Do your part to make the most of Amazon Web Services security
While Amazon designed their cloud platform infrastructure to be highly available and scalable, Amazon Web Services security features also comply with industry standards. AWS Data centers are built like fortresses and staffed 24×7, and remote access is permitted strictly according to the principle of least privileged.
AWS infrastructure is designed and managed in full compliance with security best practices and a wide range of IT security standards, including SOC 1/SSAE 16/ISAE 3402 (formerly SAS 70 Type II), SOC2, SOC3, FISMA, DIACAP, FedRAMP, PCI DSS Level 1, ISO 27001, ITAR, HIPPA, and Cloud Security Alliance.
So Amazon has done their part to ensure that Amazon Web Services security is up to the challenge. But you’ve got to do your part, too. We’re going to focus on how you can leverage some of AWS’s built-in security features to meet specific business requirements and protect the confidentiality, integrity, and availability of your data in the cloud.
Shared Security Responsibility
When you host your application in the cloud, you agree to share responsibilities with AWS. It’s the job of Amazon Web Services Security to take care of host operating systems, visualization layer, network, and physical Security. But it’s up to you to secure anything you deploy on the top host operating systems.
Amazon Web Services Security built-in features
You have a responsibility to become familiar with each security-related AWS service. Here’s a quick rundown.
Identity and Access Management (IAM)
Using Identity and Access Management (IAM), you can create users, groups, and roles, and use permissions to allow and deny their access to AWS resources such as EC2, RDS, and VPC. IAM enables you to grant unique credentials to every user within your AWS Account, allowing individual access only to the AWS services and resources required.
With IAM Mutifactor Authentication enabled, a user trying to access an AWS resource will be prompted for normal authentication (user name and password), but also for an authentication code available only through their MFA-configured device.
IAM can be used to grant your employees and applications access to the AWS Management Console and AWS service APIs. IAM is also compatible with your existing Active Directory.
Virtual Private Clouds (VPCs)
Amazon’s VPCs allow you to provision compute resources, like EC2 instances and RDS deployments, inside isolated virtual networks. VPCs give you complete control over all inbound and outbound network traffic. You can (and should) use VPCs to secure your application by restricting, where appropriate, access to and from the Internet. Using Virtual Private Network (VPN) connections, you can connect on-premise servers directly to your cloud-based VPC, bypassing public networks.
Security Groups and Network ACL’s
Using Security Groups, you can create firewall rules controlling incoming and outgoing traffic at the instance level. You can restrict traffic by protocol type (TCP, UDP, ICMP), IP address, and port.
Access Control Lists (ACLs) work at the network subnet level. Network ACLs can be especially useful in the prevention of DDOS attacks when you have a particular need to blacklist traffic from specific IP addresses.
When you create an encrypted EBS volume and attach it to an instance, data on the volume, disk I/O, and snapshots created from the volume, are all encrypted. When so configured, AWS encrypts each S3 object with a unique key. Amazon S3 server-side encryption uses one of the strongest block ciphers available – 256-bit Advanced Encryption Standard (AES-256).
RDS generates an SSL certificate for each DB Instance. Once an encrypted connection is established, data transferred between the DB Instance and your application will be encrypted during transfer.
You can use AWS Direct Connect to establish a private virtual interface between your on-premise network and your Amazon Virtual Private Cloud. Direct Connect provides a private and secure high-bandwidth network connection.
AWS Cloud Trail
CloudTrail provides you with a history of all API calls made against your account resources, including API calls made via the AWS Management Console, SDKs, and command line tools.
AWS Trusted Advisor inspects your AWS environment and makes recommendations for saving money, improving system performance and reliability, or closing security gaps.
Even without upgrading to a paid support plan, Trusted Advisor will warn you about weaknesses like security groups allowing unrestricted access (0.0.0.0/0) to specific ports or S3 buckets with open access permissions. Trusted Advisor can provide a highly effective summary of your overall Amazon Web Services security profile.
Amazon Web Services Security: the next step
Besides the built-in Amazon Web Services security services, there are many open source and commercial software packages available through the AWS MarketPlace.
But all these powerful tools will have no value if you don’t take the time to learn how to use them properly to protect the confidentiality, integrity, and availability of your cloud data.
Content Roadmap: AZ-500, ITIL 4, MS-100, Google Cloud Associate Engineer, and More
Last month, Cloud Academy joined forces with QA, the UK’s largest B2B skills provider, and it put us in an excellent position to solve a massive skills gap problem. As a result of this collaboration, you will see our training library grow with additions from QA’s massive catalog of 500+...
DevSecOps: How to Secure DevOps Environments
Security has been a friction point when discussing DevOps. This stems from the assumption that DevOps teams move too fast to handle security concerns. This makes sense if Information Security (InfoSec) is separate from the DevOps value stream, or if development velocity exceeds the band...
Test Your Cloud Knowledge on AWS, Azure, or Google Cloud Platform
Cloud skills are in demand | In today's digital era, employers are constantly seeking skilled professionals with working knowledge of AWS, Azure, and Google Cloud Platform. According to the 2019 Trends in Cloud Transformation report by 451 Research: Business and IT transformations re...
Disadvantages of Cloud Computing
If you want to deliver digital services of any kind, you’ll need to estimate all types of resources, not the least of which are CPU, memory, storage, and network connectivity. Which resources you choose for your delivery — cloud-based or local — is up to you. But you’ll definitely want...
Google Cloud vs AWS: A Comparison (or can they be compared?)
The "Google Cloud vs AWS" argument used to be a common discussion among our members, but is this still really a thing? You may already know that there are three major players in the public cloud platforms arena: Amazon Web Services (AWS), Microsoft Azure, and Google Cloud Platform (GCP)...
Deployment Orchestration with AWS Elastic Beanstalk
If you're responsible for the development and deployment of web applications within your AWS environment for your organization, then it's likely you've heard of AWS Elastic Beanstalk. If you are new to this service, or simply need to know a bit more about the service and the benefits th...
How to Use & Install the AWS CLI
What is the AWS CLI? | The AWS Command Line Interface (CLI) is for managing your AWS services from a terminal session on your own client, allowing you to control and configure multiple AWS services and implement a level of automation. If you’ve been using AWS for some time and feel...
Cloud Academy’s Blog Digest: July 2019
July has been a very exciting month for us at Cloud Academy. On July 10, we officially joined forces with QA, the UK’s largest B2B skills provider (read the announcement). Over the coming weeks, you will see additions from QA’s massive catalog of 500+ certification courses and 1500+ ins...
AWS Fundamentals: Understanding Compute, Storage, Database, Networking & Security
If you are just starting out on your journey toward mastering AWS cloud computing, then your first stop should be to understand the AWS fundamentals. This will enable you to get a solid foundation to then expand your knowledge across the entire AWS service catalog. It can be both d...
How to Become a DevOps Engineer
The DevOps Handbook introduces DevOps as a framework for improving the process for converting a business hypothesis into a technology-enabled service that delivers value to the customer. This process is called the value stream. Accelerate finds that applying DevOps principles of flow, f...
AWS AMI Virtualization Types: HVM vs PV (Paravirtual VS Hardware VM)
Amazon Machine Images (AWS AMI) offers two types of virtualization: Paravirtual (PV) and Hardware Virtual Machine (HVM). Each solution offers its own advantages. When we’re using AWS, it’s easy for someone — almost without thinking — to choose which AMI flavor seems best when spinning...
AWS Machine Learning Services
The speed at which machine learning (ML) is evolving within the cloud industry is exponentially growing, and public cloud providers such as AWS are releasing more and more services and feature updates to run in parallel with the trend and demand of this technology within organizations t...