{"id":1520,"date":"2021-07-19T08:00:03","date_gmt":"2021-07-19T01:00:03","guid":{"rendered":"https:\/\/vticloud.io\/?p=1520"},"modified":"2021-09-20T10:02:45","modified_gmt":"2021-09-20T03:02:45","slug":"checklist-bao-mat-dam-may-tren-amazon-web-services","status":"publish","type":"post","link":"https:\/\/vticloud.io\/en\/checklist-bao-mat-dam-may-tren-amazon-web-services\/","title":{"rendered":"Security Checklist for systems on Amazon Web Services"},"content":{"rendered":"<p><\/p>\n<p>Security has always been a business concern when moving to the cloud, especially for businesses that store user data such as banking, finance, real estate, and insurance. <strong>Therefore, VTI Cloud will share our cloud security checklist for systems on Amazon Web Services (AWS) in the article below.<\/strong><\/p>\n<h2><strong>AWS Shared Responsibility Model<\/strong><\/h2>\n<p>Security and compliance are a shared responsibility between AWS and its customers. This shared model can help reduce the operational burden on customers as AWS operates, manages, and controls components from the server operating system and virtualization layer to the physical security of the facilities. The department is operating the service.<\/p>\n<p>The customers will be in charge of and manage the client operating system (including security updates and patches), other associated application software, and the configuration of the Security Groups and firewall provided by AWS.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-1521\" src=\"https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/shared-responsibility-model.png\" alt=\"shared responsibility model\" width=\"1024\" height=\"555\" srcset=\"https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/shared-responsibility-model.png 1024w, https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/shared-responsibility-model-300x163.png 300w, https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/shared-responsibility-model-768x416.png 768w\" sizes=\"(max-width: 1024px) 100vw, 1024px\" \/><\/p>\n<p>The customer should carefully consider the services he\/she chooses as the customer&#8217;s responsibility will vary with the service in use, the integration of those services into the customer&#8217;s IT environment as well as the law. and current regulations.<\/p>\n<p>This nature of shared responsibility also provides flexibility and provides the ability to control customers to enable deployment.<\/p>\n<h3 data-pm-slice=\"1 1 []\">Security in the Shared Responsibility Model<\/h3>\n<p>AWS&#8217;s Shared Responsibility Model makes it clear that certain aspects of AWS security are in the hands of the business, and businesses must be fully responsible for the security incidents that occur in the management of the business.<\/p>\n<table style=\"height: 936px; width: 100%; border-style: solid;\" border=\"1\" data-number-column=\"false\" data-layout=\"wide\" data-autosize=\"false\" data-pm-slice=\"1 1 []\">\n<tbody>\n<tr style=\"height: 80px;\">\n<th class=\"pm-table-header-content-wrap\" style=\"width: 696.8px; height: 80px;\" data-colwidth=\"666\">\n<p data-pm-slice=\"1 1 []\">Security in the Shared Responsibility Model<\/p>\n<\/th>\n<th class=\"pm-table-header-content-wrap\" style=\"width: 142.4px; height: 80px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p><strong>Customer&#8217;s Responsibilities<\/strong><\/p>\n<\/div>\n<\/th>\n<th class=\"pm-table-header-content-wrap\" style=\"width: 136px; height: 80px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p><strong>AWS&#8217;s Responsibilities<\/strong><\/p>\n<\/div>\n<\/th>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Preventing or detecting when an AWS account has been compromised<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Preventing or detecting a privileged or regular AWS user behaving in an insecure manner<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 80px;\" data-colwidth=\"666\">\n<p>Preventing sensitive data from being uploaded to or shared from applications in an inappropriate manner<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 80px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 80px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Configuring AWS services (except AWS Managed Services) in a secure manner<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Restricting access to AWS services or custom applications to only those users who require it<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Updating guest operating systems and applying security patches<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 80px;\" data-colwidth=\"666\">\n<p>Ensuring AWS and custom applications are being used in a manner compliant with internal and<br \/>\nexternal policies<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 80px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 80px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Ensuring network security (DoS, man-in-the-middle (MITM), port scanning)<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Configuring AWS Managed Services in a secure