All technological notes.
AWS Key Management Service (KMS) - Encryption keys, software, AWS mangeAWS CloudHSM - Encryption keys, hardware, user managedAWS Certificate Manager (ACM) - Free, HTTPS, SSL/TLS CertificatesAWS Secrets Manager - store secrets, rotation of secrets, RDSAWS responsibility - Security of the Cloud
Customer responsibility - Security in the Cloud
Shared controls:
AWS responsibility:
Your responsibility:
AWS responsibility:
Your responsibility:
Distributed Denial of Service (DDos)

AWS Shield Standard
AWS Shield Advanced
AWS WAF
CloudFront and Route 53:
AWS Shield, provides attack mitigation at the edgeAWS Auto Scaling
AWS Shield - DDoS, network+transport layerAWS Shield
AWS Shield Standard:
AWS Shield Advanced:


AWS Web Application Firewall (WAF) to give Layer 7 (Application) protection.AWS Web Application Firewall (WAF) - DDoS, App layerAWS Web Application Firewall (WAF)
Write users their own rules to ALLOW or DENY traffic based on the contents of an HTTP requests.
Can use a ruleset from a trusted AWS Security Partner in the AWS WAF rules Marketplace.
HTTP (vs Layer 4 is TCP)Deploy on Application Load Balancer, API Gateway, CloudFront
Define Web ACL (Web Access Control List):

Pen Testing
Pen Testing is allowed to be performed on AWS.
AWS customers are welcome to carry out security assessments or penetration tests against their AWS infrastructure without prior approval for 8 services:
Prohibited Activities

Cryptography密码术
adversaryEncryption密码术
Cypher
Ciphertext
Crytographic key
Symmetric Encryption对称加密
Advanced Encryption Standard (AES)高级加密标准
Asymmetric Encryption
Rivest-Shamir-Adleman (RSA)
Hashing
Hashing function

Hashing functions are used to store passwords in database so that a password does not reside in a plaintext format.
Popular hashing functions are MD5, SHA256, and Bcrypt.
Salting Passowrds
salt is a random string not known to the attacker that the hashing function accepts to mitigate the deterministic nature of hashing functions.At rest: data stored or archived on a device
In transit (in motion): data being moved from one location to another
Encryption In-Transit
Transport Layer Security (TLS)
Secure Sockets Layers (SSL)
Encryption At-Rest
AES, RSAOn AWS, we leverage encryption keys
Digital Signature
Digital signature gives users tamper-evidence 防篡改.
Three algorithms to digital signatures:
Key generation, generates a public and private key.Signing, the process of generating a digital signature with a private key and inputted message.Signing Verification, verify the authenticity of the message with a public key.
SSH uses a public and private key to authorize remote access into a remote machine.
RSA(Asymmetric Encryption).ssh-keygen, a well known command to generate a public and private key.
ssh-keygen -t rsaCode Signing
Code Signing Certificate
Hardware Security Module
HSM’s that are multi-tenant are FIPS 140-2 Level 2 Compliant.
AWS KMSHSM’s that are single-tenant are FIPS 140-2 Level 3 Compliant.
AWS CloudHSM
Customer Managed CMK:
AWS managed CMK:
AWS owned CMK:
CloudHSM Keys (custom keystore):
CloudHSM hardware deviceCloudHSM clusterAWS Key Management Service (KMS) - Encryption keys, software, AWS mangeAWS Key Management Service (KMS)
Encryption Opt-in:
Encryption Automatically enabled:
HSM (Hardware Security Module)KMS uses Envelope Encryption.
Envelope Encryption

AWS CloudHSM - Encryption keys, hardware, user managedCloudHSM
AWS CloudHSM enables user to generate and use user’s encryption keys on a FIPS 140-2 Level 3 validated hardware.
CloudHSM => AWS provisions encryption hardwareHSM = Hardware Security Module)AWS Certificate Manager (ACM) - Free, HTTPS, SSL/TLS CertificatesAWS Secrets Manager - store secrets, rotation of secrets, RDSIntrusion Detection System / Intrusion Protection System (IDS/IPS)
Amazon Guard Duty - Malicious Activity, Intelligent, ml, SNS, CryptoCurrencyAmazon Guard Duty
it will alert user of findings which user can automate a incident response via CloudWatch Events or with 3rd Party Services.
CloudTrail Events Logs – unusual API calls, unauthorized deploymentsCloudTrail Management Events – create VPC subnet, create trail, …CloudTrail S3 Data Events – get object, list objects, delete object, …VPC Flow Logs – unusual internal traffic, unusual IP addressDNS Logs – compromised EC2 instances sending encoded data within DNS queriesKubernetes Audit Logs – suspicious activities and potential EKS cluster compromisesEventBridge rules to be notified in case of findingsHardening
security benchmark.AWS Inspect - Assessments, EC2(SSM), Container Img, LambdaAWS Inspector
AWS Security HubSend findings to Amazon Event Bridge
AWS Macie - S3, data security&privacy, PII, mlMacie
Macie works by uses Machine Learning to Analyze CloudTrail logs.

AWS Security Hub - Central dashboards, account(s), +complianceAmazon Detective - investigates root cause, ml, unified visualizationsAmazon Detective analyzes, investigates, and quickly identifies the root cause of security issues or suspicious activities (using ML and graphs)VPC Flow Logs, CloudTrail, GuardDuty and create a unified viewAWS Abuse - abusive useAWS Trust & Safety
Report suspected AWS resources used for abusive or illegal purposes
Abusive & prohibited behaviors are:
AWS Support does not deal with Abuse tickets. User need to contact abuse@amazonaws.com or fill out the Report Amazon AWS abuse form.
Confidentiality, Integrity, and Availability (CIA) triad
Confidentiality
Integrity
Hardware Security Modules (HSM).Availability

Vulnerabilities

Shared Responsibility on AWS
DDoS
Shield:
WAF:
Encryption
KMS:
CloudHSM:
AWS Certificate Manager:
GuardDuty:
EC2
Inspector:
S3
Macie:API
CloudTrail:
AWS Security Hub :
Amazon Detective:
AWS Abuse: