{"id":28419,"date":"2018-01-30T12:14:06","date_gmt":"2018-01-30T12:14:06","guid":{"rendered":"https:\/\/www.vmengine.net\/?p=28419"},"modified":"2025-05-23T17:15:45","modified_gmt":"2025-05-23T17:15:45","slug":"aws-cloud-security-discover-how-it-works","status":"publish","type":"post","link":"http:\/\/temp_new.vmenginelab.com\/en\/2018\/01\/30\/aws-cloud-security-discover-how-it-works\/","title":{"rendered":"AWS Cloud Security: discover how it works"},"content":{"rendered":"<div class=\"et_pb_section et_pb_section_53 et_section_regular\" >\n<div class=\"et_pb_row et_pb_row_88\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_85  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_module et_pb_text et_pb_text_74  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<blockquote><p><span style=\"font-weight: 400;\">&#8220;<\/span><i><span style=\"font-weight: 400;\">All that is outside of you can be subtracted at any time, just what&#8217;s inside of you is safe<\/span><\/i><span style=\"font-weight: 400;\">&#8220;. This is a quote of the british ghostwriter <\/span><b>Jeannette Winterson<\/b><span style=\"font-weight: 400;\">. What is true for human \u00a0it&#8217;s even more for companies, especially for those that works in internet world. <\/span><\/p><\/blockquote>\n<p><a href=\"https:\/\/en.wikipedia.org\/wiki\/Cloud_computing_security\"><b>Cloud Security<\/b><\/a><span style=\"font-weight: 400;\"> is a particularly debated and controversial issue. Manager and entrepreneurs are asking a lot of questions about. <\/span><\/p>\n<p><img fetchpriority=\"high\" decoding=\"async\" class=\" wp-image-28426 alignright\" src=\"https:\/\/www.vmengine.net:443\/wp-content\/uploads\/2018\/01\/security-protection-anti-virus-software-60504.jpeg\" alt=\"\" width=\"332\" height=\"221\" \/><\/p>\n<p><strong>Where do my data goes?<\/strong><\/p>\n<p><strong>How to keep my data safe? \u00a0<\/strong><\/p>\n<p><strong>What does it costs to set up a &#8220;impregnable fortress&#8221;?<\/strong><\/p>\n<p>&nbsp;<\/p>\n<p><b>Amazon Web Services,<\/b><a href=\"https:\/\/www.theregister.co.uk\/2017\/06\/19\/gartner_confirms_what_we_all_know_aws_and_microsoft_are_the_cloud_leaders_by_a_fair_way\/\"> <span style=\"font-weight: 400;\">top of Cloud Provider<\/span><\/a><span style=\"font-weight: 400;\">, makes safety an absolute priority. How? With a network data center architecture designed to satisfy most demanding companies, AWS allows its customers to recalibrate resources. But not only that, customers pay only for services that use.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">AWS has a benefit: datas are stored in highly secure and cutting-edge data centers and this allows to guarantee high levels of privacy with a lower price. Now we analyze privacy protection services that AWS provides to its customers.<\/span><\/p>\n<ol>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Network firewalls integrated into <\/span><b>Amazon VPC<\/b><span style=\"font-weight: 400;\"> and web application firewall capabilities in<\/span><a href=\"https:\/\/aws.amazon.com\/waf\/?nc1=h_ls\"> <span style=\"font-weight: 400;\">AWS WAF<\/span><\/a><span style=\"font-weight: 400;\"> that allow you to create private networks and control access to instances and applications;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Encryption in transit with TLS on all services;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Connectivity options that allow private or dedicated connections from the office or business environment.<\/span><\/li>\n<\/ol>\n<p><span style=\"font-weight: 400;\">Most frequent question is: <strong>where do my data go?<\/strong><\/span><\/p>\n<p><span style=\"font-weight: 400;\">What is certain is that they don&#8217;t dissolve in the clouds. AWS data centers have been designed to guarantee solid protection to protect customer&#8217;s privacy. All datas are stored in highly secure data centers in which staff can&#8217;t go in. Data centers are stored in<\/span><b> 49 availability zones distributed in 18 geographical regions all over the world. <\/b><span style=\"font-weight: 400;\">A new expansion plan has been announced: with 12 new availability zones and 4 additional regions in Bahrain, Hong Kong, Sweden and a second AWS GovCloud region in the US, the storage space will be &#8220;infinite&#8221;. In addition, with AWS it&#8217;s possible to choose, physically, in which region store data. <\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-28430\" src=\"https:\/\/www.vmengine.net:443\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication.png\" alt=\"\" width=\"1024\" height=\"737\" srcset=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication.png 1101w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication-300x216.png 300w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication-1024x737.png 1024w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication-768x552.png 768w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/aws-security-surface-api-authentication-720x518.