Security and Compliance Flashcards
Shared Responsibility Model
Security & Compliance responsibility is shared:
AWS - security of the cloud: cloud infrastructure, inc. hardware, software, networking and facilities.
Customer - security in the cloud: data, platforms, apps and software and its patching, and configurations (like rotating credentials, securing API calls, IAM, network traffic protection, firewall config).
Shared Responsibility Model: EC2 example
AWS:
- EC2 Service
- patching the host ops system
- security of the physical server
Customer:
- installed apps
- patching guest ops system
- security controls
Shared Responsibilities: Patching Infrastructure
AWS = patching host infrastructure
Customer = patching guest OS and apps
Shared Responsibilities: Configuration Management
AWS = configurating infrastructure devices
Customer = configuring databases and apps
Shared Responsibilities: Awareness and Training
AWS = AWS employees
Customer = their own employees
Security breach or abuse report
AWS Trust & Safety team using “Report Amazon AWS abuse”
Well-Architected Framework: 6 Pillars
- Operational Excellence
- Security
- Reliability
- Performance Efficiency
- Cost Optimisations
- Sustainability
WAF Pillar: Operational Excellence
Create apps that support your production workloads:
- plan for and anticipate failure
- deploy smaller, reversable changes
- script operations as code (terraform)
- learn from failure and refine
WAF Pillar: Security
Mechanisms that protect your systems and data:
- automated security tasks
- encrypted data in transit and rest
- least privileges assigned
- tracking of who/what/when
- security at all applications layers
WAF Pillar: Reliability
Design systems that work consistently and recover quickly:
- automatic failure recovery
- scale horizontally for resilience
- manage change through automation
- stop guessing capacity
- test recovery procedures
WAF Pillar: Performance Efficiency
Effective use of computing resources to meet requirements while removing bottlenecks:
- serverless architecture
- multi-region deployment
- delegate tasks to a cloud vendor
- use virtual resources
WAF Pillar: Cost Optimisation
Deliver optimum and resilient solution at the least cost:
- consumption-based pricing
- Cloud Financial Management
- measure efficiency
- pay only for what’s needed
WAF Pillar: Sustainability
Environmental impact - energy consumption and efficiency:
- sustainable goals
- maximise utilisation
- managed services
- reduce downstream impact
IAM
Identity and Access Management - allows you to control access to AWS services and resources.
who = Identities i.e. Root User, Individual User, Groups Roles (Apps can be users)
what = Access i.e. Policies (customer & AWS managed), Permissions Boundaries
Authentication vs Authorisation
Who vs What
Authentication = present identity and verify (username & password)
Authorisation = which services and resources the identity has access to