Cloud Security Best Practices With AWS

27
Cloud Security Best Practices With AWS

Transcript of Cloud Security Best Practices With AWS

Page 1: Cloud Security Best Practices With AWS

Cloud Security Best Practices With AWS

Page 2: Cloud Security Best Practices With AWS

Cloud computing was the organic leap from parallel and distributed

computing from the 90’s.

Building cloud framework on one’s own capital driven resources is

monotonous and man-power intensive, the need to dodge which gave

the ascent to cloud computing.

‘Scalable and Elastic’ are the two traits of cloud services ride on.

Page 3: Cloud Security Best Practices With AWS

With the point of building a Reliable, dispersed and value-based IT

infrastructure, Amazon launched Amazon Web Services.

Today the platform serves number of users and it is one of the greatest

cloud backbone existing on the planet.

While Amazon gives a speedy and reliable resource for Cloud

Computing Service, it is sensible to have some essential security

measures with to guarantee the intimate and uprightness of the

information being exchanged over the cloud backbone.

Page 4: Cloud Security Best Practices With AWS

Recorded underneath are a key's portion focuses to remember which

would adequately defend your data on any cloud service you utilize

(IaaS, SaaS, or PaaS).

We break the best practices into some portions with respect to different

divisions included into a cloud platform exchange

1. Administrative (Usage Policies).

2. Physical (Limited Access).

3. Logical (Access to Sensitive Information)

Page 5: Cloud Security Best Practices With AWS

Password

Page 6: Cloud Security Best Practices With AWS

Needless to say that strong password is required to protect any account

that contains sensitive data.

Nowadays, with expanding processing capacities, beast force is not

such a terrible alternative to go for in terms of hacking, so a strong

password is an unquestionable requirement.

A few sources propose getting rid of the default AWS account, however

it can in any case be kept for sub-auxiliary operations as long as the

best practices mentioned below are employed as well.

Page 7: Cloud Security Best Practices With AWS

Verification Process

Page 8: Cloud Security Best Practices With AWS

The design should be non-conductive for simple access.

A few layers of security are encouraged to be installed.

This would likewise help in keeping up the strength and backtrack in the

event of breach of security.

AWS MFA is an extra layer of security over the typical approval levels

characterized by AWS IAM.

Entering a unique authentication code for privileged access is not a bad

trade-off for enhanced security.

Page 9: Cloud Security Best Practices With AWS

Streamlined Operations

Page 10: Cloud Security Best Practices With AWS

In case of an attack, the event area incident area is reduced if the

number of host applications using an Amazon Machine Image (AMI) is

less.

Amazon can't get to client occasions or visitor OS so it can't perform

essential OS solidifying steps and it is up to the client to perform these

check.

Page 11: Cloud Security Best Practices With AWS

Visitor OS Safety

Page 12: Cloud Security Best Practices With AWS

The virtualization or hypervisor layer (that tasks or virtualizes the visitor

OS case) is safe and reinforced by Amazon.

The administrative and Physical parts of security is additionally dealt with

by a robust system in place but the client should take care to implement

actualize cautious security controls to keep up their AWS occurrence

security.

Page 13: Cloud Security Best Practices With AWS

Amazon Elastic Compute Cloud (EC2) gives tools for example security

bunches, which combined with anti-virus and firewall fortifications to the

framework ought to ensure a stun proof framework.

Application accessibility and security balance is critical, which is kept up

by these checks. Encryption is additionally an imperative piece of this

process.

Page 14: Cloud Security Best Practices With AWS

Encode Sensitive Data

Page 15: Cloud Security Best Practices With AWS

Critical data could be user identity or qualifications, passwords, IDs or

codes.

While keep information abroad or an open cloud domain, make certain

of the jurisdiction and laws that control the file encryption policy around

there.

For "very still" information, users can utilize their due-persistence to

think of static encryption approaches to guarantee record Integrity.

This incorporates utilizing software and tools.

Page 16: Cloud Security Best Practices With AWS

Ensure File Integrity

Page 17: Cloud Security Best Practices With AWS

Logging the files every time a change is made is a good practice.

Critical system files, application configuration files and application logs

come under this section necessarily.

A rendition control tool is additionally attractive with such a setup.

Various consistence benchmarks today like PCI oblige this progression to

be attempted.

This best practice could follow a file that bargained the framework, the

precise date and time it began furthermore could prompt signs to how

to investigate the system.

Page 18: Cloud Security Best Practices With AWS

Host Based Fire Walls

Page 19: Cloud Security Best Practices With AWS

The AWS firewall lives up to expectations in the deny all mode.

Users need to open the ports through which they need the data to

experience.

Users ought not open remote access (RDP or SSH) to the greater part

of their generation cases rather they ought to utilize "Bastion hosts" to

get remote access to creation occurrences and lock down

administrative access to just the "Bastion host" from the external

network.

Page 20: Cloud Security Best Practices With AWS

Host Based Intrusion Anticipation

Page 21: Cloud Security Best Practices With AWS

Even if a firewall is host based and gives network based security, it can

do nothing about the traffic on the open ports.

To maintain the legitimacy and traffic integrity of the data flowing

through the open ports, SQL injection and Cross Site Scripting (XSS)

attacks should be prevented using HIPS (host based intrusion

prevention framework).

Page 22: Cloud Security Best Practices With AWS

At the point when selecting HIPS (host based intrusion prevention

system) solution, it is recommended that clients delineate computing

environment to the vendors rule-set coverage to ensure appropriate

protection,

Example- If the computing environment is based on Linux OS and the

vendor has a small rule-set for Linux based OS then it may not be the

best choice for that computing environment.

Page 23: Cloud Security Best Practices With AWS

Secure Coding Exercise

Page 24: Cloud Security Best Practices With AWS

It is at the soul of any IT related operation that the coding practices

utilized ought to be secure and epitome of delicate data be performed

at each reflection level.

Page 25: Cloud Security Best Practices With AWS

All the good exercise and tips specified above are at the heart of a

sheltered cloud operation at the client end of the exchange.

There are practices utilized at the service provider end however they

are in no way, shape or form adequate for a totally assault free

operation, particularly when there is critical data being disregarded

open areas.

Page 26: Cloud Security Best Practices With AWS

Important Cloud

Computing Strategies That

Will Help Your Business

Grow:

http://bit.ly/1LkvTu9

Page 27: Cloud Security Best Practices With AWS

Thank you for Reading!

Would Like to know more? Write to us at: [email protected]

http://www.intelligentia.co.in/

www.facebook.com/intelligentia.in

http://www.twitter.com/_intelligentia

http://www.linkedin.com/company/intelligentia-it-system