SlideShare a Scribd company logo
Amazon Web Services
Shared Responsibility Model
1

Security &
4 Compliance 2
3

PPT by

www.EndPointVault.com
Amazon AWS

Amazon offers scalable cloud computing platform to
build, deploy and run wide range of application using
their servers that are spread across the globe.
AWS Shared Security Model
Amazon AWS

Amazon Client

Facilities
Physical Security
Physical Infrastructure
Network Infrastructure
Virtualization Security

OS
Application
Security Groups
OS Firewall
Network Configuration
Account Management
Physical Security - AWS
AWS Facilities state of the art electronic
surveillance system.
Authentication and Authorization is done
using multi factor access control System.
Data centre is guarded by professionals
in security domain.
Hardware are fully guarded and are
destroyed before it leave the premise or
data center.
Virtualization Security - AWS
Security for instances or virtual server is provided on
multiple level to the user:
Host OS (Amazon)
Guest OS (User Virtual Instance)
Firewall
Signed API calls

Each of these security measures are interdependent to
provide the overall security and to prevent any
unauthorized access to the database.
Host OS Security - AWS
• Authorized administrator who needs to access the
management plane are required to pass through the multifactor authentication before gaining access to the
administration host.

• All such cases are logged and audited.
• Privileges are immediately revoked as soon as the work gets
completed.
Guest OS Security - AWS
Though virtual instances are totally controlled by the user
nevertheless Amazon still provides considerable amount of
security to it.
 https/SSL enabled login and Guest OS management.
 Support for SSH (Secure Shell) network protocol for secure logging in
Unix/Linux Instances.
 Provides regular updates and patches for the Guest OS (Windows or
Linux).

Further security can be easily enhanced by the instance
administrator by using services available in Amazon
Marketplace.
Firewall Solution - AWS
• Amazon has created a robust firewall security
mechanism where by default all the ports are in deny
mode and the user explicitly open the ports to allow
the inbound traffic.
• Firewall is guest OS independent and does not reply
on the administrator instead, requires the users
X.509 certificate and relevant key to authorize
changes thus creating an extra layer of security.
Amazon Client Security
Responsibility

• Create and manage groups and set security policy to
insure data security and safety of your instance.
• Use of Virtual Private Network to ensure network
safety and creating Access list to manage the
inbound – outbound traffic from your instances.
• Setup VPN tunnel to your end for direct access of
your instances.
Identity and Access Management
• You can deny access to resources and services (EC2,
S3, Direct Connect, etc.) to those with minimum
privileges.
• Use of multi-factor authentication for authorized
access.
• API through
Access ID/ Secret Key
Resources and further study
Amazon Webinars:
Security https://www.youtube.com/watch?v=IedaYaKsb-4
Amazon AWS Foundation
https://www.youtube.com/watch?v=Nf-m-dKJYMQ

De-Duplication Process
http://www.endpointvault.com/de-dupe.html
Use the Power of Cloud to Secure Your Data
visit http://www.endpointvault.com/

More Related Content

What's hot (7)

PDF
Information Security in AWS - Dave Walker
East Midlands Cyber Security Forum
 
PPTX
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
Alert Logic
 
PPTX
01 aws track 1
JoaoSeverino2
 
PPTX
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Alert Logic
 
PPTX
AWS - Security and Compliance Overview
RightScale
 
PPTX
CSS17: DC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
PDF
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
Amazon Web Services Korea
 
Information Security in AWS - Dave Walker
East Midlands Cyber Security Forum
 
CSS17: Dallas - The AWS Shared Responsibility Model in Practice
Alert Logic
 
01 aws track 1
JoaoSeverino2
 
CSS17: Atlanta - The AWS Shared Responsibility Model in Practice
Alert Logic
 
AWS - Security and Compliance Overview
RightScale
 
CSS17: DC - The AWS Shared Responsibility Model in Practice
Alert Logic
 
AWS Enterprise Summit - 클라우드에서의 보안 - 양승도
Amazon Web Services Korea
 

Similar to Amazon AWS Shared Security Model (10)

PDF
Amazon Web Services: Overview of Security Processes
white paper
 
PDF
Security compute services_whitepaper
saifam
 
PDF
CoSolvent Community Server : Amazon Web Services Hosting ...
webhostingguy
 
PPTX
Infrastructure Provisioning & Automation For Large Enterprises
Tensult
 
PDF
Advanced Security Masterclass - Tel Aviv Loft
Ian Massingham
 
PPT
Aws training in bangalore
apponix123
 
PPTX
CLOUD COMPUTING.pptx
ghadiv05
 
PDF
Security on AWS
Amazon Web Services LATAM
 
PPTX
16h30 aws gru security deck
infolive
 
PPTX
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
Amazon Web Services: Overview of Security Processes
white paper
 
Security compute services_whitepaper
saifam
 
CoSolvent Community Server : Amazon Web Services Hosting ...
webhostingguy
 
Infrastructure Provisioning & Automation For Large Enterprises
Tensult
 
Advanced Security Masterclass - Tel Aviv Loft
Ian Massingham
 
Aws training in bangalore
apponix123
 
CLOUD COMPUTING.pptx
ghadiv05
 
Security on AWS
Amazon Web Services LATAM
 
16h30 aws gru security deck
infolive
 
Hackproof Your Cloud: Responding to 2016 Threats
CloudCheckr
 
Ad

Recently uploaded (20)

