Security has always been a business concern when moving to the cloud, especially for businesses that store user data such as banking, finance, real estate, and insurance. Therefore, VTI Cloud will share our cloud security checklist for systems on Amazon Web Services (AWS) in the article below.
AWS Shared Responsibility Model
Security and compliance are a shared responsibility between AWS and its customers. This shared model can help reduce the operational burden on customers as AWS operates, manages, and controls components from the server operating system and virtualization layer to the physical security of the facilities. The department is operating the service.
The customers will be in charge of and manage the client operating system (including security updates and patches), other associated application software, and the configuration of the Security Groups and firewall provided by AWS.
The customer should carefully consider the services he/she chooses as the customer’s responsibility will vary with the service in use, the integration of those services into the customer’s IT environment as well as the law. and current regulations.
This nature of shared responsibility also provides flexibility and provides the ability to control customers to enable deployment.
Security in the Shared Responsibility Model
AWS’s Shared Responsibility Model makes it clear that certain aspects of AWS security are in the hands of the business, and businesses must be fully responsible for the security incidents that occur in the management of the business.
Security in the Shared Responsibility Model |
Customer’s Responsibilities |
AWS’s Responsibilities |
---|---|---|
Preventing or detecting when an AWS account has been compromised |
o |
|
Preventing or detecting a privileged or regular AWS user behaving in an insecure manner |
o |
|
Preventing sensitive data from being uploaded to or shared from applications in an inappropriate manner |
o |
|
Configuring AWS services (except AWS Managed Services) in a secure manner |
o |
|
Restricting access to AWS services or custom applications to only those users who require it |
o |
|
Updating guest operating systems and applying security patches |
o |
|
Ensuring AWS and custom applications are being used in a manner compliant with internal and |
o |
o |
Ensuring network security (DoS, man-in-the-middle (MITM), port scanning) |
o |
o |
Configuring AWS Managed Services in a secure manner |
|
o |
Providing physical access control to hardware/software |
|
o |
Providing environmental security assurance against things like mass power outages, earthquakes, floods, and other natural disasters |
|
o |
Database patching |
|
o |
Protecting against AWS zero-day exploits and other vulnerabilities |
|
o |
Business continuity management (availability, incident response) |
|
o |
To understand more on this model, please read more on the following link: https://aws.amazon.com/compliance/shared-responsibility-model/
AWS Security Checklist
VTI Cloud has developed a checklist of best practices and highest priority, which businesses must follow to proactively stop threats. This checklist provides customer recommendations for Security Pillar matching in the AWS Well-Architected Framework.
VTI Cloud wrote about AWS Well-Architected Framework in the latest blog post, here: AWS Well-Architected Framework là gì? | VTI CLOUD
Security checklist of AWS Identity & Access Management (IAM)
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Security checklist of Amazon S3
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Security checklist of Amazon EC2, Amazon VPC, and Amazon EBS
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
|
Security checklist of AWS CloudTrail
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
Security checklist of Amazon CloudFront, AWS WAF, and AWS Shield
Work Checklist | Check |
|
|
|
|
|
Security checklist of Amazon RDS
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
|
|
Security checklist of Amazon Redshift
Work Checklist | Check |
|
|
|
|
|
|
|
|
|
|
|
|
|
Security checklist of AWS Systems Manager
Work Checklist | Check |
|
|
|
Security checklist of Monitoring and Alerts
Work Checklist | Check |
|
|
|
Conclusion
The most important requirement when ensuring a secure infrastructure is complete visibility. Simply put, how can an enterprise take preventive action if it doesn’t even know what’s wrong?
With the use of AWS security checklists recommended for some typical VTI Cloud services above, businesses will ensure the most essential elements to keep their infrastructure at risk. In addition, businesses can contact us, VTI Cloud, for advice and implementation on security checklists with AWS Well-Architected Review and Managed Services for businesses.
We will ensure your system runs the most smoothly, but always ensure information security, system security, and especially the optimal cost of use of the current system.
Read more on our AWS Well-Architected Review at the following link: https://vticloud.io/services/well-architected
About VTI Cloud
VTI Cloud is an Advanced Consulting Partner of AWS Vietnam with a team of over 50+ AWS certified solution engineers. With the desire to support customers in the journey of digital transformation and migration to the AWS cloud, VTI Cloud is proud to be a pioneer in consulting solutions, developing software, and deploying AWS infrastructure to customers in Vietnam and Japan.
Building safe, high-performance, flexible, and cost-effective architectures for customers is VTI Cloud’s leading mission in enterprise technology mission.