Clarke Rodgers:
Let's go further on that innovation train, so to speak. So, if I'm a customer looking at AWS, I know you build features and functionality to make AWS security better, how do you think about building versus buying security tools to help run AWS security, and make AWS, and the larger HAQM even, secure?
Chris Betz:
When I step back from those decisions, there's a couple of different things that I need to think about. My internal customers, the builders, the developers within AWS, how am I helping them achieve the security outcomes that we need as easily and seamlessly as possible? That's part of my job. It's just one of the things I must do. But you also bring up that really interesting build versus buy conversation, and there's a couple different ways I tend to think about that. One of them is in terms of core versus context. There are some technologies that are absolutely core to the way that we need to operate as a business. So, for example, how we secure each one of the EC2 systems that are running our AWS workloads, that are powering customers.
Achieving security at that scale is absolutely core to the business. Those are places where I'm more likely to invest in custom capabilities that operate at that scale, and that meet the threats that we're facing every day in that space. Because they're unique, and that's unique to us. There are other places where I'm much more likely to look towards a commercial solution, or look towards a vendor and challenge them to be able to operate at our scale. A good example of that is my laptop that I work on every day. There are security components on those systems that I buy from outside vendors, because we're not doing something that is absolutely unique. We want to leverage that capability that's already out there. It's not in the critical path for our customer delivery, and it's more context to the business.
And so that's part of how I go through each one of these decisions, is thinking through, what's available out there? How do I make sure we can go faster, leverage the best technology I possibly can? Whether that's an internal build or an external product. And how do I make sure that in the places that are absolutely unique, the places that let us deliver secure capability, let us deliver the engineering product that our customers expect at that incredibly high bar, in those places, I'm much more likely to build. In other places, I'm much more likely to look for, does the solution already exist?
Clarke Rodgers:
Being a CISO is also being a business leader, right? You have different leaders over different aspects of your AWS security business. So, you have some security engineering, you have operations, you have security assurance, among several others. How do you hold those business leaders to account to what they're supposed to be delivering to you, as the CISO?
Chris Betz:
As a security leader, I'm responsible for delivering solutions, services, that work across AWS, to power all the teams across AWS. From that perspective, my quarterly business reviews, my monthly business reviews, my weekly business reviews, bear a lot of similarity to the way service teams run across AWS. And so, as a builder, as an operator of systems, that's one lens that I look through. And I get to draft from and learn from the best of what happens across AWS. There's a second set, is the operational aspect. I've got people providing direct response activities, threat intelligence, investigations, all those things. And in that space, I get to, both borrow from the best of our operational infrastructure, the field organizations, the customer support organizations, and I get to learn from them. And again, my processes look similar, but they're uniquely tuned. And again, my weekly, monthly, quarterly review process works there.
Clarke Rodgers:
You mentioned threat intelligence. Over the last year or so, AWS has shared more about how we think about threat intelligence, and some of the tools that we've built, internally, that help customers and help AWS. There's MadPot, Mithra, Sonaris, and I'm sure there's some others. Can you sort of give me an idea about how AWS thinks about threat intelligence, internally, and then how that helps customers?
Chris Betz:
One of the things that I did not appreciate when I was outside of AWS, is how much happens within AWS that's just not visible. As I went around and learned more about the security AWS is providing, and I talked with the organizations inside of AWS, I realized that one of the reasons why we don't spend our time talking about these capabilities, or we hadn't, is because we believed that these are just things that everybody does and everybody should do. And I had to share with people that, "No, this is not stuff that everybody does, but I certainly agree, it's stuff that everybody should do." And so, I think we're on this journey now to share more and more about what we do, that's invisible and transparent. So, part one of this conversation is, how do we help people understand what we're doing on their behalf, that they may not be aware of?
I believe that the best security is security that is seamlessly part of how people work. If they don't need to worry about, how do I turn on security? If they don't need to worry about the detailed nuance, if it just protects them, that's the best possible place for us to be. And so, I think our threat intelligence conversations have been at the intersection of those two places. One, we've been doing a ton of work that folks didn't understand. We should share more of that. It's a little bit of a show me thing. You know we're secure, you know we take security as our top priority, let's show you a little bit more to help bolster that confidence. And the second piece is, and the reason you don't know about it is because we've hit that place that we really want to be, that seamless security. And so, in general, as we think about this threat intelligence work, one, it's important to understand what malicious actors are doing. That changes our risk profile. It changes how we think about risk. That also powers so many defenses.
You want defenses tailored to threat actors, tailored to the malicious activity, and we're able to do that. Threat intelligence powers that. The second piece is that seamless piece. You want to enable a seamless defense. The conversations we had on Sonaris are a great example of that seamless defense, where we're able to protect customers without them even knowing, even having to know, because we're identifying malicious actors and we're blocking the malicious actors, and enabling the customers to operate. Threat intelligence is valuable when it's used to protect people. And so, how do we merge that threat intelligence into the tools, the capabilities, that our customers are using, so it's a seamless part of how they're operating their systems? The alerts come up, they're all integrated in, so that people can take the right actions at the right time.
Clarke Rodgers:
I love that you brought up the integration question. How does the integration work when your team operates something like MadPot and the consumer product is GuardDuty. A lot of it, if I'm the customer, I'm looking at it, "Hey, these kind of do the same things." Does MadPot feed into GuardDuty itself, or are they two distinct products?
Chris Betz:
Spot on. So MadPot feeds into GuardDuty, as one of many feeds into GuardDuty. And where it's high enough fidelity, MadPot also powers things like Sonaris. Because if we know that a particular IP address and port is a malicious actor, we use things like Sonaris to say, “That IP address and port just doesn't get to talk to anybody on AWS.”
Clarke Rodgers:
Oh, that's amazing.
Chris Betz:
We're able to focus on the bad actor and stop the bad actor, where we're not in that space where it's a mixed signal. We may just provide that tip to customers through GuardDuty. And so, these feeds go multiple directions. But the whole goal is for these systems, these threat intelligence systems, to power all the different layers that we operate, the infrastructure layer, the security of the cloud, that I sweat every day, and our customer security in the cloud, the services that they operate, and that I worry desperately about. How do we make sure that we're providing them all the capabilities that we can?