content-type: application/x-www-form-urlencoded; charset=utf-8 host: iam.amazonaws.com x-amz-date: T123600Z
13 Protect against potential replay attacks 5 minutes
14 What about your API?
15 Benefits of signing requests Verify the identity of the requestor Protect data in transit Protect against potential replay attacks
16 Benefits of signing requests Verify the identity of the requestor Protect data in transit Protect against potential replay attacks Use IAM and access policies to authorize access to your APIs
17 Authorization: AWS_IAM
18 IAM and access policies to authorize access to your APIs { } "Effect": "Allow", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/* ]
19 IAM and access policies to authorize access to your APIs { }, { } "Effect": "Allow", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/* ] "Effect": "Deny", "Action": "execute-api:invoke", "Resource": [ arn:aws:execute-api:us-east-1: :myapi/admin/* ]
20 Securing your API
21
22
23
24
25
26
27
28
29
30
31
32
33
34 IAM and access policies to authorize access to your APIs { } "Version": " ", "Statement": [ { "Sid": "Stmt ", "Effect": "Allow", Action": "execute-api:invoke", "Resource": [ "arn:aws:execute-api:us-east-1: :4kp2myvxmf/*/get/pets" ] } ]
35 Access Key and Secret Key (access key and secret key have been modified for the purpose of this presentation)
36
37
38 How do my apps sign requests?
39 Cognito User and Federated Identities Cognito User Identities (Your User Pool) 1 Sign-in 3 2 Returns Access and ID Tokens Get AWS scoped credentials Cognito Federated Identities (Identity Pool) User 4 Access to your API API Gateway DynamoDB S3
40 Amazon Cognito Identity and Sync Amazon Cognito Identity Amazon Cognito Sync Your User Pool Federated Identities Data Synchronization k/v data Your own auth Guest Add sign-up and sign-in with a fully managed user directory Manage authenticated and guest users access to your AWS resources Synchronize user s data across devices and platforms via the cloud
41 API Gateway and IAM: Best Friends Forever Verify the identity of the requestor Protect data in transit Protect against potential replay attacks Use IAM and access policies to authorize access to your APIs +
42 Leveraging the Security of AWS's Own APIs for Your App Brian Wagner Solutions Architect Serverless Web Day June 23, 2016
Beyond Virtual Machines: Tapping into the AWS Universe from FileMaker
Beyond Virtual Machines: Tapping into the AWS Universe from FileMaker ITG06 Jesse Barnum President, 360Works FILEMAKER DEVCON 2018 AUGUST 6-9 GRAPEVINE, TX Jesse founded 360Works in 1996 Primary or original
More informationAWS IoT Overview. July 2016 Thomas Jones, Partner Solutions Architect
AWS IoT Overview July 2016 Thomas Jones, Partner Solutions Architect AWS customers are connecting physical things to the cloud in every industry imaginable. Healthcare and Life Sciences Municipal Infrastructure
More information4) An organization needs a data store to handle the following data types and access patterns:
1) A company needs to deploy a data lake solution for their data scientists in which all company data is accessible and stored in a central S3 bucket. The company segregates the data by business unit,
More informationBuilding Games with AWS Mobile Services
Building Games with AWS Mobile Services Ozkan Can Solutions Architect, AWS @_ozkancan How Do You Build a Mobile Game Today? AWS LAMBDA COMPUTE SERVICE EVENT DRIVEN Run code without thinking about servers
More informationAWS Security Overview. Bill Shinn Principal Security Solutions Architect
AWS Security Overview Bill Shinn Principal Security Solutions Architect Accelerating Security with AWS AWS Overview / Risk Management / Compliance Overview Identity / Privilege Isolation Roles for EC2
More informationZombie Apocalypse Workshop
Zombie Apocalypse Workshop Building Serverless Microservices Danilo Poccia @danilop Paolo Latella @LatellaPaolo September 22 nd, 2016 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
More informationSecuring Serverless Architectures
Securing Serverless Architectures Dave Walker, Specialist Solutions Architect, Security and Compliance Berlin 12/04/16 2016, Web Services, Inc. or its Affiliates. All rights reserved. With Thanks To: Agenda
More informationHow to use or not use the AWS API Gateway for Microservices
How to use or not use the AWS API Gateway for Microservices Presented by Dr. Martin Merck Wednesday 26 September 2018 What is an API Gateway Traits AWS API Gateway Features of API gateway OAuth2.0 Agenda
More informationServerless Computing. Redefining the Cloud. Roger S. Barga, Ph.D. General Manager Amazon Web Services
Serverless Computing Redefining the Cloud Roger S. Barga, Ph.D. General Manager Amazon Web Services Technology Triggers Highly Recommended http://a16z.com/2016/12/16/the-end-of-cloud-computing/ Serverless
More informationGoing Serverless. Building Production Applications Without Managing Infrastructure
Going Serverless Building Production Applications Without Managing Infrastructure Objectives of this talk Outline what serverless means Discuss AWS Lambda and its considerations Delve into common application
More informationTitle: Planning AWS Platform Security Assessment?
