Introduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS

Size: px
Start display at page:

Download "Introduction to AWS GoldBase. A Solution to Automate Security, Compliance, and Governance in AWS"

Transcription

1 Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS September 2015

2 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date of issue of this document, which are subject to change without notice. Customers are responsible for making their own independent assessment of the information in this document and any use of AWS s products or services, each of which is provided as is without warranty of any kind, whether express or implied. This document does not create any warranties, representations, contractual commitments, conditions or assurances from AWS, its affiliates, suppliers or licensors. The responsibilities and liabilities of AWS to its customers are controlled by AWS agreements, and this document is not part of, nor does it modify, any agreement between AWS and its customers. Page 2 of 17

3 Contents Abstract 3 Architecting for Compliance in AWS 4 Compliance in the Enterprise 4 Compliance Standards 4 AWS GoldBase in AWS 5 Benefits 5 AWS GoldBase Package 6 AWS GoldBase Delivery 8 Automating Compliance with AWS GoldBase 9 Example Use Case: Tiered Web Application 12 Conclusion 16 Contributors 17 Notes 17 Abstract This document describes the AWS GoldBase offering from Amazon Web Services (AWS) and the benefits it can provide to customers. AWS GoldBase is a joint offering from AWS Risk & Compliance and AWS Professional Services to provide customers with pre-validated, deployable AWS configurations which adhere to specific customer compliance requirements. This solution can streamline and simplify application deployment in AWS. It allows you to automate standardized reference architectures that meet AWS best practices and customer compliance requirements. This approach allows for a repeatable process that you can use to ensure compliant configuration of AWS resources in the cloud while reducing the time needed to approve applications for production use. Page 3 of 17

4 Architecting for Compliance in AWS Compliance in the Enterprise Compliance is a broad term used within technology and business. The simplest definition of comply is to meet specified standards. 1 Ensuring compliance in the enterprise includes adhering to the following standards: Third Party Assurance Frameworks Standards established within the customer organization AWS best practices Within the context of deploying applications on AWS, compliance will incorporate the concepts of secure, available, and scalable technology. Compliance Standards The AWS Shared Responsibility Model 2 puts the final responsibility for system security on the customer. AWS provides many different options and controls for building a highly secure application in the cloud. Customers must be able to ensure their architectures meet the compliance requirements of their organization. Examples of compliance standards that have unique requirements include the following: NIST SP The Special Publication (SP) published by the National Institute of Standards and Technology (NIST) is a catalog of security controls that most U.S. federal agencies must comply with and that are widely used within private-sector enterprises. ICD 503 The security requirements and accreditation of this Intelligence Community Directive (ICD) apply to the intelligence community; it s based on NIST SP security controls. Page 4 of 17

5 FedRAMP 4 The Federal Risk and Authorization Program (FedRAMP) is a U.S. Government program for ensuring standards in security assessment, authorization, and continuous monitoring. DoD Cloud Security Model (CSM) 5 Standards for cloud computing issued by the Defense Information Systems Agency (DISA) and documented in the U.S. Department of Defense (DoD) Security Requirements Guide (SRG). HIPAA 6 The Health Insurance Portability and Accountability Act (HIPAA) standards must be followed by any organization processing or storing Protected Health Information (PHI). ISO International Organization for Standardization (ISO) is a widely adopted global security standard that outlines the requirements for information security management systems. CJIS Security Policy 8 Criminal Justice Information Services (CJIS) security policies are guidelines for state, local, and federal law enforcement agencies that follow the NIST SP standards. PCI DSS 9 Payment Card Industry (PCI) Data Security Standard (DSS) are standards for merchants who process credit card payments that require strict security standards to protect cardholder data. AWS GoldBase in AWS In AWS, AWS GoldBase is a packaged solution to help customers streamline, automate, and implement the entire process of application deployment on AWS from initial design to operational readiness. AWS GoldBase incorporates the expertise of AWS solutions architects that is required to build a secure and reliable architecture in an easy-to-implement package that automates the process. Benefits Security controls compliance Reduced time to production deployment Transparency and support for continuous monitoring Page 5 of 17

6 Ease of deployment through automation Decreased level of effort in architectural decisions Standardization based on best practices AWS GoldBase Package The AWS GoldBase package includes the following four items for customer use: Security Controls Implementation Matrix Architecture diagrams AWS CloudFormation templates User Guide with deployment instructions Security Controls Implementation Matrix The AWS GoldBase package includes an Excel formatted security controls implementation matrix that maps features and resources to specific controls based on the required compliance standard of a customer. Security and risk evaluators use this document as a reference that makes accrediting a system easier when it is deployed in AWS. The matrix describes which controls a reference architecture meets and reduces the number of total security controls for which the application owner is ultimately responsible. Figure 1: Snippet of a section of the matrix that describes how a reference architecture applies to sections of the NIST SP controls Page 6 of 17

7 Architectural Diagrams Architectural diagrams in PowerPoint or Visio are included with the package. These diagrams illustrate and document the design of the use case. They provide a visual reference that demonstrates the components deployed by the AWS CloudFormation templates. This accompanies the description of security features implemented by the AWS GoldBase templates. Figure 2: Sample architectural diagrams showing base AWS components deployed by the templates AWS CloudFormation Templates The AWS GoldBase AWS CloudFormation templates allow for a fully automated deployment of a compliant architecture. The default AWS CloudFormation package consists of four JSON template files (AWS CloudFormation stacks): Page 7 of 17

