Course: AWS Cloud Practitioner Essentials - 6. Security

July 26th, 2022

Shared responsibility model

Compliance

Identity and Access Management (IAM)

  • user

  • policy

  • group

  • role

AWS Organization

Application Security

  • Web Application Firewall (WAF)

  • Shield - DDoS

  • Inspector - automated security assessment

  • Key Management Service (KMS) - cryptographic keys (not secrets, not certificates)

  • GuardDuty - intelligent threat detection

 


Shared Responsibility Model

no description for image available

 

no description for image available

 

no description for image available

 


 

Compliance

compliance: prove

https://aws.amazon.com/compliance/

 

using a compliant service is not sufficient to mkae a customer compliant

 


 

Identity and Access Management (IAM)

manage access to AWS services and resources

no description for image available

 

AWS account root user

rarely / never use root

any use of root, is so rare, that it should be investigated as a security event

 

IAM Users

identity representing person / application

best practice: create users for each person, don't share accounts with other ppl

 

IAM Policies

document that grants or denies permissions

best practice: principle of least privilige

 

IAM groups

collection of users

best practice: use groups

users can be in multiple groups

 

access conflicts

deny always wins

https://docs.aws.amazon.com/IAM/latest/UserGuide/reference_policies_evaluation-logic.html

 

IAM roles

identity you can assume to gain temporary access to permissions

no description for image available

you can only have one role at a time

 

roles vs groups

https://docs.aws.amazon.com/IAM/latest/UserGuide/id_roles_common-scenarios_aws-accounts.html

roles  (requires technical effort)

  • single sign on

  • federated identity

simple starting point: groups

  • stops scaling

 

technical effort

  • single sign on

  • federated identity

 


AWS Organization

create & manage AWS accounts & groups of AWS accounts

no description for image availableno description for image available

 


 

Application Security

Web Application Firewall (WAF)

no description for image available

(cf network firewall on OSI layer 3-4, but on OSI layer 7 application)

 

Shield - DDoS

no description for image available

not optional, aways on

no description for image available

optional: Shield advanced

 

Inspector

no description for image available

 

Key Management Service (KMS)

no description for image available

NOT certificate

 

GuardDuty - intelligent threat detection

no description for image available