AWS ‐ Security Controls - FullstackCodingGuy/Developer-Fundamentals GitHub Wiki

Objectives

image

Cloud Security Policies

Best Practices for Endpoint Security

  • Always use HTTPs
  • Enforce Strong Authentication
  • Use on-way password hashing
  • Utilize Rate Limiting
  • Require IP Filtering
  • Apply Input Validation

Passwords

image image

image

Account Lockout Policies

image

  • Controlling Access
    • Blacklisting
    • Whitelisting

Cloud User Permissions

image image

image

image image

HIDS (Host-based Intrusion Detection Systems)

  • It evaluates the incoming and outgoing traffic of the host

  • It uses Signature based detection

  • Monitor and analyze systems

  • Monitor and analyze network packets

image

image

image

HIPS (Host-based Intrusion Prevention Systems)

  • It protects the network systems

image

image

Hardened Baselines for App Security

image

image

image

AWS Firewall Manager

  • It helps manage firewall rules
  • Deploy rules
  • Enforces security policies
  • Deploy baseline security group rules

AWS Firewall manager: Use Cases

  • To Protect Applications
  • To Deploy Tools
  • To Audit Resources

AWS Firewall Manager: Features

  • Centrally deploy AWS firewall rules
  • Deploy security groups and rules across all your accounts and VPCs
  • Audit security groups
  • Enforce Compliance
  • Enforce rules in a hierarchical manner
  • Enable cross-account protection policies
  • Group Resources
  • Manage aws marketplace apps

image

AWS Firewall Manager: Policies

image