Extensive set of security services needed | Daily News


Extensive set of security services needed

To ensure complete customer control of data and industry leading to privacy, security
President Public Sector, India & South Asia, Amazon Internet Services Private Limited, Rahul Sharma.
President Public Sector, India & South Asia, Amazon Internet Services Private Limited, Rahul Sharma.

Customers should be provided with the most extensive set of security services and encryption to help ensure complete customer control of data and industry leading privacy and security protections when using cloud based products and services , President – Public Sector, India & South Asia, Amazon Internet Services Private Limited, Rahul Sharma told the Daily News Finance last week in Colombo.

He said that the Amazon Web Services (AWS) Cloud has been architected to be one of the most flexible and secure cloud computing environments available today. Security is job zero at AWS and always vigilant about their customers’ privacy and security. Examining the AWS cloud, it could be seen that the same security isolations are employed as would be found in a traditional data center. These include physical data center security, separation of the network, isolation of the server hardware, and isolation of storage.

“We have a shared responsibility model with the customer; AWS manages and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate, and AWS customers are responsible for building secure applications,” he said.

Moreover they provide a wide variety of best practices documents, encryption tools, and other guidance that the customers can leverage in delivering application-level security measures. In addition, AWS partners offer hundreds of tools and features to help customers to meet their security objectives, ranging from network security, configuration management, access control, and data encryption.

“For example, lots of CIOs worry about the rogue server under a developer’s desk running something destructive or that they don’t want running. Today, it’s really hard (if not impossible) for CIOs to know how many such rogue servers there are and where they might be,” he said.

In order to overcome this, AWS provides tools such as AWS Config and resource tagging to see exactly what cloud assets their company is using at any moment, AWS CloudTrail where customers can log, continuously monitor, and retain account activity related to actions across their AWS infrastructure, which simplifies security analysis, resource change tracking, and troubleshooting (AWS CloudTrail is enabled on all AWS accounts without any configuration necessary), Amazon Macie which is a security service that uses machine learning to help customers prevent data loss by automatically discovering, classifying, and protecting sensitive data in AWS.

AWS also has achieved a number of internationally recognized certifications and accreditations, demonstrating compliance with third party assurance frameworks, such as ISO 27017 for cloud security, ISO 27018 for cloud privacy, and SOC 1, SOC 2 and SOC 3. Customers can be PCI and HIPAA compliant on AWS, and we have achieved important certifications like FedRAMP at the Moderate and High levels, as well as SRG Impact Levels 2, 4, 5 and 6 for DoD systems.

These certifications help support customer compliance with requirements such as ITAR, FISMA, CJIS, and NIST 800-53 and 171. They have also obtained ISO9001 which is primarily for healthcare, life sciences, medical devices, automotive and aerospace.

Visit Kapruka.com Sri Lanka's Largest online shop. Over 125,000 unique categories such as Fresh Flowers, Cakes, Food, Jewllery, Childrens Toys and other Sri Lankan e-commerce categories. Low delivery cost to most cities here and free delivery in Colombo.

Add new comment