AWS re:Invent 2022 - Data protection and governance on AWS (STG207)
AWS re:Invent 2022 - Data protection and governance on AWS (STG207)
The world’s most valuable resource is data. Data protection and data governance help fuel business success and regulatory compliance and proactively prevent inadvertent issues or data loss. Join this session to dive deep on how AWS managed data protection services offer organizations defense in depth to help mitigate risks around their sensitive application data at rest and in transit.
ABOUT AWS Amazon Web Services (AWS) hosts events, both online and in-person, bringing the cloud computing community together to connect, collaborate, and learn from AWS experts.
AWS is the world’s most comprehensive and broadly adopted cloud platform, offering over 200 fully featured services from data centers globally. Millions of customers—including the fastest-growing startups, largest enterprises, and leading government agencies—are using AWS to lower costs, become more agile, and innovate faster.
#reInvent2022 #AWSreInvent2022 #AWSEvents
Content
6.451 -> - Hello and welcome
everyone to AWS re:Invent.
10.65 -> My name is Palak and I'm joined today here
15.87 -> with Marcos, who's our
senior solutions architect,
19.74 -> and Matthews, who's our
customer representation
22.14 -> from Asurion.
23.73 -> So let's get started.
26.16 -> Did you know that from the
beginning of humanity 'til 2003,
31.26 -> the data growth was
about half a zettabyte?
34.47 -> Now, in 2013 alone, just in two days
39.24 -> that much amount of data was recreated.
42.51 -> The data has been growing
steadily and exponentially,
45.18 -> and in 2018, that number
reached an estimated worth
49.53 -> of 33 zettabytes.
51.72 -> IDC expects that the
data will keep on growing
55.02 -> at a rate of 5.3 times,
56.91 -> and by 2025, we expect the
data to become 181 zettabytes.
63.96 -> Now, just to give you a
little bit of a perspective,
67.2 -> one zettabyte equals to
a trillion gigabytes.
70.62 -> That's a lot of data.
72.355 -> And that's, while it's exciting,
74.61 -> it poses interesting challenges
for customers of all sizes,
78.12 -> for our CIOs, our storage administrators,
80.73 -> on how to protect and safeguard that data.
84.36 -> So let me start by
talking about, you know,
87.3 -> what is data protection in the
context of this presentation?
91.44 -> Data protection refers to
strategies that one puts in place
95.016 -> to safeguard critical important data
98.64 -> from loss, compromise, and corruption,
101.76 -> and recover that data
to an operational state
104.52 -> to ensure business continuity.
107.04 -> Our customers require a
simple, cost efficient,
111.75 -> and a centralized management system
114.06 -> to be able to protect their data.
120.3 -> All right, now the AWS native services
123.63 -> have data protection inbuilt
125.19 -> based on the microservices architecture.
128.76 -> However, the management of
the data protection policies
132 -> is all one off based on the service type.
135.03 -> Customers often use ProServe
or Professional Services
138.78 -> to write scripts to create
data protection policies
142.38 -> for the individual services.
144.09 -> Now, this results into
a sprawl of tech tools
147.66 -> and additional hands required
to manage that scripts
151.83 -> and the policies associated
with the services.
155.07 -> This just results into a
siloed solutions per service.
158.907 -> Moreover, when we talk to our customers,
161.82 -> it is very clear that
compliance is a key requirement.
165.96 -> Majority of our customers not
only use one type of resource.
169.41 -> So for example, if they're protecting EFS,
172.41 -> mostly they would be also working
174.18 -> with EBS, Azure, Aurora,
RDS, and other resources.
181.08 -> So now to maintain compliance
and report on the compliance
184.35 -> of those data protection
policies, it is very cumbersome
187.23 -> to audit the logs manually through scripts
190.38 -> and report on the compliance.
192.09 -> Moreover, that approach is error prone,
194.34 -> can result into the customer
being non-compliant.
198.09 -> This siloed approach results
into costly operations
200.88 -> for the end customer.
202.35 -> As a result of this, you know,
we listen to our customers.
204.87 -> We always work backward from
our customer requirements,
207.36 -> and we decided to create
AWS Backup solution.
212.13 -> Talking to our customers,
typically, they fall
214.59 -> into one of the three
categories or topologies
216.93 -> as described here.
218.97 -> The first topology is where customers
220.92 -> are running their applications
222.78 -> on premises in their own data centers,
224.88 -> and they're using software
from backup vendors
227.85 -> or media servers or backup appliances
230.147 -> to backup or protect their data.
233.58 -> The second topology is,
you know, mostly due
236.4 -> to the onset of Cloud.
