Additional AWS Security Services
This section introduces additional security services in AWS for defense in-depth strategies.
Key Concepts
- Defense in-Depth: Applying security at all layers.
- AWS Well-Architected Security Pillar: A key principle involving multi-layered security.
- Security Services: AWS offers various security services to reduce the burden of writing custom security code.
Three Components of Defense in-Depth
- Defending Your Borders: Controlling access points.
- Adding Additional Data Protections: Implementing measures to safeguard data.
- Detecting and Responding to Threats: Identifying and addressing security incidents.
AWS Security Services Examples
AWS WAF (Web Application Firewall)
- Monitors HTTP and HTTPS requests.
- Protects web application resources.
- Includes AWS Shield for DDoS protection.
- Use Case: Detecting malicious attempts to create accounts.
Amazon Macie
- Uses machine learning to discover, classify, and protect sensitive data in Amazon S3.
- Use Case: Identifying sensitive data being migrated to Amazon S3, notifying administrators to review, and allowing or disallowing storage of questionable objects.
Amazon Inspector
- Vulnerability management service.
- Scans AWS workloads for software vulnerabilities and unintended network exposure.
- Scans EC2 instances, container images, and Lambda functions
- Use Case: Scanning an Amazon EC2 instance with a specific Amazon Machine Image (AMI) to find vulnerabilities before the AMI is used to deploy more EC2 instances.
Amazon Detective
- Automatically collects log data from AWS resources.
- Generates visualizations for efficient security investigations.
- Use Case: Triaging potential issues by finding all activity related to a specific AWS Identity and Access Management (IAM) entity.
AWS Security Hub
- Monitors security via automated, continuous checks against AWS resources.
- Aggregates security alerts in a standardized format.
- Use Case: Prioritizing response and remediation efforts.
AWS Trusted Advisor
- Provides security recommendations as part of its data.
- Helps follow AWS best practices.
- Security controls and findings can be viewed in the Trusted Advisor console if Security Hub is enabled.
Additional Notes
- The student guide provides use cases for each service.