manner<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Providing physical access control to hardware\/software<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 80px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 80px;\" data-colwidth=\"666\">\n<p>Providing environmental security assurance against things like mass power outages, earthquakes, floods, and other natural disasters<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 80px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 80px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Database patching<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Protecting against AWS zero-day exploits and other vulnerabilities<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<tr style=\"height: 56px;\">\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 696.8px; height: 56px;\" data-colwidth=\"666\">\n<p>Business continuity management (availability, incident response)<\/p>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 142.4px; text-align: center; height: 56px;\" data-colwidth=\"150\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>&nbsp;<\/p>\n<\/div>\n<\/td>\n<td class=\"pm-table-cell-content-wrap\" style=\"width: 136px; text-align: center; height: 56px;\" data-colwidth=\"144\">\n<div class=\"fabric-editor-block-mark fabric-editor-align-center\" data-align=\"center\">\n<p>o<\/p>\n<\/div>\n<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p data-pm-slice=\"1 1 []\">To understand more on this model, please read more on the following link: <span style=\"color: #ff8800;\"><a style=\"color: #ff8800;\" href=\"https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/\">https:\/\/aws.amazon.com\/compliance\/shared-responsibility-model\/<\/a><\/span><\/p>\n<h2 data-pm-slice=\"1 2 []\"><strong>AWS Security Checklist<\/strong><\/h2>\n<p>VTI Cloud has developed a checklist of best practices and highest priority, which businesses must follow to proactively stop threats. This checklist provides customer recommendations for Security Pillar matching in the AWS Well-Architected Framework.<\/p>\n<p><img loading=\"lazy\" class=\"aligncenter size-full wp-image-1547\" src=\"https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/aws-security.png\" alt=\"aws security\" width=\"825\" height=\"552\" srcset=\"https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/aws-security.png 825w, https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/aws-security-300x201.png 300w, https:\/\/vticloud.io\/wp-content\/uploads\/2021\/01\/aws-security-768x514.png 768w\" sizes=\"(max-width: 825px) 100vw, 825px\" \/><\/p>\n<blockquote>\n<p>VTI Cloud wrote about AWS Well-Architected Framework in the latest blog post, here: <span style=\"color: #ff8800;\"><a style=\"color: #ff8800;\" href=\"https:\/\/vticloud.io\/aws-well-architected-framework-la-gi\/\">AWS Well-Architected Framework l\u00e0 g\u00ec? | VTI CLOUD<\/a><\/span><\/p>\n<\/blockquote>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist of AWS Identity &amp; Access Management (IAM)<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"height: 673px; width: 100%; border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Avoid using the Access Keys of the root account in AWS as these allow full access to all resources<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Multi-Factor Authentication must be enabled for the root account to provide two-factor authentication<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Centralize identity with AWS Single Sign-On or 3rd party solution to avoid creating multiple IAM accounts arising frequently or using long-term (long-term) Access Keys<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Assign IAM users the necessary permissions to allow service logon or resource access through IAM Policies or <a href=\"https:\/\/docs.aws.amazon.com\/IAM\/latest\/UserGuide\/id_roles_common-scenarios_aws-accounts.html\">IAM Roles if using cross-account<\/a><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Make sure the user account also has MFA authentication<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>The IAM Access Keys must be renewed periodically<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Ensure a strong password policy for users and set up a 90-day lifecycle for passwords<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Assign permissions to users based on User Groups, rather than on individual users<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Granting minimal access while creating IAM Policies, these policies are required to take certain actions.