Title: Planning AWS Platform Security Assessment? Name: Rajib Das IOU: Cyber Security Practices TCS Emp ID: 231462 Introduction Now-a-days most of the customers are working in AWS platform or planning
More informationSecurity Aspekts on Services for Serverless Architectures. Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance
Security Aspekts on Services for Serverless Architectures Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Security in General Services in Scope Aspects of Services for
More informationThe Orion Papers. AWS Solutions Architect (Associate) Exam Course Manual. Enter
AWS Solutions Architect (Associate) Exam Course Manual Enter Linux Academy Keller, Texas United States of America March 31, 2017 To All Linux Academy Students: Welcome to Linux Academy's AWS Certified
More informationRed Team View: Gaps in the Serverless Attack Surface.
SESSION ID: CSV-W12 Red Team View: Gaps in the Serverless Attack Surface. Mike Cotton SVP Research & Development Digital Defense Inc. Overview Shift in Technology -> Shift in Tactics Serverless Another
More informationAdvanced Usage of the AWS CLI. Brian Wagner, Solutions Architect
Berlin Advanced Usage of the AWS CLI Brian Wagner, Solutions Architect Crash Course Intro to the AWS CLI Foundation Exploring Key Functionality Advanced Scenarios Looking at Advanced CLI Features Crash
More informationSAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING
SAMPLE CHAPTER Event-driven serverless applications Danilo Poccia FOREWORD BY James Governor MANNING AWS Lambda in Action by Danilo Poccia Chapter 8 Copyright 2017 Manning Publications brief contents PART
More informationShine and Security. Our app is playful and encourages sharing, but we take keeping this information secure very seriously.
Shine and Security Shine and Security Shine users entrust us with keeping track of the everyday actions they take to help them better themselves, their community and our planet. Putting our users first
More informationQuick start guide for Infscape UrBackup Appliance on Amazon Web Services
Quick start guide for Infscape UrBackup Appliance on Amazon Web Services Purpose of this document This document will give detailed step-by-step instructions on how to get Infscape UrBackup Appliance running
More information2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG January 2016 Page 1 of 8
2016 Infoblox Inc. All rights reserved. Implementing AWS Route 53 Synchronization Infoblox-DG-0136-00 January 2016 Page 1 of 8 Contents Introduction... 3 Infoblox and Route 53 Synchronization... 3 Prerequisites...