8 Figure 3: AWS CloudFormation stacks An additional template file, main.json, is the entry point from which the set of stacks are launched. This design provides modularity, which enables the ability to deploy a subset of resources if needed. The design facilitates reusability of templates for multiple use cases. A AWS GoldBase use case package consists of a main.json along with all required nested stacks. User Guide with Deployment Instructions The AWS GoldBase package includes a user guide that provides step-by-step instructions on how to deploy an application in AWS using the AWS CloudFormation templates. The user guide also contains information on how to customize the package to meet customer requirements. AWS GoldBase Delivery Existing AWS GoldBase packages can be provided directly to customers and used as a starting point. The AWS GoldBase packages can be customized to meet the deployment needs of specific applications. The existing AWS CloudFormation Page 8 of 17

9 templates and related documentation can be updated to match specific use cases within the customer organization. Custom Built Packages The AWS GoldBase package can be offered as a customized deliverable to customers working with AWS Professional Services or a qualified Amazon Partner Network (APN) partner. AWS or partner resources can work with the customers to accomplish all the following necessary steps for providing a complete working solution: 1. Identifying common use cases along with security and compliance requirements. 2. Designing a base architecture based on one or more common use cases. 3. Building an automated solution using AWS CloudFormation templates, documentation, security controls matrix, and related artifacts. 4. Validating and testing the AWS GoldBase package. Automating Compliance with AWS GoldBase AWS provides customers with the capability to develop and manage infrastructure as code. The AWS GoldBase solution automates the deployment of compliant architectures. It can be used in conjunction with other services and solutions to deliver a truly automated infrastructure that meets the compliance and governance requirements of the customer organization. Multiple Layers of Compliance The AWS GoldBase package provides for the ability to customize levels of automation beyond AWS resources. The following additional layers of compliance can be integrated with AWS GoldBase: Custom AMIs The AWS GoldBase package provides the capability to enforce the use of pre-built golden baseline AMIs when deploying applications. Custom Page 9 of 17

10 Amazon Machine Images (AMIs) can be centrally managed and updated based on compliance requirements related to Configuration Management (CM). Configuration Management EC2 instances deployed by the Trusted Architect templates can be bootstrapped to automatically integrate with centrally managed Configuration Management (CM) solutions such as Chef, Puppet, or Ansible which can apply hardening scripts upon deployment and ensure a consistent instance-level configuration which meets compliance requirements. Containerization Containers allow one or more applications to run independently on a single instance within an isolated user space. Securityhardened containers used by the Amazon EC2 Container Service (Amazon ECS) or Docker can be deployed using the Trusted Architect template package through additional customization at the instance level. Continuous Monitoring Trusted Architect can automate and enforce the use of features such as AWS CloudTrail, Amazon CloudWatch, and centralized logging of applications to Amazon S3 buckets. It can also ensure instances are using the Host Based Security System (HBSS) and application VPCs are accessible via peering to centrally managed security VPCs for additional monitoring capabilities. AWS GoldBase and AWS Service Catalog The AWS Service Catalog allows administrators to create and manage approved catalogs of resources that end users can access via a personalized portal. 10 AWS Service Catalog allows the creation of portfolios of one or more products that AWS end users and workload owners can launch. The AWS GoldBase template package can be delivered to workload owners and application developers as an AWS Service Catalog product. Product Each template package, based on a use case, can be a product in the form of a single AWS CloudFormation template which can include additional nested templates to deploy and automate the configuration of an AWS architecture or application. Page 10 of 17

11 Portfolios A portfolio consists of one or more products, which can have common tags and constraints applied. Portfolios can include products for different types of use cases and can be organized by compliance type. Permissions End users and workload owners specified in the AWS Identity and Access Management (IAM) service can be given permission to access portfolios based on the level of access that they need and what they need to deploy. Constraints Constraints are granular controls applied at a portfolio or product level that restrict the ways that resources can be deployed. Constraints can be used to allow templates to deploy all resources at an administrator level of access while limiting permissions to certain resources for workload owners. Tags Tagging can be enforced at the portfolio or product level, by providing custom tags for controlling access to resources or for cost allocation. Benefits of using AWS GoldBase with AWS Service Catalog include the following: A complete storefront capability for delivering applications to end users and workload owners Ease of use in deployment and management of AWS Service Catalog products Enforcement of existing separation of duties and access controls which adhere to the customer s governance model Standardization in design of AWS Service Catalog products Simplification of developing and updating AWS Service Catalog products Continuous Integration/Continuous Delivery (CI/CD) capabilities of AWS Service Catalog products that meet compliance and best practices AWS GoldBase and DevOps DevOps incorporates principles, practices, and methods that allow integration between software development and IT operations. 11 Tools and methods for automation, continuous delivery, monitoring, and security are key to developing DevOps practices. AWS GoldBase provides a use case package for both Page 11 of 17

12 infrastructure and application components that can be developed, deployed, and managed with the same DevOps principles as any software application. Example: AWS GoldBase Lifecycle Using AWS Service Catalog The example in Figure 4 illustrates the concept of CI/CD in a centralized governance model using AWS Service Catalog and AWS GoldBase. The workload owners use the AWS Service Catalog portal as a storefront to deploy complete workloads. AWS Service Catalog products are AWS GoldBase template packages that are managed by a central provisioning team. Figure 4: CI/CD using AWS Service Catalog and AWS GoldBase AWS GoldBase is managed using a source code repository such as Git or AWS CodeCommit while integration is handled by a continuous integration (CI) server, such as Jenkins. A new commit triggers an automated build of the architecture and/or application in a test account that can be fully validated for compliance and security before being pushed as an update to the AWS Service Catalog product. Example Use Case: Tiered Web Application In the example in Figure 5, a AWS GoldBase package has been designed for the reusable deployment of a three-tier web application. In this simple use case, the Page 12 of 17

