APAC CIOOutlook

Advertise

with us

  • Technologies
      • Artificial Intelligence
      • Big Data
      • Blockchain
      • Cloud
      • Digital Transformation
      • Internet of Things
      • Low Code No Code
      • MarTech
      • Mobile Application
      • Security
      • Software Testing
      • Wireless
  • Industries
      • E-Commerce
      • Education
      • Logistics
      • Retail
      • Supply Chain
      • Travel and Hospitality
  • Platforms
      • Microsoft
      • Salesforce
      • SAP
  • Solutions
      • Business Intelligence
      • Cognitive
      • Contact Center
      • CRM
      • Cyber Security
      • Data Center
      • Gamification
      • Procurement
      • Smart City
      • Workflow
  • Home
  • CXO Insights
  • CIO Views
  • Vendors
  • News
  • Conferences
  • Whitepapers
  • Newsletter
  • Awards
Apac
  • Artificial Intelligence

    Big Data

    Blockchain

    Cloud

    Digital Transformation

    Internet of Things

    Low Code No Code

    MarTech

    Mobile Application

    Security

    Software Testing

    Wireless

  • E-Commerce

    Education

    Logistics

    Retail

    Supply Chain

    Travel and Hospitality

  • Microsoft

    Salesforce

    SAP

  • Business Intelligence

    Cognitive

    Contact Center

    CRM

    Cyber Security

    Data Center

    Gamification

    Procurement

    Smart City

    Workflow

Menu
    • Amazon
    • Cyber Security
    • Hotel Management
    • Workflow
    • E-Commerce
    • Business Intelligence
    • MORE
    #

    Apac CIOOutlook Weekly Brief

    ×

    Be first to read the latest tech news, Industry Leader's Insights, and CIO interviews of medium and large enterprises exclusively from Apac CIOOutlook

    Subscribe

    loading

    THANK YOU FOR SUBSCRIBING

    • Home
    Editor's Pick (1 - 4 of 8)
    left
    How AWS Killed the Data Center

    Samuel Chesterman, Global CIO, IPG MB

    Join the Data Revolution

    Dr. Michael Gorriz, Group CIO, Standard Chartered Bank

    Looking At Google And Amazon Tools To Do Real Time Decision Support, Search And Predictive Analytics

    Denise Zabawski, VP and CIO, Nationwide Children’s Hospital

    How AWS and Public Cloud are Re-defining the Call Center Industry

    Robert Killory, CIO, 3CLogic

    AWS: A True Pioneer

    Christofer Sandberg, CTO, Eyeota

    Recovery Fundamentals in the Event of a Worldwide Ransomware Cyber-Attack

    Raymond Goh, Head of Systems Engineering, Asia & Japan, Veeam Software

     The WAN is Dead, Long Live the WAN

    Tricia Png, Regional Director, ASEAN, Silver Peak

    Future Proofing Solutions - What are we looking for in Hybrid Cloud Analytics?

    Sharryn Napier, VP & Regional Director, Qlik (Australia And New Zealand))

    right

    Designing and Building Application Security and Layering it on top of AWS

    Colin Bodell, CTO & EVP, Time.

    Tweet
    content-image

    Colin Bodell, CTO & EVP, Time.

    Before joining Time Inc. as CTO in February 2014, I worked at Amazon for eight years running the Website Application Platform team that included the technology that drives all Amazon Websites. During my time there, I led the team that successfully moved Amazon websites in North America and Europe to Amazon Web Services (AWS). I consider that project highly successful, driving significant cost savings, delivering previously unheard of agility that enabled us to react to traffic spikes and providing valuable feedback to our AWS colleagues to inform how AWS was, and will be, consumed within the enterprise.

    Now at Time Inc., the world’s leading magazine publisher, I’m taking my eight years of experience working with cloud-based infrastructure and moving all global Time Inc. websites, mobile technology and IT infrastructure to Amazon Web Services (AWS).

    Time Inc’s compute, storage and network infrastructure is run from company-owned and operated data centers and co-location facilities worldwide. I kicked off the Time Inc. “Move to the Cloud” (MTC) initiative in April 2014 with the goal of building a cloud-based infrastructure and migrating all of our digital and enterprise applications to the cloud. Moving to a cloud-based infrastructure will significantly reduce our costs while dramatically improving time-to-deploy. I want Time Inc. out of the data center business and laser-focused on our core media-centric competencies.

    The forecast we developed shows that cloud-based infrastructure costs will be ~45 percent less than equivalent services hosted in dedicated and co-location facilities. The process for bringing new hardware online in our data centers can take up to three months to specify, order, receive, rack and commission; cloud based hardware instances can be spun up in as little as 5 minutes.

    In preparing for the move to the cloud, we assembled a cross-functional team representing Infrastructure, Information Security, Website Operations and Website and Mobile application owners to collaborate on the program. This team completed the design of the cloud architecture, developed enterprise cloud standards and governance procedures and built a cloud-based infrastructure to host customer-facing and back-office applications. A key area in the preparation was solving for the challenge of designing and building application security and layering it on top of AWS. The effective management of information security risk is a crucial part of our business objectives.

    As new technologies such as cloud-based infrastructure emerge, it is the responsibility of our Technology & Product Engineering team to ensure that information security and risks are appropriately and sufficiently addressed.

