July 19 2019

AWS Re:Inforce Conference 2019: Key Takeaways

Security

Security tip

Never incorporate personal information:

- date of birth,
- social insurance number
- first name of your children,

and your passwords and usernames.

3 Takeaways From The First AWS Conference Dedicated to Cloud Security

The first Amazon Web Services (AWS) event dedicated to security, AWS Re:Inforce, was held in Boston on June 25 and 26, 2019.

Fortica, partner of Hitachi Systems Security (read full press release here), was among the 5,000 cloud security experts who attended this important conference. These two days were an opportunity to discuss the challenges of cloud security, well beyond the specific contexts of AWS.

For those of you who couldn’t attend but are interested in the topics of cloud security or AWS, we’ve put together a summary in three points, as if you were there.

AWS Re:Inforce

 

  1. AWS Can Meet Strict Security Requirements

Opportunities to comply with and align with the most demanding security practices in the AWS public cloud have been widely promoted. Several major players in the North American financial industry, including CapitalOne, outlined their approach.

AWS offers a secure default configuration with a large number of security services to meet a multitude of needs and scenarios.

 

  1. Standardize Security Rules and Give Teams Autonomy

The standardization of security policies through the installation of guardrails was a major theme that was discussed both during sessions and during sponsors' demonstrations. It is about defining the security and context-specific boundaries within which development teams can be autonomous.

Ideally, security policies can be reused through the use of labels (for example, a developer can modify the roles of its hosted application in an environment labeled "Test" but not in "Production").

Steve Schmidt, AWS CISO, announced the launch of Control Tower, a service that enables uniform security and cloud compliance policies across multiple accounts within the same organization.

 

  1. Evaluate and Correct Your Security Posture Proactively

Cloud visibility and cloud security posture assessments was one of the other big themes that were very much discussed but also widely represented among the sponsors grouped at the Security Hub.

Multi-cloud information systems, the autonomy of DevOps teams, the simplicity of deploying resources in the cloud create configuration problems and inevitable vulnerabilities that expose data.

There are solutions for detecting anomalies as early as possible, even before planning the resources by analyzing CloudFormation templates, which can be used to raise alerts or automatically correct configuration discrepancies.

Equivalent solutions that are natively offered by AWS, are effective in meeting basic but limited to AWS needs. In a more complex, more demanding or in a multi-cloud environment, a Cloud Security Posture Management (CSPM) solution will be a must.

 

In Closing

This first AWS event dedicated to cloud security has kept all its promises by highlighting emerging security practices and innovative solutions. The AWS Re:Inforce conference becomes a must-attend event for all cloud security experts. The next edition is already announced – it will take place in Houston, TX, in 2020.

In the meantime, Hitachi Systems Security and Fortica are keeping up-to-date with innovations and trends in cloud security and our its practices to benefit our customers.

If you have questions about the security of your cloud, either for an audit or a deployment coaching, we have the expertise and services to meet your needs to secure your critical assets along your path towards the cloud. Our cloud security experts take all the necessary efforts to keep up with this fast-changing industry in order to offer you the most relevant recommendations and to ensure that you can maximize the return on your cloud security investments.

See Fortica's services

Building your future at Fortica

We’re waiting for you on our team

We don’t work at Fortica. We innovate, collaborate, and exceed our customers’ expectations daily. Are you ready to commit?
Our job opportunities
© Fortica cybersécurité - All Rights Reserved 2024 | Website design made by TactikMedia
envelopephone-handsetcalendar-fullcrossmenuarrow-leftcross-circle