Smart Assist Network Engineer Training Text
JA

Chapter 8: Understanding AWS Cloud Fundamentals

AWS Logo

Amazon Web Services (AWS)


8.1 What Is the Cloud?

Basic Concept of the Cloud

Cloud computing is a service model in which IT resources such as servers, storage, and databases are used on-demand over the internet.

Comparison with On-Premises

AspectOn-PremisesCloud (AWS)
Physical server locationWithin the organization (e.g., hospital server room)AWS data centers
Initial costHigh (hardware purchase required)Low (pay-as-you-go)
ScalingTime-consuming hardware expansionScalable in minutes
OperationsSelf-managed maintenance (power, cooling, hardware failures)AWS manages physical infrastructure
SecurityFull responsibility borne by the organizationShared Responsibility Model

Shared Responsibility Model

AWS security is based on the "Shared Responsibility Model."

Customer Responsibility (Security "in" the Cloud) - Data encryption - Access control (IAM) - Application security - OS patch management (for EC2) - Network configuration (Security Groups, etc.) AWS Responsibility (Security "of" the Cloud) - Physical data center security - Hardware maintenance - Network infrastructure operations - Virtualization platform management

8.2 VPC Architecture

What Is a VPC?

A VPC (Virtual Private Cloud) is a virtual private network created within AWS. Similar to a physical network, it allows you to configure IP address ranges, create subnets, set up routing, and implement security controls.

Basic VPC Configuration

AWS Cloud VPC (10.0.0.0/16) Public Subnet 10.0.1.0/24 Load Balancer Private Subnet 10.0.2.0/24 Application Server Database

The Cloud Side of Smart Assist Is Also Built Within a VPC

Smart Assist servers are deployed within an AWS VPC, where subnet isolation and access controls are applied in the same manner as the hospital's internal network.


8.3 Subnets

Public Subnets and Private Subnets

TypeCharacteristicsWhat to Deploy
Public SubnetCan communicate externally via an Internet GatewayLoad balancers, bastion hosts
Private SubnetNo direct internet accessApplication servers, databases

Subnet Configuration in Smart Assist (Typical Example)

Internet Internet Gateway VPC AZ-a Public Subnet ALB (Load Balancer) Private Subnet Application Server Private Subnet Database AZ-c Public Subnet ALB (Load Balancer) Private Subnet Application Server Private Subnet Database

Because application servers and databases are placed in private subnets, they cannot be accessed directly from the internet.


8.4 Security Group

What Is a Security Group?

A Security Group is a firewall applied to AWS instances (servers). It controls inbound and outbound traffic on a per-instance basis.

Characteristics

CharacteristicDescription
StatefulResponses to allowed traffic are automatically permitted
Whitelist-basedOnly explicitly allowed traffic passes through (default deny)
Per-instanceIndividual rule sets can be applied to each server

Example Security Group Configuration for Smart Assist Servers

Inbound Rules

TypePortSourceDescription
HTTPS443ALB Security GroupAccept traffic only from the ALB

Outbound Rules

TypePortDestinationDescription
HTTPS443Required destinationsExternal APIs, etc.
MySQL3306DB Security GroupDatabase connection

The Smart Assist application server is designed to accept only 443/tcp traffic from the ALB (Load Balancer); direct access from the internet is not permitted.


8.5 NACL

What Is a NACL?

A NACL (Network Access Control List) is a firewall applied at the subnet level. While Security Groups are applied per instance, NACLs are applied to the entire subnet.

Differences Between Security Groups and NACLs

ItemSecurity GroupNACL
Applied toInstanceSubnet
Stateful/StatelessStatefulStateless
Default behaviorDeny allAllow all (default NACL)
Rule evaluationAll rules are evaluatedEvaluated in order by rule number (first match decides)

Defense in Depth

Using both Security Groups and NACLs together achieves defense in depth.

Internet NACL Subnet Boundary Security Group Instance Boundary Server

8.6 Load Balancer

What Is an ALB?

An ALB (Application Load Balancer) is a load balancing service provided by AWS. It distributes traffic across multiple servers, improving availability and scalability.

Role of the Load Balancer in Smart Assist

HTTPS Traffic from Hospital PCs ALB SSL Termination / Traffic Distribution AP1 AP2 Application Servers (Redundant)
RoleDescription
Traffic distributionDistributes load across multiple servers
SSL terminationTLS encryption processing is handled by the ALB
Health checksMonitors server health and stops routing to unhealthy servers
High availabilityDeployed across multiple Availability Zones (AZs)

Connection Destination as Seen from Hospital PCs

From the perspective of hospital PCs, the connection target is the ALB's FQDN (e.g., smartassist.example.com); there is no need to be aware of the individual servers behind it.


8.7 Availability Design

What Is Availability?

Availability refers to the ability of a system to remain operational. Because Smart Assist is a system that supports medical operations, high availability is required.