13 application consists of Amazon Virtual Private Cloud VPCs for both production and management use. Instances are placed in separate private and public subnets depending on where they will be accessed. An Internet gateway allows application end users access to the web instances from the Internet. The management VPC is strictly for developer and administrator use and is accessed through the customer network via a virtual private network (VPN) gateway. Deployment Figure 5: Example three-tier web application AWS CloudFormation templates provide automation. For configuration at the Amazon Elastic Compute Cloud (EC2) level, specify user data in the templates to bootstrap additional application configuration. In this example, Amazon EC2 configuration takes place by simply using user data scripts. Alternatively, instances can be bootstrapped to pull configuration from another source, such as a Chef server. Deployment of the entire package follows an organized sequence automatically by how the CloudFormation templates are structured. Deployment of this sample package follows these steps: 1. IAM users, roles, groups, and policies are created; CloudTrail and logging to an Amazon S3 bucket are enabled. 2. Amazon VPC architecture is deployed complete with subnets, gateways, NACLs, route tables, and NAT instances. Page 13 of 17

14 3. Security groups, Amazon S3 buckets, and Elastic Load Balancing (ELB) load balancers are created. 4. EC2 instances and an Amazon Relational Database Service (RDS) database are deployed. a. EC2 instances are launched using user-specified Amazon Machine Images (AMIs). b. An Amazon RDS database is created with user-specified size, type, and capacity. c. User data scripts install the latest version and configuration of software on EC2 instances. d. App instances are configured to connect to the Amazon RDS database. Deployment Options Workload owners can use parameters to customize the architecture on deployment based on their specific application requirements. The templates are designed so that different applications with similar architectures can be deployed using the same package. Page 14 of 17

15 Parameter Description Conditional createvpcmanagement Option to specify whether or not to create Management VPC If true, creates Management VPC. createvpcdevelopment Option to specify whether or not to create Development VPC If true, creates Development VPC. Stack1URL S3 URL of Stack1 template If blank, existing IAM/security config already deployed. Stack2URL S3 URL of Stack2 template If blank, VPC networking already deployed. Stack3URL S3 URL of Stack3 template If blank, does not deploy Stack3 resources. Stack4URL S3 URL of Stack4 template If blank, does not deploy any instancelevel resources. Example of parameter-specified deployment options Compliance with Third Party Assurance Frameworks In this example, the customer must comply with the NIST SP control set. The controls provide requirements that must be met from the system (application) level or from the use of common services. The following is an example control from the Boundary Protection NIST control family: SC-07(2) BOUNDARY PROTECTION (2) The information system prevents public access into the organization s internal networks except as appropriately mediated by managed interfaces employing boundary protection devices. Page 15 of 17

16 The documentation included with this automation package provides the following description, including the names of AWS CloudFormation resources, of how this control works at the AWS architecture level: ROUTE TABLES (rtbproductionpublic, rtbmanagement) and security groups limit public traffic to the public subnet and private traffic to the private subnet. Conclusion Developing an automated solution for compliance can reduce the cost, time, and effort to deploy applications in AWS while minimizing risk and simplifying architectural design. AWS GoldBase provides enterprise customers with an easyto-use, customized solution that alleviates the challenges of architecting for the cloud while reducing the level of effort normally required to build such a solution from scratch. Page 16 of 17

17 Contributors The following individuals contributed to this document: Mike Dixon, Consultant, AWS Public Sector Lou Vecchioni, Senior Consultant, AWS Public Sector, Pro Serve Brett Miller, Senior Consultant, AWS Public Sector, Pro Serve Notes mapping_ pdf Page 17 of 17

Introduction to AWS GoldBase

Introduction to AWS GoldBase Introduction to AWS GoldBase A Solution to Automate Security, Compliance, and Governance in AWS October 2015 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document

More information

Security by Design Running Compliant workloads in AWS

Security by Design Running Compliant workloads in AWS Security by Design Running Compliant workloads in 2015 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express consent

More information

Netflix OSS Spinnaker on the AWS Cloud

Netflix OSS Spinnaker on the AWS Cloud Netflix OSS Spinnaker on the AWS Cloud Quick Start Reference Deployment August 2016 Huy Huynh and Tony Vattathil Solutions Architects, Amazon Web Services Contents Overview... 2 Architecture... 3 Prerequisites...

More information

Getting Started with AWS Security

Getting Started with AWS Security Getting Started with AWS Security Tomas Clemente Sanchez Senior Consultant Security, Risk and Compliance September 21st 2017 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Move

More information

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web

Security & Compliance in the AWS Cloud. Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Security & Compliance in the AWS Cloud Vijay Rangarajan Senior Cloud Architect, ASEAN Amazon Web Services @awscloud www.cloudsec.com #CLOUDSEC Security & Compliance in the AWS Cloud TECHNICAL & BUSINESS

More information

Standardized Architecture for PCI DSS on the AWS Cloud

Standardized Architecture for PCI DSS on the AWS Cloud AWS Enterprise Accelerator Compliance Standardized Architecture for PCI DSS on the AWS Cloud Quick Start Reference Deployment AWS Professional Services AWS Quick Start Reference Team May 2016 (last update:

More information

Security & Compliance in the AWS Cloud. Amazon Web Services

Security & Compliance in the AWS Cloud. Amazon Web Services Security & Compliance in the AWS Cloud Amazon Web Services Our Culture Simple Security Controls Job Zero AWS Pace of Innovation AWS has been continually expanding its services to support virtually any

More information

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC

Building a Modular and Scalable Virtual Network Architecture with Amazon VPC Building a Modular and Scalable Virtual Network Architecture with Amazon VPC Quick Start Reference Deployment Santiago Cardenas Solutions Architect, AWS Quick Start Reference Team August 2016 (revisions)

