Slide 1
Slide 1
Slide 1
Slide 1
Slide 1
Slide 1

PRESENTATION MATERIALS

PHOTOS / VIDEOS

Official conference photos and HD videos will be made available in the next 2-3 weeks. Please follow @hitbsecconf on Twitter for links or join our Facebook Group

Kenneth White (Principal Scientist, Social & Scientific Systems)

PRESENTATION TITLE: Amazon Web Services: A Deep Analysis of the Organization, Data Centers and Global Network

PRESENTATION ABSTRACT:

Amazon Web Services has emerged as one of the fastest growing companies in the past five years, and is increasingly being seen as a critical infrastructure for thousands of private and public sector organizations. Yet, virtually nothing is known about it’s internal organizational structure, its data centers, its global network and its hardware technology stack. In this presentation, I will present the results of a deep analysis of Amazon Web Services (AWS), particularly in light of the multi-day major service outages over the past 12 months, as well as the mandatory fleet-wide virtual machine reboots.

In particular, the following topics will be covered in depth:

I. AWS Strategic & Operations Management: Who Leads?

II. Amazon Data Center Infrastructure

o Facility Build-outs: The Silent Construction Partner
o Availability Zones & Regions
o Data center locations – with pictures
o Power Capacity & Redundancy
o Backup Generators
o Acronym Soup: SAE16, SOC1, FISMA, ISO27001, Part11
o Physical, process & technical controls

III. Global Network

o Amazon’s global network
o Peering Map (public & private)
o CDN/Edge
o OC 192/fiber/submarine cables

IV. Technology

o Core Compute: EC2
o Secrets of the AWS Gurus:
o Everything you’ve read about micros are wrong
o The hidden advantages of m1.large and m1.xlarge
o Creating AMIs
o All your key are belong to us
o Hypervisor vulnerabilities
o Storage: S3, EBS, instance
o Stunning Facts about Elastic Block Storage vs. Instance Storage
o What really happened with the infamous Outage of 2011
o Block-level storage encryption: Step-by-step off-cloud key management
o Services/API & security implications
o XML SOAP signature wrapping attack & the “great AWS reboot of 2011”
o Relational Database Service
o DBA co-tenancy on Oracle – Do you see what I see?
o Instant IPSEC-based virtual network: Virtual Private Cloud (VPC)
o One of the least appreciated services on Amazon
o Four topologies to choose from (software/hardware mix)
o On-demand Apache Hadoop Map-Reduce (EMR)
o GPGPU (Cluster Compute)
o SSD-based Distributed Key-Value Store “NoSQL” (Dynamo)

ABOUT KENNETH WHITE

Kenneth White is Principal Scientist at Social & Scientific Systems, a global technical consultancy. His team designed and runs the Operations Center for the largest clinical trial network in the world, with centers in over 50 countries. Previously, while working at companies including the British Aerospace Group, he developed hardened systems for US public agencies including DISA, Treasury, EPA, NIH and CDC, and has authored federal guidance on implementing PII/PHI data protections. White holds an MEd from Harvard and is currently completing his PhD in Computational Neuroscience, specializing in expert pattern classification. Since 2010 he has served as a technical reviewer for the Software Engineering Institute at Carnegie Mellon University, focusing on lifecycle security and emerging cloud technologies. He has published numerous journal articles and abstracts in applied signal processing, most notably a major 2010 paper in the Proceedings of the National Academy of Sciences. White has been working on information assurance issues for over 20 years. He may or may not have penetrated the Sprint long-distance network over dial-up in middle school.

Okura Hotel Amsterdam
Ferdinand Bolstraat 333, 1072 LH Amsterdam,
The Netherlands

1-Day Intensive Training Sessions – 21st of May / 0900 – 1800

 

SPECIAL OPS 1  - WIRELESS SECURITY KUNGF00

SPECIAL OPS 2  – THE ART OF EXPLOITING SQL INJECTION FLAWS

SPECIAL OPS 3 – MOBILE APPLICATION HACKING – ATTACK & DEFENSE



2-Day Hands on Training Sessions – 22nd – 23rd of May / 0900 – 1800

TECH TRAINING 1  – HUNTING WEB ATTACKERS

TECH TRAINING 2  – ADVANCED LINUX EXPLOITATION METHODS

TECH TRAINING 3  - ADVANCED APPLICATION HACKING – ATTACKS, EXPLOITS & DEFENSE

 

 



3-Day Hands on Training Sessions – 21st, 22nd & 23rd of May / 0900 – 1800

TECH TRAINING 4  – THE EXPLOIT LABORATORY: ADVANCED EDITION




QUAD TRACK CONFERENCE – 24th & 25th of May / 0900 – 1800

Featuring keynotes by BRUCE SCHNEIER and ANDY ELLIS



EVENT ORGANIZER

LOCAL PARTNER

PLATINUM SPONSORS

GOLD SPONSORS

TITANIUM SPONSOR (POST CONFERENCE RECEPTION + SPEAKER RECEPTION)

SILVER SPONSOR

HACKWEEKDAY SPONSOR

ALCO_PWN SPONSOR (POST CONFERENCE RECEPTION)

HITB LAB / SIGINT SPONSOR

NETWORK SPONSORS AND UPLINK

ADDITIONAL SUPPORT BY

SUPPORTING MEDIA

FRIENDS OF HITB

Copyright © 2012 Hack In The Box | http://www.hackinthebox.org

( / 10 )