Industry information

Let security compliance become air and water to help cloud business grow freely From Amazon cloud technology Gufan

The following is the Let security compliance become air and water to help cloud business grow freely From Amazon cloud technology Gufan recommended by recordtrend.com. And this article belongs to the classification: Industry information.

Author: Gufan, general manager of Strategic Business Development Department of Amazon cloud technology in Greater China

At present, the “Great Migration” of many enterprises and institutions to the cloud continues, and security compliance has not surprisingly become one of the important key factors in considering and selecting cloud platforms. When we migrate more and more important and sensitive data to the cloud, our vigilance against security threats such as data leakage and information theft is bound to increase day by day.

With the development of innovative technologies, more and more enterprise cloud computing security concepts begin to change from limiting business development to enabling growth. In the past, when people saw that those leading enterprises have stepped up the construction of network security teams, or increased capital investment in data security and compliance, it may be more difficult to jump out of such a misunderstanding – Security compliance means restrictions and burdens. For example, many enterprises will regard “security compliance” as an independent project separated from the business. The former is only the responsibility of the security experts of the IT team, and believe that the probability of security and compliance will bring restrictions on business development and additional costs.

Whether this kind of thinking is reasonable or not, it is no longer applicable to the cloud computing environment. Cloud platforms and services make it unnecessary for enterprises to build a security compliance system from scratch. Those basic and trivial infrastructure security and compliance issues will become the responsibility of cloud service providers, and enterprises will no longer need to invest the initial cost. On the other hand, cloud service providers serving a large number of users use large-scale security services to bring more visual and automated services, enabling users to achieve the established security goals with less cost and more streamlined manpower. To sum up, Cloud Security compliance is expected to become the norm that enterprises can immediately own. It no longer means a burden and hindrance to enterprises, but a cooperative force to promote business development.

Amazon cloud technology has been committed to making security compliance the “air and water” that users can automatically obtain and effectively support business development. Although we also have excellent security experts, security is never a unique responsibility of a team or to provide countermeasures against certain threats. Since its inception, Amazon cloud technology has made security the highest priority (job zero), and is committed to forming a security culture concept that everyone is responsible and everyone participates. This enables us to not only ensure the security compliance of users on the cloud, but also enable users to get a better security service experience on the cloud.

Safety is a “job zero” in which everyone is responsible and all employees participate

Andy Jassy, the current president and CEO of Amazon, proposed that “security is our ‘job zero’ when he founded Amazon cloud technology.” It means that safety is more important than anything else and has the highest priority in all work. In the past 16 years, “job zero” has always been an important corporate culture that Amazon cloud technology has always adhered to.

Our implementation of “job zero” is far from just launching some technologies or products, but also making it a mechanism and way of doing things. The management, including the CEO of Amazon cloud technology, holds a special security meeting every week, and the security team can also report smoothly to the CEO and other management. We need to ensure that any strategic or tactical decision can make the right choice with full consideration of security needs.

The “job zero” safety concept also includes everyone in the company from bottom to top. Not only the top management and security team of the company, but also every supervisor, manager, engineer and developer… Everyone bears the responsibility for security. Every service provided by Amazon cloud technology will not consider functionality and security separately. In fact, these services have been placed on the “base” of security and compliance since their birth, which also makes security and compliance a natural gene of cloud services. Of course, the security team of Amazon cloud technology will also cooperate with the business department at any time. In fact, many service R & D teams have their own security officers to ensure that the development process is always kept within the security framework.

Make security compliance the “air and water” on the cloud

“Job zero” is not only a culture that Amazon cloud technology promotes security and business to complement each other, but also enables us to continuously bring users a secure cloud computing environment that can fully ensure business development. When users migrate data and computing to Amazon cloud technology, we hope to make users feel that security compliance is like “air and water” – both readily available and conducive to business growth.

This is why Amazon cloud technology does not set performance targets for security compliance services. Security compliance is as important and necessary to business as air and water. We have the responsibility to help users obtain a secure cloud environment free from threats and concerns, and do not have to bear too many additional costs for “air and water”.

We hope that security compliance is the air and water on the cloud, but it does not mean that the scope to be managed by Amazon cloud technology has no boundaries. Where is the boundary? It lies in the ownership and full control of the data, applications, access rights and other elements placed on the cloud. We put forward a “security responsibility sharing model” and divided responsibilities and rights: Amazon cloud technology is responsible for the security of the cloud itself, and users are responsible for the security in the cloud, but we will help customers build security protection in the cloud.

Specifically, the security and compliance construction of Amazon cloud technology for the cloud environment includes the following aspects: infrastructure, services, the principles for users to own and control data, and global security and compliance certification.

First, cloud security begins with infrastructure. Amazon cloud technology provides highly scalable and highly reliable infrastructure, adopts a variety of redundant and hierarchical control data centers, and uses a lot of automation to ensure the underlying infrastructure 7 × 24-hour monitoring and protection, as well as response and response to business continuity and disaster recovery. In addition, the security of infrastructure is completely “equal” to every customer using Amazon cloud services. Whether it is a large-scale enterprise or a small and micro enterprise, the infrastructure security obtained on the cloud is exactly the same. Therefore, infrastructure security can also be regarded as one of the most significant advantages of cloud computing, allowing users to bid farewell to the huge security costs of traditional data centers.

