The hands-on lab is part of these learning paths
Security - Specialty Certification Preparation for AWS
Solutions Architect – Associate Certification Preparation for AWS - Feb 2018
Ready for the real environment experience?
Clearly security is a huge issue for the technical sector, and public cloud is no exception to that. If you Google "top cloud security concerns" one of the top articles is from Information Week titled 9 Worst Cloud Security Threats. The section on Account or Service Traffic Hijacking states:
An intruder with control over a user account can eavesdrop on transactions, manipulate data, provide false and business-damaging responses to customers, and redirect customers to a competitor's site or inappropriate sites.
This Lab is germane to the quote above. In this Lab you will configure an EC2 instance to use the CloudWatch agent so it can deliver the security log file to Amazon CloudWatch. A CloudWatch Log Group and Log Stream will be automatically created for you. By monitoring the security log file for a specific type of potential breach (based on a pattern), CloudWatch will proactively send an email notification to your email. You will also configure Amazon Simple Notification Service (SNS) as the communication channel for the notification.
Although this Lab focuses on failed SSH attempts, there is a broader application that should be recognized, including how CloudWatch can be utilized in many different ways for many different logs or infrastructure metrics.
Upon completion of this lab you will be able to:
- Configure an EC2 instance to use the CloudWatch log agent
- Verify the log agent status
- Locate a few key security related log files and view them on the EC2 instance
- Create an Simple Notification Service (SNS) topic
- Subscribe to an SNS topic
- Use CloudWatch to monitor a log stream for a specific pattern (invalid SSH users) and send a notification via SNS
You should be familiar with:
- Basic security, log file and SSH concepts
- Using the Linux command line is not required by helpful
Before completing the lab instructions the environment will look as follows:
- An EC2 instance with the CloudWatch Log Agent configured and running
- A custom IAM Role with a Policy that allows the EC2 instance to communicate with Amazon CloudWatch
After completing the lab instructions the environment should look similar to:
About the Author
Greg has been a consistent high performer for pioneering technologies in the wireless web industries with an illustrious career that is a testament to his breadth of knowledge. Dabbling with MS Azure, at Cloud Academy, Greg really thrives on evangelizing the benefits of Amazon Web Services. A dedicated and passionate professional who learns new and emerging technologies quickly, Greg always ensures the highest quality and caliber of everything he produces.