In this section of the AWS Certified Advanced Networking - Specialty learning path, we introduce you to the various network management services currently available in AWS that are relevant to the ANS-C01 exam.
Learning Objectives
- Identify and describe the various network management services available in AWS
- Understand the use of AWS Config to assess network infrastructure
- Describe how AWS CloudTrail is used to monitor and audit network infrastructure
- Explain how Amazon Inspector is used to enhance AWS network security and compliance
- Describe how VPC Flow Logs are used to capture IP traffic within the AWS Cloud
- Identify strategies for solving common issues that occur when running cloud networking at scale
Prerequisites
The AWS Certified Advanced Networking - Specialty certification has been designed for anyone with experience designing, implementing, and operating complex AWS and hybrid networking architectures. Ideally, you’ll also have some exposure to the nuances of AWS networking regarding the integration of AWS services and AWS security best practices. Many exam questions will require advanced level knowledge of many AWS services, including AWS networking services. The AWS Cloud concepts introduced in this course will be explained and reinforced from the ground up.
With AWS CloudTrail's ability to capture a vast amount of data using either an All Region, Single Region, or AWS Organization trail, what benefits does this bring to your business, and why is it needed? Well, there are some simple and obvious reasons for this, some of which you would have already thought of yourself, but let’s go through a few to see how AWS CloudTrail is beneficial to your organization.
Using CloudTrail as a security tool is a great way to identify events that have happened that perhaps shouldn’t have. Being able to search for specific events, such as an unsuccessful sign-in attempt, or perhaps a principal trying to run a restricted API, allows your security teams to find out how these events happened, who initiated them, and then put in preventative measures ensuring that they do not occur again. Analyzing this data can also help to spot weaknesses in your infrastructure allowing your engineers to bolster and reinforce boundaries and operational best practices.
Using the features of CloudTrail Trail, and CloudTrail Lakes you are able to consolidate activity records from more than one region into a single S3 bucket, providing a convenient way to analyze data, allowing you to identify patterns and audit activity at scale using queries. Being able to bring data together from multiple sources and regions allows your teams to view API activity through a single-pane-of-glass approach, simplifying analysis of the data sets.
CloudTail provides a great way to allow you to gain visibility into your AWS cloud environment, allowing you to understand exactly what is happening, and when, and by whom. Having enhanced visibility of your environment provides an opportunity to increase your awareness of attacks, and can provide an early warning to unusual behavior. In fact, CloudTrail has an interesting feature called CloudTrail Insights which helps to track and identify any unusual behavior detected within your account based on the action of a Write API.
These events are only captured based upon the behavior pattern of API calls that fall outside the realms of your normal operations. To help you ascertain the reason behind the insight that has been triggered, additional metadata is also captured.
CloudTrail Insights is not enabled by default, however, when it is enabled CloudTrail will review, monitor and advise about irregularities in Write management events. When captured, these events are then stored in a different folder within your destination trail bucket, this folder will be named as /CloudTrail-Insight. To help you review these insights quickly and effectively, they are also viewable from within the AWS management console of the AWS CloudTrail dashboard.
As AWS CloudTrail is designed to track API calls, it can be used as a very effective method of maintaining a recorded audit of actions and configuration changes taken against your AWS resources across multiple accounts and multiple regions. The data collected from CloudTrail logs can be used to help you maintain governance and meet regulatory requirements. From an auditing perspective, each event recorded captures information pertaining to:
-
The principal who carried out the API, including the ARN
-
The Account ID
-
The username and session information
-
The time of the event
-
The source
-
The eventname (API)
-
The Region
-
Source IP address
-
And many more
Stuart has been working within the IT industry for two decades covering a huge range of topic areas and technologies, from data center and network infrastructure design, to cloud architecture and implementation.
To date, Stuart has created 150+ courses relating to Cloud reaching over 180,000 students, mostly within the AWS category and with a heavy focus on security and compliance.
Stuart is a member of the AWS Community Builders Program for his contributions towards AWS.
He is AWS certified and accredited in addition to being a published author covering topics across the AWS landscape.
In January 2016 Stuart was awarded ‘Expert of the Year Award 2015’ from Experts Exchange for his knowledge share within cloud services to the community.
Stuart enjoys writing about cloud technologies and you will find many of his articles within our blog pages.