More information8/3/17. Encryption and Decryption centralized Single point of contact First line of defense. Bishop
Bishop Encryption and Decryption centralized Single point of contact First line of defense If working with VPC Creation and management of security groups Provides additional networking and security options
More informationIoT Device Simulator
IoT Device Simulator AWS Implementation Guide Sean Senior May 2018 Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. IoT Device Simulator is licensed under the terms of the Amazon Software License
More informationAdvanced API Security
Advanced API Security ITANA Group Nuwan Dias Architect 22/06/2017 Agenda 2 HTTP Basic Authentication Authorization: Basic QWxhZGRpbjpPcGVuU2VzYW1l 3 API Security is about controlling Access Delegation
More informationBuilding Secure and Scalable Mobile Apps on AWS
Building Secure and Scalable Mobile Apps on AWS Dennis Hills Mobile Developer Advocate, Amazon Web Services April 20, 2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda
More informationAmazon Mobile Analytics. User Guide
Amazon Mobile Analytics User Guide Amazon Mobile Analytics: User Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be
More informationCloud Catastrophes. and how to avoid them
Cloud Catastrophes and how to avoid them Who? Mike Haworth Nope Works for: Insomnia Security Bio: Extensive biographical information Extensive biographical information Extensive biographical information
More informationUsing OAuth 2.0 to Access ionbiz APIs
Using OAuth 2.0 to Access ionbiz APIs ionbiz APIs use the OAuth 2.0 protocol for authentication and authorization. ionbiz supports common OAuth 2.0 scenarios such as those for web server, installed, and
More informationAdministrator Guide Administrator Guide
AutobotAI account setup process with AWS account linking In order to provide AWS account access to autobotai skill, It has to be configured in https://autobot.live portal. Currently only one account can
More informationDatto Disaster Tracking
Datto Disaster Tracking Design/Architecture Document Masters of Disaster Nsama Chipalo, Brandon Cole, Aaron Damrau, Jhossue Jimenez, Jacob Peterson Last Updated May 11th, 2015 Table of Contents Table of
More informationEXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS E-BOOK
EXTENDING SINGLE SIGN-ON TO AMAZON WEB SERVICES BEST PRACTICES FOR IDENTITY FEDERATION IN AWS 03 EXECUTIVE OVERVIEW 05 INTRODUCTION 07 MORE CLOUD DEPLOYMENTS MEANS MORE ACCESS 09 IDENTITY FEDERATION IN
More informationAmazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India
(AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.
More informationBERLIN. 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved
BERLIN 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Building Multi-Region Applications Jan Metzner, Solutions Architect Brian Wagner, Solutions Architect 2015, Amazon Web Services,
More informationAWS Mobile Hub. Build, Test, and Monitor Your Mobile Apps. Daniel Geske, Solutions Architect 31 May 2017
AWS Mobile Hub Build, Test, and Monitor Your Mobile Apps Daniel Geske, Solutions Architect 31 May 2017 2017, Amazon Web Services, Inc. or its Affiliates. All rights reserved. What to Expect from the Session
More informationDevelop and test your Mobile App faster on AWS
Develop and test your Mobile App faster on AWS Carlos Sanchiz, Solutions Architect @xcarlosx26 #AWSSummit 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. The best mobile apps are
More informationOverview of AWS Security - Database Services
Overview of AWS Security - Database Services June 2016 (Please consult http://aws.amazon.com/security/ for the latest version of this paper) 2016, Amazon Web Services, Inc. or its affiliates. All rights
More informationAWS SDK for Node.js. Getting Started Guide Version pre.1 (developer preview)
AWS SDK for Node.js Getting Started Guide Amazon Web Services AWS SDK for Node.js: Getting Started Guide Amazon Web Services Copyright 2012 Amazon Web Services LLC or its affiliates. All rights reserved.
More informationAuthorization and Authentication
CHAPTER 2 Cisco WebEx Social API requests must come through an authorized API consumer and be issued by an authenticated Cisco WebEx Social user. The Cisco WebEx Social API uses the Open Authorization
More informationPackage aws.transcribe
Type Package Title Client for 'AWS Transcribe' Version 0.1.2 Date 2018-04-09 Package aws.transcribe April 9, 2018 Client for 'AWS Transcribe' , a cloud
More informationBest Practices for Cloud Security at Scale. Phil Rodrigues Security Solutions Architect Amazon Web Services, ANZ
Best Practices for Cloud Security at Scale Phil Rodrigues Security Solutions Architect Web Services, ANZ www.cloudsec.com #CLOUDSEC Best Practices for Security at Scale Best of the Best tips for Security
More informationLab 2 Third Party API Integration, Cloud Deployment & Benchmarking
Lab 2 Third Party API Integration, Cloud Deployment & Benchmarking In lab 1, you have setup the web framework and the crawler. In this lab, you will complete the deployment flow for launching a web application
More informationAmazon Cognito Sync. API Reference API Version
Amazon Cognito Sync API Reference Amazon Cognito Sync: API Reference Copyright 2014 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. The following are trademarks of Amazon Web Services,
More informationSecuring Microservices Containerized Security in AWS
Securing Microservices Containerized Security in AWS Mike Gillespie, Solutions Architect, Amazon Web Services Splitting Monoliths Ten Years Ago Splitting Monoliths Ten Years Ago XML & SOAP Splitting Monoliths
More informationMOBILE APP FOR ACME INC. by Sean Hull - Cloud Solutions Architect -
MOBILE APP FOR ACME INC. by Sean Hull - Cloud Solutions Architect - sean@iheavy.com ABOUT SEAN HULL +1-917-442-3939 sean@iheavy.com iheavy.com/blog about.me/hullsean github.com/hullsean NEWSLETTER - SIGNUP!