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 55px;\">\n<td style=\"width: 83.6683%; height: 55px;\">\n<ul>\n<li>Attach IAM Policies to Groups or Roles when creating<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 55px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 83.6683%; height: 47px;\">\n<ul>\n<li>Appropriate conditions should be used to limit refusal or authorization of action against resources<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 47px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Eliminate unnecessary IAM users who are inactive or inactive<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Use IAM Roles to grant access to applications on EC2 Instance<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 71px;\">\n<td style=\"width: 83.6683%; height: 71px;\">\n<ul>\n<li>Use multiple AWS accounts to separate data and resources on AWS, and enable the use of Service Control Policies to integrate guardrails in AWS Control Tower. AWS Control Tower makes it easy to set up and manage AWS multi-account environments<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 71px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist<\/strong><strong> of <\/strong><strong>Amazon S3<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"height: 408px; width: 100%; border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 22px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 22px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Ensure S3 buckets are not publicly accessible (publicly read or write) &#8211; users can enable &#8216;Amazon S3 block public access to prevent access from Public<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Use object-level or bucket-level permissions next to IAM Policies to grant access to resources.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Enable MFA Delete to prevent accidental deletion of buckets<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Consider encryption of stored data, which can be done in two ways &#8211; server-side and client-side encryption<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Allows encryption of incoming and outgoing traffic through SSL endpoints<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Configure S3 lifecycle management (S3 lifecycle) through rule-based actions and use Bucket Versioning, to deal with random deletion<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Make sure S3 access logging is enabled<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Continuously inspect and monitor S3 buckets using Amazon CloudWatch metrics<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist<\/strong><strong> of <\/strong><strong>Amazon EC2, Amazon VPC, and Amazon EBS<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"height: 643px; width: 100%; border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul class=\"ak-ul\">\n<li>\n<p>Ensure data and disk (disk volume) in EBS is encrypted with AES-256<\/p>\n<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Restrict access to instances from restricted IP ranges using Security Groups<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Limits the scope of ports opened on EC2 Security Groups, to prevent attacks through vulnerabilities<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Use IAM policies with restrictions for IAM users, roles that are allowed to change or modify the original AMI (Amazon Machine Images)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Make sure Elastic Load Balancers have a valid Security Group associated with it and enable access logging<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Monitor and optimize default Security Groups, as they allow unlimited access for inbound and outbound traffic<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Use AWS Firewall Manager to automatically apply the rules of Security Groups and AWS WAF<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Ensure limited access to SSH, FTP, SMTP, MySQL, PostgreSQL, MongoDB, MSSQL, CIFS\u2026, limit access to fixed IPs if possible.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Use IAM Roles to grant access to EC2, instead of Access Keys for temporary requests<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 83.6683%; height: 47px;\">\n<ul>\n<li>If you are using the IAM user Access Keys for permanent permissions, make sure not to embed these keys directly in the code.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 47px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 83.6683%; height: 47px;\">\n<ul>\n<li>Create different keys for different applications, rotate Access Keys, use MFA validation, and deactivate unused Key pairs<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 47px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 83.6683%; height: 47px;\">\n<ul>\n<li>Enable and enable VPC flow logs to record incoming and outgoing traffic in VPC for better tracking and early diagnosis of potential problems<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 47px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Delete unused Virtual Private Gateway and VPC Internet Gateway<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 47px;\">\n<td style=\"width: 83.6683%; height: 47px;\">\n<ul>\n<li>Make sure that no VPC endpoints are exposed to the public, by checking the key value in the policy.