{"id":43264,"date":"2020-08-10T00:00:00","date_gmt":"2020-08-10T00:00:00","guid":{"rendered":"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/h\/automate-compliance-aws-well-architected-framework.html"},"modified":"2020-08-10T00:00:00","modified_gmt":"2020-08-10T00:00:00","slug":"automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity","status":"publish","type":"post","link":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/","title":{"rendered":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One &#8211; Conformity"},"content":{"rendered":"<p><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/h\/best-practices-for-automated-compliance-\/best-practices-for-automated-compliance.jpg\"><\/p>\n<div><img decoding=\"async\" src=\"https:\/\/www.trendmicro.com\/content\/dam\/trendmicro\/global\/en\/devops\/20\/h\/best-practices-for-automated-compliance-\/best-practices-for-automated-compliance.jpg\" class=\"ff-og-image-inserted\"><\/div>\n<p><span class=\"body-subhead-title\">Transcript<\/span><\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [00:00]<br \/>Good morning everyone,&nbsp;thank you for joining us&nbsp;on&nbsp;today&#8217;s webinar.&nbsp;Before we get started a few housekeeping items,&nbsp;today&#8217;s topic is best practices for automated compliance in the&nbsp;AWS&nbsp;well architected framework. When you join today\u2019s webinar you selected to either join by phone or computer audio,&nbsp;if for any reason you would like to change that selection use that same audio pain in your control panel to change the selection.&nbsp;You can also from that control panel you have the option to submit your questions to present&nbsp;us&nbsp;today who I will introduce and if for any reason you couldn&#8217;t get if you couldn&#8217;t get your questions, we plan on responding to each of you through email.&nbsp;The deck itself will be available through slide share along with recording of the webinar so with that let&#8217;s get started.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [01:10]<br \/>So&nbsp;what are we going to cover today,&nbsp;we&#8217;re going to cover a little bit of&nbsp;what security is on&nbsp;AWS,&nbsp;we will&nbsp;then&nbsp;move on and talk a little bit about&nbsp;Cloud-One and&nbsp;Cloud-One&nbsp;Conformity and&nbsp;how it works with&nbsp;AWS. We&#8217;ll dive a little deeper&nbsp;on&nbsp;the well-architected framework,&nbsp;we will then go through all of the&nbsp;questions and answers at the end&nbsp;and then finish up with a bunch of next&nbsp;steps.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [01:36]<br \/>So&nbsp;I&nbsp;am joined by&nbsp;Aaron&nbsp;Ansari&nbsp;and&nbsp;Joe&nbsp;Henderson.&nbsp;I&nbsp;am&nbsp;Sameer Kumar&nbsp;Vasanthapuram,&nbsp;I&nbsp;am a&nbsp;Partner&nbsp;Solutions&nbsp;Architect at&nbsp;AWS,&nbsp;Aaron&#8217;s a&nbsp;VP&nbsp;of&nbsp;Sales at&nbsp;Trend&nbsp;Micro&nbsp;and&nbsp;Joe&nbsp;Henderson is&nbsp;the&nbsp;General&nbsp;Manager&nbsp;of&nbsp;North&nbsp;America at&nbsp;Edrans.&nbsp;So&nbsp;let&#8217;s talk a little bit&nbsp;of&nbsp;security&nbsp;on&nbsp;AWS&nbsp;and&nbsp;what that is. Before we get there let&#8217;s talk&nbsp;a little bit about&nbsp;why many organizations face&nbsp;challenges&nbsp;and,&nbsp;you know,&nbsp;why&nbsp;security has&nbsp;traditionally been so hard&nbsp;and it comes down to&nbsp;two different factors.&nbsp;One being the lack&nbsp;of visibility&nbsp;and the second being a lack of&nbsp;automation&nbsp;and they sort of play&nbsp;into&nbsp;each other. Lack of visibility really means in an&nbsp;on-premise&nbsp;environment&nbsp;it can be quite difficult to know what&nbsp;resources and data are out there at any&nbsp;given time,&nbsp;where it&#8217;s moving,&nbsp;who&#8217;s&nbsp;utilizing it,&nbsp;who&#8217;s accessing it. And to&nbsp;wrap&nbsp;your head&nbsp;around all of this you&nbsp;might be using&nbsp;multiple point solutions,&nbsp;each having&nbsp;their own silo of data&nbsp;and you have complex&nbsp;tooling&nbsp;and&nbsp;processes to get an&nbsp;accurate assessment of things like&nbsp;real-time inventory and&nbsp;inventing&nbsp;data. Many organizations just don&#8217;t have&nbsp;this level of responsibility&nbsp;either because they&#8217;re not&nbsp;tying all of this data together&nbsp;or they might not be&nbsp;getting that in&nbsp;real time.&nbsp;Without visibility it&#8217;s&nbsp;challenging for these organizations to&nbsp;adequately secure their infrastructure&nbsp;and to meet the security and&nbsp;compliance&nbsp;requirements.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [03:19]<br \/>The second part of&nbsp;it which&nbsp;is low&nbsp;degree of automation&nbsp;is another typical challenge that we see&nbsp;where we&#8217;re trying to get rid of these&nbsp;manual processes that are&nbsp;employed to remediate issues. So,&nbsp;if you&nbsp;think about&nbsp;it&nbsp;you&#8217;re probably copying&nbsp;and pasting&nbsp;information from one tool to another. You&#8217;re probably applying manual patches&nbsp;and it&#8217;s always been difficult to&nbsp;automate key security tasks due to these&nbsp;issues. These can be varying things,&nbsp;right,&nbsp;it can also be&nbsp;that you&nbsp;know third-party or homegrown&nbsp;tools don&#8217;t work with each other&nbsp;and so requires these manual&nbsp;processes to be in place. They also lead to inconsistent&nbsp;execution when you&nbsp;have to do these things manually which&nbsp;means you are also&nbsp;addressing things at a at a later point&nbsp;of time&nbsp;leading&nbsp;to a much later time to&nbsp;detection and&nbsp;much later time to response in most&nbsp;cases it also disrupts&nbsp;customer&nbsp;experience.&nbsp;So really the goal of&nbsp;automation&nbsp;is to programmatically handle tasks that&nbsp;would have been&nbsp;otherwise been done by&nbsp;IT&nbsp;staff. This is much easier in the cloud as&nbsp;you&#8217;ll see but&nbsp;this combination of lack of visibility&nbsp;into,&nbsp;you know,&nbsp;customers on their own&nbsp;environment&nbsp;and the lower degree of automation,&nbsp;really comprises&nbsp;an organization&#8217;s ability to move&nbsp;quickly and effectively and secure their&nbsp;on-premise&nbsp;environment. So&nbsp;traditionally organizations have been&nbsp;forced into a trade-off&nbsp;which is you can either choose to move&nbsp;quickly or&nbsp;you can choose&nbsp;to stay secure.&nbsp;And due to&nbsp;these overly manual processes,&nbsp;the infosec teams have been forced to&nbsp;slow down things to a human speed.&nbsp;So&nbsp;they can ensure the security of their&nbsp;organization. However,&nbsp;today it&#8217;s possible to automate&nbsp;many of these basic security tasks. Things like patching,&nbsp;with the right&nbsp;tooling,&nbsp;gaining visibility into,&nbsp;you know,&nbsp;critical assets and data. All of these can be made easier with the&nbsp;cloud.&nbsp;So&nbsp;you can stay agile&nbsp;while maintaining,&nbsp;in many cases actually&nbsp;improving,&nbsp;your security. And by providing highly integrated&nbsp;logging and monitoring as well as&nbsp;integrated tools&nbsp;to automate core security functions,&nbsp;organizations can use&nbsp;AWS&nbsp;to&nbsp;innovate&nbsp;quickly and maintain the security&nbsp;posture.&nbsp;So&nbsp;when customers come on to&nbsp;AWS&nbsp;they are elevating their security&nbsp;when they move on to the&nbsp;cloud.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [05:57]<br \/>So,&nbsp;security at&nbsp;AWS&nbsp;really is our top&nbsp;priority and&nbsp;it starts with our core&nbsp;infrastructure&nbsp;which is designed to meet&nbsp;some of the most stringent security&nbsp;requirements in the world. And our infrastructure is monitored 24&#215;7&nbsp;to ensure confidentiality and integrity of our&nbsp;customers&nbsp;data. The same experts that monitor this&nbsp;infrastructure&nbsp;also build and maintain a broad&nbsp;selection&nbsp;of innovative security services which&nbsp;can help&nbsp;you maintain or improve your security posture. As an&nbsp;AWS&nbsp;customer you also inherit&nbsp;these best practices&nbsp;and all of the benefits and experience&nbsp;that you know we provide and all of which are&nbsp;tested against some of the&nbsp;most&nbsp;strictest&nbsp;third-party assurance frameworks. This&nbsp;also allows you to&nbsp;transform the way you do business by&nbsp;automating&nbsp;and integrating with some of the&nbsp;security services that&nbsp;AWS&nbsp;provides&nbsp;and in addition we have the largest&nbsp;network of security partners and&nbsp;solutions&nbsp;that extend the benefits of&nbsp;AWS.&nbsp;Utilizing some of these&nbsp;services in technology that you might&nbsp;be familiar with,&nbsp;like&nbsp;Trend&nbsp;Micro. This is another benefit that you gain,&nbsp;by&nbsp;moving to&nbsp;AWS&nbsp;you also inherit some of the most&nbsp;comprehensive security and compliance&nbsp;controls.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[07:26]<br \/>To aid in your compliance efforts&nbsp;AWS&nbsp;regularly achieves third-party&nbsp;validation for thousands of global&nbsp;compliance requirements&nbsp;that we continually monitor to help you&nbsp;maintain your security and compliance&nbsp;standards across&nbsp;segments this could be finance,&nbsp;retail,&nbsp;healthcare,&nbsp;government and beyond.&nbsp;We support&nbsp;many security standards and&nbsp;certifications,&nbsp;some of them being&nbsp;PCI,&nbsp;DSS,&nbsp;HIPPA,&nbsp;FebRAMP,&nbsp;SEC&nbsp;rule 17a,&nbsp;FISMA,&nbsp;and others. You inherit these latest security&nbsp;controls operated by&nbsp;AWS&nbsp;strengthening your own compliance and&nbsp;certification programs,&nbsp;while also receiving access to tools you&nbsp;can use&nbsp;to reduce your cost and time to run your&nbsp;own specific security assurance&nbsp;requirements.