Week 6 AcademyCloudFoundations_Module_04-Security
Week 6 AcademyCloudFoundations_Module_04-Security
Topics Activities
• AWS shared responsibility model • AWS shared responsibility model activity
• AWS Identity and Access Management (IAM)
• Securing a new AWS account Demo
• Securing accounts • Recorded demonstration of IAM
• Securing data on AWS
• Working to ensure compliance
Lab
• Introduction to AWS IAM
Knowledge
check
2
Module objectives
3
Module 4: AWS Cloud Security
• Loss of trust
• https://www.bbc.co.uk/news/technology-53771942
• Expense/time to resolve 6
AWS shared responsibility model
7
AWS responsibility: Security of the cloud
AWS responsibilities:
• Physical security of data centers
AWS services • Controlled, need-based access
• https://www.theregister.com/2022/01/13/
aws_planning_app_oxford/
Compute Storage Database Networking
• Hardware and software infrastructure
AWS Global Regions • Storage decommissioning, host operating
Infrastructure system (OS) access logging, and auditing
Availability Zones
Edge locations
• Network infrastructure
• Intrusion detection
• Virtualization infrastructure
• Instance isolation
8
Customer responsibility: Security in the
cloud
Customer responsibilities:
• Amazon Elastic Compute Cloud (Amazon EC2)
Customer data instance operating system
• Including patching, maintenance
Applications, IAM • Applications
• Passwords, role-based access, etc.
Operating system, network, and firewall configuration
• Security group configuration
9
Service characteristics and security
responsibility
Example services managed by the customer Infrastructure as a service (IaaS)
• Customer has more flexibility over configuring
networking and storage settings
• Customer is responsible for managing more
Amazon Amazon Amazon aspects of the security
EC2 Elastic Block Virtual Private Cloud
(Amazon VPC) • Customer configures the access controls
Store (Amazon
EBS)
11
Security Consideration
• A simple example to follow for the shared responsibility model is a
house which YOU rent
• The landlord provides
• Locks on double glazed windows
• 5 point lock on the door
• Burglar alarm
• Security camera giving a 360 view of the property
• You then go out on Friday evening and leave the front door open!
• When you get burgled is this the fault of the landlord ?
Security Consideration
• A simple example to follow for the shared responsibility model is a
house which YOU rent
• The landlord provides
• Locks on double glazed windows
• 5 point lock on the door
• Burglar alarm
• Security camera giving a 360 view of the property
• You then go out of Friday evening and leave the front door open!
• When you get burgled is this the fault of the landlord ?
• Simply NO, they have provided everything you simply did not
use what is provided
• This is similar to the Shared responsibility model
• You need to decide what is right for YOUR company in
terms of security in the cloud
Shared Responsibility Summary
• Example company for security !
Activity: AWS shared
responsibility model
15
Activity: Scenario 1 of 2
Consider this deployment. Who is responsible – AWS or the customer?
AWS Cloud 1. Upgrades and patches to the 6. Oracle upgrades or patches If
Virtual Private Cloud operating system on the EC2 the Oracle instance runs as an
instance? Amazon RDS instance?
(VPC)
• ANSWER: The customer • ANSWER: AWS
2. Physical security of the data 7. Oracle upgrades or patches If
center? Oracle runs on an EC2
• ANSWER: AWS instance?
Amazon Simple Amazon Oracle • ANSWER: The customer
Storage EC2 instance 3. Virtualization infrastructure?
Service • ANSWER: AWS 8. S3 bucket access
(Amazon S3) configuration?
4. EC2 security group settings? • ANSWER: The customer
AWS Global Infrastructure • ANSWER: The customer
5. Configuration of applications
that run on the EC2 instance?
• ANSWER: The customer
16
Activity: Scenario 2 of 2
Consider this deployment. Who is responsible – AWS or the customer?
Secure Shell
1. Ensuring that the AWS 6. Ensuring network isolation
(SSH) keys
Management Console is not between AWS customers' data?
AWS Command hacked? • ANSWER: AWS
AWS Line Interface • ANSWER: AWS
Management 7. Ensuring low-latency network
(AWS CLI) 2. Configuring the subnet? connection between the web
Console Internet
• ANSWER: The customer server and the S3 bucket?
