Security, Deployment, and Operations

AWS Secrets Manager

Secrets Manager Overview
Secrets Manager Architecture

Application Layer (L7) Firewalls

Traditional Firewalls
Layer 7 Firewalls

AWS Web Application Firewall (WAF)

Web Application Firewall (WAF) Overview
WAF Components

Web Access Control List (WEBACL)

WAF Rule Groups

WAF Rules

Rule Types:

  1. Regular – match specific conditions
  2. Rate-based – match if traffic exceeds a threshold

Statements:

Actions:

  1. Allow – permit traffic (only for regular rules)
  2. Block – deny traffic
  3. Count – log matched traffic
  4. Captcha – challenge the client; success counts as Count, failure blocks traffic
WAF Pricing

Distributed Denial of Service (DDoS) Attacks

DDoS Attacks – Overview
Normal Operation of a Web Application (Example)
Types of DDoS Attacks

Application Layer Attacks

Protocol Attacks

Volumetric (Amplification/Reflection) Attacks

AWS Shield

AWS Shield – Overview
AWS Shield Standard
AWS Shield Advanced

Hardware Security Modules (HSMs)

Local Key Management Without HSM
Hardware Security Module (HSM) Concepts

Local Key Management With HSM

HSM Architecture and Benefits

AWS CloudHSM

Refresher: KMS and HSMs
CloudHSM Overview

CloudHSM Use Cases

CloudHSM Architecture

AWS Config 101

AWS Config – Overview

Amazon Macie 101

Amazon Macie – Key Concepts
Amazon Macie – Architecture
  1. Discovery job is scheduled
  2. Discovery job uses managed and custom data identifiers to scan S3 buckets and generate findings
  3. Findings can trigger events in EventBridge → can be used for event-driven remediation (e.g. Lambda function that masks PII in S3 buckets)

Macie Identifiers and Findings

Amazon Macie – Data Identifiers

Managed Data Identifiers

Custom Data Identifiers
Amazon Macie – Findings

Sensitive Data Findings

Policy Findings

DEMO: Identifying Sensitive Data with Macie

Amazon Macie Demo – Step-by-Step

Amazon Inspector

Amazon Inspector – Overview
Amazon Inspector – Assessment Types
  1. Network assessment
    • Evaluates network configurations using the Network Reachability rules package
    • Agent not required, though installing it provides additional OS visibility
    • Checks end-to-end reachability across EC2 instances, ELBs, ALBs, Direct Connect, ENIs, IGWs, ACLs, route tables, security groups, subnets, VPCs, VGWs, and VPC peering connections
    • Example findings:
      • UnrecognizedPortWithListener
      • RecognizedPortWithListener (recognized = well-known port)
      • RecognizedPortNoListener
      • RecognizedPortNoAgent (well-known port exposed, but no agent installed, so OS listener cannot be verified)
  2. Host assessment
    • Focuses on OS-level vulnerabilities
    • Requires the Inspector Agent
    • Supported rules packages:
      • Common Vulnerabilities and Exposures (CVE)
        • Database of known cybersecurity vulnerabilities, each identified by a CVE number
      • Center for Internet Security (CIS) benchmarks
        • Industry-standard best practices that are consensus-based and unbiased
      • Amazon Inspector security best practices
        • Examples: disable root SSH login, enforce modern SSH configurations, password complexity, and other OS-level security controls

Amazon GuardDuty 101

Amazon GuardDuty – Overview