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 47px;\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 83.6683%;\">\n<ul>\n<li>Make sure there are no Network ACLs that allow unrestricted access or exit<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist <\/strong><strong>of <\/strong><strong>AWS CloudTrail<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"height: 409px; width: 100%; border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Make sure CloudTrail has Multi-region feature enabled<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>You should log into a centralized S3 bucket and use access logging and restrict access to the CloudTrail S3 bucket.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Make sure both CloudTrail and CloudTrail logging have Multi-Region logging enabled<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Ensure CloudTrail log file integrity authentication is enabled<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Ensure CloudTrail logs are encrypted<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Use in conjunction with Amazon CloudWatch for binding metrics, with Amazon GuardDuty for continuous monitoring and AWS Security Hub for a holistic view of security on AWS<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist<\/strong><strong> of <\/strong><strong>Amazon CloudFront, AWS WAF, and AWS Shield<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Uses Amazon CloudFront, AWS WAF, and AWS Shield to provide DDoS attack protection at Layer 3 (Network), Layer 4 (Transport), and Layer 7 (Application)<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Use &#8220;Signed-URLs&#8221; for content that needs to be authorized, see also<a href=\"https:\/\/docs.aws.amazon.com\/AmazonCloudFront\/latest\/DeveloperGuide\/private-content-signed-urls.html\">: Using signed URLs &#8211; Amazon CloudFront<\/a><\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Use secure CloudFront SSL versions<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist<\/strong><strong> of <\/strong><strong>Amazon RDS<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Make sure the RDS Security Groups do not allow unrestricted access<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Ensure encryption of RDS instances and snapshots, using AES-256 level encryption<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Protects data when transmitting to RDS over SSL endpoints<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Monitoring RDS control with AWS Key Management Service (KMS) and Customer Managed Keys<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Configure AWS Secrets Manager to automatically rotate secrets (a set of information, usernames, and passwords, and connection details used to access a secured service) to Amazon RDS<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Ensure RDS database instances and snapshots are not publicly accessible<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 83.6683%;\">\n<ul>\n<li>Enable automatic minor upgrade for RDS<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist <\/strong><strong>of <\/strong><strong>Amazon Redshift<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; border-style: solid;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 16.3317%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Enable require_ssl parameter in all Redshift clusters to minimize the risk of data encryption in transit for the Redshift and connect SQL Client to the enterprise cluster<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Enables Redshift Cluster encryption<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 57px;\">\n<ul>\n<li>Enable the require_ssl parameter for the RedShift Cluster<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 57px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 83.6683%; height: 79px;\">\n<ul>\n<li>Make sure Redshift user activity logging is enabled<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>Ensure Redshift encryption with KMS Customer-Managed Keys<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 23px;\">\n<td style=\"width: 83.6683%; height: 23px;\">\n<ul>\n<li>We recommend that enterprises launch Redshift clusters in the VPC for better control<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%; height: 23px;\">\u00a0<\/td>\n<\/tr>\n<tr>\n<td style=\"width: 83.6683%;\">\n<ul>\n<li>Make sure that the Redshift clusters are not publicly accessible<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 16.3317%;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist<\/strong><strong> of <\/strong><strong>AWS Systems Manager<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; border-style: solid; width: 99.3457%;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 84.1921%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 23.9631%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 84.1921%; height: 79px;\">\n<ul>\n<li>Use AWS Systems Manager Patch Manager to automate the process of patching systems and code, including OS, application, and code dependencies<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 23.9631%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 84.1921%; height: 79px;\">\n<ul>\n<li>Use the AWS Systems Manager Automation runbook or use Command to access the database or