Do your part to make the most of Amazon Web Services security
While Amazon designed their cloud platform infrastructure to be highly available and scalable, Amazon Web Services security features also comply with industry standards. AWS Data centers are built like fortresses and staffed 24×7, and remote access is permitted strictly according to the principle of least privileged.
AWS infrastructure is designed and managed in full compliance with security best practices and a wide range of IT security standards, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC2, SOC3, FISMA, DIACAP, FedRAMP, PCI DSS Level 1, ISO 27001, ITAR, HIPPA, and Cloud Security Alliance.
So Amazon has done their part to ensure that Amazon Web Services security is up to the challenge. But you’ve got to do your part, too. We’re going to focus on how you can leverage some of AWS’s built-in security features to meet specific business requirements and protect the confidentiality, integrity, and availability of your data in the cloud.
Shared Security Responsibility
When you host your application in the cloud, you agree to share responsibilities with AWS. It’s the job of Amazon Web Services Security to take care of host operating systems, visualization layer, network, and physical Security. But it’s up to you to secure anything you deploy on the top host operating systems.
Amazon Web Services Security built-in features
You have a responsibility to become familiar with each security-related AWS service. Here’s a quick rundown.
Identity and Access Management (IAM)
Using Identity and Access Management (IAM), you can create users, groups, and roles, and use permissions to allow and deny their access to AWS resources such as EC2, RDS, and VPC. IAM enables you to grant unique credentials to every user within your AWS Account, allowing individual access only to the AWS services and resources required.
With IAM Mutifactor Authentication enabled, a user trying to access an AWS resource will be prompted for normal authentication (user name and password), but also for an authentication code available only through their MFA-configured device.
IAM can be used to grant your employees and applications access to the AWS Management Console and AWS service APIs. IAM is also compatible with your existing Active Directory.
Virtual Private Clouds (VPCs)
Amazon’s VPCs allow you to provision compute resources, like EC2 instances and RDS deployments, inside isolated virtual networks. VPCs give you complete control over all inbound and outbound network traffic. You can (and should) use VPCs to secure your application by restricting, where appropriate, access to and from the Internet. Using Virtual Private Network (VPN) connections, you can connect on-premise servers directly to your cloud-based VPC, bypassing public networks.
Security Groups and Network ACL’s
Using Security Groups, you can create firewall rules controlling incoming and outgoing traffic at the instance level. You can restrict traffic by protocol type (TCP, UDP, ICMP), IP address, and port.
Access Control Lists (ACLs) work at the network subnet level. Network ACLs can be especially useful in the prevention of DDOS attacks when you have a particular need to blacklist traffic from specific IP addresses.
When you create an encrypted EBS volume and attach it to an instance, data on the volume, disk I/O, and snapshots created from the volume, are all encrypted. When so configured, AWS encrypts each S3 object with a unique key. Amazon S3 server-side encryption uses one of the strongest block ciphers available – 256-bit Advanced Encryption Standard (AES-256).
RDS generates an SSL certificate for each DB Instance. Once an encrypted connection is established, data transferred between the DB Instance and your application will be encrypted during transfer.
You can use AWS Direct Connect to establish a private virtual interface between your on-premise network and your Amazon Virtual Private Cloud. Direct Connect provides a private and secure high-bandwidth network connection.
AWS Cloud Trail
CloudTrail provides you with a history of all API calls made against your account resources, including API calls made via the AWS Management Console, SDKs, and command line tools.
AWS Trusted Advisor inspects your AWS environment and makes recommendations for saving money, improving system performance and reliability, or closing security gaps.
Even without upgrading to a paid support plan, Trusted Advisor will warn you about weaknesses like security groups allowing unrestricted access (0.0.0.0/0) to specific ports or S3 buckets with open access permissions. Trusted Advisor can provide a highly effective summary of your overall Amazon Web Services security profile.
Amazon Web Services Security: the next step
Besides the built-in Amazon Web Services security services, there are many open source and commercial software packages available through the AWS MarketPlace.
