Note_Tech

All technological notes.


Project maintained by simonangel-fong Hosted on GitHub Pages — Theme by mattgraham

AWS - Security

Back


AWS Shared Responsibility Model


Example, for RDS


Example, for S3


Distributed Denial of Service (DDos)

ddos

AWS Services


AWS Shield - DDoS, network+transport layer

Shield

Shield


AWS Web Application Firewall (WAF) - DDoS, App layer

waf


Penetration Testing on AWS Cloud

Pen Testing


Encryption - Confidentiality

Terminology


Symmetric Encryption vs Asymmetric Encryption


Hashing and Salting

Hashing function



Encryption In-Transit and At-Rest



Digital Signatures and Signing


Access Keys - Encryption

Hardware Security Module

fips


Types of Customer Master Keys: CMK


AWS Key Management Service (KMS) - Encryption keys, software, AWS mange

kms


AWS CloudHSM - Encryption keys, hardware, user managed


AWS Certificate Manager (ACM) - Free, HTTPS, SSL/TLS Certificates


AWS Secrets Manager - store secrets, rotation of secrets, RDS


Intrusion Detection System / Intrusion Protection System (IDS/IPS)


Amazon Guard Duty - Malicious Activity, Intelligent, ml, SNS, CryptoCurrency


Hardening


AWS Inspect - Assessments, EC2(SSM), Container Img, Lambda


Others

AWS Macie - S3, data security&privacy, PII, ml

Macie


AWS Security Hub - Central dashboards, account(s), +compliance


Amazon Detective - investigates root cause, ml, unified visualizations


AWS Abuse - abusive use


Security Principle: Confidentiality, Integrity, and Availability (CIA) triad

cia

layers


Summary: Security


TOP