Second, cloud security is more than just security services. We should not only look at the number of security services, but also consider the security of all cloud services. This is also the important purpose of the “job zero” mentioned above, that is, each service should give priority to solving security problems during research and development. If there are security risks in the service, it will not be launched. In addition, we automate and reduce risk through deep integration between services. Amazon cloud technology has a complete set of security operation and maintenance processes, systems and best practices to ensure the security of the cloud itself. We can deal with risks, but the better choice is to avoid risks.

Third, adhere to the concept that users own and control data. We always insist that users have their own data and can operate the data independently. However, we will not “exempt” the security of data because users own and control data. Data encryption of Amazon cloud technology is everywhere. Data flow and access to infrastructure will be accompanied by automatic encryption of the physical layer. We will also provide users with the control and visibility they need to help customers prove that data complies with local and regional data privacy laws and regulations. Our infrastructure around the world can also help customers meet the requirements of data localization.

Finally, in terms of compliance, Amazon cloud technology has obtained 98 security standards and compliance certification in the world, and regularly carries out third-party verification on thousands of global compliance. Users of Amazon cloud technology can directly inherit it. In China (where the new halo network operates in Beijing and the Western cloud data operates in Ningxia), both Western cloud data and the new halo network have passed the verification of independent third-party institutions, completed the three-level evaluation of network security protection, and also obtained the service evaluation of credible cloud from China information and Communication Research Institute. In addition, we have also obtained a series of current security and compliance requirements, such as ISO information security quality management certification, PCI-DSS, SOC, etc.

In addition to ensuring the security of the cloud environment itself, Amazon cloud technology also provides users with multi-layer protection services to further help users improve their security compliance after they go to the cloud. In order to achieve an unlimited approach to 100% cloud computing security, we also build a 1+1>2 security cooperation with the world’s rich Amazon cloud technology partner network members. Amazon cloud technology APN partner network provides hundreds of leading security compliance solutions, including consulting services focusing on data protection compliance. At present, we are constantly introducing Amazon cloud technology’s global partner network members to China, and increasing cooperation with Chinese local partner network members to provide customers with more solutions to better meet the security and compliance needs of Chinese users in domestic and international businesses.

Although cloud computing has gone through more than ten years of development, it is still in a very early stage. Whether in the world or in China, the proportion of total it expenditure used for public cloud is still in single digits. From a long-term perspective, we believe that cloud computing security compliance is not only to solve immediate threats or improve technical capabilities, but also to test the evolution of security thinking and mechanism establishment between cloud service providers and cloud computing users. Compared with solving independent problems, changes in thinking and concepts will enable us to better adapt to the security and compliance requirements of the cloud environment and turn it into a new driving force for digital transformation and business development. More reading: Amazon cloud technology speeds up the implementation of security compliance services in China, and joins hands with Deloitte to launch the security operation center cloud computing security compliance enhancement: Amazon cloud technology deepens the two systems AWS joins hands with multiple APN partners to meet the global security compliance needs of Chinese customers Amazon memorydb for redis is officially available in China. Amazon cloud technology China launched the Devops service Amazon codepip Eline Zhongke Chuangda zoupengcheng: worked closely with Amazon cloud technology to build an intelligent system platform integrating end, edge and cloud. Amazon cloud technology empowers Zhixin vision to realize intelligent heating and help the heating industry save energy and reduce emissions. Amazon cloud technology Gu fan: modern application, It is the best solution to “uncertainty”. Amazon cloud technology: a key technology bridge for Chinese enterprises to innovate at sea. Amazon cloud technology helps Roche Group fully release the value of healthy big data. Adidas will migrate the sap environment to Amazon cloud technology, Realize the digital transformation of core business AIG, the global insurance giant, selects Amazon cloud technology as the preferred public cloud provider Amazon cloud technology launched three new database functions Amazon cloud technology announced that Amazon private 5g enterprises can easily deploy and expand 5g private network Amazon cloud technology launched three new Amazon EC2 instances edit related posts supported by self-developed chips

If you want to get the full report, you can contact us by leaving us the comment. If you think the information here might be helpful to others, please actively share it. If you want others to see your attitude towards this report, please actively comment and discuss it. Please stay tuned to us, we will keep updating as much as possible to record future development trends.

RecordTrend.com is a website that focuses on future technologies, markets and user trends. We are responsible for collecting the latest research data, authority data, industry research and analysis reports. We are committed to becoming a data and report sharing platform for professionals and decision makers. We look forward to working with you to record the development trends of today’s economy, technology, industrial chain and business model.Welcome to follow, comment and bookmark us, and hope to share the future with you, and look forward to your success with our help.

Related Articles

Leave a Reply

Your email address will not be published. Required fields are marked *

Back to top button