But all these powerful tools will have no value if you don’t take the time to learn how to use them properly to protect the confidentiality, integrity, and availability of your cloud data.
New Content: Alibaba, Azure Cert Prep: AI-100, AZ-104, AZ-204 & AZ-400, Amazon Athena Playground, Google Cloud Developer Challenge, and much more
This month, our Content Team released 8 new learning paths, 4 courses, 7 labs in real cloud environments, and 4 new knowledge check assessments. Not only that, but we introduced our very first course on Alibaba Cloud, and our expert instructors are working 'round the clock to create 6 n...
Top 5 Reasons to Get AWS Certified Right Now
Cloud computing trends are on the rise and have been for some time already. Fortunately, it’s never too late to start learning cloud computing. Skills like AWS and others associated with cloud computing are in high demand because cloud technologies have become crucial for many businesse...
Introducing Our Newest Lab Environments: Lab Playgrounds
Want to train in a real cloud environment, but feel slowed down by spinning up your own deployments? When you consider security or pricing costs, it can be costly and challenging to get up to speed quickly for self-training. To solve this problem, Cloud Academy created a new suite of la...
Blog Digest: AWS Breaking News, Azure DevOps, AWS Study Guide, 8 Ways to Prevent a Ransomware Attack, and More
New articles by topicAWS Azure Data Science Google Cloud Cloud Adoption Platform Updates & New Content Security Women in TechAWSBreaking News: All AWS Certification Exams Now Available Online As an Advanced AWS Technology Partner, C...
AWS Certified Solutions Architect Associate: A Study Guide
Want to take a really impactful step in your technical career? Explore the AWS Solutions Architect Associate certificate. Its new version (SAA-C02) was released on March 23, 2020, though you can still take SAA-C01 through July 1, 2020. This post will focus on version SAA-C02.The AWS...
New on Cloud Academy: AWS Solutions Architect Exam Prep, Azure Courses, GCP Engineer Exam Prep, Programming, and More
Free content on Cloud Academy More and more customers are relying on our technology and content to keep upskilling their people in these months, and we are doing our best to keep supporting them. While the world fights the COVID-19 pandemic, we wanted to make a small contribution to he...
Breaking News: All AWS Certification Exams Now Available Online
Remote proctoring for all AWS certifications Cloud Academy is an Advanced AWS Technology Partner, and we are happy to announce all AWS certification exams are available online! What does this mean for you? You can stay focused on your certification goal. Or you can start a certifica...
How To Build a Career with AWS Certifications
From Iaas and PaaS solutions to digital marketing, cloud computing reshapes the world of technology. As the influence of this technology grows, so does investment. Tens of billions of dollars are being spent on cloud computing-related services each year. This influx is continuing to inc...
What is Cognito in AWS?
Web applications usually allow a valid username and password combination for successful sign in to the application. Modern authentication flows incorporate more approaches to ensure user authentication. When using AWS, this is no exception, thanks to the abilities and features offered b...
The 12 AWS Certifications: Which is Right for You and Your Team?
As companies increasingly shift workloads to the public cloud, cloud computing has moved from a nice-to-have to a core competency in the enterprise. This shift requires a new set of skills to design, deploy, and manage applications in cloud computing.As the market leader and most ma...
Cloud Academy’s Blog Digest: How Do AWS Certifications Increase Your Employability, How to Become a Microsoft Certified Azure Data Engineer, and more
With everything going on right now, it's likely that the only thing you've been reading lately is related to the coronavirus pandemic. It's important to stay informed during these times, but it's also good to jump into something that can take your mind off of the current situation for j...
Which Certifications Should I Get?
As we mentioned in an earlier post, the old AWS slogan, “Cloud is the new normal” is indeed a reality today. Really, cloud has been the new normal for a while now and getting credentials has become an increasingly effective way to quickly showcase your abilities to recruiters and compan...