Shared responsibility model
While AWS manages security of the cloud, security in the cloud is responsibility of the customer. Customers retain control of what security they choose to implement to protect their own content, platform, applications, systems and networks, no differently than they would in an on-site datacenter.
AWS WAF
Web Application Firewall
Is a web application firewall that helps protect your web applications from common web exploits that could affect application availability, compromise security, or consume excessive resources.
Operate at level 7
AWS Shield
Is a managed distributed deniel of service (DDoS) protection service that safeguards web applications running on AWS. AWS Shield provides always-on detection and automatic inline mitigations that minimize application downtime and latency, so there is non need to engage AWS Support to benefit from DDoS protection. There are two tiers of AWS Shield - Standard and Advanced.
Amazon Inspector
Is an automated security assessment service that helps improve the security and compliance of applications deployed on AWS. It automatically assesses applications for vulnerabilities or deviations from best practices.
After performing assessment, it produces a detailed list of security findings priortized by level of severity. These findings can be reviewed directly or as part of detailed assessment reports which are available via Amazon Inspector console or API.
AWS trusted advisor
An online resource to help you reduce cost, increase performance, and improve security by optimizing your AWS env. Trusted Advisor provides real time guidance to help you provision your resources following AWS best practices. Advisor will advise you on Cost Optimization, performance, security, fault tolerance.
AWS CloudTrail
It increases visibility into your user and resource activity by recording AWS management console actions and API calls. You can identify which users and accounts called AWS, the source IP address from which the calls were made, and when the calls occurred.
Cloudwatch vs AWS Config
- AWS Config is used to monitor configurations of your AWS Resources.
Trusted Advisor key services
AWS Penetration testing
Simulated cyber attack against your computer system to check for exploitable vulnerabilities.
Can be tests on 8 services without prior approval
AWS KMS
Works at regional basis.
CloudHSM
Parameter Store
Secrets Manager
Amazon GuardDuty
AWS Control tower
AWS Security hub
Provides a single place that aggregates, organises, and prioritises your security alerts or findings from multiple AWS services - such as GuardDuty, Inspector, Amazon Macie, IAM access analyzer and AWS Firewall manager - across multiple AWS accounts.
Compromised IAM credentials
Athena
Interactive query service which enables you to analyse and query data located in S3 using SQL
Macie
security service which uses Machine learning and NLP to discover, classify and protect sensitive data stored in S3
Artifact
Use to retrieve compliance reports