More informationMicroservices without the Servers: AWS Lambda in Action
Microservices without the Servers: AWS Lambda in Action Dr. Tim Wagner, General Manager AWS Lambda August 19, 2015 Seattle, WA 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Two
More informationHigh School Technology Services myhsts.org Certification Courses
AWS Associate certification training Last updated on June 2017 a- AWS Certified Solutions Architect (40 hours) Amazon Web Services (AWS) Certification is fast becoming the must have certificates for any
More informationServerless Single Page Web Apps, Part Four. CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016
Serverless Single Page Web Apps, Part Four CSCI 5828: Foundations of Software Engineering Lecture 24 11/10/2016 1 Goals Cover Chapter 4 of Serverless Single Page Web Apps by Ben Rady Present the issues
More informationAWS Mobile Services 7/7/2014. Marco Argenti, Vice President
AWS Mobile Services 7/7/2014 Marco Argenti, Vice President Agenda AWS Overview AWS Mobile Services Overview Amazon Cognito Amazon Mobile Analytics Amazon SNS Pricing/Availability Q&A 7/7/2014 Slides not
More informationGetting Started with AWS IoT
Getting Started with AWS IoT Denis V. Batalov, PhD @dbatalov Sr. Solutions Architect, AWS EMEA 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Things are becoming connected Source:
More informationAmazon WorkDocs. Developer Guide
Amazon WorkDocs Developer Guide Amazon WorkDocs: Developer Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used
More informationContainer-Native Applications
Container-Native Applications Security, Logging, Tracing Matthias Fuchs, @hias222 DOAG 2018 Exa & Middleware Days, 2018/06/19 Microservice Example Flow Oracle Cloud Details Logging Security, OAuth, TLS
More informationCrypto-Options on AWS. Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH
Crypto-Options on AWS Bertram Dorn Specialized Solutions Architect Security/Compliance Network/Databases Amazon Web Services Germany GmbH Amazon.com, Inc. and its affiliates. All rights reserved. Agenda
More informationHow to ensure OpenStack Swift & Amazon S3 Conformance for storage products & services supporting multiple Object APIs
How to ensure OpenStack Swift & Amazon S3 Conformance for storage products & services supporting multiple Object APIs Ankit Agrawal Tata Consultancy Services Ltd. 30 May 2017 1 Copyright 2017 Tata Consultancy
More informationQualys Cloud Platform (VM, PC) v8.x Release Notes
Qualys Cloud Platform (VM, PC) v8.x Release Notes Version 8.18.1 April 1, 2019 This new release of the Qualys Cloud Platform (VM, PC) includes improvements to Vulnerability Management and Policy Compliance.
More informationManaging and Auditing Organizational Migration to the Cloud TELASA SECURITY
Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting
More informationAt Course Completion Prepares you as per certification requirements for AWS Developer Associate.
[AWS-DAW]: AWS Cloud Developer Associate Workshop Length Delivery Method : 4 days : Instructor-led (Classroom) At Course Completion Prepares you as per certification requirements for AWS Developer Associate.
