About Us Contact Us
Home About Services Solutions Industries Knowledge Blog Contact
Hit enter to search

Blogs

AWS Security

AWS Security Best Practices to reduce Risks

  • Understand Shared Responsibility Model.

    AWS follows shared responsibility model. Amazon takes responsibility for the security of its infrastructure, and has made platform security a priority to protect customers’ critical data and applications. Amazon detects fraud and abuse, and responds to incidents by notifying customers. Customers are also responsible for the application hosted in AWS & security configurations done in AWS services.

    AWS Security
  • Enable CloudTrail

    CloudTrail is an AWS service that generates log files of all API calls made within AWS, including the AWS management console, SDKs, command line tools, etc. This capability allows organizations to continuously monitor activities in AWS for compliance auditing and post-incident forensic investigations.To Secure AWS account, below cloudtrail points should be enabled

    1. Enable Cloudtrail in all Regions.
    2. Turn on Log Validation so that any changes in logs file store in S3 bucket will be notify.
    3. Turn on multi-factor authentication (MFA) to delete CloudTrail S3 buckets, and encrypt all CloudTrail log files in flight and at rest.
  • Follow IAM best practices.

    IAM - Identity & Access Management is a web service which aims to enable secured control access to AWS resources. IAM is used to control who is authenticated and who is authorized to use the resources. Some of the steps taken for a strong IAM framework are listed below.

    1. Do not Use Access keys for root users
    2. Create Individual IAM users
    3. Provide least privileges
    4. Used Customer managed key and AWS managed key.
    5. Configure strong password policies
    6. Enable MFA for privileged user
    7. Use Roles for Application that runs on EC2
    8. Do not Share Access keys
    9. Rotate credentials regularly
    10. Monitor Activities on Your AWS Account
  • Follow Security best practices while using AWS database and storage services.

    AWS provides many storage solution like Object based storage - S3, Elastic Block Storage, Relational Database Service- RDS & Aurora, Data warehousing - Redshift, In-Cache memory - Elasticache and NoSQL - DynamoDB. Some steps that need to be taken ensure secure storage are :

    1. Ensure that no buckets are publicly accessible
    2. Enable encryption of S3 bucket for security
    3. Enable encryption of RDS storage for security
    4. Restrict access to RDS instances to decrease the risk of malicious activities such as brute force attacks, SQL injections, or DoS attacks.
  • Enable Configure management

    AWS inspector, automatically assesses application vulnerability or deviations from best practices, including impacted networks, OS, and attached storage. AWS Config, is a service that identifies all of your AWS resources and then evaluate the same with the required AWS configuration needed for your setup.