Elements of Availability Design in AWS

ElementDescription
Multi-AZ deploymentServers distributed across multiple data centers (AZs)
Auto ScalingAutomatic adjustment of server count based on load
Load BalancerAutomatic exclusion of traffic to failed servers
Database redundancyAutomatic failover via RDS Multi-AZ deployment
BackupRegular snapshot acquisition

Multi-AZ Deployment

AWS Region AZ-a ALB Node AP Server DB Server (Primary) AZ-c ALB Node AP Server DB Server (Standby) Automatic Failover * Even if AZ-a goes down, operations continue on AZ-c * ALB automatically routes traffic to the healthy AZ Application Layer Database Layer

Region Selection and Data Residency

The deployment region for Smart Assist is selected based on each country's regulatory requirements.

RegionRecommended AWS RegionData Residency Requirements
Japanap-northeast-1 (Tokyo)The "Three-Ministry Two-Guideline" framework (Japanese government guidelines for medical information systems) recommends storing data within Japan
United Statesus-east-1 (N. Virginia) / us-west-2 (Oregon)HIPAA does not mandate domestic data storage, but a BAA (Business Associate Agreement) is required. GovCloud may be necessary in some cases
EUeu-central-1 (Frankfurt) / eu-west-1 (Ireland)GDPR requires data to be stored within the EEA in principle. Cross-border transfers require legal basis such as SCCs (Standard Contractual Clauses)

Impact When Smart Assist Goes Down

Type of OutageImpactLaboratory Testing Operations
Partial (one AZ) outageALB automatically fails over; no impact on usersOperations continue
Full (entire Smart Assist) outageDetermination of unconfirmed data temporarily unavailableConfirmed results continue to be sent to LIS

Even if the entire Smart Assist system goes down, results that have been confirmed by AUTION EYE's automatic classification continue to be sent to LIS as usual. Only remote determination of unconfirmed data is affected.


8.8 How to Read the Reference Material: SOC 2 Type II Report

What Is SOC 2?

SOC 2 (System and Organization Controls 2) is a framework developed by the American Institute of Certified Public Accountants (AICPA) for evaluating internal controls of service organizations. An independent audit firm verifies whether the target organization's systems meet certain security standards and issues the findings as a report.

Corresponding file: System+and+Organization+Controls+(SOC)+2+Report

The SOC 2 Type II report for AWS used by Smart Assist (covering the period from October 2024 to September 2025)

Difference Between Type I and Type II

TypeWhat Is EvaluatedEvaluation Timing
SOC 2 Type IWhether controls are designed appropriatelyA specific point in time (snapshot)
SOC 2 Type IIWhether controls are designed and operating effectivelyOver a defined period (typically 6-12 months)

Smart Assist holds a Type II report, which is a more reliable report demonstrating that AWS controls were actually operating effectively throughout the evaluation period.

Trust Services Criteria

SOC 2 reports are evaluated based on the following five criteria. The AWS report covers Security, Availability, Confidentiality, and Privacy.

CriterionContentRelevance to Smart Assist
SecurityProtection against unauthorized accessPrevention of unauthorized intrusion into cloud infrastructure
AvailabilitySystem availabilityUptime guarantee for the Smart Assist service
ConfidentialityProtection of confidential informationConfidentiality protection for data including PHI
PrivacyHandling of personal informationPrivacy protection for PHI
Processing IntegrityCompleteness of data processing(Not covered by the AWS report)

Report Structure

SectionContentKey Points for IT Staff
Section IAWS Management's AssertionAWS's own declaration that "controls were operated as designed during the evaluation period"
Section IIIndependent Auditor's Assurance ReportVerification results by a third-party audit firm. The conclusion that controls are "appropriately designed and operating"
Section IIIDescription of the AWS SystemList of covered services, security policies, and control details. Includes Cognito, Lambda, S3, Aurora, and other services used by Smart Assist
Section IVControl Testing ResultsTesting methods and results for each control item. Pass/fail status for all items
Section VAdditional InformationSupplementary information regarding changes and additions to controls

Relationship Between the Shared Responsibility Model and SOC 2

The SOC 2 report only provides assurance for the scope managed by AWS (infrastructure layer).

LayerResponsible PartyCovered by SOC 2?
Physical data center and networkAWSYes
OS, middleware, and patch managementAWS (for managed services)Yes
Application (Smart Assist)ARKRAY / UHWNo
Data (PHI)ARKRAY / UHW / HospitalNo

Application-layer security is covered by ISO 27001 certification (see Chapter 9), and PHI protection is covered by the HIPAA Risk Assessment (see Chapter 9).

How to Explain to Hospital IT Staff

Example explanations when asked about the SOC 2 report:

QuestionSuggested Response
"What is SOC 2?"It is a report in which an independent audit firm evaluates AWS's security controls. The safety of the infrastructure on which Smart Assist runs has been verified by a third party
"Can we view the report?"The report can be viewed after signing an NDA (Non-Disclosure Agreement). Distribution of reports obtained from AWS Artifact is subject to restrictions under the AWS Terms of Service
"Did all items pass?"You can review the test results in Section IV; no significant nonconformities have been reported

In the next chapter, we will understand the regulatory requirements for medical data handled by Smart Assist.