More information

Standardized Architecture for NIST-based Assurance Frameworks in the AWS Cloud

Standardized Architecture for NIST-based Assurance Frameworks in the AWS Cloud AWS Enterprise Accelerator Compliance Standardized Architecture for NIST-based Assurance Frameworks in the AWS Cloud Quick Start Reference Deployment AWS Professional Services AWS Quick Start Reference

More information

Puppet on the AWS Cloud

Puppet on the AWS Cloud Puppet on the AWS Cloud Quick Start Reference Deployment AWS Quick Start Reference Team March 2016 This guide is also available in HTML format at http://docs.aws.amazon.com/quickstart/latest/puppet/. Contents

More information

Swift Web Applications on the AWS Cloud

Swift Web Applications on the AWS Cloud Swift Web Applications on the AWS Cloud Quick Start Reference Deployment November 2016 Asif Khan, Tom Horton, and Tony Vattathil Solutions Architects, Amazon Web Services Contents Overview... 2 Architecture...

More information

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry

SECURITY ON AWS 8/3/17. AWS Security Standards MORE. By Max Ellsberry SECURITY ON AWS By Max Ellsberry AWS Security Standards The IT infrastructure that AWS provides has been designed and managed in alignment with the best practices and meets a variety of standards. Below

More information

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

Architecting for Greater Security in AWS

Architecting for Greater Security in AWS Architecting for Greater Security in AWS Jonathan Desrocher Security Solutions Architect, Amazon Web Services. Guy Tzur Director of Ops, Totango. 2015, Amazon Web Services, Inc. or its affiliates. All

More information

Confluence Data Center on the AWS Cloud

Confluence Data Center on the AWS Cloud Confluence Data Center on the AWS Cloud Quick Start Reference Deployment March 2017 Atlassian AWS Quick Start Reference Team Contents Overview... 2 Costs and Licenses... 2 Architecture... 3 Prerequisites...

More information

Securely Access Services Over AWS PrivateLink. January 2019

Securely Access Services Over AWS PrivateLink. January 2019 Securely Access Services Over AWS PrivateLink January 2019 Notices This document is provided for informational purposes only. It represents AWS s current product offerings and practices as of the date

More information

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE

AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE AWS SECURITY AND COMPLIANCE QUICK REFERENCE GUIDE Education Edition 2018 1 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes

More information

Introduction to Cloud Computing

Introduction to Cloud Computing You will learn how to: Build and deploy cloud applications and develop an effective implementation strategy Leverage cloud vendors Amazon EC2 and Amazon S3 Exploit Software as a Service (SaaS) to optimize

More information

AWS Solutions Architect Associate (SAA-C01) Sample Exam Questions

AWS Solutions Architect Associate (SAA-C01) Sample Exam Questions 1) A company is storing an access key (access key ID and secret access key) in a text file on a custom AMI. The company uses the access key to access DynamoDB tables from instances created from the AMI.

More information

Standardized Architecture for NIST High-Impact Controls on the AWS Cloud Featuring Trend Micro Deep Security

Standardized Architecture for NIST High-Impact Controls on the AWS Cloud Featuring Trend Micro Deep Security AWS Enterprise Accelerator Compliance Standardized Architecture for NIST High-Impact Controls on the AWS Cloud Featuring Trend Micro Deep Security Quick Start Reference Deployment AWS Professional Services

More information

Automating Elasticity. March 2018

Automating Elasticity. March 2018 Automating Elasticity March 2018 2018, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents AWS s current product

More information

JIRA Software and JIRA Service Desk Data Center on the AWS Cloud

JIRA Software and JIRA Service Desk Data Center on the AWS Cloud JIRA Software and JIRA Service Desk Data Center on the AWS Cloud Quick Start Reference Deployment Contents October 2016 (last update: November 2016) Chris Szmajda, Felix Haehnel Atlassian Shiva Narayanaswamy,

More information

Training on Amazon AWS Cloud Computing. Course Content

Training on Amazon AWS Cloud Computing. Course Content Training on Amazon AWS Cloud Computing Course Content 15 Amazon Web Services (AWS) Cloud Computing 1) Introduction to cloud computing Introduction to Cloud Computing Why Cloud Computing? Benefits of Cloud

More information

Video on Demand on AWS

Video on Demand on AWS Video on Demand on AWS AWS Implementation Guide Tom Nightingale April 2017 Last updated: November 2018 (see revisions) Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. Video on Demand on AWS is

More information

Enroll Now to Take online Course Contact: Demo video By Chandra sir

Enroll Now to Take online Course   Contact: Demo video By Chandra sir Enroll Now to Take online Course www.vlrtraining.in/register-for-aws Contact:9059868766 9985269518 Demo video By Chandra sir www.youtube.com/watch?v=8pu1who2j_k Chandra sir Class 01 https://www.youtube.com/watch?v=fccgwstm-cc

More information

AWS Well Architected Framework

AWS Well Architected Framework AWS Well Architected Framework What We Will Cover The Well-Architected Framework Key Best Practices How to Get Started Resources Main Pillars Security Reliability Performance Efficiency Cost Optimization

More information

Cisco CloudCenter Use Case Summary

Cisco CloudCenter Use Case Summary Cisco CloudCenter Use Case Summary Overview IT organizations often use multiple clouds to match the best application and infrastructure services with their business needs. It makes sense to have the freedom

More information

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY

Managing and Auditing Organizational Migration to the Cloud TELASA SECURITY Managing and Auditing Organizational Migration to the Cloud 1 TELASA SECURITY About Me Brian Greidanus bgreidan@telasasecurity.com 18+ years of security and compliance experience delivering consulting

More information

Deep Dive on AWS CodeStar

Deep Dive on AWS CodeStar Deep Dive on AWS CodeStar with AWS CI/CD workflow Tara E. Walker Technical Evangelist @taraw June 28, 2017 2015, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Agenda What is DevOps

More information

AWS Landing Zone. AWS Developers Guide. June 2018

AWS Landing Zone. AWS Developers Guide. June 2018 AWS Landing Zone AWS Developers Guide June 2018 Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. AWS Landing Zone Developer Guide is licensed under the terms of the Amazon Software License available

More information

About Intellipaat. About the Course. Why Take This Course?

