aws_cloud_practitioner

Security

Shared Responsibility Model

AWS is responsible for some parts of your environment and you (the customer) are responsible for other parts. This concept is known as the shared responsibility model.

The shared responsibility model divides into:

example

Customers are responsible for the security of everything that they create and put in the AWS Cloud.


AWS IAM

AWS Identity and Access Management (IAM) enables you to manage access to AWS services and resources securely.

Some features:


AWS account root user

When you first create an AWS account, you begin with an identity known as the root user. It has complete access to all the AWS services and resources in the account.

Best practice:

example

Use cases:


IAM users

An IAM user is an identity that you create in AWS. It represents the person or application that interacts with AWS services and resources. It consists of a name and credentials.

By default, when you create a new IAM user in AWS, it has no permissions associated with it.


IAM policies

An IAM policy is a document that allows or denies permissions to AWS services and resources.

Follow the security principle of least privilege when granting permissions. By following this principle, you help to prevent users or roles from having more permissions than needed to perform their tasks.

Instead of assigning permissions to each individual IAM user, place the users into an IAM group.


IAM groups

An IAM group is a collection of IAM users.

When you assign an IAM policy to a group, all users in the group are granted permissions specified by the policy.


IAM roles

An IAM role is an identity that you can assume to gain temporary access to permissions.

When someone assumes an IAM role, they abandon all previous permissions that they had under a previous role and assume the permissions of the new role.


AWS Organizations

You can use AWS Organizations to consolidate and manage multiple AWS accounts within a central location.

When you create an organization, AWS Organizations automatically creates a root, which is the parent container for all the accounts in your organization.

In AWS Organizations, you can centrally control permissions for the accounts in your organization by using service control policies (SCPs).

SCPs enable you to place restrictions on the AWS services, resources, and individual API actions that users and roles in each account can access.

SCPs can be applied to:

Features:


Organizational units

In AWS Organizations, you can group accounts into organizational units (OUs) to make it easier to manage accounts with similar business or security requirements.

When you apply a policy to an OU, all the accounts in the OU automatically inherit the permissions specified in the policy.


Example: How to use AWS Organizations

example

A company has separate AWS accounts for the finance, information technology (IT), human resources (HR), and legal departments. You decide to consolidate these accounts into a single organization so that you can administer them from a central location. When you create the organization, this establishes the root.

example

The finance and IT departments have requirements that do not overlap with those of any other department. You bring these accounts into your organization to take advantage of benefits such as consolidated billing, but you do not place them into any OUs.

example

The HR and legal departments need to access the same AWS services and resources, so you place them into an OU together. Placing them into an OU enables you to attach policies that apply to both the HR and legal departments’ AWS accounts.


Compliance

AWS Artifact

AWS Artifact is a service that provides on-demand access to AWS security and compliance reports and select online agreements.

AWS Artifact consists of two main sections:

In AWS Artifact Agreements, you can review, accept, and manage agreements for an individual account and for all your accounts in AWS Organizations.

AWS Artifact Reports provide compliance reports from third-party auditors.


Customer Compliance Center

The Customer Compliance Center contains resources to help you learn more about AWS compliance.

What can you find here?


Denial-of-Service Attacks

A denial-of-service (DoS) attack is a deliberate attempt to make a website or application unavailable to users.

example

In a distributed denial-of-service (DDoS) attack, multiple sources are used to start an attack that aims to make a website or application unavailable.

The single attacker can use multiple infected computers (also known as “bots”) to send excessive traffic to a website or application.

example


AWS Shield

To help minimize the effect of DoS and DDoS attacks on your applications, you can use AWS Shield.

AWS Shield is a service that protects applications against DDoS attacks.

AWS Shield provides two levels of protection:

AWS Shield Standard automatically protects all AWS customers at no cost. It protects your AWS resources from the most common, frequently occurring types of DDoS attacks.

AWS Shield Advanced is a paid service that provides detailed attack diagnostics and the ability to detect and mitigate sophisticated DDoS attacks.

It also integrates with other services such as Amazon CloudFront, Amazon Route 53, and Elastic Load Balancing.

Additionally, you can integrate AWS Shield with AWS WAF by writing custom rules to mitigate complex DDoS attacks.


AWS KMS

You must ensure that your applications’ data is secure while in storage (encryption at rest) and while it is transmitted, known as encryption in transit.

AWS Key Management Service (AWS KMS) enables you to perform encryption operations through the use of cryptographic keys.

A cryptographic key is a random string of digits used for locking (encrypting) and unlocking (decrypting) data.


AWS WAF

AWS WAF is a web application firewall that lets you monitor network requests that come into your web applications.

It does this by using a web access control list (ACL) to protect your AWS resources.

AWS WAF works together with Amazon CloudFront and an Application Load Balancer.


Amazon Inspector

Amazon Inspector helps to improve security, and compliance of your AWS deployed applications by running an automated security assessment against your infrastructure.

The service consists of three parts:


Amazon GuardDuty

Amazon GuardDuty is a service that provides intelligent threat detection for your AWS infrastructure and resources.

It identifies threats by continuously monitoring the network activity and account behavior within your AWS environment.

example

It analyzes continuous streams of metadata generated from your account, and network activity found on AWS CloudTrail events, Amazon VPC Flow Logs, and DNS logs.


Notes


References