More informationTestkingPass. Reliable test dumps & stable pass king & valid test questions
TestkingPass http://www.testkingpass.com Reliable test dumps & stable pass king & valid test questions Exam : AWS-Solutions-Architect- Associate Title : AWS Certified Solutions Architect - Associate Vendor
More informationManaging Protected and Controlled Data with Globus. Vas Vasiliadis
Managing Protected and Controlled Data with Globus Vas Vasiliadis vas@uchicago.edu Globus SaaS: Research data lifecycle Instrument 1 Researcher initiates transfer request; or requested automatically by
More informationSingle Sign-On Showdown
Single Sign-On Showdown ADFS vs Pass-Through Authentication Max Fritz Solutions Architect SADA Systems #ITDEVCONNECTIONS Azure AD Identity Sync & Auth Timeline 2009 2012 DirSync becomes Azure AD Sync 2013
More informationPowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility
PowerExchange for Facebook: How to Configure Open Authentication using the OAuth Utility 2013 Informatica Corporation. No part of this document may be reproduced or transmitted in any form, by any means
More informationCertificate of Registration
Certificate of Registration THIS IS TO CERTIFY THAT 2001 8th Ave, Seattle, WA 98121 USA operates AWS using IaaS model (Amazon CloudFront, Amazon Elastic Block Store (EBS), Amazon Elastic Compute Cloud
More informationSecurity on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance
Security on AWS(overview) Bertram Dorn EMEA Specialized Solutions Architect Security and Compliance Agenda: Overview AWS Regions Availability Zones Shared Responsibility Security Features Best Practices
More informationJan Metzner. Solutions Architect Mobile/IoT EMEA, Amazon Web Services. 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Jan Metzner Solutions Architect Mobile/IoT EMEA, Amazon Web Services 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Welche Themen werden wir in diesem Webinar behandeln? Authentifizierung
More informationOffice 365 and Azure Active Directory Identities In-depth
Office 365 and Azure Active Directory Identities In-depth Jethro Seghers Program Director SkySync #ITDEVCONNECTIONS ITDEVCONNECTIONS.COM Agenda Introduction Identities Different forms of authentication
More informationLeveraging the Globus Platform in your Web Applications. GlobusWorld April 26, 2018 Greg Nawrocki
Leveraging the Globus Platform in your Web Applications GlobusWorld April 26, 2018 Greg Nawrocki greg@globus.org Topics and Goals Platform Overview Why expose the APIs A quick touch of the Globus Auth
More informationHow to Route Internet Traffic between A Mobile Application and IoT Device?
Whitepaper How to Route Internet Traffic between A Mobile Application and IoT Device? Website: www.mobodexter.com www.paasmer.co 1 Table of Contents 1. Introduction 3 2. Approach: 1 Uses AWS IoT Setup
More informationIntegration Guide. SafeNet Authentication Service (SAS)
Integration Guide SafeNet Authentication Service (SAS) Revised: 10 June 2016 About This Guide Guide Type Documented Integration WatchGuard or a Technology Partner has provided documentation demonstrating
More informationAWS Connected Vehicle Cloud
AWS Connected Vehicle Cloud AWS Implementation Guide Sean Senior Chris Rec Hitendra Nishar Tom Horton November 2017 Copyright (c) 2017 by Amazon.com, Inc. or its affiliates. The AWS Connected Vehicle Cloud
More informationServerless Architecture Hochskalierbare Anwendungen ohne Server. Sascha Möllering, Solutions Architect
Serverless Architecture Hochskalierbare Anwendungen ohne Server Sascha Möllering, Solutions Architect Agenda Serverless Architecture AWS Lambda Amazon API Gateway Amazon DynamoDB Amazon S3 Serverless Framework
More informationViGo Architecture and Principles. Mobile Voice Biometrics as-a-service
ViGo Architecture and Principles Mobile Voice Biometrics as-a-service Part number: VV/VIGO/DOC/183/C Copyright 2015 VoiceVault Inc. All rights reserved. This document may not be copied, reproduced, transmitted
More informationDigital Democracy Video Manager
Digital Democracy Video Manager by Scott Lam Computer Science Department College of Engineering California Polytechnic State University 2016 Date Submitted: March 18, 2016 Advisor: Alex Dekhtyar Table
