Presentation given during Start Up Day Hong Kong on September 15, 2017 within the Architecture track
The ForgeRock Identity Platform is trusted by companies around the world to be their foundation for digital transformation. ForgeRock extends their leadership in this space with the latest release of the ForgeRock Identity Platform, featuring advanced capabilities to meet the needs of today’s consumer facing digital services. In this webinar, learn how new features improve customer engagement and insight, offer greater privacy controls, extend security and usability for internet of things (IoT), enable DevOps and dynamic architectures, and more.
Azure AD & Azure AD B2C provide identity and access management services. Azure AD is primarily for enterprise use, allowing single sign-on for Office 365, Azure, and other cloud services. It offers features like multi-factor authentication, application access control, and on-premises Active Directory synchronization. Azure AD B2C is designed more for consumer-facing apps and allows fully customizable login experiences and identity providers like social accounts and local usernames. Both services provide user management and authentication capabilities for applications.
by Quint Van Deman, Sr. Business Development Manager, AWS Amazon Cognito lets you add user sign-up, sign-in, and access control to your web and mobile apps quickly and easily. Amazon Cognito scales to millions of users and supports sign-in.
OAuth and OpenID Connect are the two most important security specs that API providers need to be aware of. In this session, Travis Spencer, CEO of Curity, will cram in as much about these two protocols as will fit into 20 minutes.
The OAuth 2.0 authorization framework enables a third-party application to obtain limited access to an HTTP service, either on behalf of a resource owner by orchestrating an approval interaction between the resource owner and the HTTP service, or by allowing the third-party application to obtain access on its own behalf.
CloudFront is Amazon's content delivery network (CDN) that caches copies of content across a global network of edge servers to improve performance and reduce latency. It uses a distribution configuration to determine how to route requests for content to the optimal edge location. Origins specify the source of the content. CloudFront delivers content through its edge locations, improving load times, providing high bandwidth, and ensuring availability. Many companies use CloudFront to deliver media, software downloads, web assets and even dynamic content through features like cache behaviors and multiple origins. Getting started is self-service through the AWS Management Console or APIs.
This document discusses security best practices when using AWS. It covers the shared responsibility model between AWS and customers, leveraging AWS security features, understanding customer needs to form a security stance, and engaging security assessors early. It provides an overview of identity and access management tools like IAM, security groups, VPCs and direct connects. The document emphasizes applying a "security by design" approach when building on AWS.
발표영상 다시보기: https://youtu.be/il8wpd7gxe8 CI/CD 기술을 통해 팀은 민첩성을 높이고 고품질 제품을 신속하게 출시 할 수 있습니다. 이 강의에서는 컨테이너화 된 응용 프로그램을 관리 할 수 있도록 CI/CD 워크 플로우 작성을위한 모범 사례를 안내합니다. AWS Cloud Development Kit를 사용하여 코드 애플리케이션 모델로 인프라를 다루고 AWS CodePipeline 및 AWS CodeBuild를 사용하여 CI/CD 릴리스 파이프 라인을 설정하는 방법을 보여줍니다. 마지막으로 AWS CodeDeploy를 사용한 안전한 배포 자동화에 대해 설명합니다.
In this session, we will walk through the fundamentals of Amazon Virtual Private Cloud (VPC). We will discuss core VPC concepts including picking your IP space, subnetting, routing, security, NAT and VPC Endpoints.
Azure Event Grid is an event service built for modern applications. Learn about what is Azure Event Grid and how you can use it for an event driven architecture in the cloud.
AWS 클라우드 핵심 서비스로 클라우드 기반 아키텍처 빠르게 구성하기 문종민 솔루션즈 아키텍트, AWS 본 세션은 AWS를 처음 접하는 분들을 대상으로 AWS의 150여개 이상의 서비스들 중 가장 중심이 되는 컴퓨팅, 스토리지, 네트워크 등의 핵심 서비스를 기술적 관점에서 소개합니다. 클라우드에서 신규 서비스 구축 및 기존 데이터센터 워크로드를 이전할 때, Amazon EC2, S3 및 RDS, VPC 등의 서비스를 통해 어떻게 빠르게 AWS 상에서 시스템 구축할 수 있는지 살펴봅니다.
AWS Control Tower is a new AWS service for cloud administrators to set up and govern their secure, compliant, multi-account environments on AWS. In this session, University of York will discuss their implementation of AWS Landing Zone. We’ll also explain how AWS Control Tower automates AWS Landing Zone creation with best-practice blueprints.