237.57 -> Customers have started using
applications on premises,
240.96 -> but are using a target Cloud
to protect their DA data
245.16 -> using, say for example, a storage gateway.
248.19 -> And the third topology is
more Cloud-native topology,
251.82 -> where customers want to go ahead
253.62 -> and run their applications on the Cloud,
255.685 -> and they also want to natively
protect those applications
258.555 -> within the same Cloud.
260.4 -> They want to be able to
monitor, audit, and report
263.88 -> on the compliance of your data
protection policies natively
267.3 -> from the Cloud.
268.47 -> We listen to our customers
and we worked backwards,
271.08 -> and as a result of which, AWS
Backup is available to solve
274.595 -> for the hybrid and Cloud-native use cases.
277.74 -> This is what our customers wanted from us.
282.18 -> With this brief introduction, I would like
284.52 -> to invite Marcos here to
talk through the solution
288.93 -> and the architecture of AWS Backup.
290.627 -> Marcos.
- Thank you, Palak.
292.65 -> Good afternoon, y'all.
My name is Marcos Perez.
294.72 -> I'm a storage specialist
SA, part of AWS Backup team.
300.12 -> Let's go over how AWS Backup works,
303.39 -> but even before that, can you show hands
305.842 -> who is using AWS Backup
currently right now?
310.62 -> Okay, I see quite half of the
of the audience. Thank you.
315.54 -> So AWS Backup, as Palak mentioned,
318.51 -> was created to simplify, to automate,
321.93 -> to centralize the data protection,
325.83 -> both for Cloud and for on premises.
330.42 -> It's a managed services.
331.8 -> So for those you are familiar
with managed service,
335.13 -> basically we are taking out
of the undifferentiated,
339.364 -> heavy lifting of managing,
provisioning, servers, licensing,
344.64 -> infrastructure, network,
everything that you need
347.07 -> to put together in order
to put a solution together.
351.9 -> With AWS Backup, you just opt in
354.09 -> and you start using the service.
355.53 -> That's the first step.
357.24 -> The second step's quite important,
358.95 -> because most of the time we spend
360.57 -> there creating your
data protection strategy
363.78 -> is the backup plan.
365.34 -> So for those that are
using already familiar
367.74 -> with the dashboard or using scripting
369.483 -> or using CLIS decay,
371.76 -> you can create your backup plan.
373.65 -> The backup plan encapsulates
things like the frequencies of
377.683 -> the backups, the rotation,
where the backups will be saved,
385.32 -> any type of transition to code storage,
388.92 -> lifecycle management policies, and so on.
392.07 -> Once you define the backup
plan, the frequencies,
395.01 -> the retention and all the policies,
396.477 -> and then you start assigning resource,
399.09 -> you can assign resource to
a backup plan in two ways.
402.75 -> You can do that pointing
directly to the services
406.47 -> or the resources that you want to protect
408.99 -> or which is more common.
410.31 -> Customers are using tagging systems.
412.08 -> So you, you just tag your resource,
414.27 -> you select certain tags that
you put on your backup lens,
418.2 -> and then after you start
tagging the resource
421.059 -> and the multiple services
you're protecting,
423.209 -> you are able to activate the
protection for those resources.
427.979 -> You can further extend
AWS Backup functionality
431.94 -> with external components,
external primitive components
435.06 -> from AWS, for example, notification, log,
439.14 -> out trail automation, so things
like CloudTrail, CloudWatch,
444.347 -> SMS, EventBridge, all you
can go at that EventBridge
448.5 -> to learn the function that
you generate reports on S3
451.65 -> and I start inventing a few, a few new,
454.92 -> new solutions right now,
456.09 -> and Matt will share his
experience later creating
460.153 -> those components, connecting those dots
462.33 -> to generate a data protection strategy.
465.78 -> Still talking about integration,
468.48 -> AWS Backup integrates
with AWS organizations.
472.71 -> For those that are not
familiar with organizations,
475.24 -> you can manage multiple
accounts and define policies
479.55 -> and define controls for your accounts
481.56 -> in a central centralized fashion.
483.99 -> So you go to your organizations,
define the backup policies,
488.062 -> what is integrated with
backup, and then you deploy
491.34 -> all those policies and backup
plans to the child accounts.
494.79 -> You even can organize those
policies in organization units
498.75 -> or group of accounts.
501.63 -> Every single backup that's
created by AWS Backup is saved to
507.42 -> a repository called backup vault.
510.12 -> The backup vault's not
a physical repository,
512.46 -> it's not a physical storage's.
514.32 -> More of a logical construct,
516.22 -> an abstraction layer that
we created for two reasons.