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p><span style=\"font-weight: 400;\">All this without losing sight of your data through tools that allow you to keep the AWS environment under control. How? With enhanced visibility on<\/span><i><span style=\"font-weight: 400;\"> API calls through<\/span><\/i><a href=\"https:\/\/aws.amazon.com\/cloudtrail\/?nc1=h_ls\"> <i><span style=\"font-weight: 400;\">AWS CloudTrail<\/span><\/i><\/a><span style=\"font-weight: 400;\">, log aggregation options and alert <\/span><b>notifications<\/b><span style=\"font-weight: 400;\"> by<\/span><a href=\"https:\/\/aws.amazon.com\/cloudwatch\/?nc1=h_ls\"> <i><span style=\"font-weight: 400;\">Amazon CloudWatch<\/span><\/i><\/a><i><span style=\"font-weight: 400;\">. <\/span><\/i><span style=\"font-weight: 400;\">AWS allows you to define, apply and manage user access policies on all AWS services.<\/span><\/p>\n<p><span style=\"font-weight: 400;\">But now we come to<\/span><b> responsibility. <\/b><span style=\"font-weight: 400;\">A single word that can be scary but not according to the Aws philosophy based on<\/span> <a href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/?nc1=h_ls\"><b>shared <\/b><\/a><b>responsibility<\/b><span style=\"font-weight: 400;\">. This model has a double utility: helps customers to relieve from operational burden because AWS deals with protecting global infrastructure on which all services are performed while the customer will be responsible for the guest operating system (including security updates and patches), other application software and security group firewall configuration provided by AWS. Generally, almost all Aws service&#8217;s require that customer perform certain configuration and security management tasks, according to public <\/span><a href=\"https:\/\/aws.amazon.com\/whitepapers\/?nc1=h_ls\"><span style=\"font-weight: 400;\">White Paper<\/span><\/a><span style=\"font-weight: 400;\"> on AWS portal. As the image shows, customers will know well what is his area of responsibility and which instead of the provider.<\/span><\/p>\n<p><img decoding=\"async\" class=\"alignnone size-large wp-image-28443\" src=\"https:\/\/www.vmengine.net:443\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG.png\" alt=\"\" width=\"1024\" height=\"522\" srcset=\"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG.png 1200w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG-300x153.png 300w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG-1024x522.png 1024w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG-768x392.png 768w, http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/SHARED-RES-ENG-720x367.png 720w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>Despite all the efforts of AWS (and ours) to tell the best and the most possible\u00a0simply the concept of Shared Responsibility, surely <a href=\"https:\/\/www.linkedin.com\/in\/kate-z-turchin\">Kate Turchin<\/a> has defeated the competition, explaining all in only 1:54 minutes, and in its own way &#8230;<\/p>\n<p><iframe src=\"https:\/\/www.youtube.com\/embed\/tIb5PGW_t1o\" width=\"854\" height=\"480\" frameborder=\"0\" allowfullscreen=\"allowfullscreen\"><\/iframe><br \/>\n<span style=\"font-weight: 400;\">And in case of <\/span><b>DDoS attacks<\/b><span style=\"font-weight: 400;\">? There&#8217;s some news that scares insiders: in 2017, 7.5 million attacks were launched. We are talking about 57% of companies and 45% of data center operators who have been saturated of their Internet band in the last year. In 56% of cases, the financial impact of attacks was calculated between 10,000 and 100,000 dollars. AWS&#8217;s customers benefit from services and technologies designed to<\/span><b> resist DDoS attacks.<\/b><\/p>\n<p><span style=\"font-weight: 400;\">But that&#8217;s not all. AWS offers the opportunity to add a security layer to Cloud inactive data, providing <\/span><b>scalable and efficient encryption features. <\/b><span style=\"font-weight: 400;\">Here are the following:<\/span><\/p>\n<ul>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Data encryption capabilities available in AWS storage and database services, such as EBS, S3, Glacier, Oracle RDS, SQL Server RDS, and Redshift;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Flexible key management options, including AWS Key Management Service;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Hardware-based dedicated key storage using AWS CloudHSM to improve compliance;<\/span><\/li>\n<li style=\"font-weight: 400;\"><span style=\"font-weight: 400;\">Finally, AWS provides API that integrates cryptography and data protection with developed or deployed business services in AWS environment.