Amazon Web Services Security: using the built-in features

Do your part to make the most of Amazon Web Services security

While Amazon designed their cloud platform infrastructure to be highly available and scalable, Amazon Web Services security features also comply with industry standards. AWS Data centers are built like fortresses and staffed 24×7, and remote access is permitted strictly according to the principle of least privileged.

AWS infrastructure is designed and managed in full compliance with security best practices and a wide range of IT security standards, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC2, SOC3, FISMA, DIACAP, FedRAMP, PCI DSS Level 1, ISO 27001, ITAR, HIPPA, and Cloud Security Alliance.

So Amazon has done their part to ensure that Amazon Web Services security is up to the challenge. But you’ve got to do your part, too. We’re going to focus on how you can leverage some of AWS’s built-in security features to meet specific business requirements and protect the confidentiality, integrity, and availability of your data in the cloud.

Shared Security Responsibility

When you host your application in the cloud, you agree to share responsibilities with AWS. It’s the job of Amazon Web Services Security to take care of host operating systems, visualization layer, network and physical Security.  But it’s up to you to secure anything you deploy on the top host operation systems.

amazon-web-services-security
Amazon Web Services Security

Amazon Web Services Security built-in features

You have a responsibility to become familiar with each security-related AWS service. Here’s a quick run down.

Identity and Access Management (IAM)

Using IAM, you can create users, groups, and roles, and use permissions to allow and deny their access to AWS resources such as EC2, RDS, and VPC. IAM enables you to grant unique credentials to every user within your AWS Account, allowing individual access only to the AWS services and resources required.

With IAM Mutifactor Authentication enabled, a user trying to access an AWS resource will be prompted for normal authentication (user name and password), but also for an authentication code available only through their MFA-configured device.

IAM can be used to grant your employees and applications access to the AWS Management Console and AWS service APIs. IAM is also compatible with your existing Active Directory.

Virtual Private Clouds (VPCs)

Amazon’s VPCs allow you to provision compute resources, like EC2 instances and RDS deployments, inside isolated virtual networks. VPCs give you complete control over all inbound and outbound network traffic. You can (and should) use VPCs to secure your application by restricting, where appropriate, access to and from the Internet. Using Virtual Private Network (VPN) connections, you can connect on-premise servers directly to your cloud-based VPC, bypassing public networks.

Security Groups and Network  ACL’s

Using Security Groups, you can create firewall rules controlling incoming and outgoing traffic at the instance level. You can restrict traffic by protocol type (TCP, UDP, ICMP), IP address, and port.

Access Control Lists (ACLs) work at the network subnet level. Network ACLs can be especially useful in the prevention of DDOS attacks, when you have a particular need to blacklist traffic from specific IP addresses.

Data Encryption 

AWS provides Data encryption for EBS volumes, S3 buckets, and Relational Database Service (RDS) and Glacier data stores.

When you create an encrypted EBS volume and attach it to an instance, data on the volume, disk I/O, and snapshots created from the volume, are all encrypted. When so configured, AWS encrypts each S3 object with a unique key. Amazon S3 server-side encryption uses one of the strongest block ciphers available – 256-bit Advanced Encryption Standard (AES-256).

RDS generates an SSL certificate for each DB Instance. Once an encrypted connection is established, data transferred between the DB Instance and your application will be encrypted during transfer.

Direct Connect

You can use AWS Direct Connect to establish a private virtual interface between your on-premise network and your Amazon Virtual Private Cloud. Direct Connect provides a private and secure high-bandwidth network connection.

AWS Cloud Trail

CloudTrail provides you with a history of all API calls made against your account resources, including API calls made via the AWS Management Console, SDKs, and command line tools.

Trusted Advisor

AWS Trusted Advisor inspects your AWS environment and makes recommendations for saving money, improving system performance and reliability, or closing security gaps.

Even without upgrading to a paid support plan, Trusted Advisor will warn you about weaknesses like security groups allowing unrestricted access (0.0.0.0/0) to specific ports or S3 buckets with open access permissions. Trusted Advisor can provide a highly effective summary of your overall Amazon Web Services security profile.

Amazon Web Services Security: the next step

Besides the built-in Amazon Web Services security services, there are many open source and commercial software packages available through the AWS MarketPlace. But all these powerful tools will have no value if you don’t take the time to learn how to use them properly to  protect the confidentiality, integrity, and availability of your cloud data.

Written by

My professional IT career began nine years back when I was just out of my college. I worked with a great team as an infrastructure management engineer, managing hundreds of enterprise application servers. I found my passion when I got the opportunity to work with Cloud technologies: I'm addicted to AWS Cloud Services, DevOps engineering, and all the cloud tools and technologies that make engineers' lives easier. Currently, I am working as a Solution Architect in SixNines IT. We are an experienced team of engineers that have helped hundreds of customers move to the cloud responsibly. I have achieved 5 AWS certifications, happily helping fellow engineers across the globe through my blogs and answering questions in various forums.

