Security and Compliance Flashcards
Shared Responsibility
Patch Management - like for RDS its AWS responsibility but for EC2 software patch management is customer responsibility
Awareness and Training -like AWS gives this to their employees and you give it to your employees
Configuration Management
DDoS
Denial of service attack - The attacker uses BOT requests to the application server which is unable to service genuine user’s requests due to overload from BOT requests.
AWS Shield Standard
Free and enabled for all customers against DDoS attack
Provides Layer 3 and 4 attacks and reflection attacks
AWS Shield Advanced
Paid and 24/7 DDoS protection and support
AWS WAF(Web Application Firewall)
Filter requests based on rules and placed on Layer 7 like Application Load Balancer, API Gateway and CloudFront.
Protection against web exploits
Define Web ACL - filter based on IP addresses, HTTP header, body and URI strings, geo matching, rate based rules
Protects against SQL Injection and Cross Site Scripting (XSS)
CloudFront and Route 53
Provide protection at Edge location when used along with Shield
Architecture:
Route 53 is protected by shield and routes the requests to CloudFront.
CloudFront is also protected by shield and it caches the content on edge location
Use AWS WAF at CloudFront to filter the requests based on rules
Use Load Balancer on public subnet to scale the load at network level
Then behind load balancer user EC2 instances with ASG
AWS Network Firewall
Protect VPC overall from Layer 3 to 7.
This operates at VPC level unlike Web ACL that operates at subnet level
Penetration Testing
Simulated DDoS attacks, Port, Protocol and Request Flooding is not allowed
KMS
Key Management Service is the AWS encryption service and keys are managed by AWS
CloudHSM(Hardware security module)
AWS only provisions encryption hardware and encryption keys are managed by customer
CMK
Customer Master Keys
1. Customer managed CMK
2. AWS managed CMK
3. AWS owned CMK
4. Cloud HSM keys(found under custom key store)
For CloudTrail and Glacier S3 encryption is enabled by default
ACM(AWS Certificate Manager)
Service for SSL/TLS certificates
Secrets Manager
Store and Rotate passwords (Rotation using custom Lambda function)
Integrated with Amazon RDS
Encrypted using KMS
AWS Artifacts
Portal that provides AWS compliance and AWS agreement documents
Amazon GuardDuty
Threat Detective Service
Detects anomalies in AWS account
Input is from CloudTrail logs, VPC flow logs, DNS logs, S3 logs, EBS logs, Lambda network activity, RDS and Aurora login logs, EKS audit logs and output can be sent to EventBridge to generate SNS or Lambda function