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[08:13]<br \/>So,&nbsp;with that said when customers move to&nbsp;the&nbsp;cloud&nbsp;they often ask us what does security in&nbsp;the&nbsp;cloud&nbsp;look like and what&nbsp;is my&nbsp;responsibility. Security is a shared responsibility on&nbsp;AWS&nbsp;and we delineate it by saying&nbsp;AWS&nbsp;is responsible for&nbsp;security&nbsp;of the&nbsp;cloud&nbsp;and customers are responsible for&nbsp;security in the&nbsp;cloud. What&nbsp;that&nbsp;really mean?&nbsp;AWS&nbsp;is&nbsp;responsible for the security&nbsp;of&nbsp;everything from the physical&nbsp;security of our data centers where all&nbsp;of our services run,&nbsp;up to the hypervisor layer,&nbsp;and&nbsp;customers are responsible for&nbsp;the security of the applications that&nbsp;are built on top of it. A&nbsp;quick example&nbsp;on&nbsp;this is let&#8217;s assume&nbsp;you pick an elastic cloud compute&nbsp;instance and you want to run a workload&nbsp;on top of that.&nbsp;You might be responsible for everything&nbsp;from the security of the guest operating&nbsp;system which includes things like&nbsp;patching,&nbsp;malware detection,&nbsp;antivirus firewalling,&nbsp;and all of these different things&nbsp;combined together is what customers are&nbsp;required to do. So,&nbsp;this is where partners like&nbsp;Trend&nbsp;Micro can come in and help&nbsp;add that extra layer of protection and&nbsp;help customers secure their workloads&nbsp;on top of the already secure&nbsp;infrastructure that&nbsp;AWS&nbsp;provides.&nbsp;Now&nbsp;once&nbsp;customers have understood that&nbsp;this is the responsibility that they&nbsp;have&nbsp;with security securing their&nbsp;infrastructure. They also want to understand how do they&nbsp;make their workloads perform&nbsp;effectively in the&nbsp;cloud.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[09:57]<br \/>Now&nbsp;we put together what we call the well&nbsp;architected framework and the well&nbsp;architected framework has been developed&nbsp;by cloud architects&nbsp;to build secure high performing and&nbsp;resilient applications. And they&#8217;re based off of five pillars:&nbsp;operational excellence,&nbsp;security,&nbsp;reliability,&nbsp;performance&nbsp;efficiency,&nbsp;and cost optimization. So,&nbsp;what&nbsp;do&nbsp;each of&nbsp;these mean? Let&#8217;s talk a little bit about&nbsp;operational excellence&nbsp;or operations.&nbsp;So&nbsp;operations&nbsp;really&nbsp;covers&nbsp;the ability or it really concentrates&nbsp;on whether&nbsp;you&#8217;re running and monitoring systems to&nbsp;deliver business value.&nbsp;And you&#8217;re&nbsp;continually improving&nbsp;these processes and procedures you might&nbsp;want to think about how you&#8217;re&nbsp;automating changes,&nbsp;how you&#8217;re responding&nbsp;to&nbsp;events and make sure that it&#8217;s done in an&nbsp;efficient manner. When it comes to security it really&nbsp;focuses on how you want to protect&nbsp;both your information and the systems&nbsp;that&nbsp;use them and these&nbsp;could include how you&nbsp;would maintain confidentiality and&nbsp;integrity of data.&nbsp;Identifying and managing who can&nbsp;do what&nbsp;with that data,&nbsp;protecting systems&nbsp;and establishing controls,&nbsp;tools to&nbsp;establish that the application,&nbsp;the&nbsp;workload that you&#8217;re running&nbsp;has the least level of privilege, and&nbsp;controls for each person that needs&nbsp;access to it.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[11:30]<br \/>We also talk a lot about reliability and&nbsp;this&nbsp;pillar really focuses on the ability to&nbsp;prevent&nbsp;and recover from failures so you can&nbsp;meet the business&nbsp;and customer demand that you&#8217;re getting. We&nbsp;generally talk a little bit about how to&nbsp;set up and plan for disasters&nbsp;and recovery planning,&nbsp;and how we&nbsp;handle those changes when the time comes.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[11:56]<br \/>We also then move and talk about how to&nbsp;be&nbsp;efficient and be performant on&nbsp;AWS&nbsp;and we focus on selecting&nbsp;the right resource types&nbsp;based on the applications that you run,&nbsp;how do you&nbsp;monitor for&nbsp;performance,&nbsp;and how do you make informed decisions. Once you realize that&nbsp;something needs to&nbsp;be changed. And finally cost optimization which customers will understand how and where&nbsp;the money is being spent and&nbsp;selecting again&nbsp;based on the other pillars whether&nbsp;you&#8217;re being efficient with the right resource types.&nbsp;Analyzing&nbsp;spend&nbsp;over time&nbsp;and it&#8217;s&nbsp;really using the scalability of the&nbsp;cloud&nbsp;to meet business needs without really&nbsp;overspending.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[12:48]<br \/>So today we&#8217;re going to talk a little&nbsp;bit about&nbsp;Trend,&nbsp;and&nbsp;Trend who&#8217;s been an&nbsp;APN&nbsp;security partner and has been working with us on multiple service integrations and launches. They&#8217;re also part of the&nbsp;AWS&nbsp;managed&nbsp;services, they&#8217;re part of the&nbsp;seller advisory board for&nbsp;marketplace&nbsp;and&nbsp;has&nbsp;been a leading security partner&nbsp;for many&nbsp;AWS&nbsp;customers.&nbsp;So&nbsp;we&#8217;re happy to have them and&nbsp;I&#8217;m&nbsp;going to pass it&nbsp;off&nbsp;to&nbsp;Aaron who is going to talk a little&nbsp;bit about&nbsp;Cloud&nbsp;One&nbsp;Conformity<\/p>\n<p><b>Aaron Ansari <\/b>[13:29]<br \/>Thanks,&nbsp;Sameer,&nbsp;appreciate it,&nbsp;and thanks&nbsp;for the great introduction and that&nbsp;wonderful overview&nbsp;of the well architected framework as&nbsp;well as the partnership that&nbsp;AWS&nbsp;and&nbsp;Trend have&nbsp;together,&nbsp;we certainly&nbsp;appreciate it, and&nbsp;certainly are looking forward to&nbsp;this discussion as we introduce&nbsp;Edrans&nbsp;as well to this.&nbsp;So&nbsp;let&#8217;s talk&nbsp;about&nbsp;Cloud&nbsp;One&nbsp;Conformity. Notice that there&#8217;s&nbsp;a couple of&nbsp;components to that,&nbsp;there&#8217;s this&nbsp;Cloud&nbsp;One,&nbsp;and then the&nbsp;Conformity&nbsp;piece to it.&nbsp;Cloud&nbsp;One&nbsp;Conformity was a&nbsp;2019&nbsp;AWS&nbsp;technology partner of the year and the&nbsp;security competency as well as&nbsp;the cloud&nbsp;competency.&nbsp;It&#8217;s an organization that began in about 2016 and quickly grew&nbsp;both in size as well as,&nbsp;I&#8217;ll say impact,&nbsp;in the&nbsp;AWS&nbsp;and cloud security posture&nbsp;management space.&nbsp;And the reason that&nbsp;I&nbsp;say that&nbsp;is because&nbsp;the&nbsp;number of&nbsp;customers and the adoption of&nbsp;the&nbsp;technology&nbsp;grew but one of the ways that&nbsp;we grew, and&nbsp;the reason that&nbsp;I&nbsp;think that we grew&nbsp;so successfully was because we&#8217;re very&nbsp;community focused. We believe what is now deemed to cloud&nbsp;posture management to be a community&nbsp;problem and we actually give away some of our&nbsp;secret sauce&nbsp;to the community via our knowledge base as well&nbsp;as of&nbsp;a couple of&nbsp;Github&nbsp;projects.&nbsp;So,&nbsp;we,&nbsp;from the beginning it came out of the&nbsp;gate or came out of incubation with a&nbsp;very&nbsp;community minded and very&nbsp;AWS&nbsp;technology&nbsp;focused platform and it served us well,&nbsp;obviously by winning the technology&nbsp;partner&nbsp;of the year,&nbsp;by becoming a part of&nbsp;Trend&nbsp;Micro,&nbsp;and by,&nbsp;you know,&nbsp;the accolades&nbsp;that are laid upon us by our customers. And why not,&nbsp;so&nbsp;I&nbsp;guess all that to say&nbsp;is you know,&nbsp;we have a reason to be up&nbsp;here talking to you about what we&#8217;re talking&nbsp;about.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[15:18]<br \/>As&nbsp;I&nbsp;mentioned at the beginning&nbsp;Cloud&nbsp;One&nbsp;Conformity or&nbsp;Conformity&nbsp;is a piece of an overall&nbsp;cloud platform&nbsp;that&#8217;s provided by&nbsp;Trend. As&nbsp;Sameer&nbsp;mentioned&nbsp;Trend is a premier and multi-level partner with&nbsp;AWS&nbsp;and so we have a large smattering of&nbsp;offerings the&nbsp;most germane and&nbsp;biggest would&nbsp;be our&nbsp;Cloud&nbsp;One&nbsp;platform.&nbsp;This platform extends across&nbsp;many different&nbsp;components of your cloud&nbsp;and is meant to be&nbsp;kind of your one-stop shop for your&nbsp;AWS&nbsp;multi-cloud,&nbsp;for your&nbsp;AWS&nbsp;cloud service&nbsp;needs as it goes from,&nbsp;you know,&nbsp;everything from&nbsp;container to&nbsp;file to network.&nbsp;Today we&#8217;re going to&nbsp;talk about the configuration piece or&nbsp;the cloud posture management piece which&nbsp;is&nbsp;known as&nbsp;Conformity. As&nbsp;Sameer&nbsp;shared&nbsp;in the beginning the shared&nbsp;responsibility model and&nbsp;I&nbsp;have a&nbsp;slide on this as well so&nbsp;I&#8217;m going to speak to a little bit&nbsp;of a&nbsp;different point about it but as&nbsp;Sameer&nbsp;shared&nbsp;there is a large burden that is put upon the&nbsp;customer. For adoption and usage into&nbsp;AWS&nbsp;and it&#8217;s not an unfair burden,&nbsp;but&nbsp;it&#8217;s a burden in which is&nbsp;very well laid out via what&nbsp;Sammer&nbsp;just&nbsp;mentioned,&nbsp;the well architected framework. Right so&nbsp;while there is an onus on you for that&nbsp;all that extends all the way up to the&nbsp;hypervisor&nbsp;layer of the application that&nbsp;you&#8217;re building. There&#8217;s a great methodology and taxonomy&nbsp;to utilize to get&nbsp;that onus and burden done correctly. To get that done in a secure and&nbsp;compliant manner and&nbsp;to get that done in the best practices&nbsp;ways that&nbsp;AWS&nbsp;recommends. I&nbsp;mean you&#8217;re dealing with the,&nbsp;you&nbsp;know,&nbsp;the king&nbsp;or the&nbsp;biggest cloud provider that has seen&nbsp;billions of implementations,&nbsp;you&#8217;d be best to listen to what they&nbsp;have to say as it relates to the well architected framework.