Academy Cloud Foundations (ACF) 1.0.5 (EN): Module 03 Student Guide 3
User Manual:
Open the PDF directly: View PDF .
Page Count: 101
Download | |
Open PDF In Browser | View PDF |
Academy Cloud Foundations (ACF) Module 03 Student Guide Version 1.0.5 100-ACFNDS-10-EN-SG © 2018 Amazon Web Services, Inc. or its affiliates. All rights reserved. This work may not be reproduced or redistributed, in whole or in part, without prior written permission from Amazon Web Services, Inc. Commercial copying, lending, or selling is prohibited. Corrections or feedback on the course, please email us at: aws-course-feedback@amazon.com. For all other questions, contact us at: https://aws.amazon.com/contact-us/aws-training/. All trademarks are the property of their owners. AWS Academy Academy Cloud Foundations (ACF) Contents Module 03: AWS Cloud Security © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 4 3 AWS Academy Module 03: AWS Cloud Security Welcome to Module 3 – AWS Cloud Security. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 4 1 AWS Academy Module 03: AWS Cloud Security Security is of the utmost importance to AWS. AWS delivers a scalable cloud computing environment designed for high availability and dependability, while providing the tools that enable you to run a wide range of applications. Helping to protect the confidentiality, integrity, and availability of your systems and data is critical to AWS, as is maintaining customer trust and confidence. This module is intended to provide an introduction to AWS’s approach to security, including the controls in the AWS environment and some of the products and features that AWS makes available to customers to meet their security objectives. In part one, we will review the Shared Responsibility Model. In part two, we’ll examine IAM including users, groups, and roles. In part three, we’ll explore AWS Trusted Advisor. In part four, we’ll explore AWS CloudTrail. In part five, we’ll explore AWS Config. In part six, we’ll review Day One best practices. In parts seven and eight, we’ll discuss security, compliance issues and resources. An optional step by step walk though of Day One is available at the end of this module. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 5 2 AWS Academy Module 03: AWS Cloud Security The goal of this module is to familiarize you with all of the security considerations for your cloud solution. We’ll review security tools and best practices to help you understand key security concepts related to the Shared Responsibility Model and IAM. In this module, we’ll describe the AWS Shared Responsibility Model, examine IAM users, groups and roles and describe different types of security credentials. We’ll review the AWS Trusted Advisor checks and discuss security compliance. The demonstration of Day 1 best practices will walk you through the best practices for setting up an account from beginning to end. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 6 3 AWS Academy Module 03: AWS Cloud Security Introducing Part 1, the AWS Shared Responsibility Model. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 7 4 AWS Academy Module 03: AWS Cloud Security AWS provides the same approach to security that companies have been using for decades, while allowing the flexibility and low cost of cloud computing. There is nothing inherently inconsistent about providing on-demand infrastructure while also providing the security isolation that companies expect in their existing, privately owned environments. Once the customer starts using AWS, Amazon shares the responsibility of securing the customer’s data in AWS cloud with its customers, making AWS security a shared responsibility. This concept is known as the Shared Responsibility Model. Let’s take a closer look at who’s responsible for which aspects of security in the Shared Responsibility Model. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 8 5 AWS Academy Module 03: AWS Cloud Security AWS is responsible for security of the cloud. But what does that mean? Under the Shared Responsibility Model, AWS operates, manages, and controls the components from the host operating system and virtualization layer down to the physical security of the facilities in which the services operate. It means that AWS is responsible for protecting the global infrastructure that runs all of the services offered in the AWS cloud which include AWS Regions, Availability Zones, and Edge Locations. For example, AWS handles the security of the cloud, specifically the physical infrastructure that hosts your resources, which include: • Physical security of data centers with controlled, need-based access, located in nondescript facilities, 24/7 security guards, two-factor authentication, access logging and review, video surveillance, and disk degaussing and destruction. • Hardware infrastructure including servers, storage devices, and other appliances that Amazon Web Services rely on. • Software infrastructure which hosts operating systems, service applications, and virtualization software. • Network infrastructure including routers, switches, load balancers, firewalls, and cabling. This includes continuous network monitoring at external boundaries, secure access points, and redundant infrastructure with intrusion detection. • Virtualization infrastructure including instance isolation. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 9 6 AWS Academy Module 03: AWS Cloud Security Protecting this infrastructure is the number one priority for AWS. While you can not visit AWS data centers or offices to see this protection firsthand, Amazon provides several reports from third-party auditors who have verified our compliance with a variety of computer security standards and regulations. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 10 6 AWS Academy Module 03: AWS Cloud Security In addition to protecting this global infrastructure, AWS is responsible for the security configuration of its products that are considered foundational, which include Compute, Storage, Database, and Networking. Managed services include Amazon DynamoDB, Amazon Relational Database Service (or RDS), Amazon Redshift, Amazon Elastic MapReduce, Amazon WorkSpaces, and others. For these services, AWS will handle basic security tasks like Operating System and database patching, firewall configuration, and Disaster Recovery. As a customer, this is valuable because you do not need to worry about patching, maintaining, or installing antivirus software. Amazon takes care of it so the customer can focus on what goes into the environment. For most of the managed services, the customer needs to configure logical access controls and protect account credentials. Some managed services may require additional tasks such as setting up database user accounts, but overall the security configuration work is performed by AWS. Here are some examples of controls that are managed by AWS, AWS customers, or both. Inherited Controls - Controls that a customer fully inherits from AWS, such as physical and environmental controls. Shared Controls - Controls that apply to both the infrastructure layer and customer layers, but in completely separate contexts or perspectives. In a shared control, AWS provides the requirements for the infrastructure, and the customer must provide their own control implementation within their use of AWS services. Examples include: • Patch Management - AWS is responsible for patching and fixing flaws within the infrastructure, but customers are responsible for patching their guest OS and applications. • Configuration Management - AWS maintains the configuration of its infrastructure devices, but customers are responsible for configuring their own guest operating systems, databases, and © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 11 7 AWS Academy • • • Module 03: AWS Cloud Security applications. Awareness and Training - AWS trains AWS employees, but a customer must train their own employees. Customer-specific - Controls that are solely the responsibility of the customer based on the application they are deploying within AWS services. Service and Communications Protection or Zone Security, which may require a customer to route or zone data within specific security environments. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 12 7 AWS Academy Module 03: AWS Cloud Security While the cloud infrastructure is secured and maintained by AWS, customers are responsible for security of everything they put in the cloud. The customer is responsible for what is implemented using AWS and for the applications connected to AWS. The security steps you need to take depend on the services you use and the complexity of your system. This includes selecting the instance operating system, the application, security groups, firewalls, network configuration and account management. When using AWS services, customers maintain complete control over their content and are responsible for managing critical content security requirements, including: • • • • What content they choose to store on AWS. Which AWS services are used with the content? In what country that content is stored. The format and structure of that content and whether it is masked, anonymized, or encrypted. • Who has access to that content and how those access rights are granted, managed, and revoked? Customers retain control of what security they choose to implement to protect their own data, environment, applications, IAM, and operating systems. This basically means that the Shared Responsibility Model changes depending on the AWS services the customer uses. