AWS re:Invent 2019: SaaS tenant isolation patterns (ARC372-P)

Sdílet
Vložit
  • čas přidán 22. 07. 2024
  • This presentation was recorded prior to re:Invent. Tenant isolation is one of the most fundamental aspects of SaaS architecture. Every SaaS provider must consider how to ensure that their tenant resources are isolated and secure. The challenge is that each resource type (compute, storage, etc.) requires different isolation approaches. In this session, we build a clear roadmap for navigating the landscape of isolation options, highlighting the strategies for achieving isolation spanning the different multi-tenancy models and AWS services. Our goal is to create a comprehensive view of the considerations that impact your approach to introducing isolation into your SaaS solution.
    Sign up at partners.awscloud.com/SaaS.html to stay up-to-date on the latest SaaS news, resources, and events from AWS.

Komentáře • 14

  • @ajwright5512
    @ajwright5512 Před rokem

    One of the most important talks I've watched.

  • @asifadamsha8863
    @asifadamsha8863 Před 4 lety +1

    Learned lot about SaaS isolation, thank you very much !

  • @victoriaperalta8590
    @victoriaperalta8590 Před 3 lety

    Great video Tod, thank you sooo much !!

  • @RafaelCorreaGomes
    @RafaelCorreaGomes Před 4 lety +1

    Excellent content, thank you!

  • @pankpunk1
    @pankpunk1 Před 3 lety +1

    Great content; thanks for this

  • @olajide9022
    @olajide9022 Před 3 lety +3

    Amazing content. Straight to the point.

  • @jonasgrnbek7113
    @jonasgrnbek7113 Před rokem

    There are much talk about silo partitioning models and how that abstracting tenant isolation away from the developers is important. But how to do that in a pool model, it seems inherently more difficult and I feel like that might be why it is left out, since you most likely will have to rely on developer implementations for tenant isolation

  • @PaganAbroad
    @PaganAbroad Před rokem

    Was there a more recent update? I know the concepts dont change much but the tools etc to implement them usually do e.g. a 3P SaaS islotation checker version of Prowler?

  • @rob3c
    @rob3c Před 3 lety +3

    Nice overview! Unfortunately, there was still no mention of data persistence dangers in memory and on disk between successive Lambda invocations for the same function version/environment. That kind of potential leak seems problematic for multi-tenant Lambda use (and ECS for that matter), regardless of policy constraints. At least it's mentioned (buried?) at the bottom of page 9 in the "Security Overview of AWS Lambda" whitepaper, even if the video presenters all avoid the subject (not only this one).

    • @thomasgremm6127
      @thomasgremm6127 Před 2 lety +2

      That is the attack vector, that I also thought of; I guess, we 2 Jedi's are not only ones..

    • @croveapp
      @croveapp Před rokem +1

      came down to comment the same

  • @marinradjenovicmarin
    @marinradjenovicmarin Před 4 lety +2

    Thanks Tod great video! However it is still not clear to me from security perspective why is ECS so different from Lambda. You mentioned, that you can't prevent code from ECS task executing other resources. If you define role per task, does that actually prevent running anything else than what is defined in Task IAM Role?

    • @mfjonesxyz
      @mfjonesxyz Před 3 lety

      I'd also like to know more about this drawback of ECS

  • @smecher69
    @smecher69 Před 3 lety

    no *u*