About Intellipaat. About the Course. Why Take This Course? About Intellipaat Intellipaat is a fast growing professional training provider that is offering training in over 150 most sought-after tools and technologies. We have a learner base of 600,000 in over

More information

10 Considerations for a Cloud Procurement. March 2017

10 Considerations for a Cloud Procurement. March 2017 10 Considerations for a Cloud Procurement March 2017 2017, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational purposes only. It represents

More information

SIOS DataKeeper Cluster Edition on the AWS Cloud

SIOS DataKeeper Cluster Edition on the AWS Cloud SIOS DataKeeper Cluster Edition on the AWS Cloud Quick Start Reference Deployment April 2017 Last update: May 2017 (revisions) SIOS Technology Corp. AWS Quick Start Reference Team Contents Overview...

More information

Cloud security 2.0: Joko nyt pilveen voi luottaa?

Cloud security 2.0: Joko nyt pilveen voi luottaa? Cloud security 2.0: Joko nyt pilveen voi luottaa? www.nordcloud.com 11 04 2017 Helsinki 2 Teemu Lehtonen Senior Cloud architect, Security teemu.lehtonen@nordcloud.com +358 40 6329445 Nordcloud Finland

More information

How the Cloud is Enabling the Disruption of the Construction Industry. AWS Case Study Construction Industry. Abstract

How the Cloud is Enabling the Disruption of the Construction Industry. AWS Case Study Construction Industry. Abstract Case Study Construction Industry How the Cloud is Enabling the Disruption of the Construction Industry Abstract A Minfy-architected cloud solution is helping iquippo, a digital marketplace for the construction

More information

OptiSol FinTech Platforms

OptiSol FinTech Platforms OptiSol FinTech Platforms Payment Solutions Cloud enabled Web & Mobile Platform for Fund Transfer OPTISOL BUSINESS SOLUTIONS PRIVATE LIMITED #87/4, Arcot Road, Vadapalani, Chennai 600026, Tamil Nadu. India

More information

SAA-C01. AWS Solutions Architect Associate. Exam Summary Syllabus Questions

SAA-C01. AWS Solutions Architect Associate. Exam Summary Syllabus Questions SAA-C01 AWS Solutions Architect Associate Exam Summary Syllabus Questions Table of Contents Introduction to SAA-C01 Exam on AWS Solutions Architect Associate... 2 AWS SAA-C01 Certification Details:...

More information

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India

Amazon Web Services. Block 402, 4 th Floor, Saptagiri Towers, Above Pantaloons, Begumpet Main Road, Hyderabad Telangana India (AWS) Overview: AWS is a cloud service from Amazon, which provides services in the form of building blocks, these building blocks can be used to create and deploy various types of application in the cloud.

More information

ALIENVAULT USM FOR AWS SOLUTION GUIDE

ALIENVAULT USM FOR AWS SOLUTION GUIDE ALIENVAULT USM FOR AWS SOLUTION GUIDE Summary AlienVault Unified Security Management (USM) for AWS is a unified security platform providing threat detection, incident response, and compliance management

More information

Getting started with AWS security

Getting started with AWS security Getting started with AWS security Take a prescriptive approach Stella Lee Manager, Enterprise Business Development $ 2 0 B + R E V E N U E R U N R A T E (Annualized from Q4 2017) 4 5 % Y / Y G R O W T

More information

Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect. Amazon.com, Inc. and its affiliates. All rights reserved.

Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect. Amazon.com, Inc. and its affiliates. All rights reserved. Amazon Web Services 101 April 17 th, 2014 Joel Williams Solutions Architect Amazon.com, Inc. and its affiliates. All rights reserved. Learning about Cloud Computing with AWS What is Cloud Computing and

More information

HashiCorp Vault on the AWS Cloud

HashiCorp Vault on the AWS Cloud HashiCorp Vault on the AWS Cloud Quick Start Reference Deployment November 2016 Last update: April 2017 (revisions) Cameron Stokes, HashiCorp, Inc. Tony Vattathil and Brandon Chavis, Amazon Web Services

More information

Cloud Computing. Amazon Web Services (AWS)

Cloud Computing. Amazon Web Services (AWS) Cloud Computing What is Cloud Computing? Benefit of cloud computing Overview of IAAS, PAAS, SAAS Types Of Cloud private, public & hybrid Amazon Web Services (AWS) Introduction to Cloud Computing. Introduction

More information

DevOps and Continuous Delivery USE CASE

DevOps and Continuous Delivery USE CASE DevOps and Continuous Delivery USE CASE CliQr DevOps and Continuous Delivery Page 2 DevOps and Continuous Delivery In the digital economy, increasing application velocity is key to success. In order to

More information

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content

Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Amazon Web Services (AWS) Solutions Architect Intermediate Level Course Content Introduction to Cloud Computing A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction

More information

DevOps Tooling from AWS

DevOps Tooling from AWS DevOps Tooling from AWS What is DevOps? Improved Collaboration - the dropping of silos between teams allows greater collaboration and understanding of how the application is built and deployed. This allows

More information

AALOK INSTITUTE. DevOps Training

AALOK INSTITUTE. DevOps Training DevOps Training Duration: 40Hrs (8 Hours per Day * 5 Days) DevOps Syllabus 1. What is DevOps? a. History of DevOps? b. How does DevOps work anyways? c. Principle of DevOps: d. DevOps combines the best