<\/span><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-medium wp-image-28431 alignleft\" src=\"https:\/\/www.vmengine.net:443\/wp-content\/uploads\/2018\/01\/pexels-photo-533189.jpeg\" alt=\"\" width=\"300\" height=\"225\" \/><\/p>\n<p><span style=\"font-weight: 400;\">At this stage,it&#8217;s necessary to put oneself in the right hands. Relying on \u00a0cloud professionals able to provide assistance and, why not, solutions. We have been doing this for 10 years, we were born with Cloud Computing and we know all the secrets. But mostly we are a company and we stand on company&#8217;s side,\u00a0and so we will remain at your disposal for any doubts and\/or further requests.<\/span><\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;<\/p>\n<p>&nbsp;\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"et_pb_module et_pb_text et_pb_text_75  et_pb_text_align_left et_pb_bg_layout_light\">\n<div class=\"et_pb_text_inner\">\n<blockquote>\n<p style=\"text-align: center;\">Data is the key on which depends the success of an application deployment in the cloud.<\/p>\n<p style=\"text-align: center;\">The migration assessment and planning process must highlight the physical limitations inherent in data migration from the local path to the cloud.<\/p>\n<p style=\"text-align: center;\">We put at your disposal the experience and expertise of our Cloud Architect and SysOps highly specialized in the management of the AWS suite of tools, which will simplify every operation.<\/p>\n<p style=\"text-align: center;\">You need a Cloud Migration for your Business,\u00a0the staff of VMEngine will be at your disposal<\/p>\n<\/blockquote>\n<\/div><\/div>\n<\/p><\/div>\n<\/p><\/div>\n<div class=\"et_pb_row et_pb_row_89\">\n<div class=\"et_pb_column et_pb_column_4_4 et_pb_column_86  et_pb_css_mix_blend_mode_passthrough et-last-child\">\n<div class=\"et_pb_button_module_wrapper et_pb_button_7_wrapper et_pb_button_alignment_center et_pb_module \">\n\t\t\t\t<a class=\"et_pb_button et_pb_button_7 et_animated et_pb_bg_layout_light\" href=\"https:\/\/calendly.com\/vmengine\" target=\"_blank\">Book now your meeting for a Technical Assessment<\/a>\n\t\t\t<\/div>\n<\/p><\/div>\n<\/p><\/div>\n<\/p><\/div>\n","protected":false},"excerpt":{"rendered":"<p>&#8220;All that is outside of you can be subtracted at any time, just what&#8217;s inside of you is safe&#8220;. This is a quote of the british ghostwriter Jeannette Winterson. What is true for human \u00a0it&#8217;s even more for companies, especially for those that works in internet world. Cloud Security is a particularly debated and controversial [&hellip;]<\/p>\n","protected":false},"author":3,"featured_media":29390,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[97,5033,5038],"tags":[3445,71,132,5061,5036,5027,1200,3442,3443,5031],"class_list":["post-28419","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-blog-en","category-blog-2","category-in-evidenza-2","tag-amazon-firewall","tag-amazon-web-services","tag-amazon-web-services-en","tag-autoscalabilita-aws-2","tag-aws-shared-responsibility-2","tag-cloud-privacy-2","tag-cloud-security","tag-firewall-amazon","tag-risoluzione-attacchi-dos","tag-scalabilita-cloud-2"],"aioseo_notices":[],"jetpack_featured_media_url":"http:\/\/temp_new.vmenginelab.com\/wp-content\/uploads\/2018\/01\/PURE-Blue-Banner-62-1-1-scaled.jpg","amp_enabled":true,"_links":{"self":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/28419","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/comments?post=28419"}],"version-history":[{"count":1,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/28419\/revisions"}],"predecessor-version":[{"id":41310,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/posts\/28419\/revisions\/41310"}],"wp:featuredmedia":[{"embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media\/29390"}],"wp:attachment":[{"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/media?parent=28419"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/categories?post=28419"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/temp_new.vmenginelab.com\/en\/wp-json\/wp\/v2\/tags?post=28419"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}