PPTX
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
PDF
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
PDF
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
PDF
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
PDF
The Future of Artificial Intelligence (AI)
Mukul
 
PDF
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
PDF
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
PDF
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
PDF
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
PPTX
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 
PDF
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
PPTX
Machine Learning Benefits Across Industries
SynapseIndia
 
PDF
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
PDF
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
PDF
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
PDF
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
PPTX
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
PDF
Brief History of Internet - Early Days of Internet
sutharharshit158
 
PDF
Per Axbom: The spectacular lies of maps
Nexer Digital
 
PDF
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
Earn Agentblazer Status with Slack Community Patna.pptx
SanjeetMishra29
 
Research-Fundamentals-and-Topic-Development.pdf
ayesha butalia
 
Market Wrap for 18th July 2025 by CIFDAQ
CIFDAQ
 
CIFDAQ's Market Wrap : Bears Back in Control?
CIFDAQ
 
The Future of Artificial Intelligence (AI)
Mukul
 
State-Dependent Conformal Perception Bounds for Neuro-Symbolic Verification
Ivan Ruchkin
 
Trying to figure out MCP by actually building an app from scratch with open s...
Julien SIMON
 
Alpha Altcoin Setup : TIA - 19th July 2025
CIFDAQ
 
The Future of Mobile Is Context-Aware—Are You Ready?
iProgrammer Solutions Private Limited
 
python advanced data structure dictionary with examples python advanced data ...
sprasanna11
 
Peak of Data & AI Encore - Real-Time Insights & Scalable Editing with ArcGIS
Safe Software
 
Machine Learning Benefits Across Industries
SynapseIndia
 
The Past, Present & Future of Kenya's Digital Transformation
Moses Kemibaro
 
RAT Builders - How to Catch Them All [DeepSec 2024]
malmoeb
 
Responsible AI and AI Ethics - By Sylvester Ebhonu
Sylvester Ebhonu
 
Researching The Best Chat SDK Providers in 2025
Ray Fields
 
Agile Chennai 18-19 July 2025 | Emerging patterns in Agentic AI by Bharani Su...
AgileNetwork
 
Brief History of Internet - Early Days of Internet
sutharharshit158
 
Per Axbom: The spectacular lies of maps
Nexer Digital
 
Integrating IIoT with SCADA in Oil & Gas A Technical Perspective.pdf
Rejig Digital
 
Ad

Amazon AWS Shared Security Model

  • 1. Amazon Web Services Shared Responsibility Model 1 Security & 4 Compliance 2 3 PPT by www.EndPointVault.com
  • 2. Amazon AWS Amazon offers scalable cloud computing platform to build, deploy and run wide range of application using their servers that are spread across the globe.
  • 3. AWS Shared Security Model Amazon AWS Amazon Client Facilities Physical Security Physical Infrastructure Network Infrastructure Virtualization Security OS Application Security Groups OS Firewall Network Configuration Account Management
  • 4. Physical Security - AWS AWS Facilities state of the art electronic surveillance system. Authentication and Authorization is done using multi factor access control System. Data centre is guarded by professionals in security domain. Hardware are fully guarded and are destroyed before it leave the premise or data center.
  • 5. Virtualization Security - AWS Security for instances or virtual server is provided on multiple level to the user: Host OS (Amazon) Guest OS (User Virtual Instance) Firewall Signed API calls Each of these security measures are interdependent to provide the overall security and to prevent any unauthorized access to the database.
  • 6. Host OS Security - AWS • Authorized administrator who needs to access the management plane are required to pass through the multifactor authentication before gaining access to the administration host. • All such cases are logged and audited. • Privileges are immediately revoked as soon as the work gets completed.
  • 7. Guest OS Security - AWS Though virtual instances are totally controlled by the user nevertheless Amazon still provides considerable amount of security to it.  https/SSL enabled login and Guest OS management.  Support for SSH (Secure Shell) network protocol for secure logging in Unix/Linux Instances.  Provides regular updates and patches for the Guest OS (Windows or Linux). Further security can be easily enhanced by the instance administrator by using services available in Amazon Marketplace.
  • 8. Firewall Solution - AWS • Amazon has created a robust firewall security mechanism where by default all the ports are in deny mode and the user explicitly open the ports to allow the inbound traffic. • Firewall is guest OS independent and does not reply on the administrator instead, requires the users X.509 certificate and relevant key to authorize changes thus creating an extra layer of security.
  • 9. Amazon Client Security Responsibility • Create and manage groups and set security policy to insure data security and safety of your instance. • Use of Virtual Private Network to ensure network safety and creating Access list to manage the inbound – outbound traffic from your instances. • Setup VPN tunnel to your end for direct access of your instances.
  • 10. Identity and Access Management • You can deny access to resources and services (EC2, S3, Direct Connect, etc.) to those with minimum privileges. • Use of multi-factor authentication for authorized access. • API through Access ID/ Secret Key
  • 11. Resources and further study Amazon Webinars: Security https://www.youtube.com/watch?v=IedaYaKsb-4 Amazon AWS Foundation https://www.youtube.com/watch?v=Nf-m-dKJYMQ De-Duplication Process http://www.endpointvault.com/de-dupe.html
  • 12. Use the Power of Cloud to Secure Your Data visit http://www.endpointvault.com/