More information

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité

AWS Security. Stephen E. Schmidt, Directeur de la Sécurité AWS Security Stephen E. Schmidt, Directeur de la Sécurité 2014 Amazon.com, Inc. and its affiliates. All rights reserved. May not be copied, modified, or distributed in whole or in part without the express

More information

Use AWS Config to Monitor License Compliance on Amazon EC2 Dedicated Hosts. April 2016

Use AWS Config to Monitor License Compliance on Amazon EC2 Dedicated Hosts. April 2016 Use AWS Config to Monitor License Compliance on Amazon EC2 Dedicated Hosts April 2016 2016, Amazon Web Services, Inc. or its affiliates. All rights reserved. Notices This document is provided for informational

More information

EC2 Scheduler. AWS Implementation Guide. Lalit Grover. September Last updated: September 2017 (see revisions)

EC2 Scheduler. AWS Implementation Guide. Lalit Grover. September Last updated: September 2017 (see revisions) EC2 Scheduler AWS Implementation Guide Lalit Grover September 2016 Last updated: September 2017 (see revisions) Copyright (c) 2016 by Amazon.com, Inc. or its affiliates. EC2 Scheduler is licensed under

More information

AWS Reference Design Document

AWS Reference Design Document AWS Reference Design Document Contents Overview... 1 Amazon Web Services (AWS), Public Cloud and the New Security Challenges... 1 Security at the Speed of DevOps... 2 Securing East-West and North-South

More information

NGF0502 AWS Student Slides

NGF0502 AWS Student Slides NextGen Firewall AWS Use Cases Barracuda NextGen Firewall F Implementation Guide Architectures and Deployments Based on four use cases Edge Firewall Secure Remote Access Office to Cloud / Hybrid Cloud

More information

Driving DevOps Transformation in Enterprises

Driving DevOps Transformation in Enterprises Driving DevOps Transformation in Enterprises Mark Rambow Software Development Manager, AWS OpsWorks, Berlin acts_as_enterprisey start up enterprises enterprises and monolith software DevOps Drive securely

More information

AWS Course Syllabus. Linux Fundamentals. Installation and Initialization:

AWS Course Syllabus. Linux Fundamentals. Installation and Initialization: AWS Course Syllabus Linux Fundamentals Installation and Initialization: Installation, Package Selection Anatomy of a Kickstart File, Command line Introduction to Bash Shell System Initialization, Starting

More information

LINUX, WINDOWS(MCSE),

LINUX, WINDOWS(MCSE), Virtualization Foundation Evolution of Virtualization Virtualization Basics Virtualization Types (Type1 & Type2) Virtualization Demo (VMware ESXi, Citrix Xenserver, Hyper-V, KVM) Cloud Computing Foundation

More information

SoftLayer Security and Compliance:

SoftLayer Security and Compliance: SoftLayer Security and Compliance: How security and compliance are implemented and managed Introduction Cloud computing generally gets a bad rap when security is discussed. However, most major cloud providers

More information

Getting Started With Amazon EC2 Container Service

Getting Started With Amazon EC2 Container Service Getting Started With Amazon EC2 Container Service Emeka Igbokwe Solution Architect 2015, Amazon Web Services, Inc. or its affiliates. All rights reserved Agenda Containers EC2 Container Service EC2 Container

More information

AWS Landing Zone. AWS User Guide. November 2018

AWS Landing Zone. AWS User Guide. November 2018 AWS Landing Zone AWS User Guide November 2018 Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. AWS Landing Zone User Guide is licensed under the terms of the Amazon Software License available

More information

Securing Microservices Containerized Security in AWS

Securing Microservices Containerized Security in AWS Securing Microservices Containerized Security in AWS Mike Gillespie, Solutions Architect, Amazon Web Services Splitting Monoliths Ten Years Ago Splitting Monoliths Ten Years Ago XML & SOAP Splitting Monoliths

More information

Amazon Web Services (AWS) Training Course Content

Amazon Web Services (AWS) Training Course Content Amazon Web Services (AWS) Training Course Content SECTION 1: CLOUD COMPUTING INTRODUCTION History of Cloud Computing Concept of Client Server Computing Distributed Computing and it s Challenges What is

More information

IoT Device Simulator

IoT Device Simulator IoT Device Simulator AWS Implementation Guide Sean Senior May 2018 Copyright (c) 2018 by Amazon.com, Inc. or its affiliates. IoT Device Simulator is licensed under the terms of the Amazon Software License

More information

CyberPosture Intelligence for Your Hybrid Infrastructure

CyberPosture Intelligence for Your Hybrid Infrastructure VALUE BRIEF CyberPosture Intelligence for Your Hybrid Infrastructure CyberPosture is a consolidated risk score, based on configuration and workload analysis, that executives can present to their board,

More information

Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments

Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments ` Telos and Amazon Web Services (AWS): Accelerating Secure and Compliant Cloud Deployments Telos Corporation 19886 Ashburn Road Ashburn, VA 24445 www.telos.com ` Introduction Telos Corporation and Amazon

More information

Getting started with AWS security

Getting started with AWS security Getting started with AWS security Take a prescriptive approach Stephen Quigg Principal Security Solutions Architect 2016, Amazon Web Services, Inc. or its Affiliates. All rights reserved. Why is enterprise

More information

Cloudera s Enterprise Data Hub on the AWS Cloud

Cloudera s Enterprise Data Hub on the AWS Cloud Cloudera s Enterprise Data Hub on the AWS Cloud Quick Start Reference Deployment Shivansh Singh and Tony Vattathil Amazon Web Services October 2014 Last update: April 2017 (revisions) This guide is also

More information

ACCENTURE & RED HAT ACCENTURE CLOUD INNOVATION CENTER

ACCENTURE & RED HAT ACCENTURE CLOUD INNOVATION CENTER ACCENTURE & RED HAT ACCENTURE CLOUD INNOVATION CENTER HYBRID CLOUD MANAGEMENT & OPTIMIZATION DEVOPS FOR INFRASTRUCTURE SERVICES ACCENTURE CLOUD INNOVATION CENTER PUSHING CUSTOM CLOUD SOLUTIONS TO THE MAX.

