Posted on 17 Feb 2021
In this article, I will give an overview of how Amazon Web Services Security and Compliance work.
Security is one of the main focus of the Amazon Cloud, its goal is to guarantee:
Customers need to focus on their business and if they run them on their own infrastructure, they should take care of security. Manage security is not an easy task. It is an ongoing process to find out pitfalls, patch the systems, manage identity and accesses, and so on. For this reason, move the workload on a Cloud infrastructure allows moving the responsibility of much of this work to the Cloud provider and free resources to allocate on the real business.
AWS Security provides the most innovative security services, it will improve them over time, and they will be accessible at a lower cost. It provides the following services and tools:
Moreover, it provides monitoring and logging tools to find risks and understand what’s going on in the environment. In the Amazon Marketplace, there are other 3rd party services and tools that are integrable with the one provided by Amazon.
Amazon Cloud implements network security through a series of features like:
IAM is the Amazon component responsible to manage Identities and the way they access the AWS resources. The first concepts to learn are user, group, role, and policy documents. For more details about Amazon IAM read the following article.
Security is the most important aspect of whatever technology infrastructure. However, it is an expensive, complex, and time-consuming activity that is hard to track and do effectively. A normal security activity requires:
In the AWS Cloud Amazon Inspector is the component that performs this job. However, it doesn’t guarantee the completeness of the report, because it depends on the Shared Responsibility model. Therefore, it can only show the vulnerabilities and deviations under AWS’s responsibility.
You can access Amazon Inspector via:
As said above, Amazon allows your organization to find vulnerabilities and deviations in your system and data. The assessment happens in the development and production phases. Moreover, it is an ongoing process that improves the security of the system and data over time.
Amazon Inspector is agent-based, API-driven, delivered as a service. You can easily integrate it into your DevOps activities so that you can decentralize and automate security activities to find security issues during the development, test, and production phases.
The tool improves development agility because security issues are found immediately and it is easy to solve them when you identify them in the early phase of the development process.
The tool leverage the knowledge of AWS expertise so you are sure the most advanced checks are performed in your infrastructure and data.
These activities enforce security standards in the development, test, and operation processes.
Photo from AWS Cloud Practitioner Essentials (2nd Edition) course
Amazon Shield is a managed Distributed Denial of Service (DDoS) protection service that safeguards applications running on AWS. Before continuing let’s see what is a DDoS attack and what is the difference with a Denial of Service (DoS) attack.
DoS attack is a deliberate attempt to make your website or application unavailable to users. Basically, the attacker sends fake network traffic to the target machine in order to consume as much bandwidth as possible in order to reach its scalability limits, let the system suffers and make its services unavailable to the end-users.
Photo from AWS Cloud Practitioner Essentials (2nd Edition) course
The DDoS attack has the same goal as the DoS but the attack comes from multiple sources orchestrated via software.
Photo from AWS Cloud Practitioner Essentials (2nd Edition) course
DDoS attacks can happen at the infrastructure and application layer. The former is an attack on the server node try to limit its network bandwidth and reduce its availability to legitimate users. On the contrary, attacks to the application layer try to request application resources (i.e. HTML pages) in order to consume the bandwidth.
Resolution of DDoS attacks is a complex, time-consuming, and expensive task. It limits the bandwidth of network infrastructure with consequent scalability issues. In an On-Premis world, these tasks require manual intervention.
Amazon Shield provides two subscriptions:
These two subscriptions offer a lot of mitigation techniques at the infrastructure and application layers. For example, the Standard subscription protects your Amazon Route 53 Hosted Zones from infrastructure layer DDoS attacks, including reflection attacks or SYN floods that frequently target your DNS. A variety of techniques, such as header validations and priority-based traffic shaping, automatically mitigate these attacks. The Advanced subscription provides even greater protection, visibility into attacks on your Route 53 infrastructure, and help from the response team for extreme scenarios.
There are other mitigation techniques for EC2, CloudFront, and other resources that we avoid mentioning in this general overview.
Amazon AWS supports customers in a lot of industries. Sometimes these industries create standards in order to create a legal security baseline for the participant in that industries. There are a lot of standards and Amazon AWS helps its customer to be compliant with them.
Photo from AWS Cloud Practitioner Essentials (2nd Edition) course
Depending on the AWS resource and the Shared Responsibility Model the work to be compliant can be under AWS or customer responsibility. In any case, the customer needs:
When the Shared Responsibility model assigns these activities to AWS it provides reports about the current infrastructure and data status, the list of deviations with the risk assessment, and the prioritization. In some cases, AWS provides also a resolution for these risks.
In conclusion, this article provides an overview of how security and compliance are managed by the AWS platform. Its goal is to let you understand how seriously Amazon manages security in its platform, what are the tools that help customer to secure their infrastructure and data.