⚙️AWS Security & Compliance introduction 本頁目錄
AWS Shared Responsibility Model
AWS responsibility - Security of the Cloud
Protecting infrastructure (hardware, software, facilities, and networking) that runs all the AWS services
Managed services like S3, DynamoDB, RDS, etc.
Customer responsibility - Security in the Cloud
For EC2 instance, customer is responsible for management of the guest OS (including security patches and updates), firewall & network configuration, lAM
Encrypting application data
Shared controls:
Patch Management, Configuration Management, Awareness & Training
root user Privileges
Root user = Account Owner (created when the account is created)
Has complete access to all AWS services and resources
Lock away your AWS account root user access keys!
Do not use the root account for everyday tasks, even administrative tasks
Actions that can be performed only by the root user:
Change account settings (account name, email address, root user password, root user access keys)
View certain tax invoices
Close your AWS account
Restore IAM user permissions
Change or cancel your AWS Support plan
Register as a seller in the Reserved Instance Marketplace
Configure an Amazon S3 bucket to enable MFA
Edit or delete an Amazon S3 bucket policy that includes an invalid VPC ID or VPC endpoint ID
Sign up for GovCloud
summary
Shared Responsibility on AWS
Shield: Automatic DDoS Protection + 24/7 support for advanced
WAF: Firewall to filter incoming requests based on rules
KMS: Encryption keys managed by AWS
CloudHSM: Hardware encryption, we manage encryption keys
AWS Certificate Manager: provision, manage, and deploy SSL/TLS Certificates
Artifact: Get access to compliance reports such as PCI, ISO, etc...
GuardDuty: Find malicious behavior with VPC, DNS & CloudTrail Logs
Inspector: find software vulnerabilities in EC2, ECR Images, and Lambda functions
Network Firewall: Protect VPC against network attacks
Config: Track config changes and compliance against rules
Macie: Find sensitive data (ex: PIl data) in Amazon S3 buckets
Cloud Trail: Track API calls made by users within account
AWS Security Hub: gather security findings from multiple AWS accounts
Amazon Detective: find the root cause of security issues or suspicious activities
AWS Abuse: Report AWS resources used for abusive or illegal purposes
Root user privileges:
Change account settings
Close your AWS account
Change or cancel your AWS Support plan
Register as a seller in the Reserved Instance Marketplace
IAM Access Analyzer: identify which resources are shared externally
Firewall Manager: manage security rules across an Organization (WAF, Shield...)