Skip to content
This repository has been archived by the owner on Nov 2, 2024. It is now read-only.

Latest commit

 

History

History
executable file
·
114 lines (79 loc) · 3.72 KB

101_aws_security_start.md

File metadata and controls

executable file
·
114 lines (79 loc) · 3.72 KB

AWS Security - Quick Starts

First Steps on Securing your AWS account

  • Enable multi-factor authentication (MFA)
  • Enable Cloudtrail for auditing
  • Use IAM for every future action

AWS Own Security Practices

Resources:

AWS Shared Responsibility Model

Security and compliance is a shared responsibility between AWS and the customer.

  • AWS is responsible for the security "of" the cloud
  • customer is responsible for the security "in" the cloud

Security of the Cloud

  • Protection of infrastructure that run all the offered services
  • Hardware, software, networking, and facilities
  • Software services provided by AWS (Managed services)

Security in the Cloud

  • Responsibility and management of:
    • guest OS of EC2 compute instances
    • other application software
    • configuration of the AWS provided security group firewall

AWS categorized the services into three:

Shared responsibility chart:

AWS Config

Records and evaluate configurations of your AWS resources.

  • assess, audiit, and evaluate configurations
  • continuously monitors and records your AWS resource configurations
  • allows to automate evaluation of recorded configurations against their desired configurations

AWS CloudTrail

Track user activity and API usage.

  • enables governance, compliance, operational auditing, adn risk auditing og your AWS account
  • log, continuously monitor, and retain account activity related to actions across your AWS infrastructure
  • provides event history of your AWS account activity

Data Control

How data is being encrypted.

  • AWS KMS

    • Multi-tenant
    • Shared service
  • AWS CloudHSM

    • Dedicated cluster where you can store encrytion keys
    • Isolation up to the physical layer
    • Strong compliance requirement

Next Steps