This section introduces additional security services in AWS for defense in-depth strategies.
Key Concepts
Defense in-Depth: Applying security at all layers.
AWS Well-Architected Security Pillar: A key principle involving multi-layered security.
Security Services: AWS offers various security services to reduce the burden of writing custom security code.
Three Components of Defense in-Depth
Defending Your Borders: Controlling access points.
Adding Additional Data Protections: Implementing measures to safeguard data.
Detecting and Responding to Threats: Identifying and addressing security incidents.
AWS Security Services Examples
AWS WAF (Web Application Firewall)
Monitors HTTP and HTTPS requests.
Protects web application resources.
Includes AWS Shield for DDoS protection.
Use Case: Detecting malicious attempts to create accounts.
Amazon Macie
Uses machine learning to discover, classify, and protect sensitive data in Amazon S3.
Use Case: Identifying sensitive data being migrated to Amazon S3, notifying administrators to review, and allowing or disallowing storage of questionable objects.
Amazon Inspector
Vulnerability management service.
Scans AWS workloads for software vulnerabilities and unintended network exposure.
Scans EC2 instances, container images, and Lambda functions
Use Case: Scanning an Amazon EC2 instance with a specific Amazon Machine Image (AMI) to find vulnerabilities before the AMI is used to deploy more EC2 instances.
Amazon Detective
Automatically collects log data from AWS resources.
Generates visualizations for efficient security investigations.
Use Case: Triaging potential issues by finding all activity related to a specific AWS Identity and Access Management (IAM) entity.
AWS Security Hub
Monitors security via automated, continuous checks against AWS resources.
Aggregates security alerts in a standardized format.
Use Case: Prioritizing response and remediation efforts.
AWS Trusted Advisor
Provides security recommendations as part of its data.
Helps follow AWS best practices.
Security controls and findings can be viewed in the Trusted Advisor console if Security Hub is enabled.
Additional Notes
The student guide provides use cases for each service.