&nbsp;And&nbsp;so&nbsp;when you&#8217;re going through and you&#8217;re&nbsp;developing and you&#8217;re building out your&nbsp;entire infrastructure you&#8217;ve got,&nbsp;you&nbsp;know,&nbsp;infrastructures code and you&#8217;ve got&nbsp;development teams and you&#8217;ve got shadow&nbsp;IT&nbsp;and you&#8217;ve got business units that&nbsp;are all across your&nbsp;organization from&nbsp;Dubai to&nbsp;London.&nbsp;And you know the&nbsp;visibility&nbsp;and the&nbsp;standardization that needs&nbsp;to come&nbsp;with the dynamic or with the nature of&nbsp;your release to&nbsp;AWS&nbsp;isn&#8217;t there right. And&nbsp;so&nbsp;what ends up happening&nbsp;is that you have issues with containers,&nbsp;you have issues with your application,&nbsp;you have issues with the repository or the usage of the code and so what you get&nbsp;is this need or this necessity to&nbsp;understand&nbsp;all of the&nbsp;components that&nbsp;that are part&nbsp;of the application that you build. And the need for the visibility to have access to what is being put out there in&nbsp;your name&nbsp;in the&nbsp;AWS&nbsp;cloud.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[18:09]<br \/>And&nbsp;so&nbsp;you know as we&#8217;ve gone through and done&nbsp;this more and more organizations are&nbsp;migrating to&nbsp;AWS&nbsp;and more and more&nbsp;organizations are using the exploding set of&nbsp;AWS&nbsp;services that are being offered,&nbsp;comes kind of the&nbsp;peb&nbsp;cac&nbsp;issues right,&nbsp;the problem exists&nbsp;between&nbsp;keyboard and chair. It&#8217;s the&nbsp;configuration and the human element that causes the,&nbsp;we&#8217;ll say you know,&nbsp;my&nbsp;last light,&nbsp;the&nbsp;breaches.&nbsp;But just&nbsp;cause&nbsp;of the&nbsp;issues&nbsp;that are part of the&nbsp;build&nbsp;or the environment that&#8217;s being put out&nbsp;into&nbsp;AWS. And&nbsp;so&nbsp;you have,&nbsp;you know,&nbsp;breaches,&nbsp;you&nbsp;have organizational misalignments and&nbsp;again you have that lack of visibility&nbsp;as to what&#8217;s actually happening&nbsp;in your&nbsp;AWS&nbsp;footprint and environment.&nbsp;And more and more,&nbsp;you know&nbsp;re:Invent Comes,&nbsp;and more and more services are&nbsp;being released and&nbsp;AI&nbsp;and machine&nbsp;learning,&nbsp;and all&nbsp;sorts of new things are&nbsp;being announced,&nbsp;and your organization wants to adopt&nbsp;these quickly right.&nbsp;You want to be&nbsp;DevOps,&nbsp;you want to be agile,&nbsp;you want to&nbsp;be&nbsp;pushing and promoting code as much as&nbsp;possible. And&nbsp;so&nbsp;what happens is this large complex set of wonderfully&nbsp;available services that are being&nbsp;produced possible skills gap that exists&nbsp;at your organization&nbsp;and then a lack of visibility and the&nbsp;lack of alignment that&nbsp;comes there. And&nbsp;so&nbsp;when all of that is put on you right&nbsp;you don&#8217;t have the expertise,&nbsp;you&nbsp;don&#8217;t have the visibility,&nbsp;you don&#8217;t have&nbsp;the need or the capacity to do the&nbsp;things that you&#8217;re able,&nbsp;that you&#8217;re&nbsp;required&nbsp;to do.&nbsp;You need help&nbsp;right&nbsp;and so that&#8217;s where&nbsp;Cloud&nbsp;One,&nbsp;that&#8217;s&nbsp;where&nbsp;Conformity,&nbsp;that&#8217;s where&nbsp;Edrans&nbsp;comes in. Right,&nbsp;we&#8217;re able to take that&nbsp;burden&nbsp;off of you or at least alleviate that&nbsp;burden and work with you&nbsp;to make it manageable,&nbsp;to make it secure,&nbsp;to make it compliant and to do the work and to fill that skills gap that&#8217;s&nbsp;needed.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[20:05]<br \/>To be part of and hold up your&nbsp;responsibility that is part of the&nbsp;AWS&nbsp;responsibility model&nbsp;and so as&nbsp;Sameer&nbsp;already said right,&nbsp;you&nbsp;need to align to the well architecture&nbsp;framework.&nbsp;Well,&nbsp;the&nbsp;Cloud&nbsp;One&nbsp;Conformity platform is&nbsp;built off of the well architected&nbsp;framework.&nbsp;So&nbsp;each of the components that are built into&nbsp;Cloud&nbsp;One&nbsp;Conformity&nbsp;align&nbsp;directly to one of the five pillars,&nbsp;if not all of the five pillars.&nbsp;So&nbsp;an&nbsp;example would&nbsp;be like&nbsp;tagging.&nbsp;Tagging is&nbsp;a&nbsp;best practice that extends across&nbsp;all five pillars we have many,&nbsp;many,&nbsp;components and rules and pieces that adhere to the tagging best practice and&nbsp;allow you to&nbsp;ensure that you&#8217;re being compliant&nbsp;with that particular component. Moreover,&nbsp;we get very deep into the&nbsp;security piece right so if you actually&nbsp;go out to our knowledge base this is&nbsp;that sort of community&nbsp;facing portal that is available to you&nbsp;from&nbsp;Trend,&nbsp;from trend.com,&nbsp;from cloudconformity.com.&nbsp;You can go out there and get&nbsp;AWS&nbsp;instructional steps&nbsp;on how to properly configure and align&nbsp;your&nbsp;AWS&nbsp;environment&nbsp;to make it best practice, to make it&nbsp;best of breed,&nbsp;and to align it to the&nbsp;well architected framework.&nbsp;&nbsp;And&nbsp;so&nbsp;you&nbsp;can go out there right now,&nbsp;open up&nbsp;another tab,&nbsp;go out&nbsp;and look at how to properly&nbsp;configure s3 buckets. Go out and look at&nbsp;how to do&nbsp;RDS&nbsp;correctly,&nbsp;go out and look&nbsp;at how to do&nbsp;Ec2&nbsp;compute. All these popular&nbsp;services that&nbsp;are used&nbsp;billions of times a week. You can get&nbsp;the proper steps and configuration&nbsp;pieces&nbsp;for free with no dollars needed to&nbsp;be exchanged as&nbsp;part of the offering that&#8217;s out there&nbsp;but the beauty of the&nbsp;application&nbsp;is that we take all of those,&nbsp;we combine&nbsp;them into an application,&nbsp;we combine them&nbsp;into an&nbsp;auto-remediation piece,&nbsp;we combine it&nbsp;into a software package that&#8217;ll actually&nbsp;give you the ability to correct,&nbsp;give&nbsp;you the ability to detect,&nbsp;and give you&nbsp;the ability&nbsp;to respond to the configuration issues.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[22:00]<br \/>If you&#8217;re just using our knowledge&nbsp;base&nbsp;you&#8217;re kind of doing it manually&nbsp;and you&#8217;re doing it with check by check. If you&#8217;re using our application,&nbsp;well&nbsp;you know,&nbsp;you&#8217;ve got everything that&nbsp;I&nbsp;talked about. That&#8217;s taking care of the shared&nbsp;responsibility model and then when you&nbsp;use the&nbsp;expertise of resources and certified experts such as&nbsp;Edrans,&nbsp;you&nbsp;know&nbsp;you&#8217;re&nbsp;total best of breed. And you&#8217;re doing&nbsp;you&#8217;re&nbsp;building out your environment&nbsp;with all the right pieces in place at&nbsp;the foundation. And&nbsp;so&nbsp;Conformity by itself,&nbsp;in addition&nbsp;to the features and components here&nbsp;does just like&nbsp;AWS&nbsp;align to the various&nbsp;frameworks&nbsp;and policies that you&#8217;re required&nbsp;to or that are the best practices,&nbsp;that&nbsp;go&nbsp;perhaps a step deeper than just the&nbsp;AWS&nbsp;well architected&nbsp;framework. Although,&nbsp;we all know that&#8217;s a great,&nbsp;great&nbsp;foundation to build upon&nbsp;so regardless of where you are and this is a, I&nbsp;like to&nbsp;I&#8217;d like to spend a little bit&nbsp;of time on this slide because it speaks well to the journey that&nbsp;we&#8217;re seeing from across our&nbsp;tens of thousands of customers&nbsp;and&nbsp;the partners with whom&nbsp;we work and the odds are you&#8217;re not just in one particular. I&#8217;ll say silo here,&nbsp;I&nbsp;know&nbsp;silo&nbsp;is a&nbsp;negative word but&nbsp;you know what&nbsp;I&#8217;m talking about. What we tend to&nbsp;see&nbsp;is that organizations are in multiple&nbsp;states&nbsp;meaning there might be some business&nbsp;units that&nbsp;are cloud first or cloud&nbsp;native and other components of the&nbsp;business that are that are cloud curious.&nbsp;So&nbsp;if you&#8217;re a financial services or&nbsp;entity your main frame team and&nbsp;some of your development teams that are&nbsp;tied to some legacy applications might&nbsp;be cloud curious&nbsp;versus your marketing team and your&nbsp;mobile app team might be cloud first or&nbsp;even cloud native. Regardless of where you are&nbsp;in&nbsp;your&nbsp;cloud journey&nbsp;and you are on a cloud&nbsp;journey,&nbsp;I&nbsp;mean you&#8217;re here with&nbsp;AWS&nbsp;because or you&#8217;re utilizing&nbsp;AWS&nbsp;because&nbsp;you know you&#8217;re moving or migrating into&nbsp;the cloud and you might operate you know&nbsp;80 20 in the cloud or 100 in the cloud&nbsp;or 90 10.