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 13 8 AWS Academy Module 03: AWS Cloud Security In order to visualize the AWS Shared Responsibility Model, let’s take a look at an example. Let’s say a customer is using Amazon S3 for storage and Amazon Workspaces for desktop and application streaming. They also have a Virtual Private Cloud (VPC), which consists of their Amazon EC2 instance and Oracle database instance. The customer is responsible for managing the guest operating system, the applications, and security groups. AWS is responsible for protecting the global infrastructure that runs all of the services offered in the AWS cloud. The AWS global infrastructure is designed and managed according to security best practices as well as a variety of security compliance standards. AWS products that fall into the category of Infrastructure as a Service (IaaS), such as Amazon EC2 and Amazon VPC, are completely under your control and require you to perform all the necessary security configuration and management tasks. For example, for EC2 instances, you are responsible for management of the guest OS, which includes updates and security patches, any application software or utilities you install on the instances, and the configuration of the AWS-provided firewall, also called a security group, on each instance. These are basically the same security tasks that you are used to performing no matter where your servers are located. Amazon RDS database instances like Oracle are pre-configured with parameters and settings appropriate for the engine and class you have selected. AWS manages time-consuming database administration tasks including provisioning, backups, software patching, monitoring, and hardware scaling. You focus on the tasks need for application development. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 14 9 AWS Academy Module 03: AWS Cloud Security Amazon WorkSpaces is a fully managed, secure Desktop-as-a-Service (DaaS) solution. You provision virtual, cloud-based Microsoft Windows desktops for your users, providing them access to the documents, applications, and resources they need anywhere, anytime, and from any supported device. It is best practice for customers to protect their AWS account credentials and set up individual user accounts with IAM so that each user has their own credentials. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 15 9 AWS Academy Module 03: AWS Cloud Security Let’s quickly review the key points about the shared responsibility model: • The Shared Responsibility Model consists of AWS and the customer working together to secure data in the cloud. AWS is responsible for security of the cloud, while the customer is responsible for security in the cloud. • Customers have full control of what security measures they choose to implement, given the AWS services they are using. • Customers can use AWS Service Catalog to create and manage catalogs of IT services that have been approved for use on AWS. • AWS products that fall into the category of IaaS, such as Amazon EC2 and Amazon VPC, are completely under the customer’s control and that requires them to perform all of the necessary security configuration and management tasks. • By applying the Shared Responsibility Model, AWS and its customers can ensure secure and compliant data. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 16 10 AWS Academy Module 03: AWS Cloud Security Introducing Part: AWS Identity and Access Management (or IAM). © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 17 11 AWS Academy Module 03: AWS Cloud Security IAM allows you to control access to compute, storage, database, and application services in the AWS cloud. This is known as authentication and how they can use resources is known as authorization. IAM uses access control concepts you will already be familiar with such as users, groups, and permissions so you can specify which users get to access which services. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 18 12 AWS Academy Module 03: AWS Cloud Security IAM is a tool to centrally manage access to launching, configuring, managing, and terminating your resources. It allows extremely granular control over access permissions, not just based on resource, but all the way down to determining exactly which Application Programming Interface (API) calls for each service can be made. Think of the access control concepts you’re already familiar with such as users (think of these as your end users), groups (think of these as a collection of users by job function), permissions, which can be applied to users or groups, and roles (think of these as trusted entities). That’s exactly what IAM uses which makes it so powerful! Using IAM, you can create and manage AWS users and groups, and use permissions to allow and deny their access to AWS resources. IAM allows you to: • Manage IAM users and their access – You can create users in IAM, assign them individual security credentials (in other words, access keys, passwords, and multi-factor authentication devices), or request temporary security credentials to provide users access to AWS services and resources. You can manage permissions in order to control which operations a user can perform. • Manage IAM roles and their permissions – You can create roles in IAM and manage permissions to control which operations can be performed by the entity, or AWS service, that assumes the role. • Manage federated users and their permissions – You can enable identity federation to allow © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 19 13 AWS Academy Module 03: AWS Cloud Security existing identities (users, groups, and roles) from your corporate directory to access the AWS Management Console, call AWS APIs, and access resources, without the need to create an IAM user for each identity. You can manage what resources can be accessed by who and how they can be accessed, such as terminating EC2 instances and define required credentials based on context, including who is accessing which service and what they are trying to do. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 20 13 AWS Academy Module 03: AWS Cloud Security You use different types of security credentials depending on how you interact with AWS. For example, to sign in to the console, you use a user name and password. In contrast, to make programmatic calls to AWS Application Programming Interface (API) actions, you use access keys. The table on the slide summarizes the different types of AWS security credentials and when you might use each one. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 21 14 AWS Academy Module 03: AWS Cloud Security When you first create an AWS account, you begin with a single sign-in identity that has complete access to all AWS services and resources in the account. This identity is called the AWS account root user and is accessed by signing in with the email address and password that you used to create the account. AWS root accounts have full access to all resources in the account and you cannot control the privileges of the root account credentials. Therefore, AWS strongly recommends that you not use root account credentials for day-to-day interactions with AWS. Use IAM to create additional users and assign permissions to these users, following the least privilege principle. With IAM, you can securely control access to AWS services and resources for users in your AWS account. For example, if you require administrator-level permissions, you can create an IAM user, grant that user full access, and then use those credentials to interact with AWS. Later, if you need to revoke or modify your permissions, you can delete or modify any policies that are associated with that IAM user. Additionally, if you have multiple users that require access to your AWS account, you can create unique credentials for each user and define who has access to which resources. In other words, you don't need to share credentials. For example, you can create IAM users with read-only access to resources in your AWS account and distribute those credentials to users that require read access. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 22 15 AWS Academy Module 03: AWS Cloud Security When adding users, you get to select how users will access AWS. There are two different types of access you can assign users: Programmatic access and AWS Management Console access. Programmatic access enables an access key ID and secret access key for the AWS API, Command Line Interface (CLI), SDK, and other development tools. Another option is to give the user console access, which allows them to sign in to the console. The console provides a simple web interface for AWS. You can log in using your AWS account name and password. If you’ve enabled Multi-Factor Authentication (MFA), you will be prompted for your device’s authentication code. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 23 16 AWS Academy Module 03: AWS Cloud Security After a user has been authenticated, they then must be authorized to access an AWS service. In order to assign permission to a user, group or role, you have to create an IAM policy, which is a document that explicitly lists permissions. There are no default permissions. All actions are denied by default (implicit deny) unless they are explicitly allowed. Any actions that you didn’t explicitly allow are denied. Any actions that you explicitly deny are always denied. The principle of least privilege is an important concept in computer security, promoting minimal user profile privileges based on users' job necessities. When you create IAM policies, follow the standard security advice of granting least privilege, that is, granting only the permissions required to perform a task. Determine what users need to do and then craft policies for them that let the users perform only those tasks. Start with a minimum set of permissions and grant additional permissions as necessary. Doing so is more secure than starting with permissions that are too lenient and then trying to tighten them later. Note that IAM is global. It is not on a per region basis. It applies across all regions. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 24 17 AWS Academy Module 03: AWS Cloud Security AWS services and resources can be accessed using the console, CLI, or through SDKs and APIs from a wide range of supported environments. For increased security, we recommend enabling Multi Factor Authentication (MFA). With MFA, users and systems have to be authenticated before they can access AWS services and resources. There are two options for authentication devices: hardware devices and virtual MFA-compliant applications (Google Authenticator or Authy 2-Factor Authentication). SMS is another authentication alternative where you use your mobile device that can receive Short Message Service (SMS) messages to receive a code. The AWS Security Token Service (STS) is a web service that also enables you to request temporary, limited-privilege credentials for IAM users or for users that you authenticate. Visit the link to learn more. https://docs.aws.amazon.com/IAM/latest/UserGuide/id_credentials_mfa.html. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 25 18 AWS Academy Module 03: AWS Cloud Security An IAM user is an entity that you create in AWS that provides a way to interact with AWS. An IAM user primarily gives people you work with identities that they can use to sign in to the console and make requests to AWS services. Newly created IAM users have no default credentials to use to authenticate themselves and access AWS resources. You first need to assign security credentials to them for authentication and then attach permissions authorizing them to perform any AWS actions or to access any AWS resources. The credentials you create for users are what they use to uniquely identify themselves to AWS. An IAM user is really just an identity with associated permissions. You might create an IAM user to represent an application that must have credentials in order to make requests to AWS. An application might have its own identity in your account and its own set of permissions, the same way that processes have their own identities and permissions in an operating system like Windows or Linux. A best practice is to create a separate IAM user account with administrative privileges instead of using the root account user. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 26 19 AWS Academy Module 03: AWS Cloud Security A group is a collection of IAM users. Groups let you specify permissions for a collection of users, which can make it easier to manage the permissions for those users. For example, you could have a group called Developers and give that group the types of permissions that developers typically need. Any user in that group automatically has the permissions that are assigned to the group. If a new user joins your organization and should have developer privileges, add that user to the Developers group. That automatically gives them the appropriate permissions. Similarly, if a person changes jobs in your organization, instead of editing that user's permissions, you can remove him or her from the old group and add him or her to the new group. Important characteristics of groups: • A group can contain many users, and a user can belong to multiple groups. • Groups can't be nested; they can contain only users, not other groups. • There's no default group that automatically includes all users in the AWS account. If you want to have a group like that, you need to create it and assign each new user to it. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 27 20 AWS Academy Module 03: AWS Cloud Security Federated users do not have permanent identities in your AWS account the way that IAM users do. To assign permissions to federated users, you can create an entity referred to as a role. A role lets you define a set of permissions to access the resources that a user or service needs, but the permissions are not attached to an IAM user or group. Instead, at run time, applications or AWS services can programmatically assume a role. When a role is assumed, AWS returns temporary security credentials that the user or application can use to make programmatic requests to AWS. Consequently, you don’t have to share long-term security credentials, for example, by creating an IAM user, for each entity that requires access to a resource. You create a role in the AWS account that contains the resources that you want to allow access to. When you create the role, you specify two policies: • The trust policy specifies who is allowed to assume the role, such as the trusted entity or principal. • The access (or permissions) policy defines what actions and resources the principal is allowed access to. The principal can be an AWS account, an AWS service, such as Amazon EC2, a SAML provider, or an Identity Provider (IdP) that may include Login with Amazon, Facebook, or Google. The principal can also be an IAM user, group, or role from other AWS accounts, including the ones not owned by you. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 28 21 AWS Academy Module 03: AWS Cloud Security Policies give you the opportunity to fine-tune privileges granted to IAM users, groups, and roles. Because policies are stored in JSON format, they can be used in conjunction with a version control system. It’s a good idea to define least-privilege access to each user, group, or role. That way, you can customize access to specific resources using an authorization policy. When determining whether permission is allowed, IAM first checks for an explicit denial policy. If one does not exist, it then checks for an explicit allow policy. If neither an explicit deny or explicit allow policy exists, IAM reverts to the default: implicit deny. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 29 22 AWS Academy Module 03: AWS Cloud Security An IAM policy is a formal statement of one or more permissions. Policies can be attached to any IAM entity, which includes a user, group, role, or resource. For example, you can attach a policy to your AWS resources to block all requests that do not come from an approved Internet Protocol (IP) address range. Policies specify what actions are allowed, which resources to allow the actions on, and what the effect will be when the user requests access to the resources. The order in which the policies are evaluated has no effect on the outcome of the evaluation. All policies are evaluated, and the result is always that the request is either allowed or denied. When there is a conflict, the most restrictive policy wins. There are two types of IAM policies. Identity-based policies are permission policies that you can attach to a principal, or identity, such as an IAM user, role or group. These policies control what actions that identity can perform, on which resources, and under what conditions. Identity-based policies can be further categorized as: • Managed policies: Standalone identity-based policies that you can attach to multiple users, groups, and roles in your AWS account • Inline policies: Policies that you create and manage and that are embedded directly into a single user group or role. Resource-based policies are JSON policy documents that you attach to a resource, such as an Amazon S3 Bucket. These policies control what actions a specified principal can perform on that resource and under what conditions. Resource-based policies are inline policies. There are not managed resource-based policies. For more information, select the link. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies.html © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 30 23 AWS Academy Module 03: AWS Cloud Security When attaching the same policy to multiple IAM users, put the users in a group and attach the policy to the group instead. Additionally, you can use the IAM policy simulator to test and troubleshoot IAM and resource-based policies. Select the link to learn more about the IAM policy simulator. https://docs.aws.amazon.com/IAM/latest/UserGuide/access_policies_testing-policies.html © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 31 23 AWS Academy Module 03: AWS Cloud Security The policy gives users access to only the following: • The DynamoDB table whose name is represented by table-name. • The AWS account's corporate Amazon S3 bucket, whose name is represented by bucketname and all the objects that it contains. The policy includes an explicit deny ("Effect":"Deny") element. In conjunction with the NotResource element, which helps to ensure that the users can not use any AWS actions or resources except those specified in the policy, even if permissions have been granted in another policy. An explicit deny statement takes precedence over an allow statement. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 32 24 AWS Academy Module 03: AWS Cloud Security It’s important to note that one policy can be assigned to an IAM user, IAM group, and IAM roles. Now that we have covered the basic concepts of IAM, let’s log in to the console, create a user, assign the user to a group, and apply permissions. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 33 25 AWS Academy Module 03: AWS Cloud Security Now, please take a moment to review the IAM console demonstration located in the learning management system. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 34 26 AWS Academy Module 03: AWS Cloud Security Now let’s look at some additional service that can be used to improve overall security and compliance. AWS Trusted Advisor is like your customized cloud expert. It provides four of the most popular performance and security recommendations to all AWS customers. Let’s look at details and a case study to understand this service. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 35 27 AWS Academy Module 03: AWS Cloud Security AWS Trusted Advisor is a an online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS environment. It provides best practices, or checks, in five categories including: 1. Cost Optimization: See how you can save money on AWS by eliminating unused and idle resources or making commitments to reserved capacity. 2. Performance: Improve the performance of your service by checking your service limits, ensuring you take advantage of provisioned throughput, and monitoring for over-utilized instances. 3. Security: Improve the security of your application by closing gaps, enabling various AWS security features, and examining your permissions. 4. Fault Tolerance: Increase the availability and redundancy of your AWS application by taking advantage of automatic scaling, health checks, multiple Availability Zones, and backup capabilities. 5. Service Limits: Checks for service usage that is more than 80% of the service limit. The status of the check is shown by using color coding on the dashboard page: • Red: Action is recommended • Yellow: Investigation is recommended • Green: No problem has been detected You can visit the Trusted Advisor Console by selecting the link. https://console.aws.amazon.com/trustedadvisor/ © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 36 28 AWS Academy Module 03: AWS Cloud Security AWS Trusted Advisor provides popular performance and security recommendations to all AWS customers. These six Trusted Advisor checks are available to all customers at no cost: 1. Service Limits 2. Security Groups – Specific Ports Unrestricted 3. IAM Use 4. Multi-Factor Authentication (MFA) on Root Account 5. Elastic Block Store (EBS) Public Snapshots 6. Relational Database Service (RDS) Public Snapshots The complete set of checks and guidance is available with Business and Enterprise Support plans. AWS Trusted Advisor helps you to provision your resources following best practices to improve system performance and reliability, increase security, and look for opportunities to save money. For more information about Trusted Advisor best practices, select the link. https://aws.amazon.com/premiumsupport/trustedadvisor/best-practices/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 37 29 AWS Academy Module 03: AWS Cloud Security AWS Trusted Advisor provides a suite of features for you to customize recommendations and to proactively monitor your AWS resources including: • Trusted Advisor Notifications allows you stay up-to-date with your AWS resource deployment. You will be notified by a weekly email when you opt in for this service when you opt in for this free service. • You can use IAM to control access to specific checks or check categories. • You can retrieve and refresh Trusted Advisor results programmatically using the AWS Support API. • Action Links are hyperlinks on items within a Trusted Advisor report that take you directly to the console, where you can take action on the Trusted Advisor recommendations. • With the Recent Changes feature, you can track recent changes of check status on the console dashboard. The most recent changes appear at the top of the list to bring them to your attention. • The Exclude Items feature allows you to customize the Trusted Advisor report. You can exclude items from the check result if they are not relevant. • You can refresh individual checks or refresh all the checks at once by clicking the Refresh All button in the summary dashboard. A check is eligible for 5-Minute Refresh after it was last refreshed. For more information about Trusted Advisor select the link. https://aws.amazon.com/premiumsupport/trustedadvisor/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 38 30 AWS Academy Module 03: AWS Cloud Security Let’s review a case study by Hungama, who has used AWS for server and storage management since 2008, saving 33% on their monthly bill. They deliver content to consumers in 47 countries across mobile, Internet and Internet Protocol Television services. They use Amazon S3 to host more than 60 terabytes of content and Amazon EC2 and Amazon RDS for server and storage management. As the company grew rapidly, more departments used AWS for development, causing an increase in monthly costs. For more information on how Hungama uses AWS, select the link. https://aws.amazon.com/solutions/case-studies/hungama/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 39 31 AWS Academy Module 03: AWS Cloud Security Three AWS Trusted Advisor checks were particularly helpful in optimizing usage and cutting costs. The Low Utilization Amazon EC2 Instances check revealed over-provisioned instance sizes and instances spun up for special projects that were not terminated after completion. In response, the audit team used this information to right-size their instances. They also categorized production and development servers and automated the process of shutting down development servers during non-business hours. The Reserved Instance Optimization check identified additional opportunities for optimization of the RI instances they had purchased. In response, Hungama changed how they reserved their instances and based reservations on the specific usage patterns of their different instance categories (dev/prod/test/etc.). The Underutilized Amazon EBS volumes check identified a number of unused or underutilized EBS volumes that were often leftover from previous test projects. In response, the audit team created snapshots of many of the underutilized EBS volumes, which they stored on Amazon S3, and then deleted the volumes. This resulted in a reduction of over 90% on the number of snapshots generated weekly. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 40 32 AWS Academy Module 03: AWS Cloud Security In summary, AWS Trusted Advisor is an online tool that acts like a customized cloud expert, helping you to configure your resources to follow best practices. Trusted Advisor inspects your AWS environment to help close security gaps, and finds opportunities to save money, optimize costs, improve system performance, and increase reliability. This increases security with fault tolerance and service limits. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 41 33 AWS Academy Module 03: AWS Cloud Security Introducing part 4: AWS CloudTrail. AWS CloudTrail enables you to simplify governance, compliance, and risk auditing. CloudTrail accelerates analysis of operational and security issues by providing visibility into both API and non-API actions in your AWS account. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 42 34 AWS Academy Module 03: AWS Cloud Security CloudTrail is a web service that records API calls for your account and delivers log files to you. CloudTrail is a crucial tool for simplifying governance, compliance, and risk auditing. Everything in AWS is an API call and CloudTrail logs the API calls made in an AWS account across regions whether that action was performed via the CLI, an SDK, the console, or an API directly. This includes actions like starting and stopping instances, creating or modifying Amazon RDS databases, or uploading a file to Amazon S3. This logging accelerates analysis of operational and security issues by providing visibility into actions in your AWS account. Amazon CloudWatch is a monitoring service for AWS cloud resources that can be used to collect and track metrics, collect and monitor log files, set alarms, and automatically react to AWS resource changes. Integrating CloudTrail with Amazon CloudWatch provides comprehensive, secure, and searchable event history of activities made by the console, AWS SDKs, command line tools, and other AWS services. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 43 35 AWS Academy Module 03: AWS Cloud Security CloudTrail has several key benefits! It increases your visibility into user and resource activity that allows you to identify who did what and when in your account. Compliance audits are simplified because they are automatically recording and storing event logs. This allows you to search through log data, identify actions that are out of compliance, accelerate investigations into incidents, and then expedite a response. Because you are able to capture a comprehensive history of changes made within your account, you can analyze and troubleshoot any operational issues in your account. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 44 36 AWS Academy Module 03: AWS Cloud Security How does this work? First, an activity happens in your account. Next, CloudTrail captures and records that activity and calls it a CloudTrail event. The event will contain details about who performed the request, the date and time of the request, the source IP and how the request was made, the action performed, the region in which the action was taken, and the response. By default, the logs are stored for 7 days. The activity log can be sent to other AWS services, so the activity history can be retained for as long as you like. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 45 37 AWS Academy Module 03: AWS Cloud Security To get the most out of CloudTrail, turn on CloudTrail log file validations. When you are configuring CloudTrail, you can aggregate all log files to a single Amazon S3 bucket. Additionally, a configuration that applies to all regions ensures that your settings are applied consistently across all existing and newly launched regions. You can also validate the integrity of log files by detecting whether or not they were changed or deleted after they were sent to the S3 bucket. It is also a good idea to run MFA to delete a CloudTrail bucket. This can be accomplished by restricting access to where they are stored. Lastly, integrating this service with Amazon CloudWatch enables you to define actions to execute when specific events are logged by CloudTrail. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 46 38 AWS Academy Module 03: AWS Cloud Security Now, let’s look at AWS Config to see how it can help with security. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 47 39 AWS Academy Module 03: AWS Cloud Security AWS Config is a fully managed service that enables you to assess, audit, and evaluate the configuration of your AWS resources. It provides continuous monitoring, continuous assessment, change management and operation troubleshooting. AWS Config provides you with an AWS resource inventory, configuration history, and configuration change notifications to enable security and governance. With AWS Config, you can discover existing AWS resources, export a complete inventory of your AWS resources with all configuration details, and determine how a resource was configured at any point in time. These capabilities enable compliance auditing, security analysis, resource change tracking, and troubleshooting. With AWS Config, you can review changes in configurations and relationships between AWS resources. You can also review detailed resource configuration histories and determine overall compliance against those configurations specified in your internal compliance. This enables you to simplify compliance auditing, security analysis, change management, as well as operational troubleshooting. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 48 40 AWS Academy Module 03: AWS Cloud Security AWS Config makes it easy to track your resource’s configuration without the need for upfront investments, and you can avoid the complexity of installing and updating agents for data collection or maintaining large databases. After you enable AWS Config, you can view continuously updated details of all configuration attributes associated with AWS resources. You are notified via Amazon Simple Notification Service (Amazon SNS) of every configuration change. AWS Config gives you access to resource configuration history. You can relate configuration changes with CloudTrail events that may have contributed to the change in configuration. This information provides you full visibility from details, such as “Who made the change?” and “From what IP address?”, to the effect of this change on AWS resources and related resources. You can use this information to generate reports to aid auditing and assessing compliance over a period of time. If you want to track changes to resources configuration, answer questions about resource configurations, demonstrate compliance, troubleshoot, or perform security analysis, use AWS Config. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 49 41 AWS Academy Module 03: AWS Cloud Security So, how does this work? The first thing that happens is a change occurs in one of your AWS resources. Next, the AWS Config engine records and normalizes that change in a consistent format. Then those changes are delivered to an S3 bucket, they are assessed through the AWS Config APIs and, optionally, they can be sent out via a notification service like Amazon SNS. AWS Config will automatically evaluate the recorded configuration against your desired configuration. Those evaluations will be displayed on the dashboard or they are accessible via the AWS Config APIs. They can also be sent out via Amazon SNS. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 50 42 AWS Academy Module 03: AWS Cloud Security In summary, AWS Config is a simple service to set up, but it is a very powerful tool that allows you to take advantage of custom rules to automatically discover your AWS resources. With AWS Config, you can: • Evaluate your AWS resource configurations for desired settings. • Get a snapshot of the current configurations of the supported resources that are associated with your AWS account. • Retrieve configurations of one or more resources that exist in your account. • Retrieve historical configurations of one or more resources. • Receive a notification whenever a resource is created, modified, or deleted. • View relationships between resources. For example, you might want to find all resources that use a particular security group. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 51 43 AWS Academy Module 03: AWS Cloud Security Let’s take a look at how we put these services into action by starting from the beginning. This is Day 1 with a new AWS account. What are the best practices for setting up the account? © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 52 44 AWS Academy Module 03: AWS Cloud Security As we begin, AWS recommends that if you have access keys for your root account, you remove them once you've established that they are not being used anywhere in your applications. To stop using the root account, take the following steps: • First, with the root account, create an IAM user for yourself. • Next, create an IAM group, give it full administrator permissions, and add the IAM user to the group. • Then sign in with your IAM user credentials. • Finally, store your root account credentials in a very secure place. Disable and remove your root account access keys, if you have them. For instructions for setting up your first IAM user and administrators group, select the link. http://docs.aws.amazon.com/IAM/latest/UserGuide/getting-started_create-admingroup.html. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 53 45 AWS Academy Module 03: AWS Cloud Security SMS-based Multi-Factor Authentication is currently in preview release only. Select the links to request access and learn more. https://aws.amazon.com/iam/details/mfa/smsmfa/. https://aws.amazon.com/iam/details/mfa/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 54 46 AWS Academy Module 03: AWS Cloud Security Let’s reveal how to enable CloudTrail. CloudTrail logs all API requests to resources in your account via the CloudTrail console. Create a trail, give it a name, apply it to all regions, and enter a name for the new Amazon S3 bucket that the logs will be stored in. Ensure that the Amazon S3 bucket you use for CloudTrail has its access restricted to only those who should have access, such as admins. CloudTrail is now enabled by default for all customers. It will provide visibility into the past seven days of account activity without the need for you to configure a trail in the service to get started. This new always-on capability provides the ability to view, search, and download the aforementioned account activity through the CloudTrail Event History. For step-by-step instructions for creating a trail in CloudTrail, select the link. http://docs.aws.amazon.com/awscloudtrail/latest/userguide/cloudtrail-create-a-trail-usingthe-console-first-time.html. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 55 47 AWS Academy Module 03: AWS Cloud Security Now, let’s discover how to enable a billing report, such as the AWS Cost and Usage Report. • Billing reports provide information about your usage of AWS resources and estimated costs for that usage. • AWS delivers the reports to an Amazon S3 bucket that you specify and updates the reports at least once a day. • The AWS Cost and Usage Report tracks your AWS usage and provides estimated charges associated with your AWS account, either by the hour or by the day. To create an AWS Cost and Usage report, select the link. http://docs.aws.amazon.com/awsaccountbilling/latest/aboutv2/detailed-billingreports.html#turnonreports. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 56 48 AWS Academy Module 03: AWS Cloud Security In summary, displayed are some best practices to follow with IAM. For more information, select the link. http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 57 49 AWS Academy Module 03: AWS Cloud Security In summary, AWS can be accessed in three ways: • Via the AWS Management Console • Programmatically (using the CLI), and • Using the SDK A root account is the email address used to set up the AWS account and always has full administrator access. • These credentials should never be given to anyone. • The AWS Account Root User access keys should be deleted after login. • A user should be created for each individual within the organization. • And the root account should always be secured with multi-factor authentication. For more information, select the link. http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 58 50 AWS Academy Module 03: AWS Cloud Security An IAM user is an entity that you create in AWS to represent the person or service that interacts with AWS. An IAM role is similar to a user in that it is an AWS identity with permission policies that determine what actions the role can perform and used to delegate access to users. An IAM group is a place to store your users identities that represent the user. It’s a simple way to attach policies to multiple users. IAM policies are constructed with Java Script Notation (or JSON). They contain key value pairs that contain a name and a value, for example, “George Washington.” For more information, select the link. http://docs.aws.amazon.com/IAM/latest/UserGuide/best-practices.html © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 59 51 AWS Academy Module 03: AWS Cloud Security Introducing Part 7: AWS Security Compliance Program. The success of our security and compliance program is primarily measured by our customers’ success. Our customers drive our portfolio of compliance reports, attestations, and certifications that support their efforts in running a secure and compliant cloud environment. You can take advantage of this effort to achieve the savings and security at scale that AWS offers while still maintaining robust security and regulatory compliance. In this part, we’ll be discussing: • AWS’ Compliance Approach, which includes Assurance Programs. • AWS Risk and Compliance Programs, such as Risk Management, Control Environment, and Information Security. • AWS Customer Compliance responsibilities. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 60 52 AWS Academy Module 03: AWS Cloud Security AWS Service Catalog can be integrated with AWS CloudFormation for stack developments to ensure compliance with corporate standards. To help employees quickly find and deploy approved IT services, customers can use the AWS Service Catalog to create and manage catalogs of IT services that they have approved for use on AWS. This includes virtual machine images, servers, software, and databases to complete multi-tier application architectures. AWS Service Catalog allows you to centrally manage commonly deployed IT services and helps you achieve consistent governance and meet compliance requirements while enabling users to quickly deploy only the approved IT services they need. For more information on the AWS Service Catalog, select the link. https://aws.amazon.com/servicecatalog/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 61 53 AWS Academy Module 03: AWS Cloud Security As we discussed in the Shared Security Responsibility Model, AWS and its customers share control over the IT environment, which means both parties have responsibility for managing the IT environment. The responsibility of AWS in this model includes providing its services on a highly secure and controlled environment and providing a wide array of security features for customers to use. The customers’ responsibility includes configuring their IT environments in a secure and controlled manner for their purposes. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 62 54 AWS Academy Module 03: AWS Cloud Security While customers don’t communicate their use and configurations to AWS, AWS does communicate its security and control environment relevant to customers. AWS does this by: • Obtaining industry certifications and independent third-party attestations. • Publishing information about the AWS security and control practices in whitepapers and web site content. • Providing certificates, reports, and other documentation directly to AWS customers under Non-Disclosure Agreements (NDAs), as required. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 63 55 AWS Academy Module 03: AWS Cloud Security AWS engages with external certifying bodies and independent auditors to provide customers with considerable information regarding the policies, processes, and controls established and operated by AWS. Certifications/Attestations: Compliance certifications and attestations are assessed by a third-party, independent auditor and result in a certification, audit report, or attestation of compliance. Laws, Regulation, and Privacy: AWS customers remain responsible for complying with applicable compliance laws and regulations. In some cases, AWS offers functionality, such as security features, enablers, and legal agreements, such as the AWS Data Processing Agreement and Business Associate Addendum, to support customer compliance. Alignments/Frameworks: Compliance alignments and frameworks include published security or compliance requirements for a specific purpose, such as a specific industry or function. AWS provides functionality, such as security features, and that include compliance playbooks, mapping documents, and whitepapers for these types of programs. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 64 56 AWS Academy Module 03: AWS Cloud Security AWS provides information about its Risk and Compliance Program to enable customers to incorporate AWS controls into their governance framework. This information can assist customers in documenting a complete control and governance framework with AWS included as an important part of that framework. The AWS Risk and Compliance Program is made up of three components: • Risk Management • Control Environment • Information Security Let’s take a look at each of the AWS Risk and Compliance Programs in more detail. