This presentation will walk through the values and benefits of using service chaining technologies in OPNFV for service composition. The presentation will talk through and demonstrate, in real time, platform service chaining features and capabilities
This document discusses how AWS services like Amazon Inspector, AWS WAF, and AWS Config Rules help customers improve security and compliance while maintaining agility. Amazon Inspector allows customers to automate security assessments of their applications. AWS WAF provides centralized rule management and real-time protection against web attacks. AWS Config Rules enable continuous monitoring and simplify management of configuration changes across an organization. These services embed security expertise, streamline compliance processes, and allow customers to move fast while staying safe on AWS.
In this session, we will introduce you to the new AWS WAF service. We will show you how to use the service to block Amazon CloudFront requests that originate from IP addresses that you specify and block requests based on request content, such as header values or SQL queries. We will walk you through working code samples that automate security operations?and demonstrate the flexibility of AWS WAF web ACLs.
The document discusses the importance of family education for proper childcare, highlighting the roles of parents, family, community, and schools from conception to development. It presents images with guidance on planning for childbirth, caring for pregnant women and newborns, and creating child-friendly homes and schools. The picture storybook is intended to provide educational resources for facilitating discussion at the community level on ensuring children's well-being and bright futures.
IoTシステムで必須となる双方向通信における一般的な考え方と、AWS IoTで実装する際のポイントを説明
Describe the general idea in bidirectional communication which is essential in IoT system and points to implement in AWS IoT
(Using in Interop Tokyo 2016)
IoT Devices Compliant with JC-STAR Using Linux as a Container OSTomohiro Saneyoshi
?
Security requirements for IoT devices are becoming more defined, as seen with the EU Cyber Resilience Act and Japan’s JC-STAR.
It's common for IoT devices to run Linux as their operating system. However, adopting general-purpose Linux distributions like Ubuntu or Debian, or Yocto-based Linux, presents certain difficulties. This article outlines those difficulties.
It also, it highlights the security benefits of using a Linux-based container OS and explains how to adopt it with JC-STAR, using the "Armadillo Base OS" as an example.
Feb.25.2025@JAWS-UG IoT
6. Subnet-Front Subnet-Back
① 最もシンプルな構成
VPC
Web Server DB Server
一般利用者
Internet
gateway
Public IP
Public IPSSH
HTTP(S) HTTP(S)
SSH
SSH
SQL Private IP
SQL 10.0.0.0/16
SSH XX.XX.XX.XX/32
セキュリティグループ (Inbound)
HTTP(S) 0.0.0.0/0
SSH XX.XX.XX.XX/32
セキュリティグループ (Inbound)
(グローバルIPアドレス:XX.XX.XX.XX)
(10.0.0.0/16)
特定アドレスに限定しているとは言え、
DBサーバ(バックエンド)に対してインターネットからの直接着信を許可しているのは怖い…
10.0.0.0/16 local
0.0.0.0/0 IGW
ルートテーブル
管理者?開発者 10.0.0.0/16 local
0.0.0.0/0 IGW
ルートテーブル
8. Subnet-Front Subnet-Back
Subnet-Management
② 管理用ネットワークと「踏み台マシン」の導入
Web Server DB Server
一般利用者
Bastion (踏み台)
Internet
gateway
Public IP
Public IP
HTTP(S) HTTP(S) SQL
SSH
SSH
SSH SSH
SQL 10.0.0.0/16
SSH 10.0.0.0/16
セキュリティグループ (Inbound)
HTTP(S) 0.0.0.0/0
SSH 10.0.0.0/16
セキュリティグループ (Inbound)
SSH XX.XX.XX.XX/32
セキュリティグループ (Inbound)
(グローバルIPアドレス:XX.XX.XX.XX)
(10.0.0.0/16)
Private IP
Private IP
VPC
管理者?開発者
10.0.0.0/16 local
0.0.0.0/0 IGW
ルートテーブル
10.0.0.0/16 local
0.0.0.0/0 IGW
ルートテーブル
10.0.0.0/16 local
0.0.0.0/0 IGW
ルートテーブル