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[23:58]<br \/>But regardless of where you are you need&nbsp;that visibility because the dynamic&nbsp;nature of the environment&nbsp;with which you&#8217;re building tends to be&nbsp;so&nbsp;chaotic. And&nbsp;so&nbsp;if&nbsp;I&nbsp;can say this&nbsp;you tend to have such a lack of&nbsp;visibility right you&#8217;ve got this complex process with lots of&nbsp;different teams that are submitting&nbsp;builds and building applications and upgrading pieces&nbsp;within it a&nbsp;pipeline&nbsp;that there are a lot of places that&nbsp;you need to have visibility in. And&nbsp;so&nbsp;what conformity does very,&nbsp;very well&nbsp;is it gives you the plug-ins or it gives&nbsp;you the&nbsp;I&#8217;ll say&nbsp;the&nbsp;inputs&nbsp;in pipeline standpoint to go&nbsp;through and see&nbsp;and understand what&#8217;s happening at each&nbsp;major stage of the build. And&nbsp;oh&nbsp;by the way,&nbsp;we also integrate with&nbsp;the ticketing systems that you use&nbsp;because the trick to all of this is to speak with the development&nbsp;mindset and mentality&nbsp;there&#8217;s a golden path to release every&nbsp;application&nbsp;and what you don&#8217;t want to be is in the&nbsp;way of that golden path&nbsp;right you want,&nbsp;you don&#8217;t want to break&nbsp;the build and you don&#8217;t want to get in&nbsp;the way&nbsp;of the release of the application. And&nbsp;so&nbsp;when you&#8217;re trying to introduce&nbsp;security and compliance you can&#8217;t&nbsp;introduce it in a way that breaks that&nbsp;you have to introduce it in a way&nbsp;that&nbsp;the developers&nbsp;embrace it as part of the way in which&nbsp;they develop so we actually plug in and&nbsp;encourage you to introduce security&nbsp;fixes and remediation steps as bugs. And those to be tracked via the build&nbsp;coordinator and when you do that you&nbsp;have bugs that are squashed. Builds that&nbsp;are promoted&nbsp;and oh yeah it happened to be something&nbsp;that was tied to&nbsp;you know maybe&nbsp;an s3 bucket&nbsp;encryption or a best practice tagging&nbsp;policy&nbsp;but it was just a bug and&nbsp;I&nbsp;just&nbsp;developed.&nbsp;I&nbsp;just did the steps that were&nbsp;outlined in the fix and&nbsp;I&nbsp;just&nbsp;kept developing and when you do things&nbsp;that way&nbsp;you truly make it so that you are you&nbsp;are part of that. And then the next thing that you do is&nbsp;you take that and you start to&nbsp;automate it right&nbsp;you start to use,&nbsp;you&#8217;re using&nbsp;macy,&nbsp;using Config,&nbsp;you&#8217;re using guardrails,&nbsp;you&#8217;re&nbsp;using&nbsp;all the best practices that come from&nbsp;the services&nbsp;that are that are part of&nbsp;AWS. And then you plus those&nbsp;with the usage of&nbsp;Conformity,&nbsp;and&nbsp;then you have the services team that&nbsp;comes in&nbsp;from&nbsp;Edrans&nbsp;that does a great job of&nbsp;building&nbsp;on top of,&nbsp;and layering sort of that&nbsp;defense in depth strategy&nbsp;that helps you build and helps you&nbsp;maintain&nbsp;a consistent and securely&nbsp;developed application life cycle.&nbsp;<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[26:23]<br \/>Regardless of how many releases you do a&nbsp;day a week a month a year&nbsp;you&#8217;re just constantly integrating and&nbsp;weaving&nbsp;in&nbsp;the compliance and the security and&nbsp;the best practices alignment to the well&nbsp;architected framework&nbsp;in the build process and that&#8217;s huge&nbsp;it&#8217;s not mythical it&#8217;s something that we&nbsp;help our customers do and deal with&nbsp;every day. And it&#8217;s truly something that we can do&nbsp;so if you&#8217;re playing along and kind of&nbsp;looking at your buzzword bingo sheet you&nbsp;might be looking for like&nbsp;shift left,&nbsp;and&nbsp;a couple of things like that&nbsp;DevOps&nbsp;CI\/CD&nbsp;pipeline.&nbsp;All those sorts of&nbsp;things and we certainly integrate into those&nbsp;pipelines and with template&nbsp;scanning and&nbsp;infrastructure as code alignment&nbsp;that we can do. We can certainly help&nbsp;you,&nbsp;you know,&nbsp;shift left and get more earlier&nbsp;in your&nbsp;build&nbsp;process.&nbsp;But what&nbsp;I&nbsp;want to&nbsp;leave you with or what&nbsp;I&nbsp;want you to&nbsp;just kind of take away from this is the&nbsp;ability for the software to&nbsp;augment the processes or the processes&nbsp;that you&#8217;re developing&nbsp;and leveraging.&nbsp;And then&nbsp;when you bring in the experts right,&nbsp;like&nbsp;I&nbsp;mentioned before,&nbsp;when you bring in&nbsp;people that have gone and seen&nbsp;this&nbsp;hundreds&nbsp;and hundreds if not thousands&nbsp;of times. Seen the way the different development&nbsp;practices&nbsp;happen,&nbsp;seeing the best&nbsp;practices and the worst practices&nbsp;conducted audits,&nbsp;seeing the good side&nbsp;and the bad side of things&nbsp;that&#8217;s when you really get to the point&nbsp;where you have taken your build process&nbsp;and made it to the most mature and&nbsp;the most effective&nbsp;you know kind of process.&nbsp;So&nbsp;what&nbsp;Edrans&nbsp;does is they come in and&nbsp;they&nbsp;power their assessments that they&#8217;re&nbsp;going to do,&nbsp;and&nbsp;Joe&#8217;s going to talk&nbsp;about this&nbsp;with&nbsp;Conformity. And here you see a&nbsp;dashboard of&nbsp;Conformity&nbsp;that&#8217;s looking at my&nbsp;AWS&nbsp;environment and&nbsp;my accounts and telling me how&nbsp;I&nbsp;aligned&nbsp;to the various pillars of the well&nbsp;architected framework,&nbsp;and giving me the ability,&nbsp;obviously&nbsp;you&#8217;d be able to double click on this,&nbsp;and&nbsp;have the ability to remediate and&nbsp;respond to these. But the point is you have that instant&nbsp;real-time&nbsp;available assessment that&#8217;s done as part&nbsp;of the&nbsp;work that happens with&nbsp;Edrans.&nbsp;So&nbsp;what we want you to do is from a&nbsp;development practice you know kind of&nbsp;weave&nbsp;in this with the way in the life&nbsp;cycle that your projects and your&nbsp;AWS&nbsp;environment&nbsp;are&nbsp;being&nbsp;built&nbsp;have that central visibility that&#8217;s tied&nbsp;and aligned to the well architected&nbsp;framework. And you know sort of make it and build&nbsp;it so that that remediation component&nbsp;comes&nbsp;and becomes part of the way in which you&nbsp;build your applications.&nbsp;I&#8217;m going to pass this over to Joe Henderson. Joe is a good friend of mine,&nbsp;great&nbsp;person, also a very talented professional and he&#8217;s going to go over what&nbsp;Edrans&nbsp;is doing with AWS and Trend Micro&#8217;s Cloud One Conformity.&nbsp;<\/p>\n<p><b>Joe Henderson<\/b>&nbsp;[29:00]<br \/>Awesome. Thank you,&nbsp;Aaron&nbsp;for the great segue. Thanks, Sameer for kicking things off, kicking things off. And also thank you everyone for joining.&nbsp;So,&nbsp;my name is Joe Henderson, I&#8217;m the GM of&nbsp;Edrans. And I&#8217;ll be talking about how some of our customers have used the well architected framework as well as Trend Micro&#8217;s cloud performance tools to get better in their cloud security posture management.&nbsp;So,&nbsp;a little bit of background about myself. Hopefully this is relevant.&nbsp;Previously&nbsp;to&nbsp;Edrans, I spent the last nine years as a Partner Manager for a DevOps automation company and then a cloud optimization company.&nbsp;So,&nbsp;my job was to recruit and manage partners from traditional resellers, to giant systems integrators to small&nbsp;boutiques&nbsp;born in the cloud consultancy, so during this time in DevOps was becoming mainstream, and cloud was rapidly taking over the world. So along with the shift in technology, there was also a shift in the type of partners that were emerging as the leaders in the&nbsp;cloud. And it was&nbsp;these small boutiques&nbsp;born in the cloud consultancies that were standing out and delivering just amazing results for their customers. And some of them have now grown to be the most influential cloud&nbsp;companies&nbsp;today.&nbsp;So,&nbsp;in spending a lot of time with these types of partners, one of the common themes that emerged was that they focus solely on their cloud services. And they just don&#8217;t care&nbsp;about&nbsp;like&nbsp;reselling products or other things like that. However, they did have a small toolkit of their favorite software tools that they use to power&nbsp;there&nbsp;services on top of AWS. And they only recommend the use of these tools when it was truly a good fit, and it&nbsp;had&nbsp;a real benefit for the&nbsp;customers&nbsp;business.&nbsp;So&nbsp;during that time, it came across&nbsp;Edrans&nbsp;who was one of those fast growing more in the cloud at one point, boutique consultancies and then using the tool Conformity as one of their favorite recommended tools, the power of the cloud services, from assessments, to migration to optimization services.&nbsp;So&nbsp;I was lucky enough last summer to join&nbsp;Edrans&nbsp;and now I manage our customer and partner relationship as the general manager. So&nbsp;little&nbsp;bit about the company, we are a premier level AWS consultancy, that has been around for a little over 10 years. And we have offices where I&#8217;m here today in Portland, Oregon, other offices in Buenos Aires, Argentina, Barcelona, Spain, and London, England.&nbsp;<\/p>\n<p><b>Joe Henderson <\/b>[31:09]<br \/>So&nbsp;the services that we provide kind of fall into three buckets. The first is adoption, which is ultimately the strategy and the planning&nbsp;the&nbsp;ultimate migration to AWS. Second is optimization. So well architected reviews, cloud cost optimization, cloud security, and compliance, which is what we&#8217;re going to dig into today. There&#8217;s innovation where we help customers build new applications using serverless technologies. We leverage machine learning and AI services and even help customers develop IoT products with them.&nbsp;So&nbsp;before the well&nbsp;architected&nbsp;became a thing,&nbsp;Edrans&nbsp;in the early days have been&nbsp;doing&nbsp;the holistic reviews and assessments to customers. That was a lot of manual work. And then Luckily, in 2015, AWS officially formalized and launched the framework.&nbsp;So&nbsp;by definition, the well architected framework is a consistent set of design principles, and best practices for customers and partners to evaluate architectures. So why is this so important is because you can score and you can measure it. So famous quote from Peter Drucker, you can&#8217;t manage what you can&#8217;t measure, or you can&#8217;t manage, we can&#8217;t measure.&nbsp;So&nbsp;when we engage with our customers, there&#8217;s typically a theme or problem we&#8217;re trying to solve. And that theme or problem typically sits within one maybe two pillars of the well architected framework. What is super important to understand that each pillar of the well architected framework, which we learned from Aaron, we learned from Sameer, fully dependent on each other.&nbsp;So&nbsp;from performance, the cost of security.&nbsp;So&nbsp;before we tackle any problem, we always first to get a full view of where a customer&#8217;s cloud measures against that framework. Now, as you probably know, one of the main themes or problems or&nbsp;pillar&nbsp;that we see with our customers,&nbsp;and for&nbsp;sure, the one that contributes the most anxiety is cloud security.<\/p>\n<p><b>Joe Henderson<\/b> [32:56]<br \/>So&nbsp;we&#8217;ve worked with customers, you know, being a global&nbsp;company&nbsp;work&nbsp;with customers all around the world, ranging from series A&nbsp;start-ups&nbsp;to rocket ship,&nbsp;pre IPO&nbsp;companies, to large global enterprises. And within those companies, we work with folks like head of product, or director of security or VP of cloud operations, or committees of cloud centers of excellence, or simply just cloud architects on the team. And&nbsp;so&nbsp;we found that regardless of the profiles of the customer regardless&nbsp;the&nbsp;profile of the person, all these people&nbsp;face,&nbsp;very common challenges when it comes to cloud security. Now, ultimately, in their story, the hero is also the villain, which is&nbsp;they&#8217;re&nbsp;rapidly expanding the cloud, and then the potential security threats that exist within it. But&nbsp;usually&nbsp;people&nbsp;we work with were originally a part of making that decision to migrate to the&nbsp;cloud.&nbsp;So&nbsp;they&#8217;ve sold the dream of the cloud, the leadership that&#8217;s going to be faster, better tech, less expensive, it&#8217;s more secure. And so, you know, reminds me of another quote from Peter&#8217;s Uncle in Spider Man &#8220;With great power comes great responsibility&#8221;.&nbsp;So&nbsp;on top of all that, they are just we see that they&#8217;re just, they&#8217;re under so much pressure, so they have internal pressures, and just always push and push and move faster.&nbsp;So&nbsp;whether it be a sales department pushing them to get a feature released for a customer that they promised to without asking, I may be guilty of that one. Or their key engineers that&nbsp;was&nbsp;wearing too many hats, just resigned or just simply getting the release out the door, and all why&nbsp;trying&nbsp;to manage their potential security compliance risk.&nbsp;So&nbsp;then they feel like external&nbsp;pressures.&nbsp;So&nbsp;these are just general market pressures, maybe a competitor&nbsp;gaining&nbsp;traction on them. And then maybe a random global pandemic, we&#8217;ll put the world on hold for a few months. And then when we spend time with these customers, and do not talk about technology, just talk about some overall subject, sort of off the record, when it comes down to is that they got into IT to build cool stuff. They got into IT to create new technology that&nbsp;makes&nbsp;an impact. And then they&#8217;re asking themselves, why am I spending my time always reacting and playing whack a mole with security compliance issues? Or why am I worrying that my company is going to be in the paper the next day&nbsp;for&nbsp;a data&nbsp;breach.&nbsp;So&nbsp;all these pressures, and all&nbsp;these sorts of worries, and we sort of define them and what you&#8217;re seeing here.&nbsp;So&nbsp;here&#8217;s sort of more bulleted points of this is really getting those specific areas, which is little or no visibility in the cloud, they have a shortage of cloud engineers with specific security compliance background, they are moving at an uncomfortable but necessary pace. Maybe security and compliance&nbsp;was&nbsp;likely an afterthought in the past, they have current or prospective customers with strict requirements. And maybe they haven&#8217;t been successful in making that cultural engineering shift to de-silos from their teams.&nbsp;Also&nbsp;we find a lot, they just don&#8217;t have a large group of AWS experts in house. Finally, especially&nbsp;in&nbsp;this time, massive budget cuts are happening across all departments.&nbsp;And&nbsp;so&nbsp;what we kind of have here is, you know, these companies come to us as their guide, they come to us for help. And through these, you know, problems that we just discussed. In our past experience, we&#8217;ve likely seen a version of their story before. And we have a methodology that, you know, helps assess and prove things.&nbsp;So&nbsp;this guidance comes in the form of a plan, what we call the well architected security assessment.&nbsp;So&nbsp;this assessment is a service that&#8217;s powered by Conformity, which we learned all about from Aaron, and these assessments, or exercises gives customers full visibility into their cloud infrastructure across the five pillars of the well architected framework with a deep focus on security and compliance.&nbsp;So&nbsp;after things are visible, we&#8217;re able to perform a gap analysis on potential security risks, and specific failures based on the applicable compliance standards, whether it be SOC2, HIPAA, or PCI, or others. And ultimately, we then deliver a remediation roadmap, which gives a clear path of&nbsp;prioritize&nbsp;actionable tasks to improve their cloud security posture efficiently.&nbsp;<\/p>\n<p><b>Joe Henderson&nbsp;<\/b>[36:57]<br \/>So how&nbsp;these work&nbsp;first, I&#8217;ll give a quick analogy.&nbsp;So&nbsp;everyone&#8217;s been to the doctor.&nbsp;So&nbsp;you know, whether it&#8217;s for a checkup, sickness or you know, an ailment, you sit down&nbsp;the&nbsp;doctor&#8217;s office, and some questions, how you feel on, what&#8217;s your diet, like, how many drinks you had per week, how stressful&nbsp;is your job, how often you exercise? And you answer, you know, to the best of your knowledge, but in reality, you might embellish on one of those questions, you might leave out some things on another question, then the doctor wants to take a look a bit deeper, you might get a blood pressure taken, you might get some blood work done. You might even get hooked up&nbsp;to&nbsp;a couple&nbsp;machines. And then after that, the doctor has&nbsp;the&nbsp;full diagnosis of how they feel about your health. And they can give you recommendations for that. Maybe, you know, drink a little less, maybe try out yoga, maybe they&#8217;ll write you a prescription for some medicine. So maybe you take their advice. Maybe you don&#8217;t, maybe you take their advice temporarily and go back&nbsp;your&nbsp;own behavior. Or maybe you didn&#8217;t like your diagnosis, you got super motivated, and you hired a personal trainer, maybe you started a ketogenic diet, maybe started with wearing a fitness tracker to track all your movements.<\/p>\n<p><b>Joe Henderson<\/b>&nbsp;[38:00]<br \/>So&nbsp;these well architected security assessments are very similar.&nbsp;So&nbsp;we sit down with the stakeholders and ask them questions around first around the five pillars of the well architected framework. Example questions are, you know, how do you design a workload so that you can understand its state? How do you plan for disaster recovery? How do you monitor your resources&nbsp;ensure&nbsp;that they are performing as expected? How do you meet cost targets when you select resource types? Then we dig in and do a deep dive in security compliance, ask them some questions like, how are you managing credentials and authentication? How are you controlling human access? How do you defend against&nbsp;emerging&nbsp;security&nbsp;threat? And how do you protect your data in transit? How do you respond to&nbsp;an&nbsp;incident? And&nbsp;so&nbsp;it&#8217;s usually while we&#8217;re having those conversations, and we spent some time with the customer to actually install Conformity on all or a select group of AWS accounts. And just a couple hours, we have their real cloud data, that&#8217;s been matched against the one the well architected framework, as well as to security protocols and compliance standards that are relevant to them.&nbsp;We,&nbsp;then take that conversational data and analyze it against the data we get from conformity. And then we&#8217;re able to start building a report that gives me that visibility, those security gaps and those recommendations.&nbsp;So&nbsp;here&#8217;s an example of one of the output reports of the well architected framework of the data that we took from Conformity and just made it visible to the customer.&nbsp;So&nbsp;if we look at costs, you know, this team makes great&nbsp;cost, you know, decisions, but maybe they&#8217;re not transitioning to the latest server generations. Got an operational excellence, they&#8217;ve adopted&nbsp;infrastructures&nbsp;code, but maybe they don&#8217;t&nbsp;centralized&nbsp;deployment pipelines and single solution.&nbsp;So&nbsp;we take all these challenges and issues, and then we actually put them on a graph, and a list where we can show where those exist on this in a matter of importance and estimated complexity. And then also by high priority down to housekeeping items.&nbsp;So&nbsp;these are all very tactical approaches on how to actually improve the first part, which is their well architected, their overall cloud score.&nbsp;So&nbsp;we take that same methodology, and we do that security deep dive with them.&nbsp;So&nbsp;we&#8217;ve broken this down here, obviously, there&#8217;s a much, you know, deeper per customer.&nbsp;So&nbsp;from network compute protection to data protection to incident response to threat detection, credential access, you know, all those things, we take those, and again, we put them on a graph based on importance, based on estimated complexity, and then they have a playbook or they have like some guidance of how they actually can remediate&nbsp;these things&nbsp;in a short amount of time.