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Level 18 Job family Professional services Date November 2017 Reports to Cloud services group

More information

Magento Commerce Architecture and Security Model Last updated: Aug 2017

Magento Commerce Architecture and Security Model Last updated: Aug 2017 Magento Commerce Architecture and Security Model Last updated: Aug 2017 Architecture The Magento Commerce architecture is designed to provide a highly secure environment. Each customer is deployed into

More information

Amazon Web Services Training. Training Topics:

Amazon Web Services Training. Training Topics: Amazon Web Services Training Training Topics: SECTION1: INTRODUCTION TO CLOUD COMPUTING A Short history Client Server Computing Concepts Challenges with Distributed Computing Introduction to Cloud Computing

More information

AWS Solution Architect Associate

AWS Solution Architect Associate AWS Solution Architect Associate 1. Introduction to Amazon Web Services Overview Introduction to Cloud Computing History of Amazon Web Services Why we should Care about Amazon Web Services Overview of

More information

Splunk Enterprise on the AWS Cloud

Splunk Enterprise on the AWS Cloud Splunk Enterprise on the AWS Cloud Quick Start Reference Deployment February 2017 Bill Bartlett and Roy Arsan Splunk, Inc. Shivansh Singh AWS Quick Start Reference Team Contents Overview... 2 Costs and

More information

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs

AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs AUTOMATE THE DEPLOYMENT OF SECURE DEVELOPER VPCs WITH PALO ALTO NETWORKS AND REAN CLOUD 1 INTRODUCTION EXECUTIVE SUMMARY Organizations looking to provide developers with a free-range development environment

More information

Simple Security for Startups. Mark Bate, AWS Solutions Architect

Simple Security for Startups. Mark Bate, AWS Solutions Architect BERLIN Simple Security for Startups Mark Bate, AWS Solutions Architect Agenda Our Security Compliance Your Security Account Management (the keys to the kingdom) Service Isolation Visibility and Auditing

More information

Accelerate Your Enterprise Private Cloud Initiative

Accelerate Your Enterprise Private Cloud Initiative Cisco Cloud Comprehensive, enterprise cloud enablement services help you realize a secure, agile, and highly automated infrastructure-as-a-service (IaaS) environment for cost-effective, rapid IT service

More information

High School Technology Services myhsts.org Certification Courses

High School Technology Services myhsts.org Certification Courses AWS Associate certification training Last updated on June 2017 a- AWS Certified Solutions Architect (40 hours) Amazon Web Services (AWS) Certification is fast becoming the must have certificates for any

More information

Compliance with CloudCheckr

Compliance with CloudCheckr DATASHEET Compliance with CloudCheckr Introduction Security in the cloud is about more than just monitoring and alerts. To be truly secure in this ephemeral landscape, organizations must take an active

More information

Chef Server on the AWS Cloud

Chef Server on the AWS Cloud Chef Server on the AWS Cloud Quick Start Reference Deployment Mike Pfeiffer December 2015 This guide is also available in HTML format at http://docs.aws.amazon.com/quickstart/latest/chef-server/. Contents

More information

HPE Digital Learner AWS Certified SysOps Administrator (Intermediate) Content Pack

HPE Digital Learner AWS Certified SysOps Administrator (Intermediate) Content Pack Content Pack data sheet HPE Digital Learner AWS Certified SysOps Administrator (Intermediate) Content Pack HPE Content Pack number Content Pack length Content Pack category Learn more CP017 20 Hours Category

More information

DevOps Course Content

DevOps Course Content DevOps Course Content 1. Introduction: Understanding Development Development SDLC using WaterFall & Agile Understanding Operations DevOps to the rescue What is DevOps DevOps SDLC Continuous Delivery model

More information

Cloud solution consultant

Cloud solution consultant Cloud solution consultant Role brief Directorate Jisc technologies Base location Harwell or Bristol Grade B Job level 18 Job family Professional services Date 23/10/2017 Reports to Cloud services group

More information

Advanced Architectures for Oracle Database on Amazon EC2

Advanced Architectures for Oracle Database on Amazon EC2 Advanced Architectures for Oracle Database on Amazon EC2 Abdul Sathar Sait Jinyoung Jung Amazon Web Services November 2014 Last update: April 2016 Contents Abstract 2 Introduction 3 Oracle Database Editions

More information

At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

At Course Completion Prepares you as per certification requirements for AWS Developer Associate. [AWS-DAW]: AWS Cloud Developer Associate Workshop Length Delivery Method : 4 days : Instructor-led (Classroom) At Course Completion Prepares you as per certification requirements for AWS Developer Associate.

