AWS re:Invent 2016: Serverless to 32 XLarge: A Unified Security Approach To AWS Compute (CMP305)
653
27.2
Amazon Web Services776 тыс
Опубликовано 1 декабря 2016, 21:34
Each of the four distinct compute services available from AWS bring unique advantages to your application's design: Amazon EC2, AWS Elastic Beanstalk, Amazon ECS, and AWS Lambda. However, your security responsibilities change with each of these services. For example, with Amazon EC2 and AWS Elastic Beanstalk, you need a plan to lock down the operating system, your applications, and your data. Containers running in Amazon ECS provides additional flexibility and mobility but also introduces new challenges as most security techniques were not designed with containers in mind. AWS Lambda requires a completely new approach to security design at the function level.
Making sure that the diversity available in AWS compute services doesn't increase your operational burden is a significant challenge. But with the right strategy, you can use a unified approach and reduce team impact. In this session, we look at an overall security strategy for AWS compute services pulled from real-world experiences of some top global companies. Strategy in hand, we apply the strategy to each of the available compute services in order to create a unified security view for workloads, regardless of their scale.
Session sponsored by Trend Micro, Inc.
AWS Competency Partner
Making sure that the diversity available in AWS compute services doesn't increase your operational burden is a significant challenge. But with the right strategy, you can use a unified approach and reduce team impact. In this session, we look at an overall security strategy for AWS compute services pulled from real-world experiences of some top global companies. Strategy in hand, we apply the strategy to each of the available compute services in order to create a unified security view for workloads, regardless of their scale.
Session sponsored by Trend Micro, Inc.
AWS Competency Partner