Related Posts

— November 28, 2018

Two New EC2 Instance Types Announced at AWS re:Invent 2018 – Monday Night Live

Let’s look at what benefits these two new EC2 instance types offer and how these two new instances could be of benefit to you. Both of the new instance types are built on the AWS Nitro System. The AWS Nitro System improves the performance of processing in virtualized environments by...

Read more
  • AWS
  • EC2
  • re:Invent 2018
— November 21, 2018

Google Cloud Certification: Preparation and Prerequisites

Google Cloud Platform (GCP) has evolved from being a niche player to a serious competitor to Amazon Web Services and Microsoft Azure. In 2018, research firm Gartner placed Google in the Leaders quadrant in its Magic Quadrant for Cloud Infrastructure as a Service for the first time. In t...

Read more
  • AWS
  • Azure
  • Google Cloud
Khash Nakhostin
— November 13, 2018

Understanding AWS VPC Egress Filtering Methods

Security in AWS is governed by a shared responsibility model where both vendor and subscriber have various operational responsibilities. AWS assumes responsibility for the underlying infrastructure, hardware, virtualization layer, facilities, and staff while the subscriber organization ...

Read more
  • Aviatrix
  • AWS
  • VPC
— November 10, 2018

S3 FTP: Build a Reliable and Inexpensive FTP Server Using Amazon’s S3

Is it possible to create an S3 FTP file backup/transfer solution, minimizing associated file storage and capacity planning administration headache?FTP (File Transfer Protocol) is a fast and convenient way to transfer large files over the Internet. You might, at some point, have conf...

Read more
  • Amazon S3
  • AWS
— October 18, 2018

Microservices Architecture: Advantages and Drawbacks

Microservices are a way of breaking large software projects into loosely coupled modules, which communicate with each other through simple Application Programming Interfaces (APIs).Microservices have become increasingly popular over the past few years. The modular architectural style,...

Read more
  • AWS
  • Microservices
— October 2, 2018

What Are Best Practices for Tagging AWS Resources?

There are many use cases for tags, but what are the best practices for tagging AWS resources? In order for your organization to effectively manage resources (and your monthly AWS bill), you need to implement and adopt a thoughtful tagging strategy that makes sense for your business. The...

Read more
  • AWS
  • cost optimization
— September 26, 2018

How to Optimize Amazon S3 Performance

Amazon S3 is the most common storage options for many organizations, being object storage it is used for a wide variety of data types, from the smallest objects to huge datasets. All in all, Amazon S3 is a great service to store a wide scope of data types in a highly available and resil...

Read more
  • Amazon S3
  • AWS
— September 18, 2018

How to Optimize Cloud Costs with Spot Instances: New on Cloud Academy

One of the main promises of cloud computing is access to nearly endless capacity. However, it doesn’t come cheap. With the introduction of Spot Instances for Amazon Web Services’ Elastic Compute Cloud (AWS EC2) in 2009, spot instances have been a way for major cloud providers to sell sp...

Read more
  • AWS
  • Azure
  • Google Cloud
— August 23, 2018

What are the Benefits of Machine Learning in the Cloud?

A Comparison of Machine Learning Services on AWS, Azure, and Google CloudArtificial intelligence and machine learning are steadily making their way into enterprise applications in areas such as customer support, fraud detection, and business intelligence. There is every reason to beli...

Read more
  • AWS
  • Azure
  • Google Cloud
  • Machine Learning
— August 17, 2018

How to Use AWS CLI

The AWS Command Line Interface (CLI) is for managing your AWS services from a terminal session on your own client, allowing you to control and configure multiple AWS services.So you’ve been using AWS for awhile and finally feel comfortable clicking your way through all the services....

Read more
  • AWS
Albert Qian
— August 9, 2018

AWS Summit Chicago: New AWS Features Announced

Thousands of cloud practitioners descended on Chicago’s McCormick Place West last week to hear the latest updates around Amazon Web Services (AWS). While a typical hot and humid summer made its presence known outside, attendees inside basked in the comfort of air conditioning to hone th...

Read more
  • AWS
  • AWS Summits
— August 8, 2018

From Monolith to Serverless – The Evolving Cloudscape of Compute

Containers can help fragment monoliths into logical, easier to use workloads. The AWS Summit New York was held on July 17 and Cloud Academy sponsored my trip to the event. As someone who covers enterprise cloud technologies and services, the recent Amazon Web Services event was an insig...

Read more
  • AWS
  • AWS Summits
  • Containers
  • DevOps
  • serverless