Modul 3 - AWS Security
Modul 3 - AWS Security
Modul 3 - AWS Security
Donnie Prakoso
Technical Evangelist, AWS
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Topics
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Introduction to AWS Security
Resilient infrastructure
High security
Strong safeguards
Rapid innovation
Constantly evolving security services
Governance-enabled features
• Additional oversight
• Security control
• Central automation
Tools
• Access from AWS and partners
• Use for monitoring and logging
Built-in firewalls
Encryption in transit
Private/dedicated connections
Distributed denial of service (DDoS)
mitigation
Deployment tools
Inventory and configuration tools
Template definition and management tools
Encryption capabilities
Key management options
• AWS Key Management Service
Hardware-based cryptographic key storage options
• AWS CloudHSM
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
Shared Responsibility Model
© 2018, Amazon Web Services, Inc. or its Affiliates. All rights reserved.
AWS IAM
Functionality
Manage
• Users and their access
IAM Corp
• Roles and their permissions
• Federate users and their permissions
Recommendations
1. Delete root user access
keys.
2. Create an IAM user.
3. Grant administrator
access.
4. Use IAM credentials to
interact with AWS.
IAM
Programmatic access
• Enables access key ID and secret access key
IAM Policy
Roles
• Use roles for applications
• Use roles instead of sharing credentials
Credentials
• Rotate credentials regularly
• Remove unnecessary users and credentials
Use policy conditions for extra security
Monitor activity in your AWS account