VPC gateway • ANSWER: AWS
3. Configuring the VPC?
Subnet • ANSWER: The customer 8. Enforcing multi-factor
authentication for all user
4. Protecting against network logins?
outages in AWS Regions? • ANSWER: The customer
Web server on
Amazon EC2 • ANSWER: AWS
5. Securing the SSH keys
• ANSWER: The customer
S3 bucket
with objects
17
• AWS and the customer share security
Section 1 key responsibilities:
• AWS is responsible for security of the cloud
takeaways • Customer is responsible for security in the cloud
• AWS is responsible for protecting the
infrastructure—including hardware, software,
networking, and facilities—that run AWS Cloud
services
• For services that are categorized as
infrastructure as a service (IaaS), the
customer is responsible for performing
necessary security configuration and
management tasks
• For example, guest OS updates and security patches,
firewall, security group configurations
18
Module 4: AWS Cloud Security
20
AWS Identity and Access Management (IAM)
21
IAM: Essential components
When you define an IAM user, you select what types of access the user is permitted to use.
Programmatic access
• Authenticate using:
• Access key ID
AWS CLI AWS Tools
• Secret access key and SDKs
• Provides AWS CLI and AWS SDK access
23
IAM MFA
• MFA provides increased security.
MFA token
25
https://medium.com/@richb_/easy-two-factor-authentication-2fa-with-google-authenticator-php-108388a1ea23
Authorization: What actions are
permitted
After the user or application is connected to the AWS account, what are they allowed to do?
EC2
Full
instances
access
Read
-only S3 bucket
IAM user,
IAM group,
or IAM role
IAM policies
26
IAM: Authorization
Note: The scope of IAM service configurations is global. Settings apply across all AWS Regions.
27
IAM policies
• Resource-based policies
• Attached to a resource (such as an S3 bucket)
28
IAM policy example
{
"Version": "2012-10-17", Explicit allow gives users access to a specific
"Statement":[{ DynamoDB table and…
"Effect":"Allow",
"Action":["DynamoDB:*","s3:*"],
"Resource":[
"arn:aws:dynamodb:region:account-number-without-hyphens:table/table-name",
"arn:aws:s3:::bucket-name", …Amazon S3
"arn:aws:s3:::bucket-name/*"]
buckets.
},
Explicit deny ensures that the users cannot use any other AWS
{
actions or resources other than that table and those buckets.
"Effect":"Deny",
"Action":["dynamodb:*","s3:*"],
"NotResource":["arn:aws:dynamodb:region:account-number-without-hyphens:table/table-name”,
"arn:aws:s3:::bucket-name",
"arn:aws:s3:::bucket-name/*"]
} An explicit deny statement takes
] precedence over an allow statement.
}
29
Resource-based policies
Implicit deny
Yes Yes
Deny Allow
31
IAM groups
33
Example use of an IAM role
34
Example use of an IAM role
35
• IAM policies are constructed with
Section 2 key JavaScript Object Notation (JSON) and
define permissions.
takeaways • IAM policies can be attached to any IAM entity.
• Entities are IAM users, IAM groups, and IAM
roles.
• An IAM user provides a way for a person,
application, or service to authenticate to
AWS.
• An IAM group is a simple way to attach
the same policies to multiple users.
• An IAM role can have permissions policies
attached to it, and can be used to delegate
temporary access to users or applications.
36
Recorded
demo: IAM
37
Module 4: AWS Cloud Security
39
Securing a new AWS account: Account root
user
Step 1: Stop using the account root user as soon as possible.
• The account root user has unrestricted access to all your resources.
• The AWS Cost and Usage Report tracks your AWS usage and provides
estimated charges associated with your AWS account, either by the hour or by
the day.
43
Thank you
This work may not be reproduced or redistributed, in whole or in part, without prior written permission from Amazon Web Services, Inc. Commercial copying, lending, or
selling is prohibited. Corrections or feedback on the course, please email us at: [email protected]. For all other questions, contact us at:
https://aws.amazon.com/contact-us/aws-training/. All trademarks are the property of their owners.