The document discusses content delivery networks (CDNs) and Amazon CloudFront. A CDN improves performance and reliability by caching content across globally distributed edge servers close to users. CloudFront is AWS's CDN that provides low latency, high bandwidth, redundancy, scalability and cost-effectiveness. It supports dynamic and static content delivery via HTTP, RTMP and more. Customers can use CloudFront to improve website performance and user experience.
AWS에서 애플리케이션을 빌드하고 배포하려고 할 때 개발자와 애플리케이션에 올바른 권한을 부여하는 것은 보안에 매우 중요합니다. 이 과정에서는 AWS IAM의 주요 엔티티들에 대해서 알아보�� STS를 통한 임시 자격 증명, 자격 증명 연동 및 모범 사례 그리고 문제 해결에 대해서 개발자와 운영자 보안 담당자의 관점을 통해 입체적으로 알아봅니다.
This presentation walks through the Security and Compliance functionality to customers leveraging Azure as a compute environment. It includes deep-dive references to detailed information on each topic presented.
This document summarizes Amazon Web Services' (AWS) security processes and certifications. It discusses AWS' SAS70 Type II certification, physical security measures, data backup processes, multi-factor authentication, virtual machine isolation, network security controls, and use of encryption and virtual private clouds. The document is intended to provide an overview of AWS' security practices and resources for customers.
Presentation given during Start Up Day Hong Kong on September 15, 2017 within the Architecture track
This document describes building a real-time chat backend using AWS IoT. AWS IoT provides a managed WebSocket that allows building simple, scalable, and extensible client applications. The document demonstrates connecting mobile clients to AWS IoT topics using the IoT SDK, subscribing and publishing messages, and using IoT rules to trigger actions like mobile push notifications based on topic data.
NASA LandSat data can be stored, transformed, navigated, and visualized. In this session we will explore how the LandSat dataset is stored in Amazon Simple Storage Service (S3), one of the recommended cloud storage services in AWS for storage of petabytes of data, and how data stored in S3 can be processed on the server with the Lambda service, visualized for users, and made available to search engines. Create by: Ben Snively, Senior Solutions Architect
The document discusses AWS Security Token Service (STS), which enables users to request temporary security credentials. STS works with AWS Identity and Access Management (IAM) to provide credentials for IAM users or federated users authenticated outside of AWS. STS allows generating limited-privilege credentials for IAM users, federated users authenticated by an identity provider, and for delegating access to services that need to access AWS resources. The temporary credentials provided by STS can be used to make AWS API calls for the duration specified, providing a secure way to access AWS resources without long-term credentials.
お手軽に利用でき、大小あらゆる配信規模に対応してくれるCDNサービスCloudFrontの一歩踏み込んだ使いドコロを紹介します。 昨今激増しているモバイルデバイス向け動画配信におけるセキュアな動画配信と、Redshiftを組み合わせたお安く実現するリアルタイム性の高いレポーティングインフラについてご紹介します。
2015年12月2日に放送したAWS IoTの回の資料です。今後の予定は以下をご覧ください。 http://aws.amazon.com/jp/about-aws/events/#webinar
AWS IoT is a managed cloud platform that can support billions of devices and trillions of messages, and can process and route those messages to AWS endpoints and to other devices reliably and securely. In this session we look at patterns and architectures for developing connected applications using AWS IoT. We dive into demo applications that tie together physical IoT devices, web browsers, identity providers, and mobile devices to create smart, connected applications using Amazon Web Services. Speaker: Adam Larter, Solutions Architect, Amazon Web Services Featured Customer - Tekt Industries
"AWS Greengrass & IoT demo" - by Jeremy Cowan, Solutions Architect at Amazon Web Services This presentation was given at the AWS Chicago user group event on 22 March 2017 on the Internet of Things (IoT) https://www.meetup.com/AWS-Chicago/events/237737145/ @jicowan
This session will introduce best practices for IoT security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services. As a result, you are able to scale and innovate, while maintaining a secure environment.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This tech talk will introduce the best practices for IoT Security in the cloud and the access control mechanisms used by AWS IoT. These mechanisms can be used to not only securely build and provision devices, but also to integrate devices with other AWS services to create secure solutions. Learning Objectives: • Learn common Internet of Things security issues • Learn about AWS IoT security and access control mechanisms • Learn how to build secure interactions with the AWS Cloud
You have already started connecting your devices to AWS IoT. You can control them from the cloud. And you can collect, store and analyse data from all your devices in the cloud. So far so good, but you now need to build an architecture that will serve millions of users and devices concurrently. In this session, Jan will explain how you can build a real world IoT architecture that serves millions of devices. The talk will focus on user and device onboarding, device and user access management, message exchange and end user access to live and historical data stored in the cloud. Learning objectives: - Learn simple steps to build a real-world IoT architecture that serves millions of devices - Understand how to onboard and manage users and IoT devices and to access live and historial data in the cloud
AWS IoT and building an Internet connected camera. The document discusses connecting physical devices to AWS IoT using MQTT or HTTP protocols for secure communication. It describes using AWS IoT services like the rules engine to route messages, device shadows to sync state, and device registry for identity management. It provides an example of building an Internet connected camera with Raspberry Pi that takes pictures on button press and uploads to S3, notifying users via subscribed topics.
