-
Security Domains
-
Identity & access management
-
Use cases
- Manage access and federation
- Identify assets, workloads and allowed relationships
- Establish organizational-wise guardrails
- Map to one or more security frameworks
and identify gaps that need addressing
-
Native services
- AWS Identity & Access Management (IAM)
- AWS Single Sign-On
- Amazon Cognito
- AWS Directory Service
- AWS Config
- AWS Resource Access Manager
- AWS Organizations
-
Security monitoring & threat detection
-
Use cases
- Increase visibility across accounts & regions
- Enhance security posture
- Detect and investigate findings and security alerts
- Automate responses natively and/or with 3party solutions
-
Best practice
-
Native services
- AWS Security Hub
- Amazon GuardDuty
- Amazon Inspector
- Amazon Detective
- AWS CloudTrail
- AWS IoT Device Defender
-
Edge/perimeter protection
-
Use cases
- Ensure information to/from cloud is protected at all times
- Protect against DDoS attacks
- Protects against application attacks
- Monitor and alert on internal malicious traffic
-
Native services
- AWS Network Firewall
- AWS Shield
- AWS Web Application Firewall (WAF)
- Amazon Route53 Resolver DNS Firewall
- AWS Firewall Manager
-
Data Protection
-
Use cases
- Identify and protect sensitive data
- Encrypt data in motion and at rest
- Implement regional and data sovereignty use cases
- Recover from incidents
-
Native services
- Amazon Macie
- AWS Key Management Service (KMS)
- AWS CloudHSM
- AWS Certificate Manager
- AWS Secrets Manager
- CloudEndure Disaster Recovery
-
Compliance & data privacy
-
Use cases
- Implement privacy and compliance controls
- View and collect data to support audit requirements
-
Native services
- AWS Artifact
- AWS Audit Manager
- Wickr
-
Alignment against NIST
-
AWS Managed Services
- AWS Managed Services FAQs
-
Use cases
- Accelerated Data Center Migration
- Turnkey Cloud Operating Model
- Staff Augmentation
-
AMS Business Value
-
Why AMS ?
- Availability - Proactive monitoring, incident management, and backup
- Efficiency - Improved operational efficiency and cost savings
- Compliance - Acts as compliance acclerator, like PCI, SOC, ISO etc
- Security - Detective Controls & Remediations
-
What is AMS?
-
In the cloud Operational Excellence Provider
- Designated named resources, CSDM, CA
- 24/7 Operation
- SLA backed by finacial credit
-
AMS Scope and limitations
- AMS Service Description clearly documents AMS scope and RACI
- AMS do not manage customer application and data layer, we
help customer with their AWS infrastructure Operation
-
Where does AMS fit?
- In the business as usual (BAU), Operate phase
-
How is AMS different from Enterprise Support?
- How is AMS different from Enterprise Support?
-
Does AMS lock in?
-
AMS Contract is month on month
- Customer can keep the AMS best practice
and learning after AMS is out
- NO, there is no lock in with AMS
-
How about AWS Partner working with AMS
-
AMS loves Partners. AMS has a curated list of Partners
- Partner can reduce significant operational
risk and cost when working with AMS
- Considerable number of our deals are partner led
-
AMS for Mutlti or Hybrid Cloud
- As of now AMS is only available for AWS
-
AMS Operation Plans
-
Accelerate
- Recommended when customer is already
in AWS and prefers augmentation
- User guide
-
Advanced
- Recommended when customer is
looking for a full end-to-end solution
- User guide
- Onboarding guide
- AMS responsibility
matrix (RACI)
- Information resources
- Supported AWS services
-
Features
- Logging, Monitoring, Guardrails, and Event Management
- Continuity management (Backup and Restore)
- Security and access management
- Patch management
- AMS standard patch for traditional account-based patching, and
- AMS Patch Orchestrator, for tag-based patching.
- Change management
- Submit provisioning and configuration Requests for Change (RFCs)
- Deploy through AWS Service Catalog
- Deploy through Direct Change mode
- Deploy through Developer mode. Remember that the resources created through the Developer mode are not managed by AMS.
- Configure AWS services directly using self-service provisioning for select AWS services (see Supported AWS services).
- Incident management
- Problem management
- Reporting
- Service request management
- Service Desk (24x7 365 days a year)
- Designated resources
- Cloud Service Delivery Manager
- Cloud Architect
- Developer mode
- AWS support
- Customer-managed account
- Firewall management
- Compliance
- Detailed side-by-side table
-
Operations on Demand
- Curated catalog
- Operational expertise
- Pay for what you use
- Customers
- Partners
- Resources
-
AWS Professional Services
- AWS Security Assurance Services LLC
(PCI-QSAC & HITRUST and others)
-
Learning & Guidance
- Shared Responsibility Model
- Whitepapers, Technical Guides, and Reference Materials
- Security Documentation
- Provable Security: Research and Insights
-
Training
- Cloud Audit Academy
- AWS Security Control Domains
- International Content
- Workshops
- Security Software - AWS Marketplace
-
Security Partners
-
Managed Security
Service Providers (MSSP)
-
Level 1 MSSP
Competency Partners
- AWS Infrastructure Vulnerability Scanning
- AWS Resource Inventory Visibility
- AWS Security Best Practices Monitoring
- AWS Compliance Monitoring
- Monitor and Triage Security Events
- 24/7 Incident Alerting and Response
- Distributed Denial of Service (DDoS) Mitigation
- Managed Intrusion Prevention System (IPS)
- Managed Detection and Response (MDR) for AWS-Based Endpoints
- Managed Web Application Firewall
- Managed Security Services
on AWS Marketplace
-
Security Competency
Partners
- Network and Infrastructure Security
- Host and Endpoint Security
- Data Protection and Encryption
- Governance, Risk, and Compliance (Software/Hardware)
- Logging, Monitoring, SIEM, Threat Detection, and Analytics
- Identity and Access Control
- Vulnerability and Configuration Analysis
- Application Security
- Security Engineering
- Governance, Risk, and Compliance
- Security Operations and Automation