&nbsp;<\/p>\n<p><b>Joe Henderson <\/b>[40:51]<br \/>So&nbsp;I want to take some time now, before we wrap up, to talk about a specific customer.&nbsp;So&nbsp;we recently worked with a&nbsp;well funded&nbsp;healthcare&nbsp;start-up, they were building an awesome, they&nbsp;still are&nbsp;building an awesome product. And they were racing to get it into production and sell it to a few potential customers. Now they&nbsp;had&nbsp;rapidly developed this product on AWS with pretty much no guardrails. They had some upcoming HIPAA compliance audits, and other security audits based on these potential new customers. And&nbsp;so&nbsp;what we found is that the team was just not confident in their current security posture. And they had no one&nbsp;on&nbsp;engineering that had specific security or healthcare compliance experience in the past. And then everybody was just kind of wearing too many hats.&nbsp;So&nbsp;they just had no bandwidth to handle this efficiently.&nbsp;So&nbsp;we spent some time with the customer engaged them on an assessment that showed them that they&nbsp;need&nbsp;to get count they were building on did not have the best scores across the framework. And more importantly, they have close to 300 out of 500 compliance failures that were trapped in conformity.&nbsp;So&nbsp;we presented our findings, and a remediation roadmap. And it was clear that the customer does not have the resources to fix these issues quickly by themselves.&nbsp;So&nbsp;we&nbsp;end&nbsp;up engaging with them. We had one of our cloud engineers work closely with their team and also basically live in the Conformity tool to quickly tackle their compliance failures, and then closely monitor each pillar of the well architected framework the whole time.&nbsp;So&nbsp;in a short amount of time,&nbsp;were&nbsp;able to improve their security and compliance score restring, a mid 70s, to the high 90s, as well as leave them with a high performing cloud across all pillars.&nbsp;So&nbsp;you see here today, you&#8217;re seeing those scores as measurements and also a histogram&nbsp;below of&nbsp;where they started, and where they got to.&nbsp;So&nbsp;they have the competence to bring on these customers, they&nbsp;their competence to scale this business, and they&#8217;re not going to be any potential pitfalls. Now, one of the most important parts is not just doing this assessment, not just you know, getting this health score, but also then sitting their operations up for the future.&nbsp;So&nbsp;they don&#8217;t have to do these types of assessments. You know, every week. They can set up Conformity to be fully operational to automate some of these security issues, and send alerts to whether it&#8217;s Slack, whether it&#8217;s email, however, they want to set it up. And then they&#8217;re ultimately set up for this continuous government, not only on the cloud, on security, compliance, but also on the well architected framework.&nbsp;So&nbsp;they know that their&nbsp;cloud&nbsp;is&nbsp;always secure, and it&#8217;s always running at the optimal level. So here are just some bullet points of just some general you know, what success does look like for customers that go through this process and they started kind of building for the future, which is, you know, they have assessment data across the five pillars. You know, they not only understand security applied threats, but know how it actually impacts the business. And that&#8217;s super important that people forget&nbsp;about&nbsp;sometimes. And also, they get knowledge&nbsp;on&nbsp;those specific compliance standards that they might not have had before. And they can now operate a little bit more responsibly. And then obviously, I just mentioned operations&nbsp;is&nbsp;set&nbsp;up for&nbsp;for&nbsp;automated, continuous cloud security compliance. And then their ability to thoughtfully forecast and plan beyond quarters because it&#8217;s, you know, everybody protecting here knows, things come up, things get distracted, you know, timelines get, you know, altered. And so at least this gives them some power to understand&nbsp;like,&nbsp;what they&#8217;re up against, and plans for the rest of the year of how they&#8217;re going to attack, you know, whatever security compliance issues so they can continue to build at a rapid pace. And then obviously, they have access to AWS premier level services, which is us.<\/p>\n<p><b>Joe Henderson<\/b>&nbsp;[44:23]<br \/>So&nbsp;going back to, you know, the health analogy,&nbsp;Edrans&nbsp;would kind of servers, that personal trainer who put the customers through that boot camp, and Conformity, at this point, you know, served as that continuous fitness tracker for them. So now not all customers&nbsp;go&nbsp;through this process, this assessment. Some&nbsp;customers that&nbsp;do they do this as a&nbsp;one time&nbsp;exercise, and then they&#8217;ll go back to normal after a couple months. And more times out of none&nbsp;those&nbsp;types of customers, we will see again, at some point, or they will ask for help. So definitely recommended process, the quick win to kind of get things under control.&nbsp;So&nbsp;we do these assessments quite often with our customers as a joint venture&nbsp;between&nbsp;you know,&nbsp;Edrans, Trend Micro, and the AWS marketplace. We&#8217;d like to make this&nbsp;offering as&nbsp;easily accessible to customers as well.&nbsp;So&nbsp;if they do want to get a hold or test out, or buy, you know, Conformity tool, as well as our services on top of that, we&#8217;ll make it very easy. We have a bundle that we can provide via the marketplace.&nbsp;So&nbsp;I&#8217;m going to wrap up here, and we&#8217;re going to kick it back to I believe, Sameer, we&#8217;re going to&nbsp;take&nbsp;some questions.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[45:30]<br \/>Oh, thank you, Aaron and Joe. We do have a few questions.&nbsp;So&nbsp;I&#8217;m going to go through a bunch of these as time permits. Take the first question, which sounds like, why does the client have to take care of a network issue if everything is on the Amazon network?&nbsp;So&nbsp;I think that the question is&nbsp;around&nbsp;network configurations or firewall configurations. Obviously, AWS protects our infrastructure and the services that run on it. Customers, when they deploy&nbsp;applications,&nbsp;use things like security groups to dictate what traffic enters, and egresses from their applications.&nbsp;So&nbsp;making sure that you are configuring that particular set of security group rules is important to make sure that your application is only receiving intended traffic, not only from the outside world, but as you build for microservices, you want to make sure that you&#8217;re using the controls that are provided through both at a network level as well as from an identity and access management standpoint, to make sure that you allow traffic from intended users and authorized users.&nbsp;So&nbsp;it&#8217;s not just network level things that we&#8217;re talking about. We&#8217;re also talking about how you would set up your application to give access to both users and maybe a microservice within that environment. That I&#8217;m going to ask the next question, which I&nbsp;believe this&nbsp;is for you, Aaron, can you help explain what&nbsp;the&nbsp;self-healing&nbsp;and DevOps integration looks like with your security solution?<\/p>\n<p><b>Aaron Ansari <\/b>[47:13]<br \/>Sure, absolutely.&nbsp;So&nbsp;what we end up doing is we have a set of Lambda functions that are tied into AWS environment and trigger&nbsp;off of&nbsp;any of the events that the Cloud One Conformity platform alerts to, that you configure. So, if&nbsp;something&#8217;s&nbsp;very high&nbsp;or extreme and is the finding that you need to remediate or correct such as you know, I keep using the example, but&nbsp;maybe&nbsp;you&#8217;ve&nbsp;got a you know, encrypted or unencrypted s3 bucket&nbsp;that&#8217;s&nbsp;put out there. And you need to correct that. And you can use our auto remediation&nbsp;component&nbsp;which is a set of Lambda functions to correct that and reset the environment or correct the drift that occurred as part of the standard path.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[48:06]<br \/>Awesome. Moving on to the next one. I guess again, going back to you again Aaron. Customers obviously have workloads deployed across multiple environments. How&nbsp;does&nbsp;you know Cloud Conformity help&nbsp;maintain&nbsp;sort of both&nbsp;the security posture and some of the other things that we talked about today?<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[48:28]<br \/>Yeah, and so&nbsp;whether or not&nbsp;you&#8217;re&nbsp;dealing with&nbsp;a production,&nbsp;non production,&nbsp;a staging&nbsp;or even a sandbox, or, you know, scratchpad environment. Conformity&#8217;s monitoring is built in to be immediate in real time. And&nbsp;so&nbsp;we&#8217;re&nbsp;actually looking&nbsp;at log data, metadata, event bus data, you know, kind of cloud trail logs. And anytime it a change introduced in that environment,&nbsp;as long as&nbsp;you&#8217;re&nbsp;monitoring&nbsp;that environment, right,&nbsp;as long as&nbsp;we&#8217;ve&nbsp;connected that account,&nbsp;we&#8217;re&nbsp;able to then go through and give you, you know, information on what that account is doing as it relates to the checks that&nbsp;we&#8217;re&nbsp;performing. And&nbsp;so&nbsp;once you integrate this, you know,&nbsp;let&#8217;s&nbsp;be blunt with AWS accounts are like, come from a vending machine, right? Someone goes and puts in their coin, and they get five or six accounts, and&nbsp;they&#8217;re&nbsp;able to do their building. Once you tie this into your account pipeline, you truly weave this into the fact where&nbsp;you&#8217;re&nbsp;doing the monitoring across all platforms, we wanted to do that sort of shift left.