More information

WAF on AWS Deployment Kit. On Demand. Configuration Guide

WAF on AWS Deployment Kit. On Demand. Configuration Guide WAF on AWS Deployment Kit On Demand Configuration Guide 13.0 March 2018 Copyright Notice 2002-2018 Imperva, Inc. All Rights Reserved. Follow this link to see the SecureSphere copyright notices and certain

More information

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info

We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info We are ready to serve Latest IT Trends, Are you ready to learn? New Batches Info START DATE : TIMINGS : DURATION : TYPE OF BATCH : FEE : FACULTY NAME : LAB TIMINGS : Storage & Database Services : Introduction

More information

TECHNICAL WORKBOOK. PCI Compliance in the AWS Cloud A NITIAN. Report Date: October 17, Jordan Wiseman, QSA

TECHNICAL WORKBOOK. PCI Compliance in the AWS Cloud A NITIAN. Report Date: October 17, Jordan Wiseman, QSA TECHNICAL WORKBOOK PCI Compliance in the AWS Cloud Report Date: October 17, 2016 Authors: Adam Gaydosh, QSA Jordan Wiseman, QSA A NITIAN COPYRIGHT Copyright 2016 by Anitian Corporation All rights reserved.

More information

Emulating Lambda to speed up development. Kevin Epstein CTO CorpInfo AWS Premier Partner

Emulating Lambda to speed up development. Kevin Epstein CTO CorpInfo AWS Premier Partner Emulating Lambda to speed up development Kevin Epstein CTO CorpInfo AWS Premier Partner What is Lambda? Scalable, Highly Available, Stateless, event driven computing Fully managed runtime environment Python

More information

Serverless Website Publishing with AWS Code* Services. Steffen Grunwald Solutions Architect, AWS October 27, 2016

Serverless Website Publishing with AWS Code* Services. Steffen Grunwald Solutions Architect, AWS October 27, 2016 Serverless Website Publishing with AWS Code* Services Steffen Grunwald Solutions Architect, AWS October 27, 2016 Software Delivery Models evolved What do you need to move fast? Re-use services, Architect

More information

AWS Service Catalog. User Guide

AWS Service Catalog. User Guide AWS Service Catalog User Guide AWS Service Catalog: User Guide Copyright 2017 Amazon Web Services, Inc. and/or its affiliates. All rights reserved. Amazon's trademarks and trade dress may not be used in

More information

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense

Hosting DesktopNow in Amazon Web Services. Ivanti DesktopNow powered by AppSense Hosting DesktopNow in Amazon Web Services Ivanti DesktopNow powered by AppSense Contents Purpose of this Document... 3 Overview... 3 1 Non load balanced Amazon Web Services Environment... 4 Amazon Web

More information

AWS London Loft: CloudFormation Workshop

AWS London Loft: CloudFormation Workshop AWS London Loft: CloudFormation Workshop Templated AWS Resources Tom Maddox Solutions Architect tmaddox@amazon.co.uk Who am I? Gardener (Capacity Planning) Motorcyclist (Agility) Mobile App Writer Problem

More information

Advanced Continuous Delivery Strategies for Containerized Applications Using DC/OS

Advanced Continuous Delivery Strategies for Containerized Applications Using DC/OS Advanced Continuous Delivery Strategies for Containerized Applications Using DC/OS ContainerCon @ Open Source Summit North America 2017 Elizabeth K. Joseph @pleia2 1 Elizabeth K. Joseph, Developer Advocate

More information

Virtual Machine Encryption Security & Compliance in the Cloud

Virtual Machine Encryption Security & Compliance in the Cloud Virtual Machine Encryption Security & Compliance in the Cloud Pius Graf Director Sales Switzerland 27.September 2017 Agenda Control Your Data In The Cloud Overview Virtual Machine Encryption Architecture

More information

Red Hat CloudForms Hybrid Cloud Management (CL220)

Red Hat CloudForms Hybrid Cloud Management (CL220) Red Hat CloudForms Hybrid Cloud Management (CL220) DESCRIPTION: Course overview In this course, students use a hybrid environment, configure Red Hat CloudForms to work with Red Hat Virtualization and Red

More information

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS

CLOUD AND AWS TECHNICAL ESSENTIALS PLUS 1 P a g e CLOUD AND AWS TECHNICAL ESSENTIALS PLUS Contents Description... 2 Course Objectives... 2 Cloud computing essentials:... 2 Pre-Cloud and Need for Cloud:... 2 Cloud Computing and in-depth discussion...

More information

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services

AWS Webinar. Navigating GDPR Compliance on AWS. Christian Hesse Amazon Web Services AWS Webinar Navigating GDPR Compliance on AWS Christian Hesse Amazon Web Services What is the GDPR? What is the GDPR? The "GDPR" is the General Data Protection Regulation, a significant new EU Data Protection

More information

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases

Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco CloudCenter Solution with Cisco ACI: Common Use Cases Cisco ACI increases network security, automates communication policies based on business-relevant application requirements, and decreases developer

More information

Amazon CloudFront AWS Service Delivery Program Consulting Partner Validation Checklist

Amazon CloudFront AWS Service Delivery Program Consulting Partner Validation Checklist Amazon CloudFront AWS Service Delivery Program January 2019 Version 2.0 This document is provided for informational purposes only and does not create any offer, contractual commitment, promise, or assurance

More information

Introduction to cloud computing

Introduction to cloud computing Introduction to cloud computing History of cloud Different vendors of Cloud computing Importance of cloud computing Advantages and disadvantages of cloud computing Cloud deployment methods Private cloud

More information

TM DevOps Use Case TechMinfy All Rights Reserved

TM DevOps Use Case TechMinfy All Rights Reserved Document Details Use Case Name TMDevOps Use Case01 First Draft 5 th March 2018 Author Reviewed By Prabhakar D Pradeep Narayanaswamy Contents Scope... 4 About Customer... 4 Use Case Description... 4 Primary

More information

Amazon AWS-Solutions-Architect-Professional Exam

Amazon AWS-Solutions-Architect-Professional Exam Volume: 392 Questions Question: 1 By default, Amazon Cognito maintains the last-written version of the data. You can override this behavior and resolve data conflicts programmatically. In addition, push

More information