More informationAWS IAM User Guide for Cohesive Networks Support. Creating an Amazon Identity and Access Management User with "read only" policy
AWS IAM User Guide for Cohesive Networks Support Creating an Amazon Identity and Access Management User with "read only" policy 2016 Table of Contents Access the AWS IAM Service via AWS Portal 3 Create
More informationSophos Mobile Control Network Access Control interface guide. Product version: 7
Sophos Mobile Control Network Access Control interface guide Product version: 7 Document date: January 2017 Contents 1 About this guide...3 2 About Sophos Mobile Control...4 3 Sophos Mobile Control NAC
More informationThomson Reuters Graph Feed & Amazon Neptune
Thomson Reuters Graph Feed & Amazon Neptune Tutorial on how to use Amazon Neptune as a graph-database alternative to explore Thomson Reuters Graph Feed. Pratik Pandey Jan 24th, 2018 End of November last
More informationExam Questions AWS-Certified- Developer-Associate
Exam Questions AWS-Certified- Developer-Associate Amazon AWS Certified Developer Associate https://www.2passeasy.com/dumps/aws-certified- Developer-Associate/ 1. When using Amazon SQS how much data can
More informationAmazon AWS-Solutions-Architect-Professional Exam
Volume: 392 Questions Question: 1 By default, Amazon Cognito maintains the last-written version of the data. You can override this behavior and resolve data conflicts programmatically. In addition, push
More informationLevel Up Your CF Apps with Amazon Web Services
Level Up Your CF Apps with Amazon Web Services Brian Klaas bklaas@jhu.edu @brian_klaas Level Up Your CF Apps with Amazon Web Services Brian Klaas bklaas@jhu.edu @brian_klaas Hello Hello Hello Hello Hello
More information20537A: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack
20537A: Configuring and Operating a Hybrid Cloud with Course Details Course Code: Duration: Notes: 20537A 5 days Elements of this syllabus are subject to change. About this course This five-day course
More informationForeScout CounterACT. (AWS) Plugin. Configuration Guide. Version 1.3
ForeScout CounterACT Hybrid Cloud Module: Amazon Web Services (AWS) Plugin Version 1.3 Table of Contents Amazon Web Services Plugin Overview... 4 Use Cases... 5 Providing Consolidated Visibility... 5 Dynamic
More informationInstallation and Configuration Guide Simba Technologies Inc.
Simba Athena ODBC Driver with SQL Connector Installation and Configuration Guide Simba Technologies Inc. Version 1.0.2 December 11, 2017 Copyright 2017 Simba Technologies Inc. All Rights Reserved. Information
More informationSAMPLE CHAPTER. Event-driven serverless applications. Danilo Poccia. FOREWORD BY James Governor MANNING
SAMPLE CHAPTER Event-driven serverless applications Danilo Poccia FOREWORD BY James Governor MANNING in Action by Danilo Poccia Chapter 1 Copyright 2017 Manning Publications brief contents PART 1 FIRST
More informationServerless The Future of the Cloud?!
DEV4867 Serverless The Future of the Cloud?! by Bert Ertman Those who stand for nothing, fall for anything - Alexander Hamilton @BertErtman Fellow, Director of Technology Outreach at Luminis Background
More informationAre You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus
Are You Sure Your AWS Cloud Is Secure? Alan Williamson Solution Architect at TriNimbus 1 60 Second AWS Security Review 2 AWS Terminology Identity and Access Management (IAM) - AWS Security Service to manage
More informationContainers or Serverless? Mike Gillespie Solutions Architect, AWS Solutions Architecture
Containers or Serverless? Mike Gillespie Solutions Architect, AWS Solutions Architecture A Typical Application with Microservices Client Webapp Webapp Webapp Greeting Greeting Greeting Name Name Name Microservice
More informationSimple Security for Startups. Mark Bate, AWS Solutions Architect
BERLIN Simple Security for Startups Mark Bate, AWS Solutions Architect Agenda Our Security Compliance Your Security Account Management (the keys to the kingdom) Service Isolation Visibility and Auditing
More informationAmazon WorkDocs. Administration Guide
Amazon WorkDocs Administration Guide Amazon WorkDocs: Administration Guide Copyright 2018 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not
More informationQuestion: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.)