&nbsp;So&nbsp;if you tie this into the account creation templates, or, you know, the infrastructures as code, or the software defined infrastructure and environment that&nbsp;you&#8217;re&nbsp;doing, you get complete visibility across every environment.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[49:45]<br \/>Well, thank you. And he&nbsp;probably maybe&nbsp;going&nbsp;a little bit into the well architected framework security tool itself. Is it available for AWS customers to use was the&nbsp;question.&nbsp;I think,&nbsp;there&#8217;s&nbsp;a well architected tool that AWS&nbsp;provides&nbsp;and customers are obviously able to use that. But in addition,&nbsp;you&#8217;re&nbsp;able to use partner tools, like Cloud&nbsp;Conformity&nbsp;to help address both security related questions, as well as some of the other pillars that we talked about. The next question that&nbsp;we&#8217;re&nbsp;getting is, how does&nbsp;security&nbsp;hub help with PCI?&nbsp;So&nbsp;security&nbsp;hub is&nbsp;actually a&nbsp;service that AWS&nbsp;uses that, or provides that customers can use to get sort of a centralized dashboard of all the security events that have taken place within your environment. Within&nbsp;security&nbsp;hub itself, we do have a bunch of checks that we do for multiple standards, CIS being one of them. We&nbsp;did&nbsp;add&nbsp;PHPCI as well. I would also make sure that in addition to looking at what security hub provides, you will have to potentially look at what are the other specific questions that may be your PCI auditor might ask you, right, we might not be able to cover every specific scenario that a specific application that has PCI compliance requirements, will have to adhere to.&nbsp;So&nbsp;I would&nbsp;always also&nbsp;go back and understand from the auditor what sort of compliance requirements you&nbsp;have to&nbsp;help make sure that you are able to&nbsp;comply with&nbsp;that specific requirement.&nbsp;Maybe we&nbsp;can move this to Joe. Joe with new services announced every day, you know, we see that customers might not be doing this assessment, you know, once,&nbsp;it&#8217;s&nbsp;not a once and done thing, right? In your experience, what is the recommendation that&nbsp;you&#8217;re&nbsp;providing&nbsp;to&nbsp;your customers? And how often do you feel that they should be running an assessment and planning for re-architecting or&nbsp;optimizing&nbsp;their environment?<\/p>\n<p><b>Joe Henderson <\/b>[52:36]<br \/>Yes,&nbsp;great&nbsp;question.&nbsp;So&nbsp;with the Conformity tool, once you take it for a spin,&nbsp;you&#8217;ll&nbsp;see very clearly that just like&nbsp;they&#8217;ve&nbsp;got some specific security compliance protocols where you can click, and&nbsp;it&#8217;ll&nbsp;start running based on those, there is&nbsp;actually a&nbsp;well architected tool in there. So typically, what we find is the customers will engage with these types of assessments,&nbsp;we&#8217;re&nbsp;doing this sort of deep dive assessment, which is the interviews, questions, and then we match it with the data. Once&nbsp;that&#8217;s&nbsp;done, that&#8217;s&nbsp;sort of like&nbsp;the deep dive the heavy lifting. And then they can&nbsp;actually set&nbsp;up&nbsp;sort&nbsp;of automated&nbsp;viewing of where they fit on the arc, well architected framework.&nbsp;So&nbsp;we have some customers that do sort of just a weekly review, see where&nbsp;it&#8217;s&nbsp;changed over the week, and they measure it, where it was last week, on all five pillars and check out what may have changed or why did this dip? Why did this go up? And then we have some customers that do it every&nbsp;every&nbsp;month. And then we typically recommend that at the very least,&nbsp;you&#8217;re&nbsp;going to do a&nbsp;more deep&nbsp;dive, whether&nbsp;it&#8217;s&nbsp;with a partner, whether&nbsp;it&#8217;s&nbsp;just internal, at least doing one every six months. But with the tool, you could really, you can&nbsp;you can automate it,&nbsp;or&nbsp;you&nbsp;can&nbsp;you can look in there all the time.&nbsp;<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[53:45]<br \/>Awesome. Going back to you, Aaron. Do you find that cloud conformity as a tool helps accelerate the well architected review?<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[54:00]<br \/>Very much, I mean, as I mentioned,&nbsp;it&#8217;s&nbsp;built&nbsp;off of&nbsp;that. And&nbsp;so&nbsp;when you&nbsp;leverage&nbsp;Conformity to give&nbsp;you&nbsp;insight into&nbsp;what&#8217;s&nbsp;happening with relation to your alignments to the well architected framework,&nbsp;it&#8217;s&nbsp;done in seconds or minutes. And&nbsp;it&#8217;s&nbsp;consistent. And&nbsp;so&nbsp;when&nbsp;when&nbsp;you&#8217;re&nbsp;constantly&nbsp;monitoring&nbsp;your environment, and constantly&nbsp;monitoring&nbsp;your environments at a lot at I guess, adherence is the word&nbsp;I&#8217;m&nbsp;looking for adherence to the well architected framework,&nbsp;you&#8217;re&nbsp;very much in the right spot, and&nbsp;you&#8217;re&nbsp;doing it, you know, automatedly. And then when you use people like&nbsp;Edrans&nbsp;to come help you do the&nbsp;remediation,&nbsp;you&#8217;re&nbsp;just firing on all cylinders.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b> [54:51]<br \/>All right, perfect for Joe. This one is, how much cost does a security architecture definition, implementation, and operation of a serverless in container environment with&nbsp;Edrans&nbsp;look like?&nbsp;I think I&nbsp;want to&nbsp;probably rephrase&nbsp;this a little bit, I guess, is that a little bit of a difference between how you guys will be evaluating serverless and&nbsp;container based&nbsp;workloads? Joe versus&nbsp;let&#8217;s&nbsp;say, a standard&nbsp;monolith&nbsp;that&#8217;s&nbsp;running on,&nbsp;let&#8217;s&nbsp;say, a standard instance?<\/p>\n<p><b>Joe Henderson<\/b>&nbsp;[55:29]<br \/>Yeah,&nbsp;it&#8217;s&nbsp;a bit different.&nbsp;So&nbsp;these assessments, you know, they&nbsp;don&#8217;t&nbsp;really cost anything, but the tools we use, you know, use our services. And then during those remediation processes,&nbsp;that&#8217;s&nbsp;where we&nbsp;identify&nbsp;sort of where&nbsp;to attack first and where to attack next.&nbsp;It&#8217;s&nbsp;really based on the time it takes to fix those issues.&nbsp;So&nbsp;it can really vary.&nbsp;So&nbsp;I&nbsp;don&#8217;t&nbsp;have an exact number for that at this point.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[55:55]<br \/>Oh, and&nbsp;and&nbsp;going back to Aaron, any product features you can highlight that you can talk about with regards to FedRAMP level four compliance?<\/p>\n<p><b>Aaron&nbsp;Ansari<\/b>&nbsp;[56:10]<br \/>Yeah, actually, Cloud One as a platform is moving towards FedRAMP and GovCloud sort of compliance.&nbsp;We&#8217;re&nbsp;not there yet. And I&nbsp;don&#8217;t&nbsp;want you to think as though you know, I can come here and say,&nbsp;yeah, we&nbsp;we&#8217;ve&nbsp;got it in the bag. But we are moving towards that&nbsp;as a platform. And Conformity is moving toward those as a piece of this. I&nbsp;can&#8217;t&nbsp;specifically speak to, you know, dates and timelines and those sorts of things. But our customers have been asking for it as well as our federal, you know, federal and sled prospects.&nbsp;So&nbsp;it&#8217;s&nbsp;definitely something&nbsp;we have in mind and that we are moving towards.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[56:49]<br \/>Alright, thank you. And one other question for you Aaron. Maybe&nbsp;talk to&nbsp;a little bit about how you guys&nbsp;maybe work&nbsp;with the well architected tool, as well as how you guys sort of have differing feature sets as compared to what the tool does.<\/p>\n<p><b>Aaron Ansari<\/b>&nbsp;[57:09]<br \/>Sure.&nbsp;So&nbsp;the well architected tool is a fantastic first step, but what happens with the Conformity component that aligns to the framework is you just goes n levels deeper. And&nbsp;so&nbsp;while the well architected tool consumes the findings of Config and Guard Duty and those features and builds off of the alignment there. There&#8217;s a much deeper and much richer set of data that we look at with the Conformity piece to do the scanning, and you can see those on our knowledge base, which again, is completely free.&nbsp;So&nbsp;you can see kind of just how deep we go. So not only&nbsp;we&nbsp;have components that align and build off of the well architected tool, but it&#8217;s exponential, the depth in which we go into, you know, operational excellence and security and you know, the other pillars.&nbsp;So&nbsp;it&#8217;s really quite augmentative and builds and aligns back to the actual questions that are part of the well architected review.&nbsp;So&nbsp;we want to make certain that we&#8217;re encompassing every element of a question that&#8217;s asked, it might be operational, might be security based.&nbsp;So&nbsp;you&#8217;ll see within the solution set that there really goes very, very deep.<\/p>\n<p><b>Sameer Kumar&nbsp;Vasanthapuram<\/b>&nbsp;[58:25]<br \/>Awesome, thank you very much.&nbsp;So&nbsp;with that said, we&#8217;re reaching the top of the hour here.&nbsp;Appreciate&nbsp;Joe and Aaron joining us for today&#8217;s webinar. In terms of&nbsp;next&nbsp;steps, we have a bunch of links where you can learn more about AWS security solutions and partner solutions. You can learn about what Trend Micro does with AWS as well as what&nbsp;Edrans&nbsp;is working on with&nbsp;with&nbsp;Trend Micro and AWS. Again, thank you everyone for the time and appreciate you, Aaron and Joe joining us today.