Security, privacy and data sovereignty for telecom
Discover how communications service providers (CSPs) can leverage cloud to secure their telecom workloads.
Data sovereignty in the cloud
Dave Brown, Vice President EC2, AWS, and Fabio Cerone, Managing Director EMEA, AWS for Telecom, discuss data sovereignty in the cloud, and the different innovations and solutions the telcos are leading in this area.
The unique characteristics of telecom workloads
Regulatory compliance
CSPs are heavily regulated with requirements in areas of communications secrecy, critical infrastructure, data protection, data soverignty, privacy, emergency communication services, lawful interception, and net neutrality.
Resilience
Telecom workloads are mission critical, they must be highly-available and fault-tolerant as they underpin the connectivity to the Internet that many other sectors of the economy and society rely upon.
Variable latency requirements
Different telecom workloads have differing sensitivities to latency that require networks to be geographically dispersed including use of both regional and edge clouds.
Privacy
CSPs manage a variety of data including subscribers’ personal data, payment information, location, communications content, and metadata, the privacy of which is paramount to the trust that subscribers have in their provider. The security of the ever-increasing volume of network-data is critical to the data-analytics driven approach to networks operations.
Hybrid deployments
Telecom operators have complex deployments with multiple generations of network technologies operating in parallel. Legacy networks may be deployed on-premises even as parts of the newer generation of the network are in a hybrid-cloud.
Infrastructure and services to elevate security in the cloud
Security and resiliency are AWS’s highest priority. We listen closely to our customers to offer both a highly secure cloud computing environment and a range of tools and resources they can leverage to build and implement their own application-level security measures.
Resilient global infrastructure
The AWS Global Cloud Infrastructure is the most secure, extensive, and reliable cloud platform, offering over 200 fully featured services from data centers globally.
The AWS infrastructure uses multiple fault isolation constructs to help customers achieve their resilience objectives and AWS services are designed using these constructs. These fault isolation boundaries enable customers to design their workloads to take advantage of the predictable scope of impact containment they provide.
Law enforcement requests
Amazon will not release customer information without a valid and binding legal demand properly served on us. Amazon objects to overbroad or otherwise inappropriate demands as a matter of course.
The CLOUD Act does not give United States law enforcement unlimited or unfettered access to data.
AWS Nitro System
The AWS Nitro System, is a unique virtualization system that underpins all modern Amazon EC2 instances, and by design, has no operator access. There is no mechanism for any system or person to log in to EC2 AWS Nitro hosts, access the memory of EC2 instances, or access any customer data stored on local encrypted instance storage or remote encrypted Amazon EBS volumes.
Compliance program
AWS supports 143 security standards and compliance certifications, including PCI-DSS, HIPAA/HITECH, FedRAMP, GDPR, FIPS 140-2, and NIST 800-171, helping customers satisfy compliance requirements around the globe.
Supply chain security
All customers benefit from AWS being the only commercial cloud that has had its service offerings and associated supply chain vetted and accepted as secure enough for top-secret workloads.
Resources
Watch and read our telecom specific videos and blogs looking at data sovereignty, confidential computing and leveraging the cloud securely.
AWS Nitro System
Learn about the specifics of confidential computing and how it works to support telecom operators, communication service providers (CSPs) and Independent Software Vendors (ISVs).
Demystifying telecom SaaS security
Hear from AWS and Nokia industry experts discussing SaaS security and how the AWS Cloud and Nokia's Telecom SaaS deal with compliance regulations in the areas of data sovereignty and resiliency.
Build secure workloads in the cloud
Refer to our Well-Architected Framework for an understanding of how to build secure cloud workloads.
Learn more »
Data privacy in the cloud
Keeping subscriber and network data private is critical for CSP's. Earning customer trust is the foundation of our business at AWS.
Data sovereignty
Giving customers this sovereignty has been a priority for AWS since the very beginning when we were the only major cloud provider to allow customers to control the location and movement of their data.
Data Controls and residency
With AWS, you control your data by using purposely built AWS services and tools to determine where your data is stored, how it is secured, and who has access to it.
Get started
Leading telcos are already using AWS. Contact our experts to start your
journey today.