system indirectly<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 23.9631%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h3 data-pm-slice=\"1 3 []\"><strong>Security checklist <\/strong><strong>of <\/strong><strong>Monitoring and Alerts<\/strong><\/h3>\n<p>&nbsp;<\/p>\n<table style=\"border-collapse: collapse; border-style: solid; width: 99.3457%; height: 181px;\" border=\"1\">\n<tbody>\n<tr style=\"height: 23px;\">\n<td style=\"width: 84.1921%; height: 23px; text-align: center;\"><strong>Work Checklist<\/strong><\/td>\n<td style=\"width: 23.9631%; height: 23px; text-align: center;\"><strong>Check<\/strong><\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 84.1921%; height: 79px;\">\n<ul>\n<li>Enable AWS Config to monitor historical data of resources, and use the Config Managed Rules to automatically alert or immediately alert unwanted changes<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 23.9631%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<tr style=\"height: 79px;\">\n<td style=\"width: 84.1921%; height: 79px;\">\n<ul>\n<li>Alerts on the creation of both logs and events from AWS CloudTrail, to Amazon GuardDuty and application logs, help identify high-priority alerted events to investigate security incidents.<\/li>\n<\/ul>\n<\/td>\n<td style=\"width: 23.9631%; height: 79px;\">\u00a0<\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p>&nbsp;<\/p>\n<h2 data-pm-slice=\"1 1 []\"><strong>Conclusion<\/strong><\/h2>\n<p>The most important requirement when ensuring a secure infrastructure is complete visibility. Simply put, how can an enterprise take preventive action if it doesn&#8217;t even know what&#8217;s wrong?<\/p>\n<p>With the use of AWS security checklists recommended for some typical VTI Cloud services above, businesses will ensure the most essential elements to keep their infrastructure at risk. In addition, businesses can contact us, VTI Cloud, for advice and implementation on security checklists with AWS Well-Architected Review and Managed Services for businesses.<\/p>\n<p>We will ensure your system runs the most smoothly, but always ensure information security, system security, and especially the optimal cost of use of the current system.<\/p>\n<p>Read more on our AWS Well-Architected Review at the following link:<span style=\"color: #ff8800;\"> <a style=\"color: #ff8800;\" href=\"https:\/\/vticloud.io\/services\/well-architected\">https:\/\/vticloud.io\/services\/well-architected<\/a><\/span><\/p>\n<h2>About VTI Cloud<\/h2>\n<p data-renderer-start-pos=\"6835\"><strong data-renderer-mark=\"true\">VTI Cloud<\/strong>\u00a0is an\u00a0<span style=\"color: #ff6600;\"><a class=\"sc-iELTvK jHUAie\" style=\"color: #ff6600;\" title=\"https:\/\/vticloud.io\/news_events\/vti-cloud-chinh-thuc-tro-thanh-advanced-consulting-partner-cua-aws\/\" href=\"https:\/\/vticloud.io\/news_events\/vti-cloud-chinh-thuc-tro-thanh-advanced-consulting-partner-cua-aws\/\" data-renderer-mark=\"true\">Advanced Consulting Partner<\/a><\/span>\u00a0of AWS Vietnam with a team of over 50+ AWS certified solution engineers. With the desire to support customers in the journey of digital transformation and migration to the AWS cloud, VTI Cloud is proud to be a pioneer in consulting solutions, developing software, and deploying AWS infrastructure to customers<strong data-renderer-mark=\"true\">\u00a0in Vietnam<\/strong>\u00a0<strong data-renderer-mark=\"true\">and Japan.<\/strong><\/p>\n<p data-renderer-start-pos=\"7217\">Building safe, high-performance, flexible, and cost-effective architectures for customers is\u00a0<strong data-renderer-mark=\"true\">VTI Cloud\u2019s<\/strong>\u00a0leading mission in enterprise technology mission.<\/p>\n<p><\/p>","protected":false},"excerpt":{"rendered":"<p>Security has always been a business concern when moving to the cloud, especially for businesses that store user data such as banking, finance, real estate, and insurance. Therefore, VTI Cloud will share our cloud security checklist for systems on Amazon Web Services (AWS) in the article below. AWS Shared Responsibility Model Security and compliance are [&hellip;]<\/p>\n","protected":false},"author":5,"featured_media":1678,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[13],"tags":[78,70,42,51,77,67,50,34],"_links":{"self":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/1520"}],"collection":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/users\/5"}],"replies":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/comments?post=1520"}],"version-history":[{"count":1,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/1520\/revisions"}],"predecessor-version":[{"id":3177,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/posts\/1520\/revisions\/3177"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media\/1678"}],"wp:attachment":[{"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/media?parent=1520"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/categories?post=1520"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/vticloud.io\/en\/wp-json\/wp\/v2\/tags?post=1520"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}