Skip to content

Latest commit

 

History

History
116 lines (92 loc) · 5.56 KB

12. Security.md

File metadata and controls

116 lines (92 loc) · 5.56 KB
theme background class highlighter lineNumbers
seriph
/images/1-background.jpg
text-center
shiki
false

Security

Đà Nẵng, năm COVID thứ 2

AWS Shield:

  • DDoS Protection
  • AWS Shield Standard: Free Service.
  • AWS Shield Advanced: Paid Service.
  • You can add protection for any of the following resource types:
    • CloudFront distributions
    • Route 53 hosted zones
    • ELB load balancers
    • EC2 Elastic IP addresses.
    • AWS Global Accelerator accelerators

AWS WAF:

  • Web Application Firewall for CloudFront, API Gateway, Application Load Balancer, or AppSync GraphQL API.
  • Web ACL: a set of rules in AWS WAF to protect your AWS resources.
  • Each rule requires at least one top-level statement, which might contain nested statements at any depth, depending on the rule and statement type.
  • Statements can be combined using AND, OR or NOT.

  • Examples of criteria in the statements:
    • Scripts or SQL code that are likely to be malicious, like cross-site scripting (XSS) or SQL injection.
    • IP addresses or address ranges that requests originate from.
    • Country or geographical location that requests originate from.
    • Strings that appear in the request, like in the User-Agent header or the query string. Supports use of regular expressions (regex).
    • Request size limit.

  • Each rule contains action to take if a web request meets the criteria:
    • Count. You can insert custom headers into the request and you can add labels that other rules can match against.
    • Allow. You can insert custom headers into the request before forwarding it to the protected resource.
    • Block. You can customize the response. Default response is HTTP 403 (Forbidden).
  • Labels:
    • A label is metadata that a rule can add to matching web requests.
    • Rules can also match against labels when they inspect web requests.
    • Labels allow a matching rule to communicate results to the rules that are evaluated later in the same web ACL.

  • You can use rules individually or in reusable rule groups.
  • AWS Managed Rules and AWS Marketplace sellers provide managed rule groups for your use.
  • You can add a scope-down statement inside some rules: narrows the scope of the requests that the rule evaluates. Can be also applied to rate-based rules.
  • Bot Control: helps you manage bot activity to your site by categorizing and identifying common bots.
  • For a CloudFront distribution, AWS WAF is available globally, but you must use the region US East (N. Virginia) for all of your work.
  • Uses web ACL capacity units (WCU) to calculate and control the operating resources that are required to run your rules, rule groups, and web ACLs.

Amazon Inspector:

  • Assesses applications for exposure, vulnerabilities, and deviations from best practices.
  • Assessments can be automated to integrate with deployment pipelines.
  • Optional agent on EC2 instances: collects installed package information and software configuration.
  • You can use Amazon Inspector to assess your assessment targets (collections of AWS resources) for potential security issues and vulnerabilities.
  • Compares the behavior and the security configuration of the assessment targets to selected security rules packages.

  • A rule is a security check that Amazon Inspector performs during the assessment run.
  • Rules are grouped into distinct rules packages either by category, severity, or pricing.
  • Rule Severity: High, Medium, Low or Informational.
  • Available rule packages:
    • Network Reachability (network assessment).
    • Common vulnerabilities and exposures (host assessment).
    • Center for Internet Security (CIS) Benchmarks (host assessment).
    • Security best practices for Amazon Inspector (host assessment).

Amazon GuardDuty

  • A continuous security monitoring service that analyzes and processes the following Data sources:
    • VPC Flow Logs,
    • CloudTrain Event Logs.
    • CloudTrail management Events,
    • CloudTrail S3 Data Event,
    • DNS logs.

  • Uses threat intelligence feeds, such as lists of malicious IP addresses and domains, and machine learning to identify unexpected and potentially unauthorized and malicious activity within your AWS environment.
  • This can include issues like escalations of privileges, uses of exposed credentials, or communication with malicious IP addresses, or domains.
  • For example, GuardDuty can detect compromised EC2 instances serving malware or mining bitcoin.
  • Also monitors AWS account access behavior for signs of compromise, such as unauthorized infrastructure deployments, like instances deployed in a Region that has never been used, or unusual API calls, like a password policy change to reduce password strength.
  • Can trigger remediation actions.
  • Supports a Trusted IP list and multiple Threat lists (lists of known malicious IPs).

AWS Security Hub:

  • Provides you with a comprehensive view of your security state in AWS.
  • Helps you check your environment against security industry standards and best practices.
  • Collects security data from across AWS accounts, services, and supported third-party partner products.
  • Consumes, aggregates, organizes, and prioritizes findings from AWS services that you have enabled, such as Amazon GuardDuty, Amazon Inspector, Amazon Macie and AWS partner security products.
  • Helps you analyze your security trends.
  • Identify the highest priority security issues.
  • Correlates findings across providers to prioritize the most important ones.
  • Supports integration with Amazon EventBridge. To automate remediation of specific findings, you can define custom actions to take when a finding is received.