    "Time Inc’s compute, storage and network infrastructure is run from company-owned and operated data centers and co-location facilities worldwide"

    Amazon is responsible for ensuring its AWS architecture and infrastructure is secure, but the application security layer within AWS is the responsibility of the organization using the service. AWS provides a foundational security infrastructure to protect its shared system and resource platform, essentially PaaS (e.g. high availability, scalability and efficiency). The security controls provided by AWS are reactive in nature. If a customer deploys its applications using default AWS services, there are very limited application security controls in place. Companies take for granted perimeter security in a traditional infrastructure. In an AWS environment, security incident prevention, detection and monitoring are absent in a default set up. This is just a  small piece of a full secure framework and a fully protected resource. It is the sole responsibility of the AWS customer (in this case, Time Inc.) to ensure its resources are protected at every layer.

    We refused to take any risk when migrating our systems to the cloud without first understanding the gaps between traditional security and cloud-based infrastructure security. Our Information Security team performed a full gap assessment and quickly came to the understanding that it is not just a  simple one-for-one migration. For example, AWS does not have a conventional firewall or Intrusion Detection System due to the nature of the shared platform. Instead it offers “security groups” and basic logging, neither of which is sufficient for us.

    Our Information Security team identified the following gaps in a traditional AWS deployment:

    1. Firewalls and Logging

    2. Intrusion Detection Systems

    3. Intrusion Prevention Systems

    4. Denial Of Service mitigation

    5. Vulnerability and Event Management

    6. Control of Identity and Access Management

    7. Data Loss Prevention (DLP)

    We mitigated these gaps by modeling our managed security service to the unique risks of the cloud. These included implementing the following:

    1. Host-based monitoring and threat detection

    2. Host-based log management

    3. Web Application Firewalls

    4. Vulnerability scanning tools deployed in the cloud

    We encountered a significant challenge in the availability and selection of 3rd party consulting organizations with experience in architecting and deploying application security systems on AWS. The ones we identified were invariably much more expensive than prior experience would indicate as appropriate. We identified Control Group who proved to have the necessary expertise with the design of secure AWS deployment mechanisms and the development of security standards. The security standards delivered by New Yorkbased Control Group laid the foundation for our full application security framework. Additionally AlertLogic was leveraged to fill in some of the gaps that existed with monitoring and detection. We employed several other vendors and best-in-breed security tools to round out the entire security framework.

    By modeling its managed security service, we were able to successfully put in place the security incident prevention, detection and monitoring required to create a full secure framework and a fully protected resource. As of October 2014, all of our UK sites execute on AWS, their primary cloud hosting provider, as well as about a third of the US sites. The Time Inc. Move to the Cloud project will be completed in 2015, significantly reducing our costs while delivering greater flexibility – all to the benefit of our customers and our business.

    Check this out: Top Managed Security Service Companies in APAC
    tag

    AWS

    Information Security

    Firewall

    Identity and Access Management

    Weekly Brief

    loading
    Top 25 Amazon Solution Companies 2017
    ON THE DECK

    Amazon 2017

    I agree We use cookies on this website to enhance your user experience. By clicking any link on this page you are giving your consent for us to set cookies. More info

    Read Also

    Reimagining Pension Services Through Responsible Innovation

    Reimagining Pension Services Through Responsible Innovation

    Maz Mirza, Chief Digital Officer, KWAP Malaysia
    Maritime: Beyond Systems, Beyond Seas

    Maritime: Beyond Systems, Beyond Seas

    Ron Fong, Cio, Station Satcom
    Human-Centered Innovation in the GenAI Era

    Human-Centered Innovation in the GenAI Era

    CJ Meadows, Head of Innovation-Asia, Executive Education Designer, Professor & Head of Mbaconsulting, S P Jain School Of Global Management
    The Art and Science of Selling

    The Art and Science of Selling

    Scott White, Senior Manager Sales and Marketing Operations, Airbus
    Responsible Data Leadership in an AI-Driven World

    Responsible Data Leadership in an AI-Driven World

    Gemma Dias, Head of Data Governance, Tyro Payments
    Driving Guest-Centric IT Innovation in Integrated Resorts

    Driving Guest-Centric IT Innovation in Integrated Resorts

    Ching Yip, Vice President of Information Technology, Hoiana Resort & Golf
    Microsoft-Covering People 360 Degrees...

    Microsoft-Covering People 360 Degrees...

    Khalid Nizami , Heads The Digital Transformation Center Of Excellence For Asia Pacific, Ecolab
    How Insurers Can Lead Digital Ecosystems and Better Meet Customer Needs Platforms Such as Microsoft Azure Can Help Companies Become Network Orchestrators

    How Insurers Can Lead Digital Ecosystems and Better Meet Customer Needs Platforms Such as Microsoft Azure Can Help Companies Become Network Orchestrators

    Chris Henderson, EY Asia-Pacific Data & Analytics Advisory, Partner
    Loading...
    Copyright © 2025 APAC CIOOutlook. All rights reserved. Registration on or use of this site constitutes acceptance of our Terms of Use and Privacy and Anti Spam Policy 

    Home |  CXO Insights |   Whitepapers |   Subscribe |   Conferences |   Sitemaps |   About us |   Advertise with us |   Editorial Policy |   Feedback Policy |  

    follow on linkedinfollow on twitter follow on rss
    This content is copyright protected

    However, if you would like to share the information in this article, you may use the link below:

    https://amazon.apacciooutlook.com/cxoinsights/designing-and-building-application-security-and-layering-it-on-top-of-aws-nwid-833.html