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 65 57 AWS Academy Module 03: AWS Cloud Security AWS management has developed a strategic business plan that includes risk identification and the implementation of controls to mitigate or manage risks. AWS management reevaluates the strategic business plan at least biannually. This process requires management to identify risks within its areas of responsibility and to implement appropriate measures designed to address those risks. In addition, the AWS control environment is subject to various internal and external risk assessments. The AWS Compliance and Security teams have established an information security framework and policies that are based on the following governing bodies: • Control Objectives for Information and related Technology (COBIT) • American Institute of Certified Public Accountants (AICPA) • National Institute of Standards and Technology (NIST) © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 66 58 AWS Academy Module 03: AWS Cloud Security AWS maintains the security policy, provides security training to employees, and performs application security reviews. These reviews assess the confidentiality, integrity, and availability of data, as well as conformance to the information security policy. AWS Security regularly scans all Internet facing service endpoint IP addresses for vulnerabilities. However, scans are not performed on customer EC2 instance interfaces. AWS Security notifies the appropriate parties to remediate any identified vulnerabilities. In addition, external vulnerability threat assessments are performed regularly by independent security firms. Findings and recommendations resulting from these assessments are categorized and delivered to AWS leadership. These scans are done in a manner for the health and viability of the underlying AWS infrastructure and are not meant to replace the customer’s own vulnerability scans required to meet their specific compliance requirements. Customers can request permission to conduct scans of their cloud infrastructure as long as they are limited to the customer’s instances and do not violate the AWS Acceptable Use Policy. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 67 59 AWS Academy Module 03: AWS Cloud Security AWS manages a comprehensive control environment that includes policies, processes, and control activities that leverage various aspects of Amazon’s overall control environment. This control environment is in place for the secure delivery of AWS service offerings. The collective control environment encompasses the people, processes, and technology necessary to establish and maintain an environment that supports the operating effectiveness of the AWS control framework. AWS has integrated applicable cloud-specific controls identified by leading cloud computing industry bodies into the AWS control framework. AWS continues to monitor these industry groups for ideas on which leading practices can be implemented to better assist customers with managing their control environment. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 68 60 AWS Academy Module 03: AWS Cloud Security AWS has implemented a formal information security program designed to protect the confidentiality, integrity, and availability of customers’ systems and data. AWS publishes a security whitepaper that is available on the public website that addresses how AWS can help customers secure their data. To learn more about compliance and find additional resources for this topic, select the link. https://aws.amazon.com/compliance/. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 69 61 AWS Academy Module 03: AWS Cloud Security AWS customers are required to continue to maintain adequate governance over the entire IT control environment regardless of how IT is deployed. Leading practices include an understanding of required compliance objectives and requirements (from relevant sources), establishment of a control environment that meets those objectives and requirements, an understanding of the validation required based on the organization’s risk tolerance, and verification of the operating effectiveness of their control environment. Deployment in the AWS cloud gives enterprises different options to apply various types of controls and various verification methods. Strong customer compliance and governance might include the following basic approach: • Review information available from AWS together with other information to understand as much of the entire IT environment as possible, and then document all compliance requirements. • Design and implement control objectives to meet the enterprise compliance requirements. • Identify and document controls owned by outside parties. • Verify that all control objectives are met and all key controls are designed and operating effectively. By staying engaged in the compliance and governance process with AWS, customers can © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 70 62 AWS Academy Module 03: AWS Cloud Security ensure compliance requirements are being met. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 71 62 AWS Academy Module 03: AWS Cloud Security AWS Cloud Compliance enables customers to understand the robust controls in place at AWS to maintain security and data protection in the cloud. As systems are built on top of AWS cloud infrastructure, compliance responsibilities will be shared. By tying together governance-focused, audit-friendly service features with applicable security compliance regulations or audit standards, AWS Compliance enablers build on traditional programs; helping customers to establish and operate in an AWS security controlled environment. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 72 63 AWS Academy Module 03: AWS Cloud Security Introducing Part 8: AWS Security Resources. As we mentioned before, AWS communicates its security and control environment relevant to customers by doing the following: • Industry certifications and independent third-party attestations. • Information about AWS security and control practices in whitepapers and web content. • Certificates, reports, and other documentation provided directly to AWS customers under NDA. Let’s take a closer look at how AWS provides customers with guidance and expertise through online tools, resources, support, and professional services to secure their data in the cloud. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 73 64 AWS Academy Module 03: AWS Cloud Security AWS Account Teams provide a first point of contact that can guide you through your deployment and implementation and point you toward the right resources to resolve security issues that you may encounter. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 74 65 AWS Academy Module 03: AWS Cloud Security AWS Enterprise Support provides 15-minute response time and is available 24×7 by phone, chat, or email; along with a dedicated Technical Account Manager (TAM). This concierge service ensures that customers’ issues are addressed as swiftly as possible. Select the link to learn more. https://aws.amazon.com/premiumsupport/enterprise-support/ © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 75 66 AWS Academy Module 03: AWS Cloud Security The AWS Partner Network is a group of cloud software and service vendors that has hundreds of certified AWS Consulting Partners worldwide to assist customers with their security and compliance needs. The AWS Partner Network has earned endorsement from AWS. AWS Professional Services and AWS Partner Network both help customers develop security policies and procedures based on well-proven designs, and help to ensure that customers’ security design meets internal and external compliance requirements. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 76 67 AWS Academy Module 03: AWS Cloud Security With AWS Advisories and Bulletins, AWS provides advisories around current vulnerabilities and threats and enables customers to work with AWS security experts to address concerns like reporting abuse, vulnerabilities, and penetration testing. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 77 68 AWS Academy Module 03: AWS Cloud Security If you are in an auditing, compliance, or legal role, check out AWS Auditor Learning Path to obtain a better understanding of how your internal operations can demonstrate compliance using AWS. You can access Recommended Training, self-paced labs, and auditing resources from the Compliance website. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 78 69 AWS Academy Module 03: AWS Cloud Security If you do not know where to start with compliance or need to access frequently used resources and processes, check out the AWS Compliance Solutions Guide. Learn about the available compliance solutions such as: • Understanding the Shared Responsibility Model • Requesting a Compliance Report • Completing a Security Questionnaire More AWS Compliance Resources include: • Services in Scope – Details which services are currently in scope and which are in progress. • AWS Security Blog – The blog is a great way to track all the newest updates to AWS security programs. • Case Studies –Provide insightful information on some of the AWS current customer experiences with security. You can also get answers to frequently asked questions for specific compliance types, such as: • Certifications and attestations: • Payment Card Industry (PCI) • System & Organization Control (SOC) • Federal Risk and Authorization Management Program (FedRAMP) • Laws and regulations, such as the U.S. Health Insurance Portability and Accountability Act (HIPAA) © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 79 70 AWS Academy Module 03: AWS Cloud Security Select the link to learn more. https://aws.amazon.com/compliance/resources/ © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 80 70 AWS Academy Module 03: AWS Cloud Security In summary, we: • Reviewed the AWS Shared Responsibility Model • Discussed IAM • Reviewed AWS Trusted Advisor, AWS CloudTrail, and AWS Config • Explored the AWS security and compliance programs • Explored additional AWS security resources • And demonstrated and discussed Day One best practices To finish this module, complete the knowledge assessment. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 81 71 AWS Academy Module 03: AWS Cloud Security Introducing Module 3, Lab 6: Introduction to AWS IAM. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 82 72 AWS Academy Module 03: AWS Cloud Security IAM is a web service that enables AWS customers to manage users and user permissions in AWS. With IAM, you can centrally manage users, security credentials, such as access keys, and permissions that control which AWS resources users can access. In this lab, you will: • Explore pre-created IAM users and groups. • Inspect IAM policies as applied to the pre-created groups. • Follow a real-world scenario, adding users to groups with specific capabilities enabled. • Locate and use the IAM sign-in URL. • Experiment with the effects of policies on service access. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 83 73 AWS Academy Module 03: AWS Cloud Security In this lab, you’ll explore the users and groups, add users to groups and sign in and test users. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 84 74 AWS Academy Module 03: AWS Cloud Security In this lab, you: • Explored pre-created IAM Users and Groups • Inspected IAM policies as applied to the pre-created Groups • Followed a real-world scenario, adding Users to Groups with specific capabilities enabled • Located and use the IAM sing-in URL • Experimented with the effects of policies on service access © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 85 75 AWS Academy Module 03: AWS Cloud Security Introducing the Day 1 IAM Demonstration: 1. Go to IAM. 2. Review Security Status by taking the following steps.: • Activate MFA on your root account. • Create individual IAM users. • Use groups to assign permissions. • Apply an IAM password policy. The goal is to receive green checks by each security status item. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 86 76 AWS Academy Module 03: AWS Cloud Security A review of the current Security Status indicates that: • MFA has not been activated on the root account. • No individual IAM users have been created. • No permissions have been assigned to groups. • No IAM password policy has been applied. There is a custom sign-in link for the account. Note that the account number has been hidden for security purposes. Use the Customize button to change the name of the account so that the account number is not displayed. This link is used to sign in to the account and can be sent to users as they are set up. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 87 77 AWS Academy Module 03: AWS Cloud Security Before creating the users, activate MFA on the root account. The root account is the email address that you used to sign up for the AWS account. The root account has access to everything; thus, why it’s important to secure this account with restrictions. To set up MFA, click Activate MFA on your root account and then click Manage MFA. Two options will be presented: Virtual and Hardware. A hardware device is an actual hardware device. For purposes of this demonstration, select Virtual and then click Next Step. A new dialog box appears and asks us to configure a virtual MFA device. An app must be downloaded for this task. After that is complete, click Next. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 88 78 AWS Academy Module 03: AWS Cloud Security In the authenticator application, press the plus sign. Scan the barcode, enter the two authentication codes, and then click the Activate Virtual MFA button. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 89 79 AWS Academy Module 03: AWS Cloud Security Click Finish and refresh your browser. The MFA should now show that it is set up. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 90 80 AWS Academy Module 03: AWS Cloud Security Most AWS accounts are set up as company accounts with multiple users. Each user is set up with individual permissions or included as part of a group with specific permissions. A best practice is to have each user have their own account so they are not logging in a root with global privileges. Click Create individual IAM users and then select Manage Users. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 91 81 AWS Academy Module 03: AWS Cloud Security Select Add another user. Add a username. Note that usernames cannot have spaces. Select the Access types. There are two access types: • Programmatic access enables the user to have command line access to provision resources. This option will generate an access key one time. This access key must be saved as it will be used for all future access. • AWS Management Console access enables user to log in to the AWS console. Select a password type. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 92 82 AWS Academy Module 03: AWS Cloud Security Next, you will assign permissions. There are three options: • Add user to group • Copy permissions from an existing user • Attach existing policies directly We want to add the user to a group, so select Add user to group and then select the Create group button. A group is where you put users to inherit the policies assigned to the group. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 93 83 AWS Academy Module 03: AWS Cloud Security Give the group a name. For this example, give the lead developer administrative access. Select the Create group button. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 94 84 AWS Academy Module 03: AWS Cloud Security Select Next Review to review what is being created, and then select Create user. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 95 85 AWS Academy Module 03: AWS Cloud Security When a user is created, several things are generated: 1. Access key ID that is used to access AWS at the command line to programmatically access AWS, or blocked out. 2. Secret access key that is used to access AWS at the command line to programmatically access AWS. 3. Password that is used to log in to the console. Press Show to display the values in each of the fields. All of the information can be downloaded by selecting the Download csv button. Note: Never put this information in a public place. This information can be used to access your account. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 96 86 AWS Academy Module 03: AWS Cloud Security When you return to the dashboard, the individual IAM user and group security status items have been addressed. The last thing to do is apply an IAM password policy. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 97 87 AWS Academy Module 03: AWS Cloud Security The IAM password policy is a set of rules that defines the type of password that an IAM user can set. Select the rules that the passwords should follow and click the Apply password policy button. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 98 88 AWS Academy Module 03: AWS Cloud Security All the security status checkmarks are green, so the IAM setup requirements are complete. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 99 89 AWS Academy Module 03: AWS Cloud Security In the next module we will look at principles for architecting a cloud solution. © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 100 90 AWS Academy Module 03: AWS Cloud Security Thanks for participating! © 2018 Amazon Web Services, Inc. or its affiliates All rights reserved. 101 91
Source Exif Data:
File Type : PDF File Type Extension : pdf MIME Type : application/pdf PDF Version : 1.5 Linearized : No Modify Date : 2018:08:03 23:58:25-00:00 Create Date : 2018:08:03 23:58:25-00:00 APTKVER : 2018.1.0.18321 Pro Production-32 Subject : Academy Cloud Foundations (ACF) 1.0.5 (EN): Module 03 Student Guide Author : Amazon Warning : Duplicate 'Outlines' entry in dictionary (ignored) Page Count : 101 Page Mode : UseOutlines Page Layout : SinglePage XMP Toolkit : Adobe XMP Core 5.4-c005 78.147326, 2012/08/23-13:03:03 Format : application/pdf Creator : Amazon Metadata Date : 2018:08:03 23:58:2500:00 Document ID : 0791acf8-785e-44cb-b853-4144a0e819c7 Instance ID : 2d7cbab3-1d62-4d9a-acc7-2c2ab5eb755d Aptkver : 2018.1.0.18321 Pro Production-32 Creator Tool : Toolkit http://www.activepdf.com Producer : Toolkit http://www.activepdf.com Title : Academy Cloud Foundations (ACF) 1.0.5 (EN): Module 03 Student Guide Description : Academy Cloud Foundations (ACF) 1.0.5 (EN): Module 03 Student GuideEXIF Metadata provided by EXIF.tools