519.868 -> First reason, we want to make sure
522.51 -> that AWS Backup simple enough so you
525.15 -> can organize your backups,
526.56 -> organize your recovery points
in any fashion you want
529.95 -> by SLA, by business unit,
by region, by account,
534.57 -> so you, you can create the
vaults the way you need
537.963 -> to organize your backups.
539.25 -> The second aspect, and also
quite important is security.
543.69 -> We are providing a protection
layer or separation
546.329 -> from the vault where the
recovery points will be saved
550.23 -> to the storage underneath.
551.97 -> We are not exposing any
APIs on that storage.
554.97 -> So you creating that separation
will allow protection
558.21 -> against intentional or no
intentional description
561.96 -> of the data, access to the
data or to the account.
564.96 -> Once we have that separated
and not expose it.
570.12 -> The backup vault is still
the security aspect.
572.94 -> You can define IAM or identity
access management policies
578.19 -> to allow and deny access to the vaults.
581.01 -> So that's a second line of
defense to your backup vaults
586.74 -> that you can customize according
588.63 -> to your business requirements.
590.52 -> Finally, the last point about backup vault
593.483 -> is the Vault Lock.
595.11 -> So as you can see the red lock over there,
597.33 -> we have the option to
activate the Vault Lock
598.163 -> in any AWS Backup vault and
transform that repository
603.949 -> into a immutable backup repository
608.25 -> or a right once really
many backup appliance.
612.973 -> This way, the data that's
on a vault that's locked,
616.89 -> cannot be changed, cannot
be deleted UN until the end
620.43 -> of the expiration no matter
what user, even a root user,
624.21 -> for example, will not be
able to delete or change
626.844 -> or tamper in any way with
the data that's inside
630.36 -> a vault that's locked.
632.7 -> Finally, protecting backups,
restore is important,
637.32 -> but in some cases, and
Palak mentioned some
639.72 -> of those use cases, you need to prove
641.259 -> that you are protecting the data.
643.65 -> You need to show proof of backup,
645.27 -> you show need to show to
auditors reports showing
648.69 -> if our backups are compliant
with the regulations
651.017 -> and the controls that we predefined.
653.227 -> And if they are not, we can
take actions to remedy that.
658.23 -> We'll talk about Backup Audit Manager
660.21 -> and you see that we
have part of AWS Backup,
663 -> we'll be able to take care of that.
667.5 -> Today I want to share with
you three main use cases
670.921 -> around data protection.
672.316 -> I know there are several
more possible actualizations
676.22 -> for backup, butt I want to
focus on this three today
679.95 -> and Matt will share a little
bit about their journey
682.795 -> towards that compliance protection.
686.76 -> The first use case is, as Palak
mentioned, the Cloud-native.
692.7 -> So we have customers that have
the applications being born
696.99 -> or being constructed from
bottom up on the Cloud,
700.32 -> taking advantage of the resiliency,
702.54 -> the flexibility of the Cloud
703.605 -> to create applications and solutions.
709.71 -> With that media of components and services
713.7 -> that we have available
also comes complexity comes
716.85 -> the challenges that we have
718.32 -> to manage multiple services, protect them.
721.013 -> So each one of those services
we have are not a mechanism
725.55 -> which is to take a snapshots
or to take backups or sometimes
729.48 -> is different mechanisms
on the same product.
732.54 -> So how do I face this challenge?
734.918 -> Having a central, a central solution
738.72 -> that will protect
resource across the board.
741.99 -> I'll talk a little bit
more about this use case.
744.66 -> Then the second use case that
I want to share with you is
746.76 -> the compliance one.
747.72 -> So customers looking for
follow regular regulation and
755.509 -> and industry requirements,
757.079 -> they need to not just prove their,
760.023 -> their adherence to those rules,
762.933 -> but they also have to
enforce some of them.
766.02 -> So how you we can provide that enforcement
769.8 -> and how you can monitor
our compliance posture.
775.5 -> Finally, disaster recovery,
quite common use case.
778.53 -> I bet most of the audience here
has some type of need around
783.955 -> disaster recovery, creating
a secondary response
787.86 -> to any disaster happening
to my first environment.
791.37 -> So I'm assuming that
most of the audience here
794.28 -> is using one, two or the
three of those use cases
797.34 -> or planning to do so.
799.26 -> So let's talk about some architecture,
801.72 -> some use cases from customers
that we are working on,
805.35 -> those use cases.
806.43 -> And then Matt will talk
about Asurion example.
813.42 -> So here on the Cloud data environment.
815.844 -> So you can see that all my
applications are running
819.923 -> within AWS services.
822.03 -> So I'm protecting
components like ABS volumes,