Amazon Web Services

Videos: 1407 Likes: 21,888 Views: 5,818,171

Videos by: Amazon Web Services

AWS re:Invent 2015 | (SEC318) AWS CloudTrail Deep Dive

3 years ago
Ever wondered how can you find out which user made a particular API call, when the call was made, and which resources were acted upon? In this session, you will learn how to turn on AWS CloudTrail for hundreds of AWS accounts in all AWS regions to ensure you have full visibility into API activity […]

AWS re:Invent 2015 | (SEC316) Harden Your Architecture w/ Security Incident Response Simulations

3 years ago
Using Security Incident Response Simulations (SIRS–also commonly called IR Game Days) regularly keeps your first responders in practice and ready to engage in real events. SIRS help you identify and close security gaps in your platform, and application layers then validate your ability to respond. In this session, we will share a straightforward method for […]

AWS re:Invent 2015 | (SEC315) AWS Directory Service Deep Dive

3 years ago
AWS Directory Service enables you to create a new Active Directory domain in AWS with Simple AD or to connect your existing Active Directory domain with AD Connector. Learn how to use these offerings to domain join and enable single sign-on (SSO) to your Amazon EC2 Windows and Linux instances, set up federated access to […]

AWS re:Invent 2015 | (SEC312) Reliable Design and Deployment of Security and Compliance

3 years ago
No matter how you use AWS resources, you can design your AWS account to deliver a reliably secure and controlled environment. This session will focus on “”Secure by Design”” principles and show how you can configure the AWS environment to provide the reliable operation of security controls, such as: Organizational governance Asset inventory and control Logical access […]

AWS re:Invent 2015 | (SEC310) Keeping Developers and Auditors Happy in the Cloud

3 years ago
Often times, developers and auditors can be at odds. The agile, fast-moving environments that developers enjoy will typically give auditors heartburn. The more controlled and stable environments that auditors prefer to demonstrate and maintain compliance are traditionally not friendly to developers or innovation. We’ll walk through how Netflix moved its PCI and SOX environments to […]

AWS re:Invent 2015 | (SPOT210) Zynga’s Journey (Back) to the AWS Cloud

3 years ago
Zynga, a leading developer of social games with popular titles such as FarmVille, Zynga Poker, Words With Friends, and Hit It Rich! Slots, was an early AWS customer that decided to move most of its infrastructure off AWS in 2011 to build its own private cloud and data centers. With changes to its business over […]

AWS re:Invent 2015 | (SEC307) A Progressive Journey Through AWS IAM Federation Options

3 years ago
AWS Identity and Access Management (IAM) offers a continuum of interfaces and configuration options that enables customers to integrate their unique organizational identity structure and operational processes to the AWS platform. In this session we will evaluate the progressive journey of federation options that most customers go through as they widen their integration with IAM. […]

AWS re:Invent 2015 | (SEC306) Defending Against DDoS Attacks

3 years ago
In this session, we will address the current threat landscape, present DDoS attacks that we have seen on AWS, and discuss the methods and technologies we use to protect AWS services. You will leave this session with a better understanding of: DDoS attacks on AWS as well as the actual threats and volumes that we […]

AWS re:Invent 2015 | (SEC305) How to Become an IAM Policy Ninja in 60 Minutes or Less

3 years ago
Are you interested in learning how to control access to your AWS resources? Have you ever wondered how to best scope down permissions to achieve least privilege permissions access control? If your answer to these questions is “yes,” this session is for you. We will take an in-depth look at the AWS Identity and Access […]

AWS re:Invent 2015 | (SEC304) Architecting for HIPAA Compliance on AWS

3 years ago
This session brings together the interests of engineering, compliance, and security as you align healthcare workloads to the controls in the HIPAA Security Rule. We’ll discuss how to architect for HIPAA compliance using AWS, and introduce a number of new services added to the HIPAA program in 2015, such as Amazon Relational Database Service (RDS), […]

AWS re:Invent 2015 | (SEC302) IAM Best Practices to Live By

3 years ago
This session will cover AWS Identity and Access Management (IAM) best practices that help improve your security posture. We will cover how to manage users and their security credentials. We’ll also explain why you should delete your root access keys—or at the very least, rotate them regularly. Using common use cases, we will demonstrate when […]

AWS re:Invent 2015 | (SEC301) Strategies for Protecting Data Using Encryption in AWS

3 years ago
Protecting sensitive data in the cloud typically requires encryption. Managing the keys used for encryption can be challenging as your sensitive data passes between services and applications. AWS offers several options for using encryption and managing keys to help simplify the protection of your data at rest. This session will help you understand which features […]