What is AWS Security?

Data Security Knowledge Base

Introduction to Amazon Web Services

Text

Amazon Web Services (AWS) is the leading provider of on-demand cloud services with more than a million customers.

When the cloud was still new, the perceived lack of security hindered people from adopting it. While cloud security has come a long way, there are still many risks associated with it. Following recommended best practices can help mitigate those risks as you build your infrastructure and store and transmit your data with AWS.

AWS Security Risks

Text

AWS security is not fail-safe and operates on a Shared Security Responsibility model. This means that Amazon secures its infrastructure while you have your own security controls in place for the data and applications you deploy and store in the cloud.

Unlike your on-site systems, which have a hierarchical structure and a peripheral network that scrubs and analyzes data being transmitted, AWS makes it possible for every instance to communicate with the Internet. The exposed applications structure requires you to strengthen existing security controls. This includes continuously updating your security configurations with sufficient patching, strong firewall configurations, and proper network security implementations.

Furthermore, you should constantly manage your users, including third party vendors and suppliers, and limit privileges. Be sure to delete unused accounts with old credentials as they can easily be targets for breaches.

Best Practices for AWS Security

Text

In August 2016, Amazon released a 74-page document detailing the best practices for AWS users. Some of the biggest takeaways are:

Think of security at every layer.

Instead of using just one firewall to secure all of your virtual networks, be sure to use virtual firewalls on every network that you create.

Make sure that every activity is traceable and that you manage privileges meticulously.

You should be able to see which users did what on your systems. Be strict with access controls and have authentication. Only a few trusted people should be able to access the root and modify settings at that level.

Keep track of all actions, modifications, and points of exit and entry in your AWS deployments.

Not only should you be able to tell who did what on your cloud platform, but you should also create alerts to warn you of unusual activities.

Have customized image templates of all of your virtual servers.

You can use these images when you launch a new server. The Amazon Machine Image service can create these reusable templates every time you spin up an EC2 instance. These images will already include your security settings.

Be sure to encrypt every piece of sensitive data that you store in or transmit over your AWS environment.

You can opt to encrypt your data on-site and then send it to your AWS deployment. You can also store the encryption keys behind your own firewall and just use Amazon’s hardware security module to make sure that they work properly. Data key caching is a recent introduction from AWS which offers benefits such as reduced latency, but there are some security tradeoffs to consider.

Perform regular audits to ensure regulatory compliance.

AWS offers a robust suite of Compliance Resources, including an auditing security checklist which helps businesses perform self-audits to ensure that regulatory requirements are met.

AWS Security Tools

Text

Amazon has a variety of security tools available to help implement the aforementioned AWS security best practices. Here are the top AWS security tools:

CloudTrail
AWS WAF
Amazon Inspector
Amazon Cognito
CloudHSM
CloudFront

Best Practices for Choosing an AWS Security Solution

Text

With the help of a cloud security solution, businesses can easily manage their responsibilities for securing their sensitive data and applications in the cloud. Here are some best practices to help you choose the right solution:

Easy integration.

Choose a security solution that integrates with AWS to make the process painless.

Text

While Amazon has helped lower security risks by publishing best practices and developing a suite of tools, you must also enforce the proper controls and protocols and manage your users to secure your data and applications. In addition, implementing a third-party cloud security solution will help ensure compliance and unify your cloud and on-premise policies and initiatives to achieve maximum security for your organization.