Volume: 91 Questions Question: 1 Which three methods can you use to manage Oracle Cloud Infrastructure services? (Choose three.) A. Oracle Cloud Infrastructure Desktop Client B. Oracle Cloud Infrastructure
More informationUnified Secure Access Beyond VPN
Unified Secure Access Beyond VPN Luboš Klokner F5 Systems Engineer lubos@f5.com +421 908 755152 @lklokner Humans v. Technology F5 Networks, Inc Agenda Introduction General APM Use-Cases APM Use-Cases from
More informationNasuni Data API Nasuni Corporation Boston, MA
Nasuni Corporation Boston, MA Introduction The Nasuni API has been available in the Nasuni Filer since September 2012 (version 4.0.1) and is in use by hundreds of mobile clients worldwide. Previously,
More informationOAuth2lib. implementation
OAuth2lib http://tools.ietf.org/html/ietf-oauth-v2-08 implementation 24 Junio 2010 Índice de contenido Oauth2lib v05...1 Introduction...3 Documentation...4 OAuth2 Assertion Flow...4 Authorization Flow...4
More informationWHITEPAPER. Security overview. podio.com
WHITEPAPER Security overview Podio security White Paper 2 Podio, a cloud service brought to you by Citrix, provides a secure collaborative work platform for team and project management. Podio features
More informationInstallation and Configuration Guide Simba Technologies Inc.
Simba Athena ODBC Driver with SQL Connector Installation and Configuration Guide Simba Technologies Inc. Version 1.0.4 November 14, 2018 Copyright 2018 Simba Technologies Inc. All Rights Reserved. Information
More information70-487: Developing Windows Azure and Web Services
70-487: Developing Windows Azure and Web Services Candidates for this certification are professional developers that use Visual Studio 2015112017 11 and the Microsoft.NET Core Framework 4.5 to design and
More informationDeveloping Microsoft Azure Solutions (70-532) Syllabus
Developing Microsoft Azure Solutions (70-532) Syllabus Cloud Computing Introduction What is Cloud Computing Cloud Characteristics Cloud Computing Service Models Deployment Models in Cloud Computing Advantages
More informationTestbed-12 TEAM Engine Virtualization User Guide
Testbed-12 TEAM Engine Virtualization User Guide Table of Contents 1. Introduction............................................................................. 3 2. VirtualBox...............................................................................
More informationRSA NetWitness Platform
RSA NetWitness Platform AWS CloudTrail Last Modified: Tuesday, May 1, 2018 Event Source Product Information: Vendor: Amazon Web Services Event Source: AWS CloudTrail Versions: all RSA Product Information:
More informationMxVision WeatherSentry Web Services REST Programming Guide
MxVision WeatherSentry Web Services REST Programming Guide DTN 11400 Rupp Drive Minneapolis, MN 55337 00.1.952.890.0609 This document and the software it describes are copyrighted with all rights reserved.
More informationAWS Storage Gateway. Not your father s hybrid storage. University of Arizona IT Summit October 23, Jay Vagalatos, AWS Solutions Architect
AWS Storage Gateway Not your father s hybrid storage University of Arizona IT Summit 2017 Jay Vagalatos, AWS Solutions Architect October 23, 2017 The AWS Storage Portfolio Amazon EBS (persistent) Block
More informationCloud Gaming Architectures
Cloud Gaming Architectures From Social to Mobile to MMO Mark Bate, AWS Solutions Architect 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Gratuitous logo slide Scale to what you
More informationflask-dynamo Documentation
flask-dynamo Documentation Release 0.1.2 Randall Degges January 22, 2018 Contents 1 User s Guide 3 1.1 Quickstart................................................ 3 1.2 Getting Help...............................................
More informationCourse Overview This five-day course will provide participants with the key knowledge required to deploy and configure Microsoft Azure Stack.
[MS20537]: Configuring and Operating a Hybrid Cloud with Microsoft Azure Stack Length : 5 Days Audience(s) : IT Professionals Level : 300 Technology : Azure Delivery Method : Instructor-led (Classroom)
More informationVULNERABILITY ADVISORY
VULNERABILITY ADVISORY Title ManageEngine OpManager Multiple Authenticated RCE Vulnerabilities Date Released 19/06/2018 Author Vendor Website Affected Software Denis Andzakovic https://www.manageengine.com/network-monitoring/
More information