<\/p>\n<p> Read More <a href=\"https:\/\/www.trendmicro.com\/en_us\/devops\/20\/h\/automate-compliance-aws-well-architected-framework.html\">HERE<\/a><\/p>\n","protected":false},"excerpt":{"rendered":"<p>Explore how Edrans, a DevOps, IT, and software consultancy, is using Trend Micro Cloud One\u2122 \u2013 Conformity to adhere to the Well-Architected Framework and boost customers\u2019 security, performance, and compliance. Read More HERE&#8230;<\/p>\n","protected":false},"author":2,"featured_media":43265,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"colormag_page_layout":"default_layout","footnotes":""},"categories":[61],"tags":[9505,9504,9572,9571,9670],"class_list":["post-43264","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-trendmicro","tag-trend-micro-devops-aws","tag-trend-micro-devops-compliance","tag-trend-micro-devops-conformity","tag-trend-micro-devops-how-to","tag-trend-micro-devops-webinar"],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News<\/title>\n<meta name=\"description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News\" \/>\n<meta property=\"og:description\" content=\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security &amp; Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/\" \/>\n<meta property=\"og:site_name\" content=\"ThreatsHub Cybersecurity News\" \/>\n<meta property=\"article:published_time\" content=\"2020-08-10T00:00:00+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1282\" \/>\n\t<meta property=\"og:image:height\" content=\"700\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"TH Author\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:creator\" content=\"@threatshub\" \/>\n<meta name=\"twitter:site\" content=\"@threatshub\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"TH Author\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"58 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/\"},\"author\":{\"name\":\"TH Author\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\"},\"headline\":\"Automate Compliance in the Well-Architected Framework Vice President of Cloud One &#8211; Conformity\",\"datePublished\":\"2020-08-10T00:00:00+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/\"},\"wordCount\":11778,\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg\",\"keywords\":[\"Trend Micro DevOps : AWS\",\"Trend Micro DevOps : Compliance\",\"Trend Micro DevOps : Conformity\",\"Trend Micro DevOps : How To\",\"Trend Micro DevOps : Webinar\"],\"articleSection\":[\"TrendMicro\"],\"inLanguage\":\"en-US\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/\",\"name\":\"Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg\",\"datePublished\":\"2020-08-10T00:00:00+00:00\",\"description\":\"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#primaryimage\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2021\\\/10\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg\",\"width\":1282,\"height\":700},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Trend Micro DevOps : AWS\",\"item\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/tag\\\/trend-micro-devops-aws\\\/\"},{\"@type\":\"ListItem\",\"position\":3,\"name\":\"Automate Compliance in the Well-Architected Framework Vice President of Cloud One &#8211; Conformity\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#website\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"name\":\"ThreatsHub Cybersecurity News\",\"description\":\"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\"},\"alternateName\":\"Threatshub.org\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#organization\",\"name\":\"ThreatsHub.org\",\"alternateName\":\"Threatshub.org\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"contentUrl\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/wp-content\\\/uploads\\\/2025\\\/05\\\/Threatshub_Favicon1.jpg\",\"width\":432,\"height\":435,\"caption\":\"ThreatsHub.org\"},\"image\":{\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/logo\\\/image\\\/\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/threatshub\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.threatshub.org\\\/blog\\\/#\\\/schema\\\/person\\\/12e0a8671ff89a863584f193e7062476\",\"name\":\"TH Author\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g\",\"caption\":\"TH Author\"}}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/","og_locale":"en_US","og_type":"article","og_title":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News","og_description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","og_url":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/","og_site_name":"ThreatsHub Cybersecurity News","article_published_time":"2020-08-10T00:00:00+00:00","og_image":[{"width":1282,"height":700,"url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg","type":"image\/jpeg"}],"author":"TH Author","twitter_card":"summary_large_image","twitter_creator":"@threatshub","twitter_site":"@threatshub","twitter_misc":{"Written by":"TH Author","Est. reading time":"58 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#article","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/"},"author":{"name":"TH Author","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476"},"headline":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One &#8211; Conformity","datePublished":"2020-08-10T00:00:00+00:00","mainEntityOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/"},"wordCount":11778,"publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg","keywords":["Trend Micro DevOps : AWS","Trend Micro DevOps : Compliance","Trend Micro DevOps : Conformity","Trend Micro DevOps : How To","Trend Micro DevOps : Webinar"],"articleSection":["TrendMicro"],"inLanguage":"en-US"},{"@type":"WebPage","@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/","url":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/","name":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One - Conformity 2026 | ThreatsHub Cybersecurity News","isPartOf":{"@id":"https:\/\/www.threatshub.org\/blog\/#website"},"primaryImageOfPage":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#primaryimage"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#primaryimage"},"thumbnailUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg","datePublished":"2020-08-10T00:00:00+00:00","description":"ThreatsHub Cybersecurity News | ThreatsHub.org | Cloud Security & Cyber Threats Analysis Hub. 100% Free OSINT Threat Intelligent and Cybersecurity News.","breadcrumb":{"@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#primaryimage","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2021\/10\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity.jpg","width":1282,"height":700},{"@type":"BreadcrumbList","@id":"https:\/\/www.threatshub.org\/blog\/automate-compliance-in-the-well-architected-framework-vice-president-of-cloud-one-conformity\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/www.threatshub.org\/blog\/"},{"@type":"ListItem","position":2,"name":"Trend Micro DevOps : AWS","item":"https:\/\/www.threatshub.org\/blog\/tag\/trend-micro-devops-aws\/"},{"@type":"ListItem","position":3,"name":"Automate Compliance in the Well-Architected Framework Vice President of Cloud One &#8211; Conformity"}]},{"@type":"WebSite","@id":"https:\/\/www.threatshub.org\/blog\/#website","url":"https:\/\/www.threatshub.org\/blog\/","name":"ThreatsHub Cybersecurity News","description":"%%focuskw%% Threat Intel \u2013 Threat Intel Services \u2013 CyberIntelligence \u2013 Cyber Threat Intelligence - Threat Intelligence Feeds - Threat Intelligence Reports - CyberSecurity Report \u2013 Cyber Security PDF \u2013 Cybersecurity Trends - Cloud Sandbox \u2013- Threat IntelligencePortal \u2013 Incident Response \u2013 Threat Hunting \u2013 IOC - Yara - Security Operations Center \u2013 SecurityOperation Center \u2013 Security SOC \u2013 SOC Services - Advanced Threat - Threat Detection - TargetedAttack \u2013 APT \u2013 Anti-APT \u2013 Advanced Protection \u2013 Cyber Security Services \u2013 Cybersecurity Services -Threat Intelligence Platform","publisher":{"@id":"https:\/\/www.threatshub.org\/blog\/#organization"},"alternateName":"Threatshub.org","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/www.threatshub.org\/blog\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":"Organization","@id":"https:\/\/www.threatshub.org\/blog\/#organization","name":"ThreatsHub.org","alternateName":"Threatshub.org","url":"https:\/\/www.threatshub.org\/blog\/","logo":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/","url":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","contentUrl":"https:\/\/www.threatshub.org\/blog\/coredata\/uploads\/2025\/05\/Threatshub_Favicon1.jpg","width":432,"height":435,"caption":"ThreatsHub.org"},"image":{"@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/logo\/image\/"},"sameAs":["https:\/\/x.com\/threatshub"]},{"@type":"Person","@id":"https:\/\/www.threatshub.org\/blog\/#\/schema\/person\/12e0a8671ff89a863584f193e7062476","name":"TH Author","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/066276f086d5155df79c850206a779ad368418a844da0182ce43f9cd5b506c3d?s=96&d=mm&r=g","caption":"TH Author"}}]}},"_links":{"self":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43264","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/comments?post=43264"}],"version-history":[{"count":0,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/posts\/43264\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media\/43265"}],"wp:attachment":[{"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/media?parent=43264"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/categories?post=43264"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.threatshub.org\/blog\/wp-json\/wp\/v2\/tags?post=43264"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}