The growing popularity and breadth of use cases for IoT are challenging the traditional thinking of how data is acquired, processed, and analyzed to quickly gain insights and act promptly. Today, the potential of this data remains largely untapped. In this session, we explore architecture patterns for building comprehensive IoT analytics solutions using AWS big data services. We walk through two production-ready implementations. First, we present an end-to-end solution using AWS IoT, Amazon Kinesis, and AWS Lambda. Next, Hello discusses their consumer IoT solution built on top of Amazon Kinesis, Amazon DynamoDB, and Amazon Redshift.
Whether you are building an e-commerce site or a business application, security is a key consideration when architecting your website or application. In this session, you will learn more about some of the things CloudFront does behind the scenes to protect the delivery of your content such as OCSP Stapling and Perfect Forward Secrecy. We will also share best practices on how you can use CloudFront to securely deliver content end-to-end, control who accesses your content, how to shield your origins from the Internet, and getting a A+ on SSL labs.
Solstice and Amazon Web Services (AWS) will present the benefits and use cases of edge computing, including an overview AWS IoT and the newly launched AWS Greengrass. AWS IoT closes the gap between physical and digital with things, internet and connectivity. AWSGreengrass enables connected devices running on AWS’s technology to process data locally-- reducing latency, allowing offline functionality, improving security, and more. We’ll share best practices for building with edge computing and Greengrass, and how you can apply it to your current and future IoT solutions. Solstice will also walk through a real-life implementation of AWS IoT and AWS Greengrass that was showcased at AWS re:Invent 2016. Speakers: • Chris Munns, Senior Developer Advocate, AWS • Andrew Whiting, VP of Business Development, Solstice • Pat Smolen, Sr. Technical Consultant, Solstice.
Presentation from AWS Worldwide Public Sector team's conference Building and Securing Applications in the Cloud (http://aws.amazon.com/campaigns/building-securing-applications-cloud/).
by Fritz Kunstler, Sr. AWS Security Consultant AWS Join us for four days of security and compliance sessions and hands-on labs led by our AWS security pros during AWS Security Week at the San Francisco Loft. Join us for all four days, or pick just the days that are most relevant to you. We'll open on Monday with Security 101 day, followed by sessions Tuesday on Identity and Access Management, our popular Threat Detection and Remediation day Wednesday will feature an updated GuardDuty lab, and we'll end Thursday with Incident Response sessions, labs, and a talk by Netflix on their new open source IR tool. This week will also feature Dome9 as a sponsor, and you can hear them speak and present a hands-on workshop Monday during Security 101 day.
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. This webinar will introduce the lifecycle of an IoT thing and the mechanisms used by AWS IoT to manage things. These mechanisms can be used to securely build and provision things, manage deployment, manage thing health, and integrate with other AWS services. And when the life of the thing has come to an end, we will show you how to retire the thing, keeping your solution secure. Learning Objectives: • Common IoT Thing Management Issues • AWS IoT Security and Access Control Mechanisms Who Should Attend: • Technical Decision Makers, Developers, Makers
AWS IoT is a managed cloud platform that lets connected devices easily and securely interact with cloud applications and other devices. In this tech talk, we will discuss how constrained devices can leverage AWS IoT to send data to the cloud and receive commands back to the device from the cloud using the protocol of their choice. We will use the AWS IoT Starter Kit to demonstrate building a real connected product, securely connect with AWS IoT using MQTT, WebSockets, and HTTP protocols, and show how developers and businesses can leverage features of AWS IoT like